You are on page 1of 10

kl

W H I T E PA P E R S E R I E S
February 2009

Security Metrics Roadmap:


A Guide for Information Security Professionals

A WHITE PAPER BY:


Jim Maloney, CISSP,
CISM, CGEIT

www.santa-fe-group.com | 505.466.6434
info@santa-fe-group.com
W H I T E
February 2009
P A P E R S E R I E S
kl
Selecting and using a poor security metric is probably worse than not
using a metric at all. Care must be taken to ensure the metric drives the
correct behavior and helps identify and diagnose problems.
Security Metrics Roadmap:
reporting of relevant performance-related data.
A Guide for Information Security Professionals
The purpose of measuring performance is to
monitor the status of measured activities and
facilitate improvement in those activities by applying
corrective actions, based on observed measurements.
Information security professionals know the intrinsic
value of the work they do — how critical it is to the
The terms “metrics” and “measurements” are sometimes
continued success of organizations operating in an
used interchangeably. However, it is important to
ever-changing landscape of threats and vulnerabilities.
distinguish between the two. Measurements are
To be successful, they must not only provide leading-
typically collected at a point in time for the purpose
edge security solutions, but also communicate the
of examining a singular event. Metrics are based on
benefits of doing so in a tangible, quantitative manner
measurements collected over a period of time and are
that facilitates decision-making at many levels. In
used to support more detailed analysis and examine
addition, they need a foundation for continuous
trends. Measurements can be useful to provide a
improvement that can be applied to individual controls
snapshot of performance at a point in time; the true
or across the entire security program.
power of metrics comes from the collection of data over
a period of time, providing insight via analysis that
This information security metrics roadmap provides
highlights important trends and patterns.
guidance in the selection, collection, analysis, and
reporting of information security metrics. The focus
of this paper is on quantitative metrics; however,
similar analyses could be brought to bear on qualitative
The purpose of security metrics
There is an old saying in the field of metrics: “You
metrics such as attitude surveys, security training
get what you measure.” The phrase implies that if a
evaluations, and other “soft” measures. With a baseline
particular set of performance measures are collected
of good metrics, a security professional can leverage
and reviewed, the process or system being measured
this information to evaluate the efficiency, effectiveness
will tend to be optimized to improve those measures.
and impact of an information security program, and
If the performance measures are relevant, meaning that
help identify and diagnose security-related problems.
they are related to assessing the ability of a process
Metrics can also be a critical element in building the
or system to meet its stated objectives, improvements
business case and realizing the benefits of security
in the process or system will be aligned with meeting
activities, from a specific security solution to the entire
those objectives. Conversely, if the measures are not
security program.
relevant, the process or system may drift away from
its intended objectives. Each metric must be carefully
The original release of the National Institute of
selected to influence behaviors that are consistent with
Standards and Technology (NIST) Special Publication
the objectives of the business, and not just behaviors
(SP) 800-55 on security metrics clearly defines metrics
that satisfy the metric itself.
and describes why they are beneficial:1

When addressing information security metrics, scope,


Metrics are tools designed to facilitate decision
too, must be determined carefully. When financial
making and improve performance and
institutions and others relegate processes and services
accountability through collection, analysis, and

©
www.santa-fe-group.com | 505.466.6434
info@santa-fe-group.com

1
W H I T E
February 2009
P A P E R S E R I E S
kl

to third parties, the scope of their oversight extends to assist in identifying and diagnosing specific problems
those third parties. Responsibility for oversight cannot with an implemented control.
be outsourced. Risk management and compliance
obligations persist, just as if functions were carried out In addition to using metrics related to control
in-house. objectives, metrics can be useful in understanding the
overall impact of the security program on the business.
As a security program is deployed, it is important to This provides a macro perspective on the effect of
evaluate the program on a continuing basis against the security program with respect to the company’s
a clearly defined set of control objectives. These business objectives. These program-level metrics
control objectives are typically derived from a security are usually related to governance, management, and
framework or model and then adapted to the specific planning of the security program.
needs of the organization. Some of the more common
frameworks include:
As with any element of the security program, the metrics
• The Shared Assessments Program SIG
(Standardized Information Gathering) tool and program should not be static; it should be subject to the
AUP (Agreed Upon Procedures) – Standards for
same continuous improvement processes as the rest of the
assessing risks related to outsourced information
security processes that map to COBIT, ISO, and security program.
PCI standards.2
• COBIT (Control Objectives for Information
and related Technology) – Guidance for IT Criteria for selection
governance As the previous section implies, selecting and using a
poor security metric is probably worse than not using
• ISO (International Organization for
a metric at all. Care must be taken to ensure the metric
Standardization) 27002 – A code of practice for
drives the correct behavior and helps identify and
information security management
diagnose problems.
• NIST SP 800-53 – Recommended security
controls for federal information systems In his book on security metrics, Andrew Jaquith
suggests the following five attributes of a good metric:3

