Balancing risk and reward is desirable for organizations of many types. Current economic and business conditions present many organizations with a dilemma of trying to lower costs in order to meet budget reductions, while still providing a high degree of risk management. This dilemma is present in the information technology (IT) field. Maintaining, let alone improving, security controls related to information systems in order to provide a high degree of risk management without additional investment is a difficult task. Many organizations face the dilemma of cutting services without having a pragmatic method to help them understand the impact a reduction may have on their organization's ability to manage risk. Without the ability to quantify the value of security controls, security services are often one of the first areas looked at for cost reductions.
Unfortunately, information technology (IT) managers historically have not been able to quantify the risk associated with reducing security controls, let alone justify the return on investment those security controls offered in the first place. Moreover, when economic conditions improve, organizations can return to investing in IT, and the situation may reverse. That is, IT management may endeavor to find the optimum investment in security controls and resources in order to reduce an organization's risk profile.
Various features and advantages of the present disclosure will be apparent from the detailed description which follows, taken in conjunction with the accompanying drawings, which together illustrate, by way of example, features of the present disclosure, and wherein:
Reference will now be made to exemplary embodiments illustrated in the drawings, and specific language will be used herein to describe the same. It will nevertheless be understood that no limitation of the scope of the present disclosure is thereby intended. Alterations and further modifications of the features illustrated herein, and additional applications of the principles illustrated herein, which would occur to one skilled in the relevant art and having possession of this disclosure, are to be considered within the scope of this disclosure.
As used herein, directional terms, such as “top,” “bottom,” “front,” “back,” “leading,” “trailing,” etc, are used with reference to the orientation of the figures being described. Because components of various embodiments disclosed herein can be positioned in a number of different orientations, the directional terminology is used for illustrative purposes only, and is not intended to be limiting.
As used herein, the terms “computer” and “microprocessor” refer to any type of computing device, including a personal computer, mainframe computer, portable computer, PDA, smart phone, or workstation computer that includes a processing unit, a system memory, and a system bus that couples the processing unit to the various components of the computer. The processing unit can include one or more processors, each of which may be in the form of any one of various commercially available processors. Generally, each processor receives instructions and data from a read-only memory (ROM) and/or a random access memory (RAM). The system memory typically includes ROM that stores a basic input/output system (BIOS) that contains start-up routines for the computer, and RAM for storing computer program instructions and data.
A computer typically also includes input devices for user interaction (e.g., entering commands or data, receiving or viewing results), such as a keyboard, a pointing device (e.g. a computer mouse), microphone, camera, or any other means of input known to be used with a computing device. The computer can also include output devices such as a monitor or display, projector, printer, audio speakers, or any other device known to be controllable by a computing device. In some embodiments, the computer can also include one or more graphics cards, each of which is capable of driving one or more display outputs that are synchronized to an internal or external clock source.
The term “computer program” is used herein to refer to machine-readable instructions, stored on tangible computer-readable storage media, for causing a computing device including a processor and system memory to perform a series of process steps that transform data and/or produce tangible results, such as a display indication or printed indicia.
The terms “computer-readable media” and “computer-readable storage media” as used herein includes any kind of tangible memory or memory device, whether volatile or non-volatile, such as floppy disks, hard disks, CD-ROMs, flash memory, read-only memory, and random access memory, that is suitable to provide non-volatile or persistent storage for data, data structures and machine-executable instructions. Storage devices suitable for tangibly embodying these instructions and data include all forms of non-volatile memory, including, for example, semiconductor memory devices, such as EPROM, EEPROM, and flash memory devices, magnetic disks such as internal hard disks and removable disks, magneto-optical disks, and optical disks, such as CD, CDROM, DVD-ROM, DVD-RAM, and DVD-RW. Any of the above types of computer-readable media or related devices can be associated with or included as part of a computer, and connected to the system bus by respective interfaces. Other computer-readable storage devices (e.g., magnetic tape drives, flash memory devices, and digital video disks) also may be used with the computer.
One challenge within the field of risk management today is that of finding a uniform method, model or process for organizations to rationalize their security services portfolio at a layer of granularity that facilitates return-on-investment (ROI) projections. That is, return-on-investment in the sense of quantifying what reduction in risk would actually be achieved by investing in certain security tools, controls, and/or services. If executives had an ability to view their security budget in the same manner that private equity firms view their investment portfolios, for example, they may make different security investment decisions.
