Re: [scap_interest] Gaps in Risk Management

Adam Montville <amontville@tripwire.com> Wed, 15 February 2012 13:57 UTC

Return-Path: <amontville@tripwire.com>
X-Original-To: scap_interest@ietfa.amsl.com
Delivered-To: scap_interest@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 91FAF21F86E0 for <scap_interest@ietfa.amsl.com>; Wed, 15 Feb 2012 05:57:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.687
X-Spam-Level:
X-Spam-Status: No, score=-5.687 tagged_above=-999 required=5 tests=[AWL=0.913, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id id6rmP5Olqks for <scap_interest@ietfa.amsl.com>; Wed, 15 Feb 2012 05:57:54 -0800 (PST)
Received: from TX2EHSOBE006.bigfish.com (tx2ehsobe001.messaging.microsoft.com [65.55.88.11]) by ietfa.amsl.com (Postfix) with ESMTP id 810A021F84D9 for <scap_interest@ietf.org>; Wed, 15 Feb 2012 05:57:54 -0800 (PST)
Received: from mail56-tx2-R.bigfish.com (10.9.14.236) by TX2EHSOBE006.bigfish.com (10.9.40.26) with Microsoft SMTP Server id 14.1.225.23; Wed, 15 Feb 2012 13:57:54 +0000
Received: from mail56-tx2 (localhost [127.0.0.1]) by mail56-tx2-R.bigfish.com (Postfix) with ESMTP id D89772402FC; Wed, 15 Feb 2012 13:57:53 +0000 (UTC)
X-SpamScore: -37
X-BigFish: VPS-37(zz9371Ie6eL148cM98dK4015Lzz1202hzz8275ch1033IL8275bh8275dhz2dh2a8h668h839h946h)
X-Forefront-Antispam-Report: CIP:174.47.84.216; KIP:(null); UIP:(null); IPV:NLI; H:PDXHB01.tripwire.com; RD:174-47-84-216.static.twtelecom.net; EFVD:NLI
Received: from mail56-tx2 (localhost.localdomain [127.0.0.1]) by mail56-tx2 (MessageSwitch) id 1329314271357146_2916; Wed, 15 Feb 2012 13:57:51 +0000 (UTC)
Received: from TX2EHSMHS035.bigfish.com (unknown [10.9.14.251]) by mail56-tx2.bigfish.com (Postfix) with ESMTP id 45E962004A; Wed, 15 Feb 2012 13:57:51 +0000 (UTC)
Received: from PDXHB01.tripwire.com (174.47.84.216) by TX2EHSMHS035.bigfish.com (10.9.99.135) with Microsoft SMTP Server (TLS) id 14.1.225.23; Wed, 15 Feb 2012 13:57:48 +0000
Received: from PDXHB01.tripwire.com (172.30.0.53) by PDXED01.tripwire.com (192.168.192.5) with Microsoft SMTP Server (TLS) id 14.1.355.2; Wed, 15 Feb 2012 06:06:32 -0800
Received: from PDXMB02.tripwire.com ([fe80::f997:7b65:8e64:438e]) by PDXHB01.tripwire.com ([fe80::d495:98d2:7df4:2154%11]) with mapi id 14.01.0355.002; Wed, 15 Feb 2012 05:57:46 -0800
From: Adam Montville <amontville@tripwire.com>
To: Luis Nunez <lnunez@c3isecurity.com>, "kathleen.moriarty@emc.com" <kathleen.moriarty@emc.com>
Thread-Topic: [scap_interest] Gaps in Risk Management
Thread-Index: AQHM61pd/+qf+nsvQUKFi0HafiSh75Y9gPEAgAAD04CAAAM8AIAAdOOA
Date: Wed, 15 Feb 2012 13:57:45 +0000
Message-ID: <CB60F94B.92D6%amontville@tripwire.com>
In-Reply-To: <E17F701C-2ED4-4B78-8636-8DA11251CCEA@c3isecurity.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.14.0.111121
x-originating-ip: [172.30.0.234]
x-exclaimer-md-config: 79afcaa7-fdf4-4fa6-abe0-afeaa4640a4f
Content-Type: text/plain; charset="Windows-1252"
Content-ID: <35E2EDB197694D4CAE1F300721DAE775@tripwire.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: tripwire.com
Cc: "scap_interest@ietf.org" <scap_interest@ietf.org>, Mike Lloyd <drmike@redsealnetworks.com>
Subject: Re: [scap_interest] Gaps in Risk Management
X-BeenThere: scap_interest@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Discussion List for IETFers interested in the Security Content Automation Protocol \(SCAP\)." <scap_interest.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scap_interest>, <mailto:scap_interest-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/scap_interest>
List-Post: <mailto:scap_interest@ietf.org>
List-Help: <mailto:scap_interest-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scap_interest>, <mailto:scap_interest-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Feb 2012 13:57:58 -0000

Brainstorming at RSA is an excellent idea.  I'd like to additionally look at what was done with risk external to the information security domain.