These frameworks’ control objectives generally fall


• Consistent – The metrics can be measured
into one of three broad categories: people, process, or
consistently without need for subjective
technology, all of which can be assessed and monitored
judgment.
via metrics.
• Inexpensive – The metrics can be gathered
The purpose of evaluating a security program against inexpensively, and ideally in an automated
control objectives is twofold. One purpose is to assess fashion.
the effectiveness (achieving control objectives) and • Numerical – The metrics can be expressed as
efficiency (achieving control objectives using the a cardinal number or percentage and measure
minimum amount of time, money, people, or other something on an absolute basis instead of a
resources) of the program. The other purpose is to relative basis.

©
www.santa-fe-group.com | 505.466.6434
info@santa-fe-group.com

2
W H I T E
February 2009
P A P E R S E R I E S
kl

• Unit of measure – The metrics are expressed in on track to meet its objectives, and if it is
one or more units of measure. doing so efficiently. As the security program is
• Contextually specific – The metrics are defined or updated, a process for continuous
meaningful to the user and relevant to the improvement based on security metrics should
decision-making process. be incorporated. ISO 27001 provides a good
example of the central role of continuous
The book Metrics for IT Service Management (ITSMF)
improvement in a security program via its plan,
uses the SMART acronym (Specific, Measurable,
do, check, act model. Monitoring of the program
Achievable, Realistic, and Timely) more typically
for the purposes of identifying and diagnosing
applied to goal setting as another method for assessing
problems is a control objective itself, not only
the quality of a metric and its intended use:4
in ISO 27001, but also in many of the other
• Specific – Is the metric measuring a specific commonly adopted security frameworks.
part of the process or a specific control? 2) Determine scope: adopt a security framework
• Measurable – Can the defined metric actually and select relevant control objectives. Several
be measured? choices for security frameworks are available
from sources including COBIT, ISO, NIST, and
• Achievable – Is the target level for the metric
the Information Security Forum (ISF). Besides
achievable?
providing a taxonomy of security controls that
• Realistic – Can the metric actually be used as a can be monitored and assessed via metrics, a
basis for diagnosis or improvement? security framework provides a more effective
• Timely – Can the metric be collected frequently approach to meeting security requirements
enough to be useful? from multiple laws, regulations, and industry
standards.

A combination of these selection and assessment 3) Select metrics and targets for assessment of key
attributes is recommended for determining the quality controls. Using the selection and assessment
of a candidate security metric, and subsequently criteria described here, an initial set of metrics
selecting and optimizing an effective set of security may be selected and then expanded and
metrics. improved over time. Thresholds for acceptable
performance of measured processes and systems
Establishing a security metrics program will also need to be established.
Several references suggest a similar sequence of 4) Identify data sources, collection methods and
steps for establishing a security metrics program. reporting tools. Ideally, automated methods of
These steps, summarized below, may be used as the data collection from reliable sources will be used
basis for developing a project plan for managing the to feed a reporting tool, making security metrics
implementation of a security metrics program. reporting inexpensive and consistent.
5) Respond to analysis. The security program
1) Integrate metrics into the security program
must be responsive to the results of analysis
design. As with any major business program
of the metrics. A combination of automated
or initiative, metrics can play a key role in
and manual procedures should be established
determining whether a security program is
that support consistent review of the metrics-

©
www.santa-fe-group.com | 505.466.6434
info@santa-fe-group.com

3
W H I T E
February 2009
P A P E R S E R I E S
kl

based reports and the alerts that are triggered Analysis and visualization of metrics
based on metrics that fall outside of established Unlike a single measurement, metrics are collected over
thresholds. a period of time. Companies realize the true power and
benefit of collected metrics when they are analyzed to
reveal trends and patterns. As with any type of data
Candidate metrics
and data analysis, visualization can be beneficial. Many
Three of the references used in this paper collectively
of the standard forms of visual data display (e.g., bar
describe a wide variety of candidate security-related
charts, line charts, pie charts, scatter diagrams, and
metrics (see Exhibit 1).
radar diagrams) can be applied to potentially improve
the presentation and understanding of both the raw
Only a manageable number of metrics should be collected metrics data and the results of the data analysis.

and analyzed — those needed to ensure that the security Although the use of metrics specifically in the domain
of information security is relatively immature, the tools
program is meeting its objectives and that key controls are
and processes for collection, analysis, and reporting of
operating as expected. If target levels of performance are metrics in general are well established. Many business
intelligence and performance management software
being reached consistently, some metrics can be dropped applications include an implicit or explicit process for
from the program. managing metrics.