A typical IT security group has a myriad of security controls and policies that cover such areas as patching, anti-virus, firewalls, intrusion prevention, etc. Making all of these security controls and policies work together to minimize the exposure and susceptibility of an organization's information systems to threats and vulnerabilities is a delicate balancing act. Additionally, it is notoriously difficult to evaluate how well these security tools and processes actually protect an organization, and even harder to estimate in advance the impact a change in security controls and mechanisms or a modification in security policy may have on an organization. It has also been found that security organizations often rely on suspect historical risk data and have few tools to help them understand the trade-offs of investing in different security strategies before placing them into practice.
Some organizations have developed information security management methodologies or models (hereinafter “information security program”, or “InfoSec”) to address some of these challenges. Within an InfoSec, a risk model can be created to expose threats, determine a likelihood of occurrence, and project the likely effects to information and assets. The model can also interact with an InfoSec common control schema, which can serve as an inventory of industry recognized best-practice security controls used to offset threats, subsequently reducing an organization's risk. The InfoSec approach has been used effectively by many large organizations in recent years.
Although the results of the InfoSec approach have been generally favorable, the manual extraction and data manipulation involved in the use of this sort of risk model can impose a cumbersome and unwieldy process that is not easily replicated throughout an organization's InfoSec department or easily applied to risk management projects. Efforts in security analytics research can help systematize an understanding of security policies, risks and investments. This research can provide modeling and simulation approaches and ideas from economics that allow the development of models of security-related business processes and threat environments, and the creation of simulations to predict likely outcomes of policy and technology decisions on security control investments.
There are a variety of approaches for developing risk models that are known by those of skill in the art. Many of these, such as Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE®), Factor Analysis of Information Risk (FAIR), Facilitated Risk Analysis Process (FRAP), and guidelines from National Institute of Standards and Technology (NIST), have many desirable features. However, these other approaches generally do not provide the ability to optimize a set of security controls.
As disclosed herein, a method has been developed to provide a mathematical and rational basis for an InfoSec risk model, to enable more effective reasoning about risk and the application of mitigating controls. One result of this method is a capability which allows users of InfoSec to determine how to optimize a set of controls to minimize risk, subject to a budget constraint. This approach can help improve the manner in which security and risk management personnel can deliver desired results.
An InfoSec risk assessment is a multi-step approach that guides an organization through the entire lifecycle of risk management. A flowchart outlining the overall process of an embodiment for analyzing risk in accordance with this disclosure is presented in
The process continues next by identifying threat objectives (step 102). The objective is the expected outcome of the threat if it is successful (e.g. “gain access to industrial control system,” or “gain access to Supervisory Control and Data Acquisition (SCADA) system). As shown in
When performing a risk assessment it is desirable to first properly assess the threats that are specific to an organization, its business processes, location, and other characteristics. Some of these threats are generic, i.e. they could impact an organization regardless of the nature of its business. There are a number of references known to those of skill in the art that are used for recognized threat categories, such as NIST reports, OCTAVE® and Microsoft's® STRIDE®, as well as other threat environment reports. Based on these or other references, and inventory of pre-defined threats and compliance events can be created.
Identified threats are inventoried and articulated into risks by taking into account an organization's business and technology impacts. One aspect of this analysis is to estimate the monetary impact that a particular threat poses to the business. (step 104) That is, if a particular threat were successful, what would be the likely monetary damage to the business? Other relevant factors are also identified, including anticipated attack vectors (step 106). An attack vector is the path or technology that is used to perpetrate the attack (e.g. “dial-tone POTS line”).
The next sub-step as part of identifying threat objectives (step 102) is to estimate the likelihood that a particular threat will be manifested. In general, the likelihood of a particular threat can be considered as being primarily due to two factors: the likelihood that the attack will be initiated (estimated at step 108) and the likelihood that, if initiated, the attack will be successful. (estimated at step 110) These likelihoods can be derived by considering a wide variety of factors such as the type of skill a person would need to carry out an attack, how that attack would be initiated as well as how complex the attack is to mount.
