Solution Path: Threats and Vulnerabilities



Similar documents
Understanding Vulnerability Management Life Cycle Functions

The Six Triggers for Using Data Center Infrastructure Management Tools

Recognize the Importance of Digital Marketing

Agenda for Supply Chain Strategy and Enablers, 2012

Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost

Cloud IaaS: Security Considerations

Gartner's View on 'Bring Your Own' in Client Computing

Cloud IaaS: Service-Level Agreements

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users

Organizations Should Implement Web Application Security Scanning

How to Develop an Effective Vulnerability Management Process

CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance

Organizations Must Employ Effective Data Security Strategies

Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets

NAC Strategies for Supporting BYOD Environments

Emerging PC Life Cycle Configuration Management Vendors

How to Choose Providers for Mobile Consumer Application Platforms

Key Issues for Identity and Access Management, 2008

Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process

Establishing a Strategy for Database Security Is No Longer Optional

Now Is the Time for Security at the Application Level

Choosing a Replacement for Incumbent One-Time Password Tokens

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products

Overcoming the Gap Between Business Intelligence and Decision Support

IT asset management (ITAM) will proliferate in midsize and large companies.

How To Create A Cloud Computing System

Research. Key Issues for Software as a Service, 2009

Discovering the Value of Unified Communications

Prepare for the Inevitable With an Effective Security Incident Response Plan

The Lack of a CRM Strategy Will Hinder Health Insurer Growth

The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools

Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in

Business Intelligence Focus Shifts From Tactical to Strategic

The Five Competencies of MRM 'Re-' Defined

IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions.

IT Cost Savings With Information Governance

Toolkit: Reduce Dependence on Desk-Side Support Technicians

Eight Critical Forces Shape Enterprise Data Center Strategies

2010 FEI Technology Study: CPM and BI Show Improvement From 2009

Security and Identity Management Auditing Converge

Research Agenda and Key Issues for Converged Infrastructure, 2006

Data in the Cloud: The Changing Nature of Managing Data Delivery

Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity

Deliver Process-Driven Business Intelligence With a Balanced BI Platform

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing

Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons

Managing IT Risks During Cost-Cutting Periods

Best Practices for Confirming Software Inventories in Software Asset Management

Cloud Decision-Making Criteria for Educational Organizations

For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes.

The Four New Ps of Marketing That CMOs and CIOs Should Consider

X.509 Certificate Management: Avoiding Downtime and Brand Damage

The Next Generation of Functionality for Marketing Resource Management

Is a Commodity and Other Fairy Tales

Private Cloud Computing: An Essential Overview

Q&A: The Many Aspects of Private Cloud Computing

Gamification Meets Analytics With Kaggle

Charity Shows That You Don't Need a Big Budget to Succeed With Predictive Analytics

Ensure Emerging Trends and Technologies Advance Your Marketing Strategy

Gartner Clarifies the Definition of the Term 'Enterprise Architecture'

IT Operational Considerations for Cloud Computing

IT Architecture Is Not Enterprise Architecture

Governance Is an Essential Building Block for Enterprise Information Management

NGFWs will be most effective when working in conjunction with other layers of security controls.

Selection Requirements for Business Activity Monitoring Tools

Invest in an analysis of current metrics and those missing, and develop a plan for continuous management and improvement.

Roundup of Business Intelligence and Information Management Research, 1Q08

2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities

How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits

Strategic Road Map for Network Access Control

Cost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending?

Key Issues for Data Management and Integration, 2006

Key Issues for Consumer Goods Manufacturers, 2011

Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability.

Use Heterogeneous Storage Virtualization as a Bridge to the Cloud

Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools

Q&A: How Can ERP Recurring Costs Be Contained?

When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud

Energy savings from well-managed data centers can reduce operating expenses by as much as 20%.

BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle

The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other.