The importance of using a packaged application for


A limited set of initial metrics may be selected from
collection, analysis, and reporting will become more
the references listed in Exhibit 1 as a pilot program
apparent as the volume and complexity of the metrics
using the previously described metrics selection and
increase. There has been a movement toward vendor
assessment criteria. The initial metrics should cover
consolidation in this area recently; to research current
some broad security program objectives as well as a few
offerings and find an appropriate solution, consider
specific indicators of performance. They should also
reviewing analyst reports and using an RFI/RFP
be selected for simplicity of collection, analysis, and
process.
reporting format.

Critical success factors


After a few months of exercising the initial metrics,
NIST provides several critical success factors
the metrics program can be expanded and adjusted
for organizations to consider in designing and
to better meet the needs of the security program and
implementing a security metrics program. In summary,
the objectives of the business. As with any element of
these factors are:6
the security program, the metrics program should not
be static; it should be subject to the same continuous
1) Stakeholders. Information security is a
improvement processes as the rest of the security
broad, cross-functional business activity that
program.
touches many elements of the organization.
As such, it is important to involve stakeholders
Exhibit 2 lists some candidates for an initial set of
from all organizations with security-
security metrics, one per each major security category
related responsibilities in the design and
in the ISO 27002 controls framework.

©
www.santa-fe-group.com | 505.466.6434
info@santa-fe-group.com

4
W H I T E
February 2009
P A P E R S E R I E S
kl

implementation process (e.g., information With careful selection and use, metrics improve
security, IT operations, legal, and human security program effectiveness and efficiency, allowing
resources). If an internal organization exists that problems to be identified and diagnosed more quickly.
has responsibility for business intelligence or And security metrics can be a key element of a business
performance management functions, the security case that supports investments in the security program
metrics program should try to leverage any today and tomorrow.
existing infrastructure that may be available for
data collection and reporting. 1
Security Metrics Guide for Information Technology
2) Manageability. Only a manageable number Systems, National Institute of Standards and Technology
of metrics should be collected and analyzed Special Publication 800-55, July 2003, 9.
— those needed to ensure that the security 2
The Shared Assessments Program was developed by BITS
program is meeting its objectives and that (www.bitsinfo.org) and is managed by The Santa Fe Group
key controls are operating as expected. If See www.sharedassessments.org.
target levels of performance are being reached 3
Andrew Jaquith, Security Metrics - Replacing Fear,
consistently, some metrics may be dropped from Uncertainty and Doubt (Upper Saddle River, NJ: Pearson
the program. New metrics may be needed in Education, 2007) 21-25.
response to changes in the security program and
4
Peter Brooks, Metrics for IT Service Management, The IT
its objectives.
Service Management Forum (Zaltbommel, Netherlands:
3) Data quality. The analysis and reports based Van Haren Publishing, 2006) 42.
on metrics will only be as good as the quality
Performance Measurement Guide for Information Security,
5
of the data available to generate those reports.
NIST SP 800-55 Revision 1, July 2008.
Standardized and automated methods of
collection should be used along with periodic 6
Security Metrics Guide for Information Technology
review and validation of the collected data. Systems, 13-14.
4) Relevance. An information security program
exists not for its own sake, but as an element About the Author
of helping the business meet its objectives. A Jim Maloney has worked in information technol-
subset of the metrics and resulting analysis at the ogy for more than 25 years. As an expert in security
program level should be aligned with business program management, Jim’s specialties include security
objectives and relate to business impact. strategy, risk assessment, security framework selection,
policies, procedures, staffing, compliance, and technol-
Conclusion ogy evaluations. He has been directly involved in the
Establishing and maturing a security metrics program full lifecycle of security product and services develop-
can require substantial effort. But programs that are ment from both business and technology perspectives,
designed and implemented properly should not require and is a Certified Information Systems Security Profes-
significant resources to maintain. Automated collection, sional (CISSP) and a Certified Information Security
analysis, and reporting can further help organizations Manager (CISM). For more information about Jim, see
manage their programs. http://santa-fe-group.com/staff_jim.php.

©
www.santa-fe-group.com | 505.466.6434
info@santa-fe-group.com

5
W H I T E
February 2009
P A P E R S E R I E S
kl
Exhibit 1: Reference descriptions of candidate security-related metrics

Reference Metrics related to Number of candidate metrics

NIST SP 800-55 R15 Program- and System-Level 19

ITSMF Metrics4 Security Management 10

ITSMF Metrics4 Incident Management 13

Security Metrics1 Diagnostics 79

Security Metrics1 Program Effectiveness 73

Exhibit 2: Candidates for an initial set of security metrics

Security Category Objective Metric Comments

Risk Management and To identify and Percentage (%) of For those risks for
Treatment prioritize risks and high-risk vulnerabilities which the decision
remediate those risks remediated within has been to apply
that are unacceptable specified target appropriate controls,
timeframe these controls should
be selected and
implemented to meet
the requirements
identified by a risk
assessment.

