Measuring the Performance and Effectiveness of Critical security - - PowerPoint PPT Presentation

measuring the performance and effectiveness of critical
SMART_READER_LITE
LIVE PREVIEW

Measuring the Performance and Effectiveness of Critical security - - PowerPoint PPT Presentation

Measuring the Performance and Effectiveness of Critical security controls William Makatiani Name Here About Serianu Limited Serianu is a Pan Africa based Cyber Security and business consulting firm. We are an award winning company in the


slide-1
SLIDE 1

Name Here

Measuring the Performance and Effectiveness of Critical security controls

William Makatiani

slide-2
SLIDE 2

About Serianu Limited

Serianu is a Pan Africa based Cyber Security and business consulting firm. We are an award winning company in the African Cybersecurity sector that helps our customers collect, protect, and analyze critical business information.

Our Partnerships

  • Paladion Networks - Mumbai, India
  • Liquid Telecom - Africa
  • Global Honeynet Project – Kenyan chapter founding

members

  • USIU-Africa – Research and Data Analysis Partner
slide-3
SLIDE 3

24/7 Cyber Security Command Centre Serianu Cyber-Threat Command Centre (SC3)

slide-4
SLIDE 4

Africa Cyber Immersion Centre

slide-5
SLIDE 5

Top 10 Cyber security Priorities for 2018

slide-6
SLIDE 6
slide-7
SLIDE 7
slide-8
SLIDE 8

 Introduce the inherent risk profiling methodology and approach  Introduce the top critical cyber security controls and metrics measurement approach  Discuss testing the Effectiveness of Critical Cyber Resilience and Visibility Controls  Discuss how metrics can be used to facilitate decision making and improve performance and accountability.  Discuss how to develop metrics that are quantifiable, observable, and objective data supporting metrics.  Discuss how organisations can use metrics to apply corrective actions and improve performance.  Discuss how metrics can be packaged and delivered to different stakeholders - senior management and board members

Objectives

slide-9
SLIDE 9

Topic 1: Introduction to Cyber Security metrics and Performance Measurement approach Topic 2: Developing and Implementing monitoring use cases and scenarios Topic 3: Breach scenario analysis Topic 4: Cyber security visibility statements

Content

slide-10
SLIDE 10

Topic 1: Introduction to Cyber Security metrics and Effectiveness Monitoring Topic 2: Developing and Implementing monitoring use cases and scenarios Topic 3: Breach scenario analysis Topic 4: Cyber security visibility statements

Content

slide-11
SLIDE 11

Metrics are designed to facilitate decision making and improve performance and accountability through collection, analysis, and reporting of relevant performance-related data. Its important to understand the environment you are operating in i.e banking, Insurance, Academia etc. This involves understanding the:  Top Risks  Controls for mitigating these risks  Testing of these controls

Cyber Security Metrics and Performance

slide-12
SLIDE 12

 Metrics are designed to facilitate decision making and improve performance and accountability through collection, analysis, and reporting

  • f relevant performance-related data.

Its important to understand the environment you are operating. This involves understanding the:  Top Risks and Inherent risks  Controls for mitigating these risks  Testing of these controls Cyber Security Metrics and Performance

slide-13
SLIDE 13

 These process enables institutions identify their risks and determine their cybersecurity maturity. The approach provides a repeatable process to measure preparedness over time. Cyber Security Metrics and Performance

slide-14
SLIDE 14

Various frameworks provide guidelines for assessing security posture and the frequency of these assessment namely:  ISO 27001  PCIDSS  NIST  CBK Guidelines  Africa Cyber Security Framework (ACSF) Cyber Security Metrics and Monitoring

slide-15
SLIDE 15

Three step approach:  Inherent Risk Profiling – Semi-Annual  Benchmarking and Maturing Assessment - Annual  Visibility and Resilience Monitoring - Periodical  Incident Trending and Reporting - Continuous Measuring cyber security performance and effectiveness

slide-16
SLIDE 16
  • Cybersecurity inherent risk is the level of risk posed to the institution by

the following:

  • Technologies and Connection Types
  • Delivery Channels
  • Online/Mobile Products and Technology Services
  • Organizational Characteristics
  • External Threats

Inherent Risk Profiling

slide-17
SLIDE 17
  • Inherent risk incorporates the type, volume, and complexity of the

institution’s operations and threats directed at the institution. Inherent risk does not include mitigating controls.

