Your IT Vendor Is Not Your Security Team
In many mid-sized Nepali enterprises, the responsibility for cybersecurity defaults to the same vendor or internal team tasked with managing infrastructure, network availability, and helpdesk operations.
This structural overlap introduces significant operational risk.
IT operations and cybersecurity are distinct disciplines with fundamentally opposing objectives. Conflating them violates the core security principle of segregation of duties. Both domains require deep technical expertise, but the associated threat models, frameworks, and performance metrics do not align.
The Objective Misalignment
An IT vendor's primary mandate is availability. Their operational incentives prioritize uptime, seamless user experience, and rapid resolution of functional outages. Success is measured by SLA adherence, license compliance, and minimal friction in identity management.
This mandate does not require them to adopt an adversarial mindset. Traditional IT operations do not conduct continuous threat modeling against the infrastructure they deploy. They are not engaged to map lateral movement vectors or identify exfiltration chokepoints that a persistent threat actor might exploit. This is not a deficiency in their service delivery; it is simply outside the scope of infrastructure management.
Security architecture is adversarial. It requires an operational model built on assuming breach, implementing zero-trust access controls, and continuously hunting for indicators of compromise (IoCs) across network telemetry.
The Operational Gap
When IT vendors deploy standard infrastructure (such as Active Directory environments or cloud tenants), they follow deployment templates optimized for functionality. A standard deployment typically involves configuring domain administrator credentials, creating functional service accounts, and enabling remote management protocols like RDP or WinRM.
However, securing this environment requires actions that actively introduce friction. An infrastructure-focused vendor is unlikely to systematically disable legacy authentication protocols (like NTLMv1), enforce strict Tier 0 administrative tiering, restrict lateral SMB traffic between endpoints, or deploy centralized SIEM logging with custom detection rules.
These missing controls represent the difference between an isolated, containable incident and a catastrophic domain-wide ransomware deployment.
The Requirements for Defensive Posture
A robust security posture demands dedicated resources focused on:
- Validating access controls and network segmentation through routine penetration testing and red team engagements.
- Actively hunting for behavioral anomalies in endpoint telemetry and network traffic analysis (NTA), rather than relying on reactive alert triage.
- Conducting comprehensive attack surface management (ASM), covering public-facing infrastructure, shadow IT instances, and third-party API integrations.
- Developing and actively simulating incident response (IR) playbooks.
- Integrating actionable threat intelligence feeds specific to regional and sector-based adversary groups.
This requires continuous validation, not periodic compliance checks.
The Limitation of Commodity Controls
Relying exclusively on endpoint antivirus or standard EDR solutions is a fragile defense strategy. Advanced persistent threats (APTs) and modern ransomware operators actively utilize "living off the land" (LotL) techniques. By abusing legitimate system binaries (such as PowerShell, WMI, or certutil) and utilizing fileless execution methods, attackers routinely bypass signature-based and heuristic detections. A silent antivirus dashboard does not guarantee a secure environment.
Conclusion
For enterprise leadership, treating IT vendors as critical operational partners is necessary, but extending their mandate to cover defensive security is a structural flaw. When a critical incident occurs, relying on the same team that architected the network to independently validate its security posture creates a conflict of interest.
Security requires independent validation. It is a distinct operational capability that organizations must build internally or source from specialized defensive practitioners.