Real-Time Decisions Need Corporate Performance Management

The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption

Measuring the Business Value of Data Quality

Tactical Guideline: Minimizing Risk in Hosting Relationships

The Seven Building Blocks of MDM: A Framework for Success

Use This Eight-Step Process for Identity and Access Management Audit and Compliance

XBRL Will Enhance Corporate Disclosure and Corporate Performance Management

The Current State of Agile Method Adoption

Key Issues for Business Intelligence and Performance Management Initiatives, 2008

Cloud, SaaS, Hosting and Other Off-Premises Computing Models

Assessing the Security Risks of Cloud Computing

In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand

Business Intelligence Platform Usage and Quality Dynamics, 2008

An outline of the five critical components of a CRM vision and how they contribute to an enterprise's CRM success

Consider Identity and Access Management as a Process, Not a Technology

Singapore Empowers Land Transport Planners With Data Warehouse

Microsoft and Google Jostle Over Cloud-Based and Collaboration

The What, Why and When of Cloud Computing

Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy

Transcription:

Solution Path: Threats and Vulnerabilities Published: 24 January 2012 Burton IT1 Research G00226331 Analyst(s): Dan Blum This solution path helps Gartner clients develop a strategy and program for managing threats and vulnerabilities in their IT environments. Table of Contents Problem Statement...1 Solution Path Diagram...2 What You Need to Know...4 Solution Path...4 Implement a Risk Management Process...4 Assess Threats and Raise Awareness...4 Resist Cyberattacks and Malware...5 Assess and Manage Vulnerabilities...6 Monitor IT Infrastructure and High-Value Applications...6 Implement Incident Investigation and Response Processes...7 Provide Feedback and Adapt...7 Revisit Security Architecture...7 Advance Security Monitoring Capabilities...7 List of Figures Figure 1. Managing Threats and Vulnerabilities...3 Problem Statement How can we monitor, assess and manage technical threats and vulnerabilities in our IT environments?

Solution Path Diagram Page 2 of 9 Gartner, Inc. G00226331

Figure 1. Managing Threats and Vulnerabilities How can we monitor, assess and manage threats and vulnerabilities to our IT environments? Solution Path Research Research Risk Management: Concepts and Frameworks Security Monitoring Threat Assessment in Dangerous Times 1.0 Implement a risk management process Vulnerability Management Decision Point Malicious Software Decision Point 2.1 Assess threats and raise awareness 2.2 Resist cyberattacks and malware 2.3 Assess and manage vulnerabilities 2.4 Monitor IT infrastructure and high-value applications Malware, APTs and the Challenges of Defense Vulnerability Management Practices and Vulnerability Assessment Technology 3.0 Implement incident investigation and response Attacks, Fraud and Loss: The Continuing Insider Threat 4.0 Provide feedback and adapt Web Application Testing: Protecting the Front Lines Acting on Security Monitoring: Incident Response and Forensics Security Key Performance Indicators 5.0 Revisit security architecture 6.0 Advance security monitoring capabilities Framework for Creating a Security Technology Architecture Market Profile: Security Information and Event Management, 2010 2012 Gartner, Inc. and/or its affiliates. All rights reserved. Source: Gartner (January 2012) Gartner, Inc. G00226331 Page 3 of 9