  • The Inherent Risk Profile includes descriptions of activities across risk

categories with definitions for the least to most levels of inherent risk.

  • The profile helps management determine exposure to risk that the

institution’s activities, services, and products individually and collectively pose to the institution. Inherent Risk Profiling

slide-18
SLIDE 18

Inherent Risk Profiling and Monitoring

Category Sub-Category Data Point Least Minimal Moderate Significant Most Technology Technologies and Connection Types Total number of Internet service provider (ISP) connections (including branch connections) No connections Minimal Complexity (1-20 Connections) Moderate Complexity (21-100 Connections) Significant Complexity (101- 200 Connections) Substantial Complexity (>200 Connections) Technology Technologies and Connection Types Unsecured external connections, number of connections not users (e.g., file transfer protocol (FTP), Telnet, rlogin) None Few instances of unsecured connections (1–5) Several instances of unsecured connections (6–10) Significant instances of unsecured connections (11– 25) Substantial instances of unsecured connections (>25) Processes Organizational Characteristics Mergers and acquisitions (including divestitures and joint ventures) None planned Open to initiating discussions

  • r actively seeking a merger
  • r acquisition

In discussions with at least 1 party A sale or acquisition has been publicly announced within the past year, in negotiations with 1 or more parties Multiple ongoing integrations

  • f acquisitions are in process

People Organizational Characteristics Direct employees (including information technology and cybersecurity contractors) Number of employees totals <50 Number of employees totals 50– 2,000 Number of employees totals 2,001–10,000 Number of employees totals 10,001–50,000 Number of employees is >50,000 Processes Organizational Characteristics Changes in IT environment (e.g., network, infrastructure, critical applications, technologies supporting new products or services) Stable IT environment Infrequent or minimal changes in the IT environment Frequent adoption of new technologies Volume of significant changes is high Substantial change in

  • utsourced provider(s) of

critical IT services; large and complex changes to the environment occur frequently Processes Organizational Characteristics Locations of branches/business presence 1 state 1 region 1 country 1-20 countries >20 countries Processes Organizational Characteristics Locations of operations/data centers 1 state 1 region 1 country 1-20 countries >10 countries Technology External Threats Attempted cyber attacks No attempted attacks

  • r reconnaissance

Few attempts monthly (<100); may have had generic phishing campaigns received by employees and customers Several attempts monthly (100– 500); phishing campaigns targeting employees or customers at the institution or third parties supporting critical activities; may have experienced an attempted Distributed Denial

  • f Service (DDoS) attack

within the last year Significant number of attempts monthly (501– 100,000); spear phishing campaigns targeting high net worth customers and employees at the institution

  • r third parties supporting

critical activities; Institution specifically is named in threat reports; may have experienced multiple attempted DDoS attacks within the last year Substantial number of attempts monthly (>100,000); persistent attempts to attack senior management and/or network administrators; frequently targeted for DDoS attacks

slide-19
SLIDE 19

Designed to help management measure the institution’s level of risk and corresponding controls. The levels range from baseline to innovative. Cybersecurity Maturity includes statements to determine whether an institution’s behaviors, practices, and processes can support cybersecurity preparedness within the following four domains:

  • Anticipate Risk – Cyber Risk management
  • Detect Vulnerabilities – Cyber Vulnerability Management
  • Respond to Incidents – Cyber Incident Management
  • Contain Threats – Cyber Threat Management

Benchmarking and Maturing Assessment

slide-20
SLIDE 20

Cyber security Benchmarking and Maturity Framework

Cybersecurity Risk Management

Risk Management People & Culture Infrastructure Management Access & Data Management Third Party Management

Cybersecurity Vulnerability Management

Vulnerability Management Patch Management External Dependency Monitoring

Cybersecurity Incident Management

Event Detection Response and Mitigation Threat Intelligence

Cyberthreat Management

Cyber risk Remediation Information Sharing Metrics and Reporting Continuous Improvement

slide-21
SLIDE 21

Benchmarking and Maturity Assessment

Overall Maturity Score

8.68

CYBER INFORMED

Anticipate

Domain(s) Not Implemented (0) Ad-Hoc (1) Defined (2) Measurable (3) Optimized (4) Weighted Score Maturity Score

