Even Your Security Tools Aren't Immune
MySherpa VP Ericka Downs was featured this week in SC Media's coverage of CVE-2026-20223, making the case that even the tools we deploy to protect us can't be implicitly trusted. This article expands on that thinking.
The recent disclosure of a maximum-severity (CVSS 10.0) vulnerability in Cisco Secure Workload Cluster Software is not just another security advisory. It is a direct reminder that even the platforms designed to protect us can become attack vectors. This critical flaw, allowing unauthenticated remote attackers to gain Site Admin privileges, perfectly illustrates the core tenet of the "assume breach" mindset: compromise is inevitable. This is not about fear; it is about building resilience.
1. The Inevitable Truth: What "Assume Breach" Really Means
Forget the old fortress mentality where a strong perimeter was enough. Modern threats bypass traditional defenses with alarming regularity. "Assume breach" is not a defeatist attitude. It is a strategic imperative that shifts our focus from preventing every attack to minimizing the impact when an attack succeeds. It acknowledges that sophisticated adversaries will eventually find a way in.
1.1 Beyond the Perimeter: Why Traditional Security Fails
Attack surfaces are expanding with cloud, mobile, and remote work. Sophisticated phishing and social engineering bypass technical controls. Insider threats, whether malicious or accidental, represent a constant risk. According to the IBM Security & Ponemon Institute Cost of a Data Breach Report, the average time to identify and contain a breach was 258 days in 2024. That is more than eight months of undetected compromise.
What is meant by a security breach? It is not just one thing. Breaches happen through stolen credentials, social engineering attacks, ransomware, system vulnerabilities, SQL injection, human error, and even physical security compromises. Each vector represents a different failure mode, and no single control stops them all.
1.2 The Mindset Shift: From Prevention to Resilience
Focus on detection and rapid response, not just impenetrable walls. Design systems to operate securely even when compromised. Prioritize limiting lateral movement and data exfiltration post-breach. Think of it like having a smoke detector and a fire extinguisher, not just a locked door.
Highlight: Thinking "assume breach" is like designing a skyscraper with fireproof compartments and evacuation plans, rather than just relying on a single, unbreachable front door. You prepare for the worst, even as you hope for the best.
2. The Cisco Case Study: A CVSS 10.0 Reminder
The Cisco Secure Workload vulnerability (Cisco Security Advisory: CVE-2026-20223) is not just a number. It is a real-world scenario where a critical security control became the vulnerability itself. This flaw in a zero-trust segmentation tool underscores that no component, especially those designed for security, can be implicitly trusted.
2.1 Dissecting CVE-2026-20223: When Security Tools Turn Against You
The details are critical. A CVSS v3.1 base score of 10.0. Maximum severity. The flaw allows unauthenticated remote attackers to gain Site Admin privileges. It affects both SaaS and on-premises deployments, with no workarounds except patching. The tool meant to segment and protect became the gateway to full compromise.
Attackers could access internal REST API endpoints, read sensitive information, and make configuration changes across tenant boundaries. No authentication was required. No special configuration was needed to exploit it.
In SC Media this week
MySherpa VP Ericka Downs, quoted in SC Media's coverage of CVE-2026-20223:
"We can't implicitly trust anything in the environment, including the tools meant to protect it. We have to design with an 'assume breach' mindset, where segmentation limits impact and keeps an incident from spreading."
2.2 The Zero Trust Paradox: Trust Nothing, Verify Everything
Cisco Secure Workload is designed for microsegmentation: a core Zero Trust tenet. The vulnerability highlights that even Zero Trust components need continuous validation. The foundational document for this, NIST SP 800-207: Zero Trust Architecture, reinforces this principle: "no actor, system, network, or service...is trusted by default."
This incident is not a failure of Zero Trust, but a validation of its core "assume breach" premise. Even your security infrastructure requires scrutiny.
Highlight: The Cisco flaw teaches us that even our most trusted security partners and their tools require continuous scrutiny. It is a powerful argument for partnership risk analysis. Do not put all your security eggs in one basket, or at least understand the systemic risk if that basket breaks.
3. Operationalizing "Assume Breach": Three Foundational Shifts
Moving from a theoretical understanding of "assume breach" to practical implementation requires fundamental shifts in how organizations design, deploy, and manage their security. These are not quick fixes but strategic investments in long-term resilience.