Presented in
In general the result of a risk assessment is a library or register of threats, with each threat having been characterized with properties such as name, source, objective, instrument, vector, target, complexity, exposure, result, loss expectancy, likelihood of occurrence, and impact. The name is the designation for the event that poses a threat (e.g. “compromised dial-up modem”). The source designation provides insight to origin-based mitigation/management strategies (e.g. “hacker”). The objective is the expected outcome of the threat if it is successful (e.g. “gain access to industrial control system,” or “gain access to SCADA system”). The instrument is the technology or process that is likely to be used to enable the threat to occur (e.g. “telephone war dialer”). The vector is the path or technology used to perpetrate the attack (e.g. “dial-tone POTS line”). The target is the ultimate target the threat would affect (e.g. “modems for OEM remote support access, out of band ICS access, maintenance to protect relay substations, or non-managed assets connected to the ICS”).
Complexity is determined based on the objective, instrument, vector and target, and can be specified as a value from 0 to 1. Exposure refers to exposure to the asset or organization if the threat were to occur (e.g. “unauthorized access to either a critical or non-critical asset”). The result is the ultimate effect if the threat is realized (e.g. “compromised network access point”). Loss expectancy is the annual loss expectancy (ALE) (e.g. estimated as a dollar value) based on exposure and threat result, together with a business impact assessment (BIA). Likelihood of occurrence is the probability that a particular threat might materialize. This can be expressed as a number between 0 and 1. The NIST framework can be used to describe the bands (high, medium, or low) in which the threat likelihood can be matched to a BIA study or general consensus. The impact can be defined as a value between 0 and 100; again, a NIST framework can be used to identify the bands in which the threat impact can be categorized.
Once threats are identified by likelihood and impact (step 102 in
Analysis of additional properties can also be used to identify control effectiveness. These properties can include people (personnel that are assigned to oversee and manage controls), policies/procedures (governance artifacts that are used to specify a control's purpose and operation), processes (operational sequences of activities or events that are designed to reduce risk), products (technologies or solutions that are used to manage or mitigate risk) and proof (metrics or validation methods used to track the effectiveness of control mechanisms).
As part of this control analysis, the cost of deployment of different controls are estimated. (step 122) An exemplary table 700 of control device costs is provided in
Estimating the likelihood of penetration (step 124) can involve multiple sub-steps. The effectiveness of existing or proposed controls to address threats can be determined by examining the sophistication of the skills required by an adversary to defeat the control, and the ability of the organization to effectively deploy the control. Since some controls may require substantially more skill than others in order to defeat, guidance for domain experts to choose a skill level is given, such as shown in the table 400 of
The InfoSec can also integrate a method or model for determining control maturity, which is also considered in the determination of likelihood of penetration analysis. This control maturity model can be applied through performing interviews and examining supporting documentation for each property of a control. These properties can include people (personnel that are assigned to oversee and manage controls), policy/procedures (governance artifacts that are used to specify a control's purpose and operation), processes (operational sequences of activities or events that are designed to reduce risk), products (technologies or solutions that are used to manage or mitigate risk) and proof (metrics or validation methods used to track the effectiveness of control mechanisms). It is desirable to establish the maturity of a control in order to determine its beneficial impact on an organization. Improving the maturity of a control improves the control's effectiveness. Again, quantitative levels are used to describe control maturity, to which probabilities are then assigned that differ by orders of magnitude. Provided in
Any gaps in security can also be identified where there are no controls to mitigate certain risks, or where existing controls are weak. Based on best security practices and established standards, a new set of controls might then be recommended to cover the risk gaps. For example, once gaps in a current risk treatment are identified, the InfoSec can be used to produce remediation control templates that are compiled based on various control design attributes relating to industry standards and best practices. Controls can be deployed based on the level of control maturity required to accommodate an organization's budget and appetite for risk.
In view of the above risk analysis methodology, a formal mathematical method has been developed to support and ground the dependencies and relationships behind the information gathered by the ISM. Referring to
As noted above, each threat in the formal model represents a potential target objective of an attacker, and each objective is associated with an impact. The impact is denoted v and can be measured in dollars (or other monetary units). As noted above, the impact represents the damage that would be caused if the objective were compromised. Multiple threat vectors can be associated with each objective, each vector corresponding to a different path an attacker can exploit to compromise the target.
