Example: marketing

Information Security Effectiveness Metrics: What Metrics ...

IBM Global ServicesSecurity & Privacy ServicesInformation Security EffectivenessInformation Security EffectivenessMetrics: what Metrics ? what Role for Metrics ? Metrics : what Metrics ? what Role for Metrics ?MatundaNyanchama, PhD, CISSPN ational Leader, Security & Privacy Delivery ServicesIBM Global Services, CanadaE-mail: & PrivacyIBM Global ServicesNovember 21, 2004 November 21, 200422 Copyright IBM Global ServicesCopyright IBM Global ServicesAgendaAgenda Background Some Definitions Why Metrics ? IS Metrics -Background Value Information Security Metrics Metrics Development Process Scope of Measurement ISO 17799 Scoping out IS Metrics Information Security Program Example Scope of Considerations for Measurement Examples of Measures Metrics & Reporting Data Sources for IS Metrics IS Metrics Process & Reporting Metrics Breadth, Depth & Purpose Incident Management Example Sample IS Dashboard State of IS Metrics & Caveats & Some Suggestions SummarySecurity & PrivacyIBM Global S

The IS Management Life Cycle. Maintain & Improve Security Management Program Monitor & Continuously Review Program Performance Establish Information

Tags:

  Information, What, Security, Effectiveness, Metrics, Information security effectiveness metrics

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of Information Security Effectiveness Metrics: What Metrics ...

1 IBM Global ServicesSecurity & Privacy ServicesInformation Security EffectivenessInformation Security EffectivenessMetrics: what Metrics ? what Role for Metrics ? Metrics : what Metrics ? what Role for Metrics ?MatundaNyanchama, PhD, CISSPN ational Leader, Security & Privacy Delivery ServicesIBM Global Services, CanadaE-mail: & PrivacyIBM Global ServicesNovember 21, 2004 November 21, 200422 Copyright IBM Global ServicesCopyright IBM Global ServicesAgendaAgenda Background Some Definitions Why Metrics ? IS Metrics -Background Value Information Security Metrics Metrics Development Process Scope of Measurement ISO 17799 Scoping out IS Metrics Information Security Program Example Scope of Considerations for Measurement Examples of Measures Metrics & Reporting Data Sources for IS Metrics IS Metrics Process & Reporting Metrics Breadth, Depth & Purpose Incident Management Example Sample IS Dashboard State of IS Metrics & Caveats & Some Suggestions SummarySecurity & PrivacyIBM Global ServicesNovember 21, 2004 November 21, 200433 Copyright IBM Global ServicesCopyright IBM Global ServicesSome DefinitionsSome Definitions Metric: relating to measurement.

2 Involving, or proceeding by, measurement (Webster s Revised Unabridged Dictionary) Information Security pertains to integrity, confidentiality& availability;auditabilityandaccountabili ty Security Metric: A measurable attribute of the result of a Security engineering process that could [be] evidence its Effectiveness . (see references) Effectiveness :Having an intended/expected effect; operative; in effect; efficacy, force, punch, power, strength, success, validity, vigor, weight (The American Heritage Dictionary) Efficiency:Production of desired effect/results with minimum waste of time, effort, or skill ; a measure of Effectiveness ; specifically, theuseful output divided by input into a system; proficiency, capability, adeptness, adequacy, suitability (The American Heritage Dictionary) Benchmark:Reference, a standard by which something is measured.

3 Criterion, gauge, goal, measure, standard, touchstone, yardstick Return on Investment (ROI):A measure of profitability; it measures how effective a company uses its capital to generate profit; income that an investment provides in a specified time ( one year) Security & PrivacyIBM Global ServicesNovember 21, 2004 November 21, 200444 Copyright IBM Global ServicesCopyright IBM Global ServicesWhy Metrics ?Why Metrics ? Metrics are intended to: Focus on measurable attributes ..that could serve as evidence of Effectiveness /efficiency of a given program or process Facilitate decision making: what are the shortcomings? How closely are objectives met? Gaps/shortcomings if any?

4 Need change of direction? Help improve performance and accountability: where are gaps? How can things be done better? Who is responsible? Can be objectiveor subjective, and quantitativeor qualitative. To be relevant, Metrics should be SMART, Specific, Measurable, Attainable, Repeatable and Time-independentRemember: If you cannot measure it, you cannot manage it. -anonQuestion? Where are we with Information Security Metrics ? Security & PrivacyIBM Global ServicesNovember 21, 2004 November 21, 200455 Copyright IBM Global ServicesCopyright IBM Global ServicesValue Information Security Metrics Value Information Security Metrics --II IS performance against defined IS goals, Efficacy of Information Security Accountability to stakeholders Assess IS plans, programs, processes, etc.

