Top Banner
Security Measures and Metrics Pete Lindstrom Research Director Spire Security
49

Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Dec 25, 2015

Download

Documents

Betty Fisher
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Security Measures and Metrics

Pete Lindstrom

Research Director

Spire Security

Page 2: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Agenda

Elements of metrics

Interlude: Four disciplines

Back to metrics

ROI/ROSI

Page 3: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Status of security

Difficult to define “good security”

Minimal difference between security and “lucky”

We don’t know how to measure success.

One incident doesn’t necessarily mean “failure”

Page 4: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Key elements of security metrics

Page 5: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Key elements of security metrics

Building BlocksLet’s put them

together…

People:Admins by Department

Costs:Salaries, ConsultingHW, SW, Maint.

Activities:Four Disciplines

Time:Hr/Day

Month/Yr

Resources:User accts,

systems, apps

Page 6: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Agenda

Elements of metrics

Interlude: Four disciplines

Back to metrics

ROI/ROSI

Page 7: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Process Effectiveness MetricsProcess

Effectivenessa.k.a. “doing things

right”

Elements:• Activities• errors

For example:• Accts per person• Vulns per person• Patches per person

error rates

Page 8: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

ThreatMANAGEMENT

TrustMANAGEMENT

IdentityMANAGEMENT

VulnerabilityMANAGEMENT

Security reference model

1. Harden the Infrastructure

2. Control sources (users/others)

3. Harden the Process/data

4. Monitor/detectinappropriate and/or

malicious activity

Page 9: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

ThreatMANAGEMENT

TrustMANAGEMENT

VulnerabilityMANAGEMENT

IdentityMANAGEMENT

Identity ValidationAccount ManagementPassword Management

Policy ManagementSecurity Arch. DesignTicket Management

Vulnerability AssessmentsPatch ManagementSoftware Security

Four disciplines of security management

Threat IdentificationSecurity MonitoringIncident Management

INLINEINLINE

Intrusion Prevention

AuthenticationUser Access

Control

EncryptionIntegrity

System Access Control

Page 10: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Identity management

Functions

Identify users

Assign accounts/rights

Maintain identity (passwords)

Validate sessions

Authorize access

Page 11: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Vulnerability management

Functions

Scan for exposures

Eliminate vulnerabilities

Remediate vulnerabilities

Mitigate vulnerabilities

Manage compliance

Page 12: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Trust management

Functions

Write policies

Design security

Ensure confidentiality

Ensure integrity

Page 13: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Threat management

Functions

Analyze traffic

Analyze logs

Manage incidents

Conduct forensics

Page 14: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Agenda

Elements of metrics

Interlude: Four disciplines

Back to metrics

ROI/ROSI

Page 15: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Process Effectiveness MetricsProcess

Effectivenessa.k.a. “doing things

right”

Elements:• Activities• errors

For example:• Accts per person• Vulns per person• Patches per person

error rates

Page 16: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Process effectiveness

Error rates

Identity management• Request errors

Vulnerability management• Vulnerabilities remaining

Threat management• Incident response

Trust management• Policy violations

Page 17: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Staff Productivity MetricsStaff

productivitya.k.a. “people doing

things” better

Elements:• People• Activities

For example:• Accts per person• Vulns per person• Patches per person

Page 18: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Staff productivityProductivity and workload for all manual activities

(activities/people) Identity management• Requests per administrator• Account disablements per admin• Password resets per admin

Vulnerability management• Vulnerabilities resolved per administrator

Threat management• Incidents per person

Trust management• Policy changes per person

Page 19: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Cycle Time MetricsCycle Time

a.k.a. avg “time to perform activity x”

Elements:• Time• Activities

For example:• Accts per month• Vulns fixed per month• Patches per month

Page 20: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Process efficiency (cycle time)

Time/activities

Identity management• Request time

Vulnerability management• Remediation time

Threat management• Incident response time

Trust management• Policy creation time

Page 21: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Efficiency MetricsAdmins by

Department

2000 Hours per FTE

Efficiencya.k.a. “people doing

things” quicker

Elements:• People• Activities• Time

For example:• Accts/person/hr• Vulns/person/hr• Patches/person/hr

Page 22: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Cost Effectiveness MetricsAdmins by Department

Salaries, Consulting Fees

Costeffectiveness

a.k.a. “people doing things” cheaper

Elements:• People• Activities• Costs

For example:• Cost per acct• Cost per vuln fixed• Cost per patch

Page 23: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Cost effectivenessDollars/activities; dollars/resources; dollars/demographics Identity management• Cost per request• Cost per password reset

Vulnerability management• Cost per vulnerability• Cost per system setting

Threat management• Cost per incident

Trust management• Cost per policy• Cost per project

Page 24: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

When to use metrics

Process effectiveness• Six Sigma

Staff productivity• ROI / promotions

Cycle time• Balanced scorecard

Efficiency• ROI

Cost effectiveness• Activity-based costing• ROI/TCO

Page 25: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Business uses of security

Benchmarking (Balanced scorecard)

Baselining (Six Sigma)

Activity-based costing/Mgt

ROI

Risk management (ROSI)

Page 26: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Missing Element: RISK! Risk Managementa.k.a. “people doing

things” more securely!