Each threat vector is associated with a likelihood, denoted ρi, that the attack will be launched and succeed, assuming no controls are in place. This likelihood can be obtained as the product of the probability that the attack will be launched, times the probability that the attack will penetrate the system to reach the target if no controls are deployed. While these two quantities are difficult to measure, or even define precisely, estimates determined using the qualitative techniques described above can be used.
The product of the likelihood times the estimated impact is called the risk, and represents the expected loss associated with the threat vector. The total overall likelihood from all threat vectors is then calculated using the inclusion-exclusion principle, and the overall residual risk is the product of the overall likelihood times the impact of the threat objective.
Provided in
Each threat vector is associated with a likelihood, denoted Ri and shown in column 612, that the attack will be launched. This likelihood can be obtained as the product of the probability Li that the attack will be launched (column 608), times the probability Si that the attack will succeed (column 610), as given by the following equation:
R
i
=L
i
*S
i [1]
An example of this computation is provided in
Next, it is desirable to consider the options that a defender has: namely, the choice of controls that will help thwart attacks along different vectors, thereby reducing the overall risk. A defender has a choice of different kinds of controls to thwart an attack. Access control, intrusion detection, and authentication are all different types of controls that can be used as part of a comprehensive strategy to thwart or minimize the impact of an attack. In table 600 the control set options are designated φi (column 614). Each type of control can be implemented with different choices of mechanisms—different mechanisms incur different costs, and also differ in their ability to thwart different attacks. In general, the defender has a choice of selecting some control types as part of strategy and, for each control type, selecting one control mechanism. For example, if A and B are two control types containing, respectively, mechanisms a1 . . . am and b1 . . . bn, the defender has (m+1) (n+1) choices; he may select either zero or one control mechanism of either control type.
Each control mechanism has a known cost of deployment, which may, for example, include the fixed and marginal costs of deploying the control over a specified period of time. A table presenting cost of deployment of various control mechanisms is provided in
An additional factor that can enter into the penetration probability computation is the capability maturity level of a given control mechanism. An example of probabilities qi based upon capability maturity level is given in table 500 in
To achieve an attack objective, the attacker must penetrate each choice of control type. A simplifying assumption can be made that the ability to penetrate one control is independent of the ability to penetrate another control, which is how an organization achieves a defense-in-depth architecture. For any attack vector, the overall ability wi (column 616) of the hacker to penetrate the set of selected controls is the product of all probabilities qi, given by the equation:
w
i
=Π*q
i [2]
where qi represents the probability of penetrating the ith deployed control mechanism. The residual likelihood against this threat vector is then given by
ρi=Ri*wi. [3]
This quantity is given in column 618 in
(ρ1+ρ2−ρ1ρ2) [4]
This quantity is not shown in its own column in
ρ=v(ρ1+ρ2−ρ1ρ2) [5]
This quantity is shown in column 620 in
Several simplifying assumptions in both the risk model and the control portfolio optimization framework have been made, which are detailed here. First, it can be assumed that various probabilities are available: the probability that an attack is successful, the probability that a control can mitigate an attack, etc. As noted earlier, it is difficult to define these probabilities precisely or to estimate them with a high-degree of accuracy.
However, a lack of accuracy in estimating these probabilities does not render the solution invalid. In practice, instead of using numerical values for such probabilities, these kinds of probabilities can be converted into discrete ranges, such as “low”, “medium”, and “high.” Those skilled in the art can assign values in these types of ranges if they are given guidance on what those ranges mean. These probabilities can be decomposed into components that InfoSec practitioners can assess with some course quantification. Second, various types of independence can be assumed. For example, it can be assumed that the ability to defeat various kinds of controls is independent. It can also be assumed that the individual threats are independent, which allows the risk values to be carried through. In reality, skilled hackers possess several tools to defeat a variety of controls, and it may be difficult to separate threats into categories that are independent. In principle, this problem can be overcome with more sophisticated models that account for dependent variables.
Assigning rough numerical values and a formal framework is believed to capture expert reasoning and find solutions that are judged reasonable. In short, the value of the analysis is to be found not in the calculations, but in the quality of the answers. A set of examples can justify this vision.