5 For Efficiency how well Information Security resources are utilized Effectiveness of Information Security program + existing Security controls Identify IS risks what assets need protection? what is their value? what threats and vulnerabilities exist to the assets? what chances for exploitation exist? IS Risk Management Risk assessment -extent of exposure to threats + potential business impacts should attacks happen Controls - what countermeasures/controls to identified risks Controls assessment -How effective are those controls Assess IS posture Security & PrivacyIBM Global ServicesNovember 21, 2004 November 21, 200466 Copyright IBM Global ServicesCopyright IBM Global ServicesValue Information Security Metrics Value Information Security Metrics --IIII Security posture trends is the state of Security improving, staying the same or getting worse?

6 Help identify priorities for resource deployment in based on risk levels to assets Facilitate corrective action where controls are weak, whereincident response times are unacceptable Demonstrate the value of Information Security to executives Benchmark against industry, where possible -how do we compare with our peers in industry? Can be used for compliance-related assessments SOX for internal controls assessmentSecurity & PrivacyIBM Global ServicesNovember 21, 2004 November 21, 200477 Copyright IBM Global ServicesCopyright IBM Global ServicesInformation Security Metrics Benefits SummaryInformation Security Metrics Benefits Summary Productivity indicators: Effectiveness & efficiency of a Security program Security return on investment (ROI) (where possible to measure) Information Security program maturity Information Security posture.

7 Collected data can be used as baseline for measurements & trending Risks are identified and a business case made to address the risks Help define a baseline and hence deviations: Apply risk management methodology for deviations from baseline Quantify risk and hence plan for better risk management strategyUsed appropriately: Metrics can engender process improvement. Demonstrate value of Information Security investment, ROI Facilitate risk management Allow benchmarking with industry peersSecurity & PrivacyIBM Global ServicesNovember 21, 2004 November 21, 200488 Copyright IBM Global ServicesCopyright IBM Global ServicesMetrics Development ProcessMetrics Development ProcessFollow ISO17799 s plan-do-check-act cycle Plan Establish key objectives for the Metrics required Identify the required Metrics and hence required data Design & implement strategy for data collection & Metrics generation Establish targets/benchmarks.

8 Where possible compare with industry Determine the process for collecting and analyzing data, and reporting Establish Metrics review program, and the refinement process/cycle DO Communicate with stakeholders and ensure buy-in Implement the Metrics program people, process and technology CHECK/Monitor Continuously review Metrics report against objectives and benchmarks Monitor program performance against objectives and benchmarks Identify gaps, if any, in the program ACT Address gaps in program Refine specific Metrics , where necessary Refine Metrics program, where necessarySecurity & PrivacyIBM Global ServicesNovember 21, 2004 November 21, 200499 Copyright IBM Global ServicesCopyright IBM Global ServicesScope of Measurement Scope of Measurement ISO 17799 ISO 17799 Sample MeasurementsISO AreaSample MeasurementsGaps in policies; Potential impacts of policy gaps; # Security violations per period of Policy% staff with certification; formal roles and responsibilities; staff turnover; Security spending/employee; IS spending as % IT budgetSecurity Organization% assets in inventory; % assets with classification; % assets with valuation; % assets with protection planAsset Classification & Control# Security training sessions; level of Security awareness.

9 # of personnel Security -related incidentsPersonnel SecurityFrequency of review of physical access; # access anomalies or violationsPhysical & Environmental Security # incidents; incident impacts; frequency of assessment; % systems with exposures; incident response Metrics ; how quickly threats are communicated;frequency of awareness activities; change control issuesCommunications & Operations ManagementAccess activation/termination turnaround; % of expired accounts;% accounts with expired pwds; % of accounts with weak passwordsAccess Control% projects that use IS; # policy exceptions/risk acceptances; %projects that perform code reviews; freq. of VAs; % systems with vulnerabilitiesSystems Development & Maintenance% systems with BCP/DRP; frequency of BCP/DRP testing; % systems that pass BCP/DRP testing; System availabilityBusiness Continuity Management# & trend of exemptions.

10 ComplianceSecurity & PrivacyIBM Global ServicesNovember 21, 2004 November 21, 20041010 Copyright IBM Global ServicesCopyright IBM Global ServicesElements of an IS Program Elements of an IS Program The IS Management Life CycleThe IS Management Life CycleMaintain & Improve Security Management ProgramMonitor & Continuously Review Program PerformanceEstablish Information Security Management ProgramImplement Information Security Management ProgramDevelopment, Maintenance & Improvement of the ISM ProgramACTCHECKDOPLANKey Security Program ElementsStrategic Governance, Policies & Business Strategy Strategy, Policy, Procedures, Standards, Awareness PlanTactical Risk Assessment, Design Reviews, Due Care, New Technology Insertion, Risk Acceptance, Policy ExceptionsOperational Active Security : Intrusion Detection & Alerts, Incident Management, Vulnerability Assessments, Data Aggregation & Analysis, Trending, Root Cause Analysis.


Related search queries