What You Need to Know Simply from reading the news, it's clear that global compliance requirements are increasing and that external threats are becoming more numerous and capable. At the same time, many enterprise environments are becoming more complex, with increased globalization and outsourcing, and this potentially leads to more vulnerabilities and insider threats. Any organization in any industry needs to make an effort to protect itself against threats and vulnerabilities. However, organizations in the national defense, government, financial services, critical infrastructure, telecommunications or media industries as well as many other types of organizations that manufacture or develop valuable, proprietary trade secrets and technologies must recognize that they're at risk of attacks from advanced persistent threats (APTs), such as national intelligence agencies and organized cybercrime groups. Organizations should conduct their security program starting with the assumption that they may even now already be compromised by an APT and should make a concerted effort to limit current and future damages. Gartner provides this solution path as a starting point for implementing a risk-appropriate threat assessment and vulnerability management program in the enterprise. Solution Path This solution path provides a step-by-step road map to understanding the problems, solutions and choices required to answer the question: "How can an organization monitor, assess and manage technical threats and vulnerabilities to its IT environment?" Each step recommends general strategies and refers readers to research with more detailed recommendations. Some steps also point to specific Reference Architecture Decision Points, walking readers through a road map of architectural choices. Implement a Risk Management Process Because risks are a function of threats, vulnerabilities and consequences, an enterprise threat and vulnerability management program is closely related to the risk management process. However, threat and vulnerability management should operate continuously providing feedback to the risk management process, as well as providing or supporting operational services (such as protection against malware, remediation of vulnerabilities and investigations of adverse events). Risk management itself must be front and center to enterprise information security programs. Most organizations should, at least on an annual basis, conduct an enterprisewide risk assessment. Moreover, more limited or localized risk assessments should be triggered by business and IT changes or other events, such as opening a new site, deploying a new e-commerce system or taking on a new strategic outsourcing partner. Assess Threats and Raise Awareness Organizations must assess the threats posed by internal or external people. While APTs have garnered considerable notoriety lately, insider risk is also an ever-present danger (see "Attacks, Page 4 of 9 Gartner, Inc. G00226331

Fraud, and Loss: The Continuing Insider Threat" for more information). Because a variety of attacks from insider threats (e.g., rogue financial traders) and external threats (e.g., APTs or hacktivists) can credibly cause medium or high consequences, it's important to raise awareness of the risks not only in the security department, but also across the organization. This is especially true in light of attackers' use of social engineering techniques, such as spear-phishing emails, for initial penetration of the target organization. "Threat Assessment in Dangerous Times" recommends, at minimum, that organizations understand the threat landscape for their industries or lines of business and gather threat data by participating in information sharing forums. Organizations should disseminate threat data to the groups that need it and should provide actionable instructions. Depending on the risk level and the nature of the business, organizations may also need to organize a dedicated threat assessment team and/or make use of third-party threat intelligence, brand protection services and/or other services. Organizations should also factor the results of threat assessment into protection programs to better understand the likelihood and nature of different types of attacks. Gartner's threat assessment guidance also advises organizations to participate in information sharing forums, such as the International Information Integrity Institute (I-4), International Security Forum (ISF), or the various Information Sharing and Analysis Centers (ISACs), to learn of the threats that peer organizations have or haven't discovered. If appropriate, this information can be used to help justify security budget and staffing to progress the IT security architecture from one that just deals with basic threats and vulnerabilities to one that also leverages increased resources and/or advanced technologies for its defense. Resist Cyberattacks and Malware Threats use direct cyberattacks (hacking), social engineering (e.g., phishing) and malware to exploit vulnerable systems or unaware users and to accomplish their intents. They also sometimes employ physical attacks, such as stealing a mobile computer or backup media. One thing that's clear from "Threat Landscape" is that, even if organizations aren't already themselves the subject of targeted attacks, by tolerating vulnerabilities and allowing malware into their IT environments, they may become targets of opportunity. This is due to an increasingly collaborative cybercrime environment in which some hackers specialize in writing malware, while others specialize in exploitation. Thus, if one of your systems is compromised by spyware, your users' credentials may be sold in an underground forum (server root accounts fetch a higher price). Resisting malware, therefore, must be part of most organizations' baseline security defense capability. Typically, anti-malware tools are implemented on most client and server endpoints and in network security gateways. However, planners must make many technical choices, such as whether to layer defenses along diverse infection and exfiltration vectors and whether to emphasize blacklisting, whitelisting, behavioral, reputation and other approaches at a particular layer for a particular use case. To plan an optimized malware defense, see "Malicious Software" and "Malware, APTs, and the Challenges of Defense." Gartner, Inc. G00226331 Page 5 of 9

