Security is a management problem first

July 30, 2018
Focusing on security technology alone will not address some of the root causes behind many successful breaches

With what seems like a never-ending stream of cybersecurity attacks, corporate boards and executives are searching for that “silver bullet” to protect them from the universe of threats. Unfortunately, corporations are spending hundreds of millions on products that claim to be the cure-all, but in reality, these products are not stopping every attack because technology isn’t the only solution.

This above scenario leads to CIOs having shelves of un-deployed or under-utilized security products – a.k.a., “shelfware.” Many of these products have the potential to reduce security risks, but only if they are fully implemented and integrated into an overall security strategy. The problems may not be with the products, but rather a lack of management focus on how to properly design, implement, and monitor solutions. This requires an integration of people, processes, and technology.

Security Management Program Objectives

Implementing a security management program starts with understanding what assets need to be protected as well as establishing boundaries (or scope) of what will be included in a security management program. Assets should include data and intellectual property, as well as the information technology and other resources the organization uses to produce value. Organizations that rely on third parties to perform work on their behalf should consider including their assets managed by third parties in the scope of their security management program as well.

Once all assets have all been identified and the scope of the security management program established, management will need to establish security objectives to protect the data. For organizations new to this journey, consider the National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF)[1] as it is a good reference for the strategic-level security objectives, including Identify, Protect, Detect, Respond, and Recover. Each of these objectives will have multiple supporting observable and measurable controls.

Evaluating Risk

The next step is to identify risks to the assets and select appropriate controls from one of many security frameworks available to mitigate those risks. Unless there are legal, regulatory, or contractual requirements to align to a specific control framework — e.g., the Health Insurance Portability and Accountability Act (HIPAA) for healthcare organizations or the Payment Card Industry’s (PCI) Data Security Standards for those merchants that accept payment cards — organizations may want to align with the NIST CSF or the International Standards Organization 27002:2013 Standard.

Controls are selected as a byproduct of a risk assessment, where gaps in controls are evaluated and the likelihood and adverse impacts are documented. The risk management process should be documented and repeatable, so the outcome of a risk assessment is a prioritized set of actionable projects that can achieve the organization’s security objectives. It is unrealistic to expect all risks to be mitigated, but all open deferred risks should be reviewed at least annually by executive management. The risk assessment process should be updated on a set schedule and following changes in the security management program’s scope or environment.

Every untreated risk needs to be assigned to a risk owner. This individual should acknowledge his/her responsibility, preferably in writing. Executive leadership should hold these risks owners accountable for reducing the risk to a level within the published risk appetite.

Implementing Controls & Solutions

As stated earlier, controls supporting the key objectives need to be observable and measurable, and the selection of appropriate measurement points is critical to success. As an example, the NIST CSF function of Protecting systems requires implementation of a vulnerability management plan (PR.IP-12). This plan has many components, including the selection, deployment, and validation of software patches.

The primary objective of a patch management process (i.e., control) is to reduce or eliminate network vulnerabilities. Measuring the effectiveness of a network vulnerability control can be accomplished by reviewing patch deployment reports; however, this alone does not provide assurance that vulnerabilities are being reduced. There are several reasons that can contribute to this control’s failure, including the requirement to reboot a system following patch deployment, a misconfiguration that doesn’t permit a patch to work on all systems, or the presence of other incompatible software.

Automated patch management products can generate reports on the number of patches deployed. While these reports are important, measuring this control alone may present a false sense of security and ultimately divert management’s attention from the stated objective of remediating vulnerabilities.

The best solution to measure the control effectiveness for a patch management product is to select a control measurement at the end of the process, such as evaluating the number of vulnerabilities remediated. This can be accomplished by performing vulnerability scans and document systems still requiring remediation.

The CIO and the IT management team should then focus on reviewing run-time charts that document the number of both new and recurring vulnerabilities found on a monthly basis. These charts can also document the average age of unmitigated vulnerabilities, as this can be an early indicator of a resource shortage. In an optimized security management program, the overall number of recurring vulnerabilities should show a steady decline down to zero, while the number of days to remediate should also decline. Any increase in recurring vulnerabilities or average days to close would indicate a control failure, as shown in the example.

Wrapping it Up

By now, it should be clear that focusing on security technology alone will not address some of the root causes behind many successful breaches. The comparison between the reports from a patch management product and vulnerability scans illustrates how management can leverage touch points in seemingly unrelated controls to measure the objective’s effectiveness. There are many others addressing user training, incident response, and access controls. Only through the use of good security management principles, including the implementation of observable and measurable objectives, will organizations actually reduce the overall risk. Ultimately, managing security through observable and measurable metrics can help protect organizations’ assets.

[1] https://www.nist.gov/cyberframework 

About the author: Clyde Hewitt is the Vice President of Security Strategy, CynergisTek.