DOMAIN 1: GOVERNANCE AND STRATEGY

1 5 4 23 2.30

DOMAIN 2: RISK MANAGEMENT

1 1 7 2 21 1.91

DOMAIN 3: PEOPLE AND CULTURE

4 1 3 2 13 1.30

DOMAIN 4: INFRASTRUCTURE MANAGEMENT

2 5 19 2.71

DOMAIN 5: ACCESS AND DATA MANAGEMENT

1 1 7 1 28 2.80

DOMAIN 6: THIRD PARTY MANAGEMENT

6 2 18 2.25

DOMAIN 7:BUSINESS CONTINUITY AND INCIDENT RESILIENCE PLANNING

3 2 12 2.40 Total 5 4 27 24 1 134 15.67

Detect

Domain(s) Not Implemented (0) Ad-Hoc (1) Defined (2) Measurable (3) Optimized (4) Weighted Score Maturity Score

DOMAIN 1:VULNERABILITY MANAGEMENT

1 1 6 3 22 2.00

DOMAIN 2: PATCH MANAGEMENT

1 2 8 2.67

DOMAIN 3: EXTERNAL DEPENDENCY MONITORING

1 1 6 21 2.63 Total 1 2 8 11 51 7.29

Respond

Domain(s) Not Implemented (0) Ad-Hoc (1) Defined (2) Measurable (3) Optimized (4) Weighted Score Maturity Score

DOMAIN 1: EVENT DETECTION

2 4 2 16 2.00

DOMAIN 2: RESPONSE AND MITIGATION

6 12 2.00

DOMAIN 3: THREAT INTELLIGENCE

1 2 4 1.33 Total 1 2 12 2 32 5.333333333

Contain

Domain(s) Not Implemented (0) Ad-Hoc (1) Defined (2) Measurable (3) Optimized (4) Weighted Score Maturity Score

DOMAIN 1: CYBER RISK REMEDIATION

4 2 14 2.33

DOMAIN 2: INORMATION SHARING

2 2 2 0.50

DOMAIN 3: METRICS AND REPORTING

3 1 9 2.25

DOMAIN 4: CONTINUOUS IMPROVEMENT

1 2 4 1.33 Total 3 2 9 3 29 6.42 Weighted Score = Sum (Weight of Control * No. of Control) Maturity Score = Weighted Score / No. of Controls E.g. Consider a "Domain X" which has total 6 controls. Assume out of the 6 controls, 1 is "Not Implemented"; 2 is "Defined" and 3 are "Optimized. The Weighted Score of Domain X = 1*0+2*2+3*4=16 and Maturity Score of Domain X = 16/ 6 = 1.66.

25

5

10 15 20

Score: 8.68

slide-22
SLIDE 22

Cyber Security Visibility and Resilience Monitoring

  • Cyber Security Visibility Monitoring is an innovative approach to enable
  • rganisations to measure, map and enhance their evolving cyber security

posture, with the objective of providing senior business leadership with the appropriate understanding of the state of their information security efforts.

  • The approach provides organisations with a guide they can implement to

capture an overall view of their security posture and helps to identify significant risks. The components map to the different controls that have been identified as being weak.

slide-23
SLIDE 23

Top 10 Critical Cyber security Controls - Monitoring

  • 1.0 ASSET MANAGEMENT
  • 2.0 USER MANAGEMENT
  • 3.0 PRIVILEGED ACCOUNTS
  • 4.0 CHANGE MANAGEMENT
  • 5.0 VULNERABILITY MANAGEMENT
  • 6.0 MALWARE MANAGEMENT
  • 7.0 BREACH SCENARIO ANALYSIS
  • 8.0 MONITORING AND ANALYSIS
  • 9.0 INCIDENT RESPONSE AND RECOVERY
  • 10.0 TRAINING AND AWARENESS
slide-24
SLIDE 24

Visibility and Resilience Monitoring

EXISTENCE (0.3) COMPLETENESS (0.3) TIMELINESS (0.2) REPORTING (0.2) VISIBILITY SCORE 1.0 ASSET MANAGEMENT 2.0 USER MANAGEMENT 3.0 PRIVILEGED ACCOUNTS 4.0 CHANGE MANAGEMENT 5.0 VULNERABILITY MANAGEMENT 6.0 MALWARE MANAGEMENT 7.0 BREACH SCENARIO ANALYSIS 8.0 MONITORING AND ANALYSIS 9.0 INCIDENT RESPONSE AND RECOVERY 10.0 TRAINING AND AWARENESS

slide-25
SLIDE 25

Existence and Completeness

Perimeter and Boundary Network and Applications Database and Transactions Websites and Portals Employees and Third Parties

