Security Metrics What Can We Measure?



Similar documents
Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Data Management & Protection: Common Definitions

Information Security and Risk Management

OPEN SOURCE SECURITY

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

UF Risk IT Assessment Guidelines

QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

BYOD Guidance: BlackBerry Secure Work Space

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Enterprise Software Management Systems by Using Security Metrics

COORDINATION DRAFT. FISCAM to NIST Special Publication Revision 4. Title / Description (Critical Element)

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers

Information Security Risk Management

The Business Case for Security Information Management

Computer Security. Evaluation Methodology CIS Value of Independent Analysis. Evaluating Systems Chapter 21

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

The Importance of Cybersecurity Monitoring for Utilities

Metasploit The Elixir of Network Security

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

IT OUTSOURCING SECURITY

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

Safeguards Frameworks and Controls. Security Functions Parker, D. B. (1984). The Many Faces of Data Vulnerability. IEEE Spectrum, 21(5),

The Nature of Cyber Security. Eugene H. Spafford

Common Cyber Threats. Common cyber threats include:

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS

NIST National Institute of Standards and Technology

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

Information Security Services

Effective Software Security Management

TIME TO LIVE ON THE NETWORK

Now Is the Time for Security at the Application Level

HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS

Network Incident Report

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Network Instruments white paper

End-user Security Analytics Strengthens Protection with ArcSight

Information security governance has become an essential

Information Technology Security Training Requirements APPENDIX A. Appendix A Learning Continuum A-1

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

How To Protect A Network From Attack From A Hacker (Hbss)

Vulnerability Audit: Why a Vulnerability Scan Isn t Enough. White Paper

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Network Security Policy

Host-based Intrusion Prevention System (HIPS)

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Firewalls Overview and Best Practices. White Paper

SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT

Data Driven Assessment of Cyber Risk:

Uncover security risks on your enterprise network

Principles of Information Security, Fourth Edition. Chapter 12 Information Security Maintenance

Office of Inspector General

8 Steps for Network Security Protection

8 Steps For Network Security Protection

Chapter 6: Fundamental Cloud Security

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Information Security Policies and Procedures Development Framework for Government Agencies. First Edition AH

Security Self-Assessment Tool

Building a Business Case:

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

Penetration Testing Report Client: Business Solutions June 15 th 2015

ABB s approach concerning IS Security for Automation Systems

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

Session 334 Incident Management. Jeff Roth, CISA, CGEIT, CISSP

SUPPLIER SECURITY STANDARD

Big Data, Big Risk, Big Rewards. Hussein Syed

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

Data Security Incident Response Plan. [Insert Organization Name]

HIPAA Compliance Review Analysis and Summary of Results

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

PCI DSS 3.0 : THE CHANGES AND HOW THEY WILL EFFECT YOUR BUSINESS

Think like an MBA not a CISSP

Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget

Functional vs. Load Testing

Building A Secure Microsoft Exchange Continuity Appliance

Evaluation Report. Office of Inspector General

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Building Security into the Software Life Cycle

Observation and Findings

Network Security and Risk Analysis Using Attack Graphs

1 Purpose Scope Roles and Responsibilities Physical & Environmental Security Access Control to the Network...

Transcription:

Security Metrics What Can We Measure? Zed Abbadi The Public Company Accounting Oversight Board

What is a Metric A metric is a system of related measures enabling quantification of some characteristic. A measure is a dimension compared against a standard.* Security metric is a system of related dimensions (compared against a standard) enabling quantification of the degree of freedom from possibility of suffering damage or loss from malicious attack.* *QoP 06, Oct. 2006

Do We Really Need Metrics? "If you cannot measure it, you cannot improve it." "In physical science the first essential step in the direction of learning any subject is to find principles of numerical reckoning and practicable methods for measuring some quality connected with it. I often say that when you can measure what you are speaking about, and express it in numbers, you know something about it; but when you cannot measure it, when you cannot express it in numbers, your knowledge is of a meagre and unsatisfactory kind; it may be the beginning of knowledge, but you have scarcely in your thoughts advanced to the state of Science, whatever the matter may be." [PLA, vol. 1, "Electrical Units of Measurement", 1883-05-03] Lord Kelvin You cannot manage what you cannot measure"

Drivers For Metrics Money matters Asset vs. liability Governance You claim it is a science? Do as good as math, physics and astrology Decision aid How are we doing with security

Good Metrics. vs. Metrics Quantitative Objective Based on a formal model Has a time dimension Universally acceptable Has ground truth Inexpensive Obtainable Repeatable

Data Collection Vulnerabilities, exploits and attacks Organization vs. industry vs. everyone else Disclosure Policies Accuracy Statistical Significance

Attempts at Measuring Security TCSEC (Orange book) ITSEC (Europe s Orange book) CTCPEC (Canada s Orange book) Common Criteria (everyone s Orange book) Framework rather than a list of requirements SSE-CMM NIST FIPS-140 series NIST SP 800-55

Security Metrics Types Process Security Metrics Network Security Metrics Software Security Metrics People Security Metrics Other

Process Security Metrics Measure processes and procedures Imply high utility of security policies and processes Relationship between metrics and level of security not clearly defined Compliance/Governance driven Generally support better security Actual impact hard to define

Examples No. of Policy Violations % of systems with formal risk assessments % of system with tested security controls % of weak passwords (noncompliant) No. of identified risks and their severity % of systems with contingency plans

Network Security Metrics Driven by products (firewalls, IDS etc) Readily available Widely used Gives sense of control Nice charts and interfaces Can be misleading

Examples Successful/unsuccessful logons No. of incidents No. of viruses blocked No. of patches applied No. of spam blocked No. of virus infections No. of port probes Traffic analysis

Software Security Metrics Software measures are troublesome (LOC, FPs, Complexity etc) Laws of Physics are missing Metrics are context sensitive and environment-dependent Architecture dependent Aggregation may not lead to strength

Examples Size and complexity Defects/LOC Defects (severity, type) over time Cost per defect Attack surface (# of interfaces) Layers of security Design Flaws

People Security Metrics Relevance Unique characteristics Risk perception skewed optimism Bias Limited memory and attention span Behavior modeling is difficult Awareness training?

Reliability vs. Security Similar but different We care more about reliability Different adversary model Reliability models exist, but Security is a moving target

Most Common Security Metric Risk- We love this thing! Source for profit Where is the data? Non monetary consequences Adversary behavior models Accuracy against ground truth Mission/system/support models Dynamic in nature

Future Of Security Metrics Consumers demand better security metrics Government involvement is increased Science evolves to provide better measures Vendors volunteer (forced to) develop universal accurate metrics Some vendors cheat, a watchdog is created Security problems continue, no change in level of risk