Storage Decisions 2003

Hosted by
Security Budgets:
Getting What You Need
Pete Lindstrom, CISSP
Research Director
[email protected]
Spire Security, LLC
www.spiresecurity.com
Hosted by
The Problem w/ Security Budgets

Success = nothing happens

Nobody knows what = success

We don’t analyze the strategic value of the
security program

We don’t justify our purchases
Hosted by
Agenda

Quantify your asset value. . . and potential
loss

Identify how much you're really spending on
security

Evaluate the effectiveness of security
controls

Measure true success
Hosted by
what are you trying to protect?
The 5 Elements of Value
1.
IT Productivity (time)
2. User Productivity (time)
3.
Legal/Regulatory Costs (fines)
4.
Direct Revenue (dollars)
5.
Stored Asset Value (intellectual property,
financial assets)
Hosted by
Audience: Which element is most important to you?
The 5 Elements of Value
A. IT Productivity (time)
B. User Productivity (time)
C. Legal/Regulatory Costs (fines)
D. Direct Revenue (dollars)
E.
Stored Asset Value (intellectual property,
financial assets)
Hosted by
Which element of value is most
important to you?
1.
IT Productivity (time)
2.
User Productivity (time)
3.
Legal/Regulatory Costs (fines)
4.
Direct Revenue (dollars)
5.
Stored Asset Value (intellectual
property, financial assets)
35%
32%
16%
10%
6%
1
2
3
4
5
Hosted by
Productivity

Where users and IT spend their time.

Time is money philosophy.

Often the only aspect of loss we quantify.

Basic source of ROI.

Hourly rate x hours of effort.
Hosted by
Productivity
IT Security Activities

Managing user accounts
(Identity Management)

Designing security controls
(Trust Management)

Monitoring systems
(Threat Management)

Configuring components
(Exposure Management)
Hosted by
Productivity
End-User Activities

Operational system usage

Revolve around availability

•
Of systems (e.g. email)
•
Of data (recovery)
Automation of business process
•
Reconciliations
•
Digital signatures
Hosted by
Legal/Regulatory Costs


Lawsuits –
•
Privacy suits
•
Downstream Liability
•
Legal fees
Regulatory Issues –
•
Regulatory fines
•
Remediation costs
Hosted by
Direct Revenue

E-Commerce systems

Level of materiality

Seasons, cycles, forecasts drive expected
losses

Some benchmarks: shrinkage; materiality
(internal controls)
Hosted by
Stored Asset Value

Stored Value (financial assets)

Stored Knowledge (intellectual property)

Market Cap (or equivalent) – Book Value =
Goodwill (intangible assets)

Some % of this Goodwill is attributable to
information assets.
•
•
Professional services – higher percentage
Contract manufacturing or retail - lower
Hosted by
how much are you spending?
Spending Philosophies

Generic - risk will decrease incrementally as
spending increases.

Skeptic - risk is low no matter how much you spend.
(ROI unnecesary)

Paranoid - risk is high no matter how much you
spend. (ROI impossible)

Weak Link – risk remains high, until all bases are
covered, then it is drastically reduced.

Just Enough – risk is reduced drastically through
basic measures then hits law of diminishing returns.
Hosted by
Spending Philosophies
Anticipated Loss
(Risk)
“Paranoid”
“Weak Link”
“Generic”
“Good Enough”
“Skeptic”
Security Spending
Hosted by
Which spending
philosophy are you?
1. Generic - risk will decrease incrementally as
spending increases.
2. Skeptic - risk is low no matter how much you
spend. (ROI unnecessary)
3. Paranoid - risk is high no matter how much
you spend. (ROI impossible)
4. Weak Link – risk remains high, until all bases
are covered, then it is drastically reduced.
5. Just Enough – risk is reduced drastically
through basic measures then hits law of
diminishing returns.
36%
23%
18%
14%
9%
1
2
3
4
5
Hosted by
Identity Management
Functions
Product Categories
 Identify users
 Provisioning
 Assign accounts/rights
 Password Management
 Maintain identity
(passwords)
 Single Sign-on
 Validate sessions
 Authorize access
 Authentication
 Web Access Control
Hosted by
Trust Management
Functions
Product Categories
 Write policies
 Policy lifecycle (written)
 Design security
 Public key infrastructure
 Ensure confidentiality
 Data encryption (db &
file)
 Ensure integrity
 Digital Signatures
 VPNs
Hosted by
Threat Management
Functions
Product Categories
 Info Collection
 Intrusion Detection
 Evaluation
 Antivirus
 Response
 Security Event
Management
 Recovery
 Review
 Forensics
Hosted by
Exposure Management
Functions
Product Categories
 Protect systems from being
inappropriately accessed,
 Firewalls
compromised, exploited.
 Control access to system
resources.
 Reduce exposure –
vulnerabilities and future
vulnerabilities
 System Access Control
 Vulnerability Assessment
 Patch Management
 Software security
 Security Resource Planning
Hosted by
Four Disciplines of Security Mgt
Identity
Threat
MANAGEMENT
MANAGEMENT
Identity Validation
Account Management
Password Management
Threat Identification
Security Monitoring
Incident Management
Authentication
User Access
Control
Intrusion
Prevention
Encryption
Integrity
System Access
Control
INLINE
Policy Management
Security Arch. Design
Cert Management
Reduce Exposure
Vulnerability Management
Software Security
Trust
Exposure
MANAGEMENT
MANAGEMENT
Hosted by
Which discipline do you
think is most effective at
reducing risk?
41%
30%
1. Identity Management
2. Exposure/Vulnerability
Management
3. Threat Management
4. Trust Management
22%
6%
1
2
3
4
Hosted by
Calculating Spending


