358 33 3MB
English Pages 247 [281] Year 2010
IT Security Management
Lecture Notes in Electrical Engineering Volume 61
For other titles published in this series, go to www.springer.com/series/7818
Alberto Partida
●
Diego Andina
IT Security Management IT Securiteers - Setting up an IT Security Function
Alberto Partida Information Security Expert GIAC, CEH, CISSP, CISA, CGEIT, MBA Technical University of Madrid Universidad Politécnica de Madrid (UPM) Spain [email protected] securityandrisk.blogspot.com
Diego Andina Grupo de Automatización en Señal y Comunicaciones Technical University of Madrid Universidad Politécnica de Madrid (UPM) Spain [email protected]
ISBN 978-90-481-8881-9 e-ISBN 978-90-481-8882-6 DOI 10.1007/978-90-481-8882-6 Springer Dordrecht Heidelberg London New York Library of Congress Control Number: 2010928831 © Springer Science+Business Media B.V. 2010 No part of this work may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, microfilming, recording or otherwise, without written permission from the Publisher, with the exception of any material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com)
There are costs and risks to a program of action, but they are far less than the long-range risks and costs of comfortable inaction. John F. Kennedy, 1961–1963 …the only asset that is undervalued these days in world economy is risk… Robert Rubin, 2006 Information security is based on outsmarting the other (the dark ;-) side Alberto Partida, 2008
Acknowledgments
To: My best half and my beloved editor, Raquel My mentors in life, my parents, my brother My mentors in my study life, Diego and Jean-Nöel My mentors in my working life, Santiago, Carlos, Luis, Fernando, Jan and Dominique My team colleagues at work My friends
vii
About the Authors
Alberto Partida is a M.Sc. graduate in telecommunication engineering by Universidad Politécnica de Madrid (UPM), specialised in computer science and IT security. He started in IT security in 1996 as a student preparing his dissertation in the group for Automation in Signals and Communications at UPM, led by Diego Andina. Since 1998, his professional experience covers network, system, application and business process security. Alberto currently provides his expertise to international organisations, coordinating a team of IT and Security experts focused on an IT risk reduction approach within the technology and organisational realm. He also teaches IT and IT security to pre-graduates in a French University. Alberto is a member of the SANS GIAC Advisory Board. He holds CEH, CISA, CISSP, CGEIT, Gold GSEC, Gold GCFW, Gold GCFA, GCIA and GREM GIAC certifications and he has finished his MBA at Henley Business School, ranked in the world’s top 15 schools by The Economist MBA ranking. Alberto can be contacted through his blog at securityandrisk.blogspot.com. Professor Diego Andina was born in Madrid, Spain, received simultaneously two master degrees, on computer science and on communications by the Universidad Politécnica de Madrid (Technical University of Madrid, UPM), Spain, in 1990, and the Ph.D. degree in 1995. He works for UPM where he heads the Group for Automation in Signals and Communications (GASC/UPM). He is author or coauthor of more than 200 national and international publications, being director of more than 50 R&D projects financed by National Government, European Commission or private institutions and firms. He is also an associate editorial member of several international journals and transactions and has participated in the organization of more than 50 international events. Diego is co-author of the book “Computational Intelligence for Engineering and Manufacturing” (2007) published by Springer. He is a computational intelligence researcher and an educational innovation expert. In the past, he has worked as a consultant at Andersen Consulting and he was a lieutenant in charge of the Security Office at the Spanish Air Force.
ix
Foreword
In 1862, the gardener James Bateman sent several specimens of the Christmas orchid to Charles Darwin. This orchid was first planted in Britain in 1855 and it did not blossom until 1857. It had been discovered several decades before by the French botanist Louis-Marie Aubert du Petit-Thouars in Madagascar in 1822. The most significant aspect of this flower is the length of its spur. It measures 20–35 cm from the tip to the lip of the flower. In 1862, Charles Darwin published his book titled “Fertilization of Orchids”, where he predicted that there should be a moth with a proboscis of a similar size. Darwin knew that the Christmas orchid should be pollinated by a moth with a proboscis that could get to the bottom of the flower given that the nectar is stored in the lower 5 cm of its tubular spur. There should be a moth with a proboscis of a similar length, able to reach the nectar from the outside of the flower. At that time, the reaction in the scientific community was not welcoming. Darwin had to endure some teasing. No one had ever discovered a moth with a two-handspan proboscis. The moth that pollinates the Christmas orchid was discovered later on in Madagascar in 1903 and it had, indeed, a 25–30 cm long proboscis. It was baptised with the name of “Xanthopan morganii praedicta”. The qualifier “praedicta” refers to the prediction made by Darwin. We had to wait for the arrival of the 21st century for it to be filmed in action for the first time. How could Darwin be sure of the existence of that moth? Would it not be possible that another type of insect was responsible for this orchid’s pollination? For Darwin, the reasoning was simple. Tubular flowers of pale or white colours that open at night belong to the floral syndrome called sphinxophilia. Such flowers are usually pollinated by sphinginae (sphinx moths). These moths have a very long proboscis and obtain nectar while in flight over the flower, similar to what hummingbirds do. That is, sphinxophilias are pollinated by sphinginae. If a sphinxophilia has a 35 cm long spur and the nectar is located in its lower 5 cm, there must be a sphinginae with a 30 cm long proboscis. Simple. Forty-one years passed by until that sphinx moth was discovered and 140 years until it was filmed. More striking than no one else having this idea before is the fact that scientists contemporary to Darwin did not believe him. Darwin predicted shockingly the
xi
xii
Foreword
existence of an animal, unknown until then, by simply using the logic of the evolution of species. Daniel Hunt Janzen states for the first time in 1980 his “theory of co-evolution”. According to it, evolutionary changes that occur in a species are the answer to the selection process that another species makes, whose result transforms into a process of mutual adaptation with the first species. Each one makes the other evolve. This concept can be applied to symbiotic and parasitic relationships, pollination and to the relationship between hunter and prey. The Christmas orchid and its moth have become one of the most used examples of co-evolution. Let’s go back in time and think of the early days of the relationship between the flower and the moth, when co-evolution began to take shape. The spur of the flower measured 10 cm and moths’ proboscis reached 5 cm. Moths with a 5.1 cm long proboscis had more chances to survive because they could access food that individuals with a 4.9 cm long proboscis did not reach. Furthermore, moths with a 5.1 cm long proboscis specialised in taking the nectar of orchids with a 10.1 cm long spur and exchanged pollen with specimens having a just over 10 cm long spur, since there were more competitors fighting to land on flowers with a just under 10 cm long spur. This situation promoted the genetic exchange between moths with large proboscis, making each new generation grow in length. You can imagine the rest of the story. Thousands of years later, Darwin managed to predict the existence of the moth by looking only at the flower, and 118 years later Janzen came to explain his theory of co-evolution. Alberto and Diego have captured in this book some ideas derived from coevolution applied to the organization of Security in Information Systems. The application of co-evolution is of interest to us, obviously, not the one that occurs between a flower and a moth, but the one happening among people. We apply the principles of co-evolution to four organisational aspects: – The first point focuses on the relative speed at which evolution must occur. Leigh Van Valen developed a principle within the co-evolution theory known as the “Red Queen hypothesis”, referring to the Red Queen that appears in Lewis Carroll’s book “Alice in Wonderland”, who states that “you cannot stop running to continue in the same place”. From the co-evolution viewpoint, this principle is often expressed as “for an evolutionary system, continuous improvement is necessary, at least, to maintain adjustment with respect to the systems with which it is co-evolving”. We must transform and evolve at the speed of change of our ecosystem. Not slower or faster. – The second aspect has to do with what we provide to the process of co-evolution, and what we obtain from it. If we wish for a Christmas orchid to blossom, a fundamental step is to find a moth with a 30 cm long proboscis. If we, as IT security executives, need to patch systems ad-hoc in less than 12 h, the key is not to confront IT operations colleagues with an order. A smarter way may be to achieve a specific budget so that a technical unit can always perform that patching job on demand when required. If we wish for Christmas orchids to blossom, a fundamental step is to find moths with a 30 cm long proboscis.
