6

28-33 RealityCheck 7/9/03 10:23 AM Page 28 · experts become superheroes again. By applying the determined budget across the potential threat windows, the security organization should

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 28-33 RealityCheck 7/9/03 10:23 AM Page 28 · experts become superheroes again. By applying the determined budget across the potential threat windows, the security organization should

28-33_RealityCheck 7/9/03 10:23 AM Page 28

Page 2: 28-33 RealityCheck 7/9/03 10:23 AM Page 28 · experts become superheroes again. By applying the determined budget across the potential threat windows, the security organization should

Why hasn’t a major television network produced a show

about IT security? At first glance, it seems a subject

fraught with drama-a cross between high-tech thriller and

political saga, with a little comic book humor thrown in for

the kids. Our hero is the Chief Information Security Offi-

cer (CISO) of a major enterprise, and we join him as he

battles espionage and intricate hacking attempts.

But there’s a catch: Before the CISO can thwart

would-be attackers, he first must convince execu-

tive management that the threats are big enough

to warrant a hefty measure of protection. And

here’s another twist: Sometimes the threats

are not big enough. So we end up watching a

CISO that sometimes is Batman, with all

of the bells and whistles to protect

Gotham City from disaster-and

sometimes he is just Bruce Wayne.

Reality

check

Balancing cost and risk is the

secret to IT security success

A U G U S T 2 0 0 3 D E L L I N S I G H T 2 9

Reality check [ Cutting Edge ]

By Sarah C. Close

28-33_RealityCheck 7/9/03 10:23 AM Page 29

Page 3: 28-33 RealityCheck 7/9/03 10:23 AM Page 28 · experts become superheroes again. By applying the determined budget across the potential threat windows, the security organization should

[ Cutting Edge ] Reality check

Fascinating? Not really.

Who wants to watch a superhero battle

evil on a budget? Yet that’s the case in the

world of IT security. It’s not a thrilling

drama—it’s more of a reality show.

Instead of hurling a constant barrage

of high-powered artillery at their

assailants, CISOs must walk a thin

and realistic line between cost and

risk, weighing asset values and loss

expectancies against the likelihood

of certain threats. To strike that

balance and paint an accurate

picture of potential vulnerabilities

and foes, businesses must engage in ongoing

risk assessments that help justify both the

expense and value of security.

An enterprise-wide adventure

The task of justification is a necessary

burden in today’s IT world. Like it or not,

IT organizations are under tremendous

pressure to align technology with business

objectives. Budgets are tight, and executive

attitudes have shrunk from the gaping

optimism of the late 1990s into a more

practical mindset. Companies now accept

that an IT infrastructure built for the sake

of IT only neglects the importance of the

business it is meant to serve. Likewise, IT

security implemented purely for the sake

of protecting IT investments—and not for

protecting all enterprise assets, including

the corporate purse—neglects the value

of corporate objectives. It also shows the

kind of dichotomy between IT and busi-

ness that some experts believe

triggered the downfall of the

dot-com dominion.

Risk assessments are the

means by which companies can

visualize the alignment between

IT security and business, putting

faceless threats and intan-

gible asset value into a

language that all C-level

executives can under-

stand. Only through

mutual, enterprise-wide

communication can an

accurate risk assessment

take place. CIOs and

CISOs are responsible

for communicating the

strengths and weaknesses

of the IT infrastructure to

the rest of the management

team, while CEOs and CFOs

help convey the business

requirements.

William Hugh Murray,

certified information

systems security personnel

(CISSP), agrees. Murray is

an executive consultant with

TruSecure Corporation, an

international managed secu-

rity services provider based in

Herndon, Virginia. In an ideal

risk assessment scenario, he

says, “Security staff first

28-33_RealityCheck 7/9/03 10:24 AM Page 30

Page 4: 28-33 RealityCheck 7/9/03 10:23 AM Page 28 · experts become superheroes again. By applying the determined budget across the potential threat windows, the security organization should

A U G U S T 2 0 0 3 D E L L I N S I G H T 3 1

recommends to general

management a choice of risk postures, and

general management chooses the level of

risk that it is comfortable with.” At this

point, the security staff works to match

present risks to company objectives by

selecting the protective measures that

satisfy both categories.

As obvious as it seems, achieving this

kind of company-wide cooperation can be

a frequent holdup in the execution of risk

assessments, according to Chris Richter,

director of security product management

at Cable & Wireless (C&W), another global

provider of managed security services.