Security Policy To ensure that Percentage (%) of Employees, contractors,


employees, contractors, employees who and third-party
and third-party users have signed an users should sign an
understand their acknowledgement that acknowledgement of
security responsibilities they have read and their security roles and
understood the security responsibilities.
policies

Organization of To ensure that Percentage (%) of job Security roles and


Information Security employees, contractors, performance reviews responsibilities of
and third-party users with evaluation of employees, contractors,
understand their security responsibilities and third-party users
responsibilities, and are and compliance should be defined and
suitable for the roles documented.
assigned to them

©
www.santa-fe-group.com | 505.466.6434
info@santa-fe-group.com

6
W H I T E
February 2009
P A P E R S E R I E S
kl
Exhibit 2: Candidates for an initial set of security metrics, continued

Security Category Objective Metric Comments

Asset Management To achieve and maintain Percentage (%) of All critical assets should
appropriate protection critical assets with be clearly identified
of organizational assets a documented risk and a risk assessment
assessment performed on those
assets.

Human Resources To ensure that Percentage (%) of An adequate level of


Security employees, contractors, system users that have awareness, education,
and third-party users received basic awareness and training in security
are aware of information training procedures should
security threats and be provided to all
their responsibilities, employees, contractors,
and are equipped to and third-party users.
support security policies
in the course of their
normal work

Physical and To prevent unauthorized Percentage (%) of Critical or sensitive


Environmental Security physical access physical security information-processing
and damage to the incidents allowing facilities should be
organization’s premises unauthorized entry into physically protected
and information systems facilities containing from unauthorized
information systems access, damage, and
interference.

Communications and To reduce risks resulting Critical patch latency Timely information
Operations Management from exploitation of on severs and desktops about technical
published technical (average days that vulnerabilities of
vulnerabilities critical patches were information systems
missing) being used should
be obtained, and
appropriate measures
taken to address the
associated risk.

Access Control To control access to Percentage (%) of Access to information


information security incidents systems should be
caused by improperly controlled on the basis
configured access of business and security
controls requirements.

©
www.santa-fe-group.com | 505.466.6434
info@santa-fe-group.com

7
W H I T E
February 2009
P A P E R S E R I E S
kl
Exhibit 2: Candidates for an initial set of security metrics, continued

Security Category Objective Metric Comments

Information Systems To ensure that security Percentage (%) of Security requirements


Acquisition, is an integral part of system acquisition should be identified at
Development, information systems or development the requirements phase
and Maintenance specifications that of a project.
include security
requirements

Information Security To ensure a quick, Average time from The adverse impact of
Incident Management effective, and orderly initial incident report to information security
response to information incident recovery incidents on the
security incidents organization and its
business operations
should be minimized.

Business Continuity To protect critical Percentage (%) of A business continuity


Management business processes from critical systems management process
the effects of major addressed in the should be implemented
failures of information contingency plan to minimize the impact
systems or disasters, and on the organization and
to ensure their timely recover from loss of
resumption information assets.

Compliance To ensure compliance Percentage (%) of The security of in-


of systems with systems that are house and outsourced
organizational security compliant with the information systems
policies and standards specified baseline should be reviewed
(both in-house and configuration regularly.
outsourced)

©
www.santa-fe-group.com | 505.466.6434
info@santa-fe-group.com

8
W H I T E
February 2009
P A P E R S E R I E S
kl

Other White Papers by The Santa Fe Group


The New Consumer Value: “Living Light”
Volume 1 in The Santa Fe Group’s Living Light Series
By Leslie P. Mitchell, Janey Place, and
Catherine A. Allen

Beyond Compliance: Integrating New Regulations into


Your Risk Management Practice
By Peter J. Baldassaro, Robert W. Jones,
Edward J. Potter and Jodi Pratt

Mobile Payments Get a Risk Management Reality Check


By Gary Roboff, Senior Consultant

The Future is Mobile


By Janey A. Place Ph.D., Senior Consultant

When Bad Things Happen to Good Banks: The Perils


of an Unbalanced Control Regime
By Robert W. Jones, Senior Consultant

Fraud in the ACH System: A Holistic Approach


for Financial Institutions
By The Santa Fe Group Vendor Council

Electronic Discovery 2007: A Primer for


Financial Institutions
By The Santa Fe Group Vendor Council

Internal Fraud: Surveying the Current Landscape


By The Santa Fe Group Vendor Council

Internal Fraud: Building the Business Case for Investment


By The Santa Fe Group Vendor Council

➔ Download this paper and other Santa Fe Group


titles at http://santa-fe-group.com/whats-new.php.

©
www.santa-fe-group.com | 505.466.6434
info@santa-fe-group.com

You might also like