Elements:• Activities• Resources

Four Disciplines:• Identity Mgt• Vuln Mgt• Trust Mgt• Threat Mgt

Page 27: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Risk metricsResources/resources; resources/demographics Identity management• User accounts per application

Vulnerability management• Vulnerabilities per resource

Threat management• Incidents per resource

Trust management• Policies per resource

Page 28: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Risk effectiveness

Activities/activities (automated)

Identity management

• Failed logins/total logins

Vulnerability management

• Access denied/total access

Threat management

• Incidents/events

Trust management

Page 29: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Agenda

Elements of metrics

Interlude: Four disciplines

Back to metrics

ROI/ROSI

Page 30: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Examples:Return on Investment (ROI) & Return on Security Investment (ROSI)

Page 31: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

The elements of value (Loss)

ROI

• IT productivity (time)

• User productivity (time)

…these also have ROSI value

ROSI

• Legal/regulatory costs (fees/fines)

• Direct revenue

• Stored asset value (intellectual property, financial

assets)

Page 32: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Let’s talk ROI

Keyword is efficiency

Reduced Capital Expenditures (CapEx)• Lower h/w, s/w costs

Scalability, manageability, performance

Reduced Operating Expenditures (OpEx)• Lower IT, end-user costs

(higher productivity)

Page 33: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Productivity

Where users and IT spend their time.

Time-is-money philosophy.

Often the only aspect of loss we quantify.

Basic source of ROI.

Hourly rate x hours of effort.

In order to determine the value of activities, you first have to determine what activities are performed.

Page 34: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Identity management ROI

Provisioning• New employee productivity• Automated account management

Password management• Reduced help desk time• Employee productivity

Web access control• Developer efficiency (build vs. buy)

Page 35: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Trust management ROI

Public Key Infrastructure

• Managing certificates

Virtual Private Networks

• Leased lines

SSL Acceleration

• Hardware efficiency

Page 36: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Vulnerability management ROI

Firewalls

• Reduce ACL management

Vulnerability assess/remediate

• Reduce manual efforts

Patch management

• Automate patching

Software quality

• Reduce bug fixes

Page 37: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Threat management ROI

Antivirus• Recovery of systems

Network IDS• Reduce manual detection/forensics

Host IDS• Manual log efforts

Security Event Management• Aggregation/prioritization of work

Page 38: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Getting to ROI

Identify amount of labor allocated to

individual security activities.

Identify solution and its corresponding

activities.

Identify labor difference with and without

solution.

Page 39: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

The roots of ROSI

Our overall objective is to reduce risk.We are relatively “new” to spending on

solutions.We often didn’t really do anything that was

considered a recurring expense (I am guessing a bit here).

But, the Internet has changed all that (or at least made it apparent).

Page 40: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Return on Security Investment

Keyword: Effectiveness

Effectiveness = Reduced risk

Protecting Value and Loss

• Legal/regulatory costs (fees/fines)

• Direct revenue

• Stored asset value (intellectual property,

financial assets)

Page 41: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Legal/regulatory costs

Lawsuits:

• Privacy suits

• Downstream liability

• Legal fees

Regulatory issues:

• Regulatory fines

• Remediation costs

Page 42: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Direct revenue

E-Commerce systems

Level of materiality

Seasons, cycles, forecasts drive expected

losses

Some benchmarks: shrinkage; materiality

(internal controls)

Page 43: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Stored asset value

Stored Value (financial assets)

Stored Knowledge (intellectual property)

Market Cap (or equivalent) – Book Value = Goodwill (intangible assets)

Some % of this Goodwill is attributable to information assets.• Professional services – higher percentage• Contract manufacturing or retail - lower

Page 44: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Determining loss

No physical goods

Ubiquitous supply

Full asset value is not necessarily lost

Look at loss in other ways:

• Type of loss

• For each application/system

Page 45: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Types of losses

How much value would be lost under the following conditions (for each app/dataset)?

Information-centric loss• Modified data (Integrity)• Copied data (Confidentiality)• Deleted data (Availability)

System/App-centric loss• Resource availability (Productivity)• Resource misuse (Liability)

Page 46: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Loss potentialRead Modify Delete Avail Misuse

Asset

Value

H M M L L

Revenue M H H H L

Fines M/H H L L ?

IT Prod. L H M L M

EU Prod. L L M H M

Page 47: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Calculating potential loss

Annual Loss Expectancy = Probability x ValueALE = P x A

(Insurance Industry)

Level One: Calculate overall loss potential in 5 categories.• ALE = P x L(Assets, Revenue, Fines, IT Prod, EU Prod)

Level Two: Take above and factor in types of losses.• ALE = P x (C(A,R,F,I,E); I(A,R,F,I,E); A(A,R,F,I,E))

Level Three: Perform above for all applications/data.• ALE = P x App1(C(A,R,F,I,E); I(A,R,F,I,E); A(A,R,F,I,E))…

Appn(C(A,R,F,I,E); I(A,R,F,I,E); A(A,R,F,I,E))

Page 48: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Getting to ROSI

Determines cost effectiveness of proposed

solution.

Calculate losses with and without solution.

Compare the difference.

Page 49: Security Measures and Metrics Pete Lindstrom Research Director Spire Security.

Pete [email protected]

Agree? Disagree?