“For risk assessments to be done prop-

erly,” Richter says, “the entire company

must support implementing the project,

which is often a very large undertaking.”

Unfortunately, many companies don’t

think about putting this much effort into

analyzing risk until a threat already has

appeared. They either misunderstand the

purpose of the exercise, or they don’t

believe the cost of the assessment will

justify its potential savings.

Figuring it out

Aside from recognizing the need to engage

all aspects of senior management in the

process, experts typically have disagreed

on the preferred methodology for assessing

risk. Quantitative supporters give a thumbs

up to a mathematical approach because it

converts risk into the language of value

that CEOs and CFOs—the ones controlling

the purse strings—best understand. A

quantitative risk assessment assigns

numerical or financial values to certain

variables—such as annual loss expectancy

(ALE), single loss expectancy (SLE), or

total cost of ownership (TCO) for an asset

or security solution—and then plugs those

figures into formulas that help gauge the

consequences of a particular implementa-

tion or attack. By weighing security in

terms of dollars and cents, the business

benefits—and the effectiveness of the secu-

rity solutions in play—become apparent

and justified.

However, qualitative enthusiasts say

that purely formulaic strategies ignore the

dynamics inherent in today’s business.

Technology is constantly changing. Asset

value is constantly changing.

And, as anyone who watches

the news can attest, threats are

constantly changing and often

concealed. “A major limitation

is visibility into threats and

vulnerabilities,” TruSecure’s

Murray says. “Threats change

over time, and vulnerabilities

may be both numerous and

obscure.” Other variables include

expertise, global markets, politics,

and corporate or departmental

objectives. To approach risk assess-

ment without adapting to all of

these variables is counterproductive

and might result in inaccuracies.

Not surprisingly, seasoned secu-

rity professionals now are leaning

toward a combined approach to risk

assessment that covers four basic areas:

what you are trying to protect (asset

value), what you are protecting assets

from (threat analysis), the likelihood of

those threats (vulnerability assessment),

and the potential cost to the business

(loss expectancy).

In analyzing each of these areas,

Richter says, “C&W recommends both

An ounce of

prevention?Does risk management equal risk prevention?

No way, experts say. Total technological secu-

rity does not exist. Our IT infrastructures

rely far too heavily on networked connections

to survive inside a vacuum. Although total risk

prevention is impossible, companies can

implement preemptive measures. Examples

include: firewall policy modification, installa-

tion of intrusion detection devices and soft-

ware, distributed denial of service (DDoS)

mitigation, the review and elimination of

vulnerabilities in custom-generated software

code, software patch applications, and the

strengthening of authentication practices for

virtual private network (VPN) users.

28-33_RealityCheck 7/9/03 10:24 AM Page 31

Page 5: 28-33 RealityCheck 7/9/03 10:23 AM Page 28 · experts become superheroes again. By applying the determined budget across the potential threat windows, the security organization should

[ Cutting Edge ] Reality check

quantitative and qualitative

approaches to risk assessments, because

both play a very vital role.” Similarly,

TruSecure recommends the use of a

simple risk equation (Risk = Threat ×

Vulnerability × Cost) that recognizes some

costs will be without dollar figures.

These so-called soft or semi-soft costs

include lost productivity, damage

control, and lost customer loyalty—and

enterprises never should discount them

from an accurate risk assessment.

The weakest link

Of all the elements within risk assess-

ment, one in particular offers enter-

prises greater control over security:

vulnerability assessment. Unlike

threat assessment, which takes

stock of potential attackers beyond

your reach, vulnerability assess-

ment provides visibility into infra-

structural weaknesses. These

weaknesses are places within

your infrastructure where attacks

might be successful, but they

also are places that you can

monitor and modify at will.

The trick is to find these weak-

nesses before the hackers do.

Where do you look?

Everywhere, Richter says.

Companies should do

“everything from analyzing

software code for buffer

overflow vulnerabilities to

making sure that the card

scanning system on the

front door is working

properly, or even deter-

mining how easy it is to

obtain unauthorized

router log-in credentials from

an overly trusting system administrator.”

Cable & Wireless offers a managed vulnera-

bility scanning service that helps customers

pinpoint their Achilles’ heels on an ongoing

basis. “A good managed vulnerability scan-

ning service can not only reveal to

customers what common hack-attack risks

they are exposed to,” says Robert Hansen,

security product manager, “but also how

their vulnerability to such attacks has

changed over time, if at all.”