  • 1. Attempt to configure weak user account passwords that are non-

compliant with established policy. Verify that the system does not allow weak passwords to be used. Fully Implemented

  • 2. Attempt to re-use a user account password that was previously

used for the account. Verify that the system requires unique new passwords during each update. Not Implemented

  • 4. Attempt to gain access to password files stored on the system. If

successful, identify whether passwords are cryptographically secured. Fully Implemented N/A

Access Management

slide-26
SLIDE 26

Timeliness and Effectiveness

Perimeter and Boundary Network and Applications Database and Transactions Websites and Portals Employees and Third Parties

  • 1. Does the system audit and report on valid and invalid log-ins to

user accounts? Effective

  • 2. Does the system audit and report on valid and invalid log-ins to

network and security device user accounts? Not Effective

  • 3. Does the system lock users out after five (5) invalid attempts?

Partially Effective

  • 4. Do user account passwords expire at least every 90 days?

Not Effective

Access Management

slide-27
SLIDE 27

Reporting and Trending Perimeter and Boundary Network and Applications Database and Transactions Websites and Portals Employees and Third Parties

  • 1. How many invalid attempts to access user accounts have been

detected within a period of time?

Fully Reports

  • 2. How many accounts have been locked out within a period of

time?

Does not Report

  • 3. How many attempts to gain access to password files in the

system have been detected within a period of time?

Partially Reports

  • 4. What is the percentage of systems on the organization's

network that are not utilizing Network Access Control (NAC) with client certificates to authenticate to the organization's network (by business unit)?

Not Available

Access Management

slide-28
SLIDE 28

Automated Metrics Perimeter and Boundary Network and Applications Database and Transactions Websites and Portals Employees and Third Parties

  • 1. How many invalid attempts to access user accounts have

been detected within a period of time?

Fully Reports

  • 2. How many accounts have been locked out within a

period of time?

Does not Report

  • 3. How many attempts to gain access to password files in

the system have been detected within a period of time?

Partially Reports

  • 4. What is the percentage of systems on the organization's

network that are not utilizing Network Access Control (NAC) with client certificates to authenticate to the

  • rganization's network (by business unit)?

Not Available

Access Management

slide-29
SLIDE 29

This focuses on the following areas: Incident Trending and Reporting

  • 1.0 ASSET MANAGEMENT
  • 2.0 USER MANAGEMENT
  • 3.0 PRIVILEGED ACCOUNTS
  • 4.0 CHANGE MANAGEMENT
  • 5.0 VULNERABILITY MANAGEMENT
  • 6.0 MALWARE MANAGEMENT
  • 7.0 BREACH SCENARIO ANALYSIS
  • 8.0 MONITORING AND ANALYSIS
  • 9.0 INCIDENT RESPONSE AND RECOVERY
  • 10.0 TRAINING AND AWARENESS
slide-30
SLIDE 30

Incident Trending and Reporting

DESIGN OPERATING SIGNIFICANT MATERIAL TOTALS

1.0 ASSET MANAGEMENT 2.0 USER MANAGEMENT 3.0 PRIVILEGED ACCOUNTS 4.0 CHANGE MANAGEMENT 5.0 VULNERABILITY MANAGEMENT 6.0 MALWARE MANAGEMENT 7.0 BREACH SCENARIO ANALYSIS 8.0 MONITORING AND ANALYSIS 9.0 INCIDENT RESPONSE AND RECOVERY 10.0 TRAINING AND AWARENESS

slide-31
SLIDE 31

Topic 1: Introduction to Cyber Security metrics and Performance Measurement approach Topic 2: Developing and Implementing monitoring use cases and scenarios Topic 3: Breach scenario analysis Topic 4: Cyber security visibility statements

Content

slide-32
SLIDE 32

Key performance and effectiveness metrics

Regardless of the size, architecture or industry, a security analyst succeeds or fails by their ability to collect and understand:

The right data at the right time in the right context.

What should we then focus on?

When it comes down to it, we have two things: Assets and Users.

.

slide-33
SLIDE 33

Key performance and effectiveness metrics

.

slide-34
SLIDE 34

Key performance and effectiveness metrics

.

Key Static Metrics

Unauthorized Access Vulnerabilities Changes Configurations

slide-35
SLIDE 35

Key performance and effectiveness metrics

.