From: Luis Nunez <lnunez@c3isecurity.com<mailto:lnunez@c3isecurity.com>>
Date: Tue, 14 Feb 2012 17:59:26 -0500
To: "kathleen.moriarty@emc.com<mailto:kathleen.moriarty@emc.com>" <kathleen.moriarty@emc.com<mailto:kathleen.moriarty@emc.com>>
Cc: Mike Lloyd <drmike@redsealnetworks.com<mailto:drmike@redsealnetworks.com>>, <scap_interest@ietf.org<mailto:scap_interest@ietf.org>>
Subject: Re: [scap_interest] Gaps in Risk Management

Jerome,
great idea and thanks for mentioning this talk. It would be an interesting discussion to have with Dr. Mike on the topic.  Lets hook up.

Since you mentioned Geer.  Here is an excellent talk Dan recent gave. http://geer.tinho.net/geer.suitsandspooks.8ii12.txt

-ln

On Feb 14, 2012, at 5:47 PM, <kathleen.moriarty@emc.com<mailto:kathleen.moriarty@emc.com>> wrote:

Hi Jerome,

I think it is a really good idea to start from use cases and what we want to get out of this work to drive the standards efforts.  The work being done here should result in the ability to report on meaningful and actionable metrics.  Brainstorming like this at the RSA Conference and on list would be great.  Activities like this may be tied to the frameworks as well – how do we get good risk metrics against the frameworks in which we want to measure our security programs?

Luis brought up CSA’s control matrix, maybe we want to think about what was done for 800-53 and how that could apply out to other frameworks like ISO27002 +ISO27017 (Virtualization/cloud), HIPAA HITECH, etc.  performing checks, assessing risk, and producing metrics are the drivers for these underlying activities.

Dan Greer has some good presentations online related to metrics and is running a series in IEE Security and Privacy on the topic as well.  I do need to admit that I have to catch up on my reading, so I can’t tell you too much about that effort :)

Any other thoughts on these topics?

Thanks,
Kathleen

From: scap_interest-bounces@ietf.org<mailto:scap_interest-bounces@ietf.org> [mailto:scap_interest-bounces@ietf.org] On Behalf Of Jerome Athias
Sent: Tuesday, February 14, 2012 5:34 PM
To: scap_interest@ietf.org<mailto:scap_interest@ietf.org>
Subject: Re: [scap_interest] Gaps in Risk Management

Hi list,

could it be possible to have a brainstorming at the RSA Conference?

or / because i identifed the following talk (at BSides San Francisco, // free event):

Metrics That Don’t Suck: A New Way To Measure Security Effectiveness ~ Dr. Mike Lloyd

How does your organization measure and report its security posture and performance?  Do you have spreadsheets that show how many vulnerabilities you found last month, or how many viruses your AV system stopped? Those numbers might pacify your management, but any security pro can tell you that they are no way to benchmark the real work you do – or how much danger your enterprise might be in.

Maybe the problem is that we’re all trying to use the data we already have – host metrics, network metrics, applications data – instead of building the data we actually need.  We need metrics that show the current range of threats, and the enterprise’s exposure. We need data that shows whether our security tools and programs are actually working or not. We need methods for demonstrating that our security teams are performing well – not only this month, but over a period of time.

In this thought-provoking presentation, we’ll describe methods for building an enterprise security metrics program that’s completely different from the current, sucky model of counting vulnerabilities or numbers of patches applied. We’ll outline methods for monitoring the threat landscape, and your organization’s exposure. We’ll offer some best practices for measuring the effectiveness of current security tools and systems. Best of all, we’ll outline a way to build a maturity model for security, so that you can show your security team’s performance on a month-to-month basis, and demonstrate its continuing improvement over time.

Want to stop reporting a bunch of crap and start building a real set of data that accurately measures your organization’s risk and its effectiveness in controlling it?  Want to learn how to integrate security data across hosts, networks, and applications?  Want your performance – and your company’s security posture – to be monitored using metrics that don’t suck?  Here’s a chance to look at the picture from a whole new angle.

(ref: http://www.infosecisland.com/blogview/20057-Security-BSides-San-Francisco-Speakers-and-Topics-Lineup.html )

I see these events as a good place to exchange our ideas.

Just my 2 cents

/JA
_______________________________________________
scap_interest mailing list
scap_interest@ietf.org<mailto:scap_interest@ietf.org>
https://www.ietf.org/mailman/listinfo/scap_interest

_______________________________________________ scap_interest mailing list scap_interest@ietf.org<mailto:scap_interest@ietf.org> https://www.ietf.org/mailman/listinfo/scap_interest