More importantly, companies that can

identify their vulnerabilities have the

opportunity to repair them and thereby

prevent some attacks—or at least mitigate

risk. “Given that a threat assessment is part

of every risk analysis,” Hansen says, “the

likelihood of the potential threat decreases

dramatically when proactive vulnerability

scanning is combined with risk mitigation

by trained security professionals.”

Now what?

After accurately assessing the risk your

company faces, it is time to deploy the

appropriate security measures to manage

that risk. Now, the CISO and security

experts become superheroes again. By

applying the determined budget across the

potential threat windows, the security

organization should be able to propose and

implement a detailed posture of defense

that will adequately, effectively, and effi-

ciently protect the enterprise.

Gartner analyst Mark Nicolett advises

companies to focus on these four critical

pillars for effective IT security:1

» Security risk, organization, policies, and

architecture. “A key element of effective

IT security risk management is to identify

exposures and their potential costs so

that security policies—and an overall

security architecture—

can be developed to minimize these

exposures and costs.”

» Security infrastructure. “An enterprise’s

security infrastructure is made up of the

tools, technologies, and tactics that are

deployed to protect the network perime-

ter and internal resources.”

» Security administration. “Enterprises

cannot realize satisfactory returns on

their investment in security planning

and policy development without effec-

tive execution and implementation.”

» Business continuity planning. “Busi-

ness continuity planning has evolved

beyond its traditional focus on disaster

recovery to include planning and design

for IT and business process resilience.”

And because risk assessment should be

an ongoing and adaptable endeavor, certain

elements of the process—such as vulnera-

bility assessments and asset valuations—

should continue regularly throughout the

security strategy.

Although The CISO Show probably

won’t grace your TV screen next season,

the challenges of IT security are still prime-

time fodder. The climate of this era, torn

between terror alerts and a timid economy,

has forced us to focus simultaneously on

defense and value, on the implementation

of stringent protection, and on the cost

justification of such protection. Although

companies cannot fend off every hacker

attack with laser beams and pulverizers,

they can approach security with the realism

it deserves. An accurate risk assessment,

coupled with flexibility and an acknowledg-

ment of boundaries, could be the most

important mechanism in aligning business

and technology, once and for all.

3 2 D E L L I N S I G H T A U G U S T 2 0 0 3

1 Gartner, Inc. Managing IT Security Risk in a DangerousWorld by Mark Nicolett. March 25, 2003.

…“soft” or “semi-soft” costs include

lost productivity, damage control, and

lost customer loyalty…

28-33_RealityCheck 7/9/03 10:24 AM Page 32

Page 6: 28-33 RealityCheck 7/9/03 10:23 AM Page 28 · experts become superheroes again. By applying the determined budget across the potential threat windows, the security organization should

Reality check [ Cutting Edge ]

Don’t forget

your prioritiesMany organizations approach IT security with only a vague understanding of the hazards they face.

Jennifer Asprey, CISSP and a senior security product manager with Cable & Wireless, says that

many C&W customers come looking for managed security “after performing some kind of security

assessment” rather than conducting an overall risk analysis. “Most of our customers understand

the overall threats in the industry and come to us with a perceived need,” Asprey says. “But very

few customers understand how to prioritize the risks or determine whether dollars are better spent

on one security service versus another.”

Prioritization is a critical but often overlooked step in the risk assessment process. Beyond simply

identifying assets and threats, companies must determine which assets are the most valuable,

which threats are the most manageable, and which losses are the most tolerable. William Hugh

Murray, CISSP and an executive consultant with TruSecure Corporation, offers some helpful rules

of thumb: “Do not spend more money mitigating a risk than tolerating it would cost you. And never

spend more money making a decision than the value of the decision.” In other words, he says,

recognize your “implementation-induced limitations”-such as budget, available expertise, and

time-and “limit the use of expensive rigor and discipline to those decisions that really require it.”

Companies also must consider the usability of the infrastructural components they are protect-

ing. “This is a careful balancing act,” says Asprey. “As the security of a given device goes up,

the usability goes down.” Prioritizing risks and assets can help a company better determine the

extent to which it is willing to make compromises.

A U G U S T 2 0 0 3 D E L L I N S I G H T 3 3

28-33_RealityCheck 7/9/03 10:24 AM Page 33