Assess and Manage Vulnerabilities Vulnerability management also needs to be part of every organization's security program. Organizations should implement vulnerability scanning and remediation for IT infrastructure (e.g., network routers and host operating systems) and for any applications that are in widespread use. Organizations should also include virtual and cloud environments, as well as mobile, wireless and non-pc devices (e.g., printers), in the program. Vulnerability management tools have evolved from simple scan-and-report mechanisms to processfocused systems that manage the full implementation of technical security policy on host and network devices. But even advanced vulnerability management products may lack an out-of-thebox capability for leveraging detailed context to properly classify vulnerabilities and to prioritize remediation steps. Thus, if organizations are unwilling to invest in a comprehensive set of vulnerability management tools and processes or are in the early stages of deploying technical professionals must do more of the prioritization, triage, testing and classification work manually. In practice, this means identifying high-value systems (note that some regulations, such as Payment Card Industry Data Security Standard [PCI DSS], require vulnerability management) and making sure that all applications on those systems are frequently scanned, updated and remediated using either enterprisewide or point-vendor-supplied solutions. For guidance on how to implement vulnerability management both initially and at an advanced level, see the upcoming documents "Vulnerability Management Practices and Vulnerability Assessment Technology" and "Vulnerability and Security Configuration Assessment Solutions Comparison," as well as "Vulnerability Management." To expand coverage of vulnerability management, organizations should also deploy perimeter policy validation tools and application security testing tools (at least for critical applications). For more information, see "Tools for Network-Aware Firewall Policy Assessment and Operational Support," "Dynamic Software Security Testing: Web Application Scanning Technology Assessment," and "Web Application Testing: Protecting the Front Lines." Monitor IT Infrastructure and High-Value Applications Security monitoring is required to detect cyberattacks, abnormal behavior of privileged users or systems, and much more that may signify a threat or vulnerability is present. The better the monitoring, the earlier the detection and (hopefully) the lower the impact. As with vulnerability management, organizations should start by monitoring IT infrastructure and high-value systems. Enterprises may also have regulatory obligations (e.g., PCI DSS, Sarbanes-Oxley Act [SOX] or Health Insurance Portability and Accountability Act [HIPAA]) to monitor certain types of activity. Security monitoring is related to operational monitoring and touches virtually every part of the IT security infrastructure. For example, security monitoring must keep track of the malware and vulnerability scanning mechanisms discussed above, and must also consume and record events from network devices, endpoints and applications. Note that we'll revisit monitoring in the last step, which recommends that organizations continually advance technical security monitoring technologies. This involves processes as well as tools. Page 6 of 9 Gartner, Inc. G00226331

Security monitoring requirements must first be specified in policy and tie in with a broader security architecture. Even early efforts should be architecturally cohesive; see "Security Monitoring" for more information. Implement Incident Investigation and Response Processes Incidents happen, and organizations must learn from them. As organizations implement security monitoring, they're also more likely to detect the incidents. Once they've detected incidents, organizations may need to investigate and respond. As described in the Assess Threats and Raise Awareness section of this research, organizations should also participate in information sharing forums to learn from incidents that happened to peer organizations. "Acting on Security Monitoring: Incident Response and Forensics" provides information on how organizations communicate internally, build procedures, identify and train responsible staff, respond to different kinds of incidents, and communicate externally. Provide Feedback and Adapt Finally, staff must take feedback from threat assessment, vulnerability management and security monitoring and use it to adapt the security architecture and feed into risk management processes. As part of architecture planning and risk management, periodically revisit the question of whether to take threat detection, vulnerability management and monitoring to a higher (but more expensive) level of sophistication. Metrics are important to the feedback process because they can provide triggers or thresholds for making decisions on when to invoke crisis management procedures or make other significant changes. For more information on metrics, see "Security Key Performance Indicators." Revisit Security Architecture Because enhancing an organization's ability to address technical threats and vulnerabilities touches many different points in the IT infrastructure and the organization, planners should also revisit the overall security architecture to help make choices. Even organizations laboring under serious threats don't necessarily require all the advanced technologies. See "Framework for Creating a Security Technology Architecture" as a starting point for reviewing security architecture overall. Finally, threat and vulnerability management, as well as security monitoring, provides vital feedback to and security programs. As this feedback reaches global security organizations, they must adapt to it. Advance Security Monitoring Capabilities Implementing basic anti-malware, vulnerability management and security monitoring (see the Monitor IT Infrastructure and High-Value Applications section of this research) will give organizations some breathing room and significantly reduce their likelihood of becoming a target of opportunity, as well as help detect and respond to attacks that occur. However, some adversaries such as APTs are capable of launching repeated sophisticated and coordinated cyberattacks, Gartner, Inc. G00226331 Page 7 of 9