3.1 Microsegmentation: Containing the Blast Radius
Divide networks into small, isolated zones to limit lateral movement. Apply least-privilege access controls between segments. If one segment is breached, the attacker cannot easily move to others. This is like the fire doors in a building, preventing a small fire from becoming a conflagration.
Strong IT infrastructure solutions make microsegmentation practical, creating network boundaries that contain threats rather than letting them spread freely.
3.2 Continuous Verification: Trust is a Liability
Verify user identity, device health, and application permissions at every access attempt. Implement Multi-Factor Authentication (MFA) everywhere: Microsoft data shows it blocks 99.9% of automated attacks. Regularly audit configurations and access policies for deviations. Assume every request could be malicious until proven otherwise.
3.3 Enhanced Detection & Response: Speed is Your Ally
Invest in advanced threat detection tools like EDR and SIEM with behavioral analytics. Develop and regularly test incident response plans. Focus on reducing Mean Time To Detect (MTTD) and Mean Time To Respond (MTTR).
What is the first thing you do when you get hacked? Isolate affected systems immediately to prevent lateral movement. Then activate your incident response plan. Organizations with mature detection capabilities identify breaches in days, not months.
4. Common Pitfalls & How to Navigate Them
Implementing an "assume breach" strategy is not without its challenges. Many organizations stumble when trying to apply these principles without a clear roadmap or understanding of common obstacles.
4.1 The "Too Hard, Too Expensive" Myth
Zero Trust implementations can be phased, starting with critical assets. The cost of a breach far outweighs the investment in proactive security. The IBM Security & Ponemon Institute Cost of a Data Breach Report consistently shows organizations with mature zero trust implementations have significantly lower average breach costs. We are talking over a million dollars less per incident.
Focus on measurable business outcomes: reduced downtime, lower breach costs. It is an investment in business continuity, not just an IT expense.
4.2 Over-Reliance on Single Partners
Security concentration risk is real, as the Cisco flaw demonstrated. Diversify security controls where appropriate, or thoroughly vet single-partner solutions. Understand the blast radius if a core security component is compromised.
Partnering with experienced Managed Services Providers helps distribute risk and ensures you are not dependent on a single partner's security posture.
4.3 Neglecting the Human Element
SANS Institute research shows employee error or negligence accounts for more than 80% of data breaches. Regular cybersecurity training is non-negotiable. Foster a security-aware culture where everyone understands their role. Even the best tech fails if people are not part of the solution.
5. Actionable Next Steps for Your Organization
Shifting to an "assume breach" posture is a journey, not a destination. Regardless of your organization's size or current security maturity, there are concrete steps you can take today to enhance your resilience.
5.1 For Small to Mid-Sized Businesses (SMBs)
Prioritize MFA implementation across all services. Implement least-privilege access for all users and systems. Regularly back up critical data and test disaster recovery plans. Consider partnering with a carefully vetted MSP for expert guidance. Data from the Verizon DBIR shows SMBs face disproportionate ransomware pressure, making professional IT support essential.
5.2 For Enterprises & Large Organizations
Conduct a detailed Zero Trust architecture assessment using the CISA Zero Trust Maturity Model as a framework. This push is echoed by federal mandates like Executive Order 14028 and OMB Memorandum M-22-09, which require U.S. government agencies to adopt Zero Trust architectures. Implement microsegmentation for critical applications and data. Develop and mature a continuous monitoring and threat hunting program. Invest in advanced security orchestration, automation, and response (SOAR) capabilities.
5.3 The Path Forward: Continuous Improvement
Security is a continuous process, not a one-time project. Regularly review and update security policies and controls. Stay informed about emerging threats and vulnerabilities. Embrace a culture of learning and adaptation within your security team.
The Cisco 10.0 flaw is a powerful, real-world validation of the "assume breach" principle. It is a call to action for every organization to move beyond traditional perimeter defenses and build security architectures designed for resilience in the face of inevitable compromise. By embracing this mindset, you transform potential disasters into manageable incidents. This secures your business outcomes and lets you focus on growing.
Ready to strengthen your organization's cyber resilience? We help you partner with top-tier professionals who understand the "assume breach" mindset. They can help you implement practical, effective security controls that protect your business when threats emerge. Not if.
Further reading: SC Media's coverage of CVE-2026-20223, featuring commentary from MySherpa VP Ericka Downs.

