The key to cost-effective cybersecurity

Placeholder Image for Article Template

Engaging leaders in protecting an organization's cyber, IT and information assets is a critical starting point to effective security. A next logical step for any government or commercial organization is to leverage risk management and analytics to implement a mission-based security program.

As organizations move forward, guidance from the National Institute of Standards and Technology and evolving capabilities in industry are merging to define a path forward for agencies to follow.

Information security and risk management are essential for all public-sector organizations because they depend on information and IT systems to make informed, critical decisions and successfully carry out their missions. And those IT systems and information resources are subject to almost constant threats that can have significant and wide-ranging impacts on operations, compromising the confidentiality, integrity or availability of information for an agency.

Given the significant and growing danger of these threats, leaders must understand their responsibilities for achieving sound information security and for managing IT-related security risks. As we've discussed previously, the Obama administration's Cybersecurity Framework provides a broad road map for government and commercial organizations to get started on this effort. Although the process is complex, several resources allow agencies to enhance such understanding in a public-sector context.

NIST guidance

First, NIST -- in partnership with the Defense Department, the Office of the Director of National Intelligence and the Committee on National Security Systems -- developed a common information security framework for the federal government and its contractors in order to improve information security and strengthen risk management processes. The six-step Risk Management Framework:

  • Promotes the implementation of robust continuous monitoring processes, enabling near-real-time risk management and ongoing information system authorization.
  • Encourages the use of automation to provide senior leaders with the necessary information to make cost-effective, risk-based decisions.
  • Integrates information security into the enterprise architecture and system development life cycle.
  • Emphasizes the selection, implementation, assessment and monitoring of security controls throughout the system's life cycle.
  • Suggests creating a risk executive -- a senior official dedicated to understanding how risks can affect strategic goals and objectives.
  • Establishes responsibility and accountability for security controls deployed within organizational information systems and inherited by those systems (i.e., common controls).

In addition to the guidance contained in the Risk Management Framework, NIST has published two additional documents -- NIST SP 800-39 and NIST SP 800-30 -- that emphasize the need for integrated organization-wide risk management and risk assessments.

Risk assessment capabilities

Agencies can use the connection between information/IT systems and critical business processes to form a focal point for assessing risk through the threat, vulnerability, and consequence concept. This targeted approach to implementing security controls reduces budget impact while increasing effectiveness. It allows agencies to implement an effective information security program that is framed with three primary goals to promote a holistic approach and an effective information security architecture:

  • Protect data and information systems.
  • Conduct security protection activities with respect to security compliance requirements (security compliance-related vulnerabilities).
  • Analyze cyberthreat data and develop predictive and proactive threat prevention (cyberthreat vulnerabilities independent of compliance).

In addition, agencies can use cyberthreat analysis and security intelligence to address vulnerability management in two critical areas. The first area focuses on understanding and assessing an organization's security compliance profile and using analysis to develop actions that remediate compliance-related vulnerabilities as quickly as possible, through immediate response and the plan of action and milestones process required by law and Office of Management and Budget policy. That compliance profile approach to continuous monitoring creates a continuous improvement capability that enhances situational awareness.

The second area focuses on cyberthreat analysis and security intelligence by aggregating and correlating security threat intelligence data that can create actionable and operationally relevant recommendations. This approach increases awareness of vulnerabilities that might allow an organizational compromise prior to an actual breach or network penetration. This analytics and security intelligence capability can also be framed with risk management to identify insider threat vulnerabilities or compromises.

Taken together, the resources from NIST and growing capabilities for assessing risk and using analytics provide a strong road map for agencies to follow in the continual improvement of their cybersecurity posture.

About the Authors

Dan Chenok is executive director of the IBM Center for the Business of Government.

John Lainhart leads IBM's Public Sector Cybersecurity and Privacy Services.

Cyber. Covered.

Government Cyber Insider tracks the technologies, policies, threats and emerging solutions that shape the cybersecurity landscape.


Reader comments

Fri, Mar 28, 2014

This is not a critique; it’s a statement of fact. There is a difference between “going through the motions” and applying the top-down methods of distributed defenses (elastic defenses). Most, effectively all, the cyber guys at our institution use the same old scorched -earth methodology, (MAD vs NUTS?). I they got their way entirely all we would have is a costly and useless infrastructure, (if we don’t already), and the attackers would still get in. Our cyber pros have all the tools in the tool box at their disposal but they use everyone as it it’s a hammer. They don't realize it's the Go (Weiqi) paradigm, not Chess, (although they play it like American football). While the following overused phrase from the Art of War is cited by many cyber-security charlatans: “The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable." It is only rhetorical. Even the detractors don’t get it because their brains are wired wrong. The attackers think laterally while the defenders are fighting in trenches. There is a reason what the attackers are winning: “Fixed fortifications are a monument to the stupidity of man.” General George S. Patton

Thu, Mar 27, 2014

Analytics are important but not at the expense of basic computer security hygiene. If you don't pay to get the unsexy security basics done, you don't have computer security. Bad web design cannot be fixed with continual patching. Keyloggers make user name and password logins obsolete no matter how complicated or long you make the password. Security is about having and hardening multiple layers and when you skimp on a layer, gaps develop over-time to gaping holes. CIOs don't appreciate the need to layer and tend to select flash over substance. The cloud first mandate is a prime example of this bias and lack of understanding of what is good security and information assurance.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group