Information Security News mailing list archives

IT Managers See Need for Risk Metrics


From: InfoSec News <isn () c4i org>
Date: Tue, 10 Jun 2003 00:09:08 -0500 (CDT)

http://www.computerworld.com/securitytopics/security/story/0,10801,81897,00.html

By JAIKUMAR VIJAYAN 
JUNE 09, 2003
Computerworld 

WASHINGTON -- Technology managers trying to justify and prioritize IT
security spending are searching for some way to quantify the risk
management benefits.

But a lack of standard processes and the wide variability of factors
that affect risk are making it hard for companies to collect such
metrics, users said last week at a conference here organized by
Gartner Inc.

"There is an increasing focus on measuring security effectiveness,"  
said Carl Cammarata, chief information security officer at automobile
association AAA Michigan in Dearborn. Companies are realizing that
"you can't manage what you can't measure."

Driving the trend is the fact that security budgets have been rising
by 20% annually over the past couple of years, said Richard Hunter, an
analyst at Stamford, Conn.-based Gartner.

"These have been pure costs, and CIOs and CEOs are asking what they
are getting from all that [spending]," Hunter said. "If the response
is, 'You are getting better security,' the next question is, 'How do
you know?' "

As a result, security administrators are under growing pressure to
find quantitative measures to demonstrate the efficacy of their
security strategies.

"You need to have a baseline to measure against. If you don't have any
measurements, you don't know where you are," said Gregory Waters, a
senior information assurance engineer at TWM Associates Inc., an IT
auditing firm in Fairfax, Va.

The numbers can come from a variety of sources. For example, said
Gartner, a company could collect metrics on the number of attacks it
faced during a specific period, the type of attacks, the percentage of
attacks that were successful, the time that elapsed between the onset
of an attack and when it was first detected, and the time it took to
launch countermeasures.

The metrics could also relate to a company's overall risk profile
based on an assessment of the vulnerabilities and threats faced by an
organization and the countermeasures in place to deal with them.


Meaningful Metrics

Some vendors, such as Foundstone Inc. in Mission Viejo, Calif., and
TruSecure Corp. in Herndon, Va., offer tools they say will help
companies numerically score their risk on a sliding scale based on
such assessments.

Used properly, such metrics can help security administrators give
business managers a better snapshot of a company's risk profile,
Cammarata said. At AAA, merely using statistics and benchmarks from
organizations such as the SANS Institute in Bethesda, Md., and the
Computer Security Institute in San Francisco no longer cut it,
Cammarata said. "My managers want to know what these statistics mean
to my organization specifically," he said.

Consequently, AAA is planning to gather internal metrics to build a
one-page "dashboard" that will give managers a better, more relevant
picture, he said.

Northrop Grumman Mission Systems in Reston, Va., is pursuing a similar
dashboard approach, said CIO Diane Murray. "It will give us a
high-level management view of how well we are doing" on the security
front, she said.

Such information can also be useful to auditors for evaluating a
company's compliance with regulatory requirements.

But gathering such metrics and using them in a meaningful way can be
hard, especially when dealing with an issue such as risk, said Bill
Spernow, chief information security officer at the Georgia Student
Finance Commission in Tucker.

"The raw statistics that we need to create a measurable foundation do
not exist," he said. Moreover, numbers may not always tell the full
story, because there are too many variables and dependencies involved
in measuring risk, Spernow said. At best, they are "trend indicators"  
that could create a "false sense of security" if relied upon solely,
he added.

Standards such as ISO 17779, which covers IT governance and data
security, can provide a good basis for understanding what's needed to
build effective IT security, he said.



-
ISN is currently hosted by Attrition.org

To unsubscribe email majordomo () attrition org with 'unsubscribe isn'
in the BODY of the mail.


Current thread: