Cybersecurity may feel like something new and special, but it’s merely a new application of concepts the world has seen countless times before. Today, security teams can apply ancient lessons from the battlefield to strengthen their cybersecurity programs. Five key principles from Sun Tzu’s The Art of War hold wisdom today.
The Art of War by Sun Tzu is considered one of the most influential and enduring classics on military strategy. This ancient Chinese text has guided generals and leaders for over 5000 years, despite dramatic changes in the nature of warfare over the centuries.
As we enter a new era of warfare, fought with bits and bytes over computer networks, many of Sun Tzu’s core principles maintain their relevance.
Sun Tzu emphasized the critical importance of having a clear vision of victory before engaging in war. Without defining what victory means for that specific conflict, it is impossible to achieve a victorious outcome. You end up blindly swinging your sword rather than executing a purposeful strategy.
This lesson applies directly to cybersecurity. Before implementing controls or selecting security tools, we need to define what victory means for our specific organization. What does a “win” look like? Some key steps toward this definition:
Create a vision statement for the security team – This gives your program meaning, grounds it in ideals bigger than any individual, and defines a destination to rally behind. Having a clear vision facilitates everything from recruiting talent to selecting technologies. It provides long-term direction.
Discuss acceptable losses and risk thresholds with leadership – No war ever avoids casualties, and cybersecurity is no different. We need to frankly discuss with boards and executives how much disruption the organization is willing to tolerate in pursuit of its business goals. This is where things such as risk capacity helps us to establish parameters for victory. Perhaps 10% revenue loss in a year is acceptable, but 20% the organization could not recover from. Defining these thresholds allows you to prioritize and justify security investments.
Educate all staff on victory and how they contribute – Getting broad buy-in is key. Staff must see how their daily actions map into achieving the defined victory for the organization. Create internal marketing campaigns, training programs, and other ways to engage employees with security imperatives based around your victory definition. This facilitates coordination and promotes appropriate corporate governance.
A key Sun Tzu principle is understanding yourself and your enemy. In cybersecurity, “knowing yourself” equates to comprehensively understanding your assets, capabilities, and the threats you face. Let’s break it down:
Know your revenue – Every organization in the world exists because they can generate revenue, it’s vital that we protect it. Follow the money trails that attackers aim to disrupt, from customer transactions to supplier relationships. Meet with Finance to map out your revenue cycles and business model. It’s a sad reality that many security leaders are not financially literate, and it must change.
Know your capabilities – Have clarity on where you can visibly detect threats, technically disrupt attacks in progress, and rapidly recover normal operations after an incident. No, your capabilities are not just the tools you bought from vendors in the Magic Quadrant; they are the outcomes you can drive with your collective people, processes, and technologies.
Know your enemies capabilities – You can’t defend against everything. Take time to nderstand what type of adversaries are most likely to target your organization. Then understand what tools, tactics, and procedures (TTPs) they are most likely to use in an eventual attack.
Focus on the intersection – Every war is won and lost at the intersection of capabilities, where one party can drive an outcome the other cannot stop. This is where tools such as MITRE ATT&CK allow you to understand and compare your capabilities to those of your adversaries. What tactics can your adversary use that you cannot detect, disrupt, or recover?
In the complex conflicts of today, victory is rarely achieved alone. It is coalition-based. As Sun Tzu noted, wise leaders expand their capabilities by choosing allies and partners judiciously.
Cybersecurity programs similarly need external partners, from vendors to government entities. But these allies must be vetted and selected carefully.
Sun Tzu emphasized the importance of coordinating the entire war effort, from supreme commander down to foot soldiers; everyone has a role. In cybersecurity as well, we cannot isolate security as the domain of one department. It must be woven into organizational culture and business processes. Security leaders must find ways to “enable defense from within.”
Sun Tzu advised military leaders to avoid obvious strategic and tactical mistakes that hand easy advantages to the enemy. Cybersecurity programs should similarly focus on core incident response capabilities and fixing basic security gaps, rather than only striving for impenetrable prevention.
With a clear vision of victory, knowing yourself and your enemies, trusted allies, organization-wide engagement, and avoiding losing, The Art of War provides a timeless blueprint for success in any warfare domain, even those Sun Tzu never could have imagined.
Michael Meis is the Founder of Kelevra and ACISO at The University of Kansas Health System.