An Analysts key focus should revolve around the following:

Threshold Analysis  Volume  Velocity  Limits  Multiplicity Profile Analysis Correlation

slide-36
SLIDE 36
slide-37
SLIDE 37

Perimeter and Boundary

Control Devices Control Metric Source for the log Is the source collecting the log Log retention

  • n the

device Status Reports Rules Alerts Tested? Comments

Firewall, NAC, NAT, VPN, routers, proxy systems, wireless Access Point (WAP), attacks and violations, ports, anomalous request types, denial of service and false positives, Network and host IDS/IPS WIDS Malware Partially Pending Pending Pending Pending Pending IPS Implementation Authentication Closed a a a a Pending DLP implementation Exploits Partially Pending Pending Pending Pending Pending IPS Implementation Access Closed a a a a N/A Scanning Closed a a a a N/A Performance Closed a a a a N/A Availability Closed a a a a N/A Data Loss Prevention Pending Pending Pending Pending Pending Pending DLP implementation Configuration changes Closed a a a a N/A Network and Applications

slide-38
SLIDE 38

Topic 1: Introduction to Cyber Security metrics and Performance Measurement approach Topic 2: Developing and Implementing monitoring use cases and scenarios Topic 3: Breach scenario analysis Topic 4: Cyber security visibility statements

Content

slide-39
SLIDE 39

Breach Scenario Analysis

What can go wrong in with our current business processes? Which systems are most likely to be used to leverage the attack? Who is most likely to attack us? Insider? How will the attack us?

slide-40
SLIDE 40
slide-41
SLIDE 41

Topic 1: Introduction to Cyber Security metrics and Performance Measurement approach Topic 2: Developing and Implementing monitoring use cases and scenarios Topic 3: Breach scenario analysis Topic 4: Cyber security visibility statements

Content

slide-42
SLIDE 42

 Cyber security Resilience and Visibility Statement

The cyber security balance sheet. Reports the level of visibility that management have into cyber security posture of the organisation It is based on the cyber security resources, investments and details of a company security posture on a specific day. This is a snapshot of what the company looked like at a certain time in history.

slide-43
SLIDE 43

 Cyber security Deficiency and Incident Statement

‘the cyber security income statement’

Report incidents, activities, and resulting impact positive or negative of an

  • rganisation during a specific time period.

Compares the number of incidents in a certain period over a previous period. Shows key stakeholders and shareholders how efficiently the company is at mitigating cyber security threats from available resources.

slide-44
SLIDE 44

Visibility as at March 30, 2018 Asset Management Control Devices Year Existence Completeness Timeliness Reporting Visibility Score 2018 80% 80% 60% 60% 70% 2017 70% 70% 60% 50% 63% Control Devices Year Existence Completeness Timeliness Reporting Visibility Score 2018 60% 50% 40% 30% 45% 2017 30% 30% 25% 25% 28% Control Devices Year Existence Completeness Timeliness Reporting Visibility Score 2018 70% 66% 70% 70% 69% 2017 40% 40% 33% 40% 38% Control Devices Year Existence Completeness Timeliness Reporting Visibility Score 2018 80% 78% 71% 78% 77% 2017 68% 63% 63% 40% 59% Monitoring and Analysis 1) Logging 2) Static Metric Analysis 3) Threshold Analysis 4) Profiling 5) Correlation

THE CYBER SECURITY RESILIENCE AND VISIBILITY STATEMENT

Hardware and Software (Databases, Servers, Laptops, Routers) User Management 1) Employees 2) Vendors 3) System Accounts 4) Customer Accounts Breach Scenarios 1) Insider Threats 2) External Threats

slide-45
SLIDE 45

User Management Design Operating Significant Material

2018

30 60 58 60

2017

66 56 53 56

2016

56 46 36 46 Privileged Accounts Design Operating Significant Material

2018

80 75 70 75

2017

77 70 67 70

2016

70 65 60 65 Malware and Viruses Design Operating Significant Material

2018

56 42 33 42

2017

55 40 30 40

2016

20 32 26 32 Monitoring and Analysis Design Operating Significant Material

2018

68 63 61 63

2017

63 60 55 60

2016

60 55 51 55 THE CYBER SECURITY DEFICIENCY AND INCIDENT STATEMENT

slide-46
SLIDE 46

Our Contacts: