SlideShare a Scribd company logo
Security Metrics
CS795/895 Spring 2004
• Source: Security Metrics Guide for
Information Technology Systems, July
2003 http://csrc.nist.gov/publications/
nistpubs/800-55/sp800-55.pdf
Components of a Metrics Program
• Strong upper-level management support
• Practical Security policies and procedures
• Quantifiable performance metrics
• Results-oriented metrics analysis
Roles
• Head of the Agency
• Chief Information Officer
• Agency IT Security Program Manager
• Program Manager/System Owner
• System Security Officer
Purpose of metrics
• Metrics are tools designed to facilitate decision
making and improve performance and
accountability through collection, analysis, and
reporting of relevant performance-related data.The
purpose of measuring performance is to monitor
the status of measured activities and facilitate
improvement in those activities by applying
corrective actions, based on observed
measurements.
Characteristics
• IT security metrics must be based on IT security
performance goals and objectives.
• IT security metrics must yield quantifiable
information
• Data required for calculating metrics must be
readily obtainable
• Metrics need to provide relevant performance
trends over time and point to improvement actions
that can be applied to problem areas.
Metric Types
Stages of Development (Level of maturity)
Level 1 Level 2 Level 3 Level 4 Level 5
Policy Procedures Procedures P&C P&C
Developed Developed & Controls Tested Integrated
Implemented
Types of Metrics
Goals ObjectivesImplementation Effectiveness Impact
Defined Identified & Efficiency
of security plans
Illustration: Level 4 and 5 Metrics
• Computing the percentage of crackable passwords within a
predefined time threshold will validate the effectiveness of
an organization’s password policy by measuring the length
of time required to break policy-compliant passwords.
• The impact metrics would quantify incidents by type (e.g.,
root compromise, password compromise, malicious code,
denial of service) and correlate the incident data to the
percentage of trained users and system administrators to
measure the impact of training on security.
Metric Detail Form
• Performance goal
• Performance objective
• Metric
• Purpose
• Implementation evidence
• Frequency
• Formula
• Data Source
• Indicators
Performance Goal
• State the desired results of implementing
one or several system security control
objectives/techniques that are measured by
the metric.
Performance Objective
State the actions that are required to
accomplish the performance goal. Multiple
performance objectives can correspond to a
single performance goal.
Metric
• Define the metric by describing the
quantitative measurement(s) provided by
the metric. Use a numeric statement that
begins with the words “percentage,”
“number,” “frequency,” “average,” or other
similar terms.
Purpose
Describe the overall functionality obtained by
collecting the metric. Include whether a metric
will be used for internal performance measurement
or external reporting, what insights are
hoped to be gained from the metric, regulatory or
legal reasons for collecting a specific
metric if such exist, or other similar items.
Establishing Performance Targets
• The mechanics of establishing performance targets differ
for implementation metrics and the other three types of
metrics (effectiveness, efficiency, and impact).
• For implementation metrics, targets are set to 100 percent
completion of specific tasks.
• Setting performance targets for efficiency, effectiveness,
and impact metrics is more complex, because these aspects
of security operation do not assume a specific level of
performance.
• Management will need to apply qualitative and subjective
reasoning to determine appropriate levels of security
effectiveness and efficiency and to use these levels as
targets of performance for applicable metrics.
Feedback Within Metrics Development Process
• For example, if a security policy defines a specific
password configuration, compliance with this policy could
be determined by measuring the percent of passwords that
are configured according to the policy.
• This measure addresses the level of security control
implementation. It is assumed that configuring all
passwords according to the policy will significantly
reduce, if not eliminate, system compromises through
broken passwords.
• To measure effectiveness of the existing password policy
implementation, the percent of crackable passwords (by
common password-breaking tools) could be identified.
Identification and Authentication
• Are users individually authenticated via passwords,
tokens, or other devices?
• Question: Are vendor-supplied passwords replaced
immediately?
• Metric: Percentage of systems without active vendor-
supplied passwords
• Are access controls enforcing segregation of duties?
• Question: Does the system correlate actions to users?
• Metric: Percentage of unique user IDs
Logical Access Controls
• Do the logical access controls restrict users to authorized
transactions and functions?
• Question: Is access to security software restricted to
security administrators?
• Metric: Percentage of users with access to security
software that are not security administrators
Logical Access Controls (Contd.)
• Are there logical controls over network access?
• Question: Are insecure protocols disabled?
• Metric: Percentage of systems running restricted
protocols
Audit Trails
• Is activity involving access to and modification of
sensitive or critical files logged, monitored, and possible
security violations investigated?
• Question: Does the audit trail provide a trace of user
actions?
• Metric: Percentage of systems on which audit trails
provide a trace of user actions

More Related Content

What's hot

Information Security Project
Information Security ProjectInformation Security Project
Information Security Project
novemberchild
 
Continual Monitoring
Continual MonitoringContinual Monitoring
Continual Monitoring
Tripwire
 
SOC3D_Brochure_NEW_Digital
SOC3D_Brochure_NEW_DigitalSOC3D_Brochure_NEW_Digital
SOC3D_Brochure_NEW_Digital
Oscar Williams
 

What's hot (20)

Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best Practices
 
Nist 800 53 deep dive 20210813
Nist 800 53 deep dive 20210813Nist 800 53 deep dive 20210813
Nist 800 53 deep dive 20210813
 
NIST Supply Chain Risk publication 800-161
NIST Supply Chain Risk publication 800-161NIST Supply Chain Risk publication 800-161
NIST Supply Chain Risk publication 800-161
 
What is a cybersecurity assessment 20210813
What is a cybersecurity assessment  20210813What is a cybersecurity assessment  20210813
What is a cybersecurity assessment 20210813
 
Master Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines SchoolMaster Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines School
 
isicg - 3 r's v4
isicg - 3 r's v4isicg - 3 r's v4
isicg - 3 r's v4
 
Information Security Project
Information Security ProjectInformation Security Project
Information Security Project
 
The Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryThe Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your Story
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity Audit
 
Supplement To Student Guide Seminar 03 A 3 Nov09
Supplement To Student Guide   Seminar 03 A 3 Nov09Supplement To Student Guide   Seminar 03 A 3 Nov09
Supplement To Student Guide Seminar 03 A 3 Nov09
 
Challenges of Vulnerability Management
 Challenges of Vulnerability Management Challenges of Vulnerability Management
Challenges of Vulnerability Management
 
Community IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security PolicyCommunity IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security Policy
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshop
 
Information security
Information securityInformation security
Information security
 
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Josephiuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Continual Monitoring
Continual MonitoringContinual Monitoring
Continual Monitoring
 
SOC3D_Brochure_NEW_Digital
SOC3D_Brochure_NEW_DigitalSOC3D_Brochure_NEW_Digital
SOC3D_Brochure_NEW_Digital
 

Similar to Securitymetrics

· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
LynellBull52
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ Infrastructure
Priyank Hada
 
Security Baselines and Risk Assessments
Security Baselines and Risk AssessmentsSecurity Baselines and Risk Assessments
Security Baselines and Risk Assessments
Priyank Hada
 
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS              .docxRunning head AUDITING INFORMATION SYSTEMS PROCESS              .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
joellemurphey
 

Similar to Securitymetrics (20)

Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010
 
Information system audit 2
Information system audit 2 Information system audit 2
Information system audit 2
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
 
Controls in Audit.pptx
Controls in Audit.pptxControls in Audit.pptx
Controls in Audit.pptx
 
Chapter 15 software product metrics
Chapter 15 software product metricsChapter 15 software product metrics
Chapter 15 software product metrics
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
 
Practical Measures for Measuring Security
Practical Measures for Measuring SecurityPractical Measures for Measuring Security
Practical Measures for Measuring Security
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ Infrastructure
 
Unit Iii
Unit IiiUnit Iii
Unit Iii
 
CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptx
 
Compliance
ComplianceCompliance
Compliance
 
Unit 8 software quality and matrices
Unit 8 software quality and matricesUnit 8 software quality and matrices
Unit 8 software quality and matrices
 
Software Productivity Measurement
Software Productivity MeasurementSoftware Productivity Measurement
Software Productivity Measurement
 
Security Baselines and Risk Assessments
Security Baselines and Risk AssessmentsSecurity Baselines and Risk Assessments
Security Baselines and Risk Assessments
 
Security-Monitoring-and-Improvement.pptx
Security-Monitoring-and-Improvement.pptxSecurity-Monitoring-and-Improvement.pptx
Security-Monitoring-and-Improvement.pptx
 
Old Presentation on Security Metrics 2005
Old Presentation on Security Metrics 2005Old Presentation on Security Metrics 2005
Old Presentation on Security Metrics 2005
 
Security metrics 2
Security metrics 2Security metrics 2
Security metrics 2
 
Implementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentorImplementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentor
 
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS              .docxRunning head AUDITING INFORMATION SYSTEMS PROCESS              .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
 
Software metrics by Dr. B. J. Mohite
Software metrics by Dr. B. J. MohiteSoftware metrics by Dr. B. J. Mohite
Software metrics by Dr. B. J. Mohite
 

Recently uploaded

Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdf
Kamal Acharya
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 

Recently uploaded (20)

Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Pharmacy management system project report..pdf
Pharmacy management system project report..pdfPharmacy management system project report..pdf
Pharmacy management system project report..pdf
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Furniture showroom management system project.pdf
Furniture showroom management system project.pdfFurniture showroom management system project.pdf
Furniture showroom management system project.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdf
 
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and VisualizationKIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
 
Scaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageScaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltage
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
 
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxCloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Explosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdfExplosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdf
 
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
 
A case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfA case study of cinema management system project report..pdf
A case study of cinema management system project report..pdf
 
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and ClusteringKIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
 

Securitymetrics

  • 2. • Source: Security Metrics Guide for Information Technology Systems, July 2003 http://csrc.nist.gov/publications/ nistpubs/800-55/sp800-55.pdf
  • 3. Components of a Metrics Program • Strong upper-level management support • Practical Security policies and procedures • Quantifiable performance metrics • Results-oriented metrics analysis
  • 4. Roles • Head of the Agency • Chief Information Officer • Agency IT Security Program Manager • Program Manager/System Owner • System Security Officer
  • 5. Purpose of metrics • Metrics are tools designed to facilitate decision making and improve performance and accountability through collection, analysis, and reporting of relevant performance-related data.The purpose of measuring performance is to monitor the status of measured activities and facilitate improvement in those activities by applying corrective actions, based on observed measurements.
  • 6. Characteristics • IT security metrics must be based on IT security performance goals and objectives. • IT security metrics must yield quantifiable information • Data required for calculating metrics must be readily obtainable • Metrics need to provide relevant performance trends over time and point to improvement actions that can be applied to problem areas.
  • 7. Metric Types Stages of Development (Level of maturity) Level 1 Level 2 Level 3 Level 4 Level 5 Policy Procedures Procedures P&C P&C Developed Developed & Controls Tested Integrated Implemented Types of Metrics Goals ObjectivesImplementation Effectiveness Impact Defined Identified & Efficiency of security plans
  • 8. Illustration: Level 4 and 5 Metrics • Computing the percentage of crackable passwords within a predefined time threshold will validate the effectiveness of an organization’s password policy by measuring the length of time required to break policy-compliant passwords. • The impact metrics would quantify incidents by type (e.g., root compromise, password compromise, malicious code, denial of service) and correlate the incident data to the percentage of trained users and system administrators to measure the impact of training on security.
  • 9. Metric Detail Form • Performance goal • Performance objective • Metric • Purpose • Implementation evidence • Frequency • Formula • Data Source • Indicators
  • 10. Performance Goal • State the desired results of implementing one or several system security control objectives/techniques that are measured by the metric.
  • 11. Performance Objective State the actions that are required to accomplish the performance goal. Multiple performance objectives can correspond to a single performance goal.
  • 12. Metric • Define the metric by describing the quantitative measurement(s) provided by the metric. Use a numeric statement that begins with the words “percentage,” “number,” “frequency,” “average,” or other similar terms.
  • 13. Purpose Describe the overall functionality obtained by collecting the metric. Include whether a metric will be used for internal performance measurement or external reporting, what insights are hoped to be gained from the metric, regulatory or legal reasons for collecting a specific metric if such exist, or other similar items.
  • 14. Establishing Performance Targets • The mechanics of establishing performance targets differ for implementation metrics and the other three types of metrics (effectiveness, efficiency, and impact). • For implementation metrics, targets are set to 100 percent completion of specific tasks. • Setting performance targets for efficiency, effectiveness, and impact metrics is more complex, because these aspects of security operation do not assume a specific level of performance. • Management will need to apply qualitative and subjective reasoning to determine appropriate levels of security effectiveness and efficiency and to use these levels as targets of performance for applicable metrics.
  • 15. Feedback Within Metrics Development Process • For example, if a security policy defines a specific password configuration, compliance with this policy could be determined by measuring the percent of passwords that are configured according to the policy. • This measure addresses the level of security control implementation. It is assumed that configuring all passwords according to the policy will significantly reduce, if not eliminate, system compromises through broken passwords. • To measure effectiveness of the existing password policy implementation, the percent of crackable passwords (by common password-breaking tools) could be identified.
  • 16. Identification and Authentication • Are users individually authenticated via passwords, tokens, or other devices? • Question: Are vendor-supplied passwords replaced immediately? • Metric: Percentage of systems without active vendor- supplied passwords • Are access controls enforcing segregation of duties? • Question: Does the system correlate actions to users? • Metric: Percentage of unique user IDs
  • 17. Logical Access Controls • Do the logical access controls restrict users to authorized transactions and functions? • Question: Is access to security software restricted to security administrators? • Metric: Percentage of users with access to security software that are not security administrators
  • 18. Logical Access Controls (Contd.) • Are there logical controls over network access? • Question: Are insecure protocols disabled? • Metric: Percentage of systems running restricted protocols
  • 19. Audit Trails • Is activity involving access to and modification of sensitive or critical files logged, monitored, and possible security violations investigated? • Question: Does the audit trail provide a trace of user actions? • Metric: Percentage of systems on which audit trails provide a trace of user actions