Foreword
xiii
– The third organisational topic deals with the realistic speed at which we can perform the process of co-evolution. We will start with moths with 5 cm long proboscis. Although the goal is to reach moths with 30 cm long proboscis, the first step will be to strive for a 5.1 cm long proboscis. Transformation in cultural and organisational processes needs to occur gradually and steadily. If we aim to perform a process that currently takes 1 week in just 1 h, a first real success will be to run it in less than 48 h. Only then we will be able to start thinking of reducing the time required for it to less than 6 h. The fundamental tenet is to improve and to start moving towards the target. Most of the times, we will only know the speed we can attain once we have started our journey. – The fourth and final aspect upon co-evolution refers to the mandate of IT security officers to provide security enhancements to the organisation. This is their contribution to the co-evolution process. However, it is not exclusive to them. If IT security executives fail in fulfilling their mandate, other players will do it for the mere survival of the business. These foundational recommendations, not only to Information Systems Security, but to any human organization, can be summarised in the following sentences: – We need to change at the same speed and in sync with our ecosystem. If our environment is re-organised, we should re-organise in the same direction and with the same intensity. – We should work to reach objectives and not worry about who owns the means to achieve them. – Determination, patience and perseverance. Every day, we must make our human environment one step closer to achieving the objective. – We must be the shift lever in our area of expertise, otherwise leadership will naturally disappear. Santiago Moral Chief Information Security Officer at BBVA Bank BBVA Bank ranks in listings such as Fortune 500, S&P 500, and Dow Jones
Contents
1
Vulnerabilities, Threats and Risks in IT ................................................. Foundational Concepts................................................................................ 1.1 Three Definitions: Vulnerability, Threat and Risk ........................... 1.2 Examples of Threats, Vulnerabilities and Risks .............................. 1.3 Impact and Probability Graph .......................................................... 1.4 Risk and Active and Passive Voices in Grammar ............................ 1.5 Internal and External Elements in a Risk ......................................... Information Risk Management Theory ....................................................... 1.6 Information Properties ..................................................................... 1.7 Risk Management Activities ............................................................ 1.7.1 Risk Assessment .................................................................. 1.7.2 Risk Mitigation .................................................................... 1.7.3 Risk Acceptance................................................................... 1.7.4 Risk Communication ........................................................... 1.8 Risk Management: Example Number 1 ........................................... 1.8.1 Risk Assessment .................................................................. 1.8.2 Risk Mitigation .................................................................... 1.8.3 Risk Acceptance................................................................... 1.8.4 Risk Communication ........................................................... 1.9 Risk Management: Example Number 2 ........................................... 1.9.1 Risk Assessment .................................................................. 1.9.2 Risk Mitigation .................................................................... 1.9.3 Risk Acceptance................................................................... 1.9.4 Risk Communication ........................................................... Appetite for IT Risk: Let the Business Lead .............................................. 1.10 IT Security Getting Close to Reality................................................ 1.11 IT Provides Solutions to the Business ............................................. 1.12 IT Provides Secure Solutions to the Business.................................. 1.13 How to Derive Appetite for IT Risk From Management Decisions .......................................................... 1.14 Risk Perception by Human Beings ..................................................
1 1 1 2 4 4 5 6 6 6 7 7 7 8 8 8 8 9 9 9 9 10 10 10 11 11 12 12 13 14
xv
xvi
Contents
Where to Focus: Business Value of IT Security ......................................... 1.15 How to Keep IT Security Work Real by Avoiding Doomsday Tellers and Collecting News .......................................... 1.16 Profit to Risk Ratio .......................................................................... 1.17 Smart Selection of Risks to Mitigate Following the Pareto