social engineering attacks, and targeted malware that may leverage zero-day exploits of as-yetundetected vulnerabilities. These kinds of adversaries include, but are not limited to, hostile nationstate actors and organized criminal enterprises. Adversaries may already have penetrated your organization and may be operating as insiders, or they may be working as teams and will soon do so. Organizations at higher risk of APTs include those in the national defense, government, financial services, critical infrastructure, telecommunications or media industries, as well as any other organization with high-value intellectual property or other kinds of assets. Such organizations should make an effort to discover whether they or their peers have been, or currently are, infiltrated. If the attackers make mistakes, then organizations may discover them through routine anti-malware detection and security infrastructure monitoring. But if the attackers don't make mistakes, organizations may only be able to discover them through advanced monitoring technologies, such as threat detection sandboxes, network forensic analysis, network behavior anomaly detection, honeypots, or advanced security information and event management (SIEM) deployments. Some tools (e.g., threat detection sandboxes deployed in an appliance) can be deployed on a trial basis to "test the waters"; others require time, tuning and customization (e.g., SIEM correlation). For in-depth coverage of SIEM technology, see "Security Information and Event Management Technology Assessment." Note, however, that there isn't a single security monitoring solution; while an SIEM system may perform a critical function as a monitoring hub, a variety of other product categories may be needed. See "Data Loss Prevention," "Selecting Secure Web Gateway Solutions" and the upcoming "Enhancing Security and Compliance with Database Audit and Protection" for more information. Acronym Key and Glossary Terms APT advanced persistent threat HIPAA Health Insurance Portability and Accountability Act I-4 International Information Integrity Institute ISAC ISF PCI DSS SIEM SOX Information Sharing and Analysis Centers International Security Forum Payment Card Industry Data Security Standard security information and event management Sarbanes-Oxley Act Page 8 of 9 Gartner, Inc. G00226331

Regional Headquarters Corporate Headquarters 56 Top Gallant Road Stamford, CT 06902-7700 USA +1 203 964 0096 European Headquarters Tamesis The Glanty Egham Surrey, TW20 9AW UNITED KINGDOM +44 1784 431611 Japan Headquarters Gartner Japan Ltd. Atago Green Hills MORI Tower 5F 2-5-1 Atago, Minato-ku Tokyo 105-6205 JAPAN + 81 3 6430 1800 Latin America Headquarters Gartner do Brazil Av. das Nações Unidas, 12551 9 andar World Trade Center 04578-903 São Paulo SP BRAZIL +55 11 3443 1509 Asia/Pacific Headquarters Gartner Australasia Pty. Ltd. Level 9, 141 Walker Street North Sydney New South Wales 2060 AUSTRALIA +61 2 9459 4600 2012 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner s prior written permission. The information contained in this publication has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. This publication consists of the opinions of Gartner s research organization and should not be construed as statements of fact. The opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered in Gartner research. Gartner s Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see Guiding Principles on Independence and Objectivity on its website, http://www.gartner.com/technology/about/ ombudsman/omb_guide2.jsp. Gartner, Inc. G00226331 Page 9 of 9