How Can Security Be Measured
How Can Security Be Measured
How Can Security Be Measured
T
raditional security metrics are haphazard at best; at worst bypassing the most expensive items. The assumption is that
they give a false impression of security that leads to aggregating risk reduction controls is a better buy. Thus, there is
inefficient or unsafe implementation of security measures. a tendency to buy large quantities of security tools and avoid the
This paper presents an approach whereby maturity and quality more expensive, less glamorous controls. The more difficult
are combined to provide a more complete and orderly picture of controls tend to be organizational in nature requiring cultural
an organization’s security posture. The approach will be referred change (such as a disaster recovery plan) rather than specific
to as the Security Program Maturity Model. turnkey solutions [such as firewalls and intrusion detection
Security metrics—the measurement of the effectiveness of systems (IDSs)]. Management thinks it is buying more security
the organization’s security efforts over time—have always for less money.
been difficult to evaluate. How can an organization determine However, who is to say that more security is purchased?
whether it is secure? The measure of the quality of the security How can the organization measure the relative protection
program can be truly tested only when the organization is gained by each purchase? Is the organization purchasing the
stressed by a crisis. Yet, this situation is exactly what the security safeguards in the right order? Is the organization being
security effort is designed to prevent. exposed to more risk because of the unsystematic approach
Management needs some measure of how secure the toward implementation?
organization is. Organizations need to ask themselves: Building security programs from the ground up allows for
• How many resources does it take to be “safe”? the development of new approaches toward these traditional
• How can the cost of new security measures be justified? security metrics problems. A fresh look at these problems
• Is the organization getting its money’s worth? enables the development of a comprehensive solution for any
• When does the organization know it is “safe”? industry.
• How does the organization compare its posture with others in This newer, more systematic approach toward security
the industry and with best practice standards? metrics will:
The traditional answer to these questions relates to risk • Generate reproducible and justifiable measurements
assessment and the residual risk the organization is willing to • Measure something of value to the organization
take based on business needs and budget limits. Risk • Determine real progress in security posture
management may beg the question, not necessarily leading to a • Apply to a broad range of organizations while producing
stronger security stance. similar results
Imagine, for instance, a risk assessment that lists a threat • Determine the order in which security controls should be
matrix and the cost to mitigate the risks. Some items on the list applied
would be of insignificant cost. Other items will be very • Determine the resources needed to apply to the security
expensive (figure 1). Often, management may decide to mitigate program
could take years of wasteful redesign work to the inventory ISO 17799 Categories
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
system to properly categorize and ultimately protect the assets. 1. Overall Security Managementt (11)
Since this model is essentially a detailed compliance tool, 2. Asset Classification and Control (5)
high level of maturity may give the false impression of project 4. Physical & Environmental Security (12)
management closure. It might indicate to management that the 5. Cyber Access Control (11)
organization is now “safe” and there is no more need to 6. System Development and Maintenance (9)
Endnotes
Medium 1
ISO/IEC 17799:2000(E), Information Technology—
Code of Practice for Information Security Management,
departments. Thus, in sorting the elements by departments, December, 2000
management can gain a security understanding specifically 2
National Institute of Standards and Technology (NIST)
customized by the way the organization is structured. Computer Security Expert Assist Team (CSEAT) IT
Figure 9 provides a simulated example of one such fictional Security Model, csrc.nist.gov/cseat/CSEAT_IT_Security_
organization. At a glance, it can be seen how each department Maturity_Levels.htm
rates in program maturity and quality. For example, department 3
Dunbar, Thomas M.; “Information Metrics @ Citigroup,”
2 is more mature, yet its quality is lower than the other two 14 June 2000, Computer System Security and Privacy
departments, and while departments 1 and 3 are at nearly the Advisory Board (CSSPAB) workshop “Approaches to
same level of maturity, the quality of department 1’s Measuring Security,” http://csrc.nist.gov/ispab/june13-
implementation is higher. 15/Citigroup.pdf
These appraisals need active management on an ongoing 4
IT Governance Institute (ITGI), Control Objectives for
basis. By using security metrics in this manner, the organization Information and related Technology (COBIT), USA, 2000,
incorporates security deeply into its structure. Security metrics www.itgi.org. Also see www.auckland.ac.nz/security/
then become a meaningful gauge of organizational performance, InfomationSecurityMaturityAssessment.htm, draft version 0.1,
because they were designed to meet the initial objectives for 2003.
metrics. An organization can easily demonstrate security posture 5
Systems Security Engineering Capability Maturity Model,
improvements over time. Moreover, as security elements become (SSE-CMM), Carnegie Melon University, 1999,
adopted in a more systematic way, management can begin to www.sse-cmm.org
understand the costs and benefits of an organized, mature and 6
“CERT Security Capability Assessment Tool,” CSO Online,
high-quality security program. CXO Media Inc. and Carnegie Melon University, 2003,
They are sorted by ISO 17799 categories with the numbers www.csoonline.com/surveys/securitycapability.html
in parentheses representing the actual number of program 7
G. Miles, et al., Security Assessment: Case Studies for
elements used for the maturity score. Implementing the NSA IAM, Sygress Publishing Inc., 2004
All the quality measures for existing program elements are
aggregated at two different times.
Information Systems Control Journal, formerly the IS Audit & Control Journal, is published by the Information Systems Audit and Control Association, Inc.. Membership in the association, a voluntary
organization of persons interested in information systems (IS) auditing, control and security, entitles one to receive an annual subscription to the Information Systems Control Journal.
Opinions expressed in the Information Systems Control Journal represent the views of the authors and advertisers. They may differ from policies and official statements of the Information Systems Audit
and Control Association and/or the IT Governance Institute® and their committees, and from opinions endorsed by authors' employers, or the editors of this Journal. Information Systems Control Journal
does not attest to the originality of authors' content.
© Copyright 2005 by Information Systems Audit and Control Association Inc., formerly the EDP Auditors Association. All rights reserved. ISCATM Information Systems Control AssociationTM
Instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. For other copying, reprint or republication, permission must be obtained in writing from the
association. Where necessary, permission is granted by the copyright owners for those registered with the Copyright Clearance Center (CCC), 27 Congress St., Salem, Mass. 01970, to photocopy articles
owned by the Information Systems Audit and Control Association Inc., for a flat fee of US $2.50 per article plus 25¢ per page. Send payment to the CCC stating the ISSN (1526-7407), date, volume,
and first and last page number of each article. Copying for other than personal use or internal reference, or of articles or columns not owned by the association without express permission of the
association or the copyright owner is expressly prohibited.
www.isaca.org