The method disclosed herein also provides an approach to optimize a portfolio of security controls. Security decisions often involve trade-offs: a security policy choice that optimizes time spent by the security team might create burdens (cost) for IT operations or the business; and a decision to spend money defending one risk can mean reduced resources for combating other threats. It is desirable that the resources available in a fixed security budget be allocated in proportion to the security priorities a particular organization has and in response to the impact from potential threats.
Choosing which security controls to invest in with the goal of minimizing residual risk is not a trivial task. Budget constraints generally prohibit selecting all controls. Also some controls may not be practically possible, as they might be dependent on technical constraints or staff competencies that might be missing in a particular organization. On the other hand, legal and compliance constraints may place priorities on one set of controls rather than another.
During customer engagements, the InfoSec approach produces a lot of threat and control data that is stored across disparate spreadsheets. In order to identify the controls that should be implemented to reduce the risk, a manual data analysis process is used, often relying on the consultant's expertise to choose the appropriate defense mechanisms. By using the mathematical framework described previously and by applying an economic utility maximization approach together with search algorithms a solution can be developed that allows the stakeholders (e.g. the consultants and the customer) to more easily explore control investment choices, and ultimately choose the optimal solution. Following is a description of an approach to control selection optimization, including the utility function that can be used and a set of search optimization algorithms that have been used.
In exploring this issue, the optimization challenge is to determine an optimal set of controls φ that results in the greatest reduction in risk, but whose total cost is no more than some specified budget B or reasonable in light of the potential impact cased by the threat. This is a combinatorial optimization problem. It involves searching through an exponential set of combinations of controls to find the correct solution. Although the problem in its full generality is NP-Complete, it is believed that sub-optimal algorithms are likely to provide solutions that are within an acceptable range. Several algorithms can be used to find such solutions. For example, a greedy algorithm could be used in which, at each step, the control that leads to the greatest reduction in risk, but still stays within the available budget, is selected.
Following is an illustrative example that helps to show how the method disclosed herein is implemented. For this example, it is assumed that the XYZ energy company has one thousand remote terminal units (RTU) controlled by a SCADA system to control the flow of oil through pipelines. These RTUs are located in remote locations, so dispatching a service unit to the controller is expensive (on average $100 per box). As a result, XYZ has installed modems in the boxes so that they can reach them remotely when doing basic maintenance, view statistics of their usage, etc. However, they are looking to improve the security of these boxes to meet and exceed North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) compliance requirements. XYZ has a budget of $200,000 to improve the security of their RTUs.
The primary threat is that an adversary can dial into either the SCADA system and/or RTUs and perform some malicious act of sabotage. An obvious control would be to disconnect the phone line, and have any service be done locally, but this is deemed to be too expensive and impractical. XYZ's domain experts determine that the likelihood of an attack being initiated is occasional (as per
XYZ is considering several controls: dial back modems, user id & password authentication, strong authentication, a VPN (virtual private network) into the controller, logging and monitoring connections to the controllers, and locking out the boxes if a threshold number of unsuccessful authentication attempts occurs (Remote Login Threshold or RLT). The cost estimates shown in
The next step is to consider the cost of the control options. A table showing the costs for all control alternatives shown in
Following the analysis methodology described above, each cost in
Even for a simple example like this, the number of combinations is quite large. For simplicity, this analysis has not specifically considered some of the factors that can make the problem even more complex, including multiple threats, multiple vectors of attack, and the capability of the organization to deploy the controls. However, the method disclosed herein can be used to consider these additional issues. In particular, in performing the method disclosed herein, each of the values discussed herein, such as those associated with impact, threat vectors, launch and attack probability, control options and costs, penetration probabilities, and so on, can be input into a computer system having a processor and system memory, and having program code stored in tangible computer-readable storage memory, for causing the computer system to calculate likelihoods of attack and success, and to determine a risk associated with various threat vectors, and then calculate a residual risk across multiple threat vectors. Following this method, IT managers can quantify the risk associated with reducing security controls, as well as justify the return on investment those security controls offer. Moreover, IT management can use this method to find an optimum investment in security controls and resources in order to reduce an organization's risk profile.
It is to be understood that the above-referenced arrangements are illustrative of the application of the principles disclosed herein. It will be apparent to those of ordinary skill in the art that numerous modifications can be made without departing from the principles and concepts of this disclosure, as set forth in the claims.