Manual functions (4 disciplines – operating expenses)
•
Salaries (allocated for functional %)
•
consulting expenses
•
across all departments
Automated functions (capital expenses)
•
Allocated native functions (security %)
•
Security software and hardware, plus maintenance
Hosted by
how effective is your security?
Calculating Risk
Annual Loss Expectancy = Probability x Asset Value
ALE = P x A
(Insurance Industry)

Basic equation, difficulty in details

Easy to understand letters, very difficult to
determine the numbers
Hosted by
Calculating Potential Loss

No physical goods; reproducible supply

Full asset value is not necessarily lost
•

Could be more, could be less
Look at loss in other ways –
•
Type of loss
•
For each application/system
Hosted by
Calculating Potential Loss

Level One – organization-wide loss

Assume Value = Loss

Calculate overall loss potential for 5
Elements of Value
•
ALE = P x A turns into…
•
ALE = P x L(Assets, Revenue, Fines, IT Prod, EU Prod)
Hosted by
5 Types of Exposure


Information-centric Exposure
1.
Copied/Read data (Confidentiality)
2.
Modified data (Integrity)
3.
Deleted data (Availability)
System/App-centric Exposure
4.
Resource Availability (Productivity)
5.
Resource Misuse (Liability)
Hosted by
Which type of exposure
concerns you the most?
30%
1. Copied Read Data
(Confidentiality)
2. Modified Data (Integrity)
3. Deleted Data (Availability)
4. Resource Availability
(Productivity)
5. Resource Misuse (Liability)
24%
22%
19%
5%
1
2
3
4
5
Hosted by
Loss Potential
Read
Modify
Delete
Avail
Misuse
H
M
M
L
L
Revenue
M
H
H
H
L
Fines
M/H
H
L
L
?
IT Prod.
L
H
M
L
M
EU Prod.
L
L
M
H
M
Asset
Value
Hosted by
Calculating Potential Loss

Level Two – organization-wide loss by
exposure type

Calculate overall loss potential for 5
Elements and 5 Types.
•
•
•
•
ALE =
P x C(A, R, F, I, E) +
P x I(A, R, F, I, E) +
P x A(A, R, F, I, E)…(etc.)
Hosted by
Calculating Potential Loss

Level Three

Calculate overall loss potential for 5
Elements and 5 Types for every application.
•
•
•
ALE =
Supply Chain
 P x C(A, R, F, I, E) + P x I(A, R, F, I, E) + P x A(A, R, F, I,
E)…(etc.)
Financial Systems
 P x C(A, R, F, I, E) + P x I(A, R, F, I, E) + P x A(A, R, F, I,
E)…(etc.)
Hosted by
Probability/Likelihood

The ‘P’ in the equation.

Highly variable.
•

Everyone should consider it ‘1’ initially
Consider using insurance-like estimates.
•
% of potential loss
Hosted by
Measuring Effectiveness

Determine highest impact
•
combination of highest anticipated loss and biggest
risk.

Reduce anticipated loss

Increase productivity

Effectiveness is the before/after change
Hosted by
how effective is your security?
Measuring Success
Identity Management
Trust Management
 Accounts assigned
 Policy testing
 Passwords changed
 Certificates issued
 Authenticated sessions
 VPN sessions
 Failed logins
Hosted by
Measuring Success part II
Threat Management
Exposure Management
 Alerts/incidents
 Failed access attempts
 Failed attacks
 Vulnerabilities identified
 Forensics data collected
 Patches applied
 Vulnerabilities fixed
Hosted by
Security Budget Roundup

Take risk & productivity approach, by

identifying ROI & ROSI opportunities

Conduct complete analysis of security
program – develop strategy

Justify with regulations and incident
information
Hosted by
Security Budgets:
Getting What You Need
Pete Lindstrom, CISSP
Research Director
[email protected]
Spire Security, LLC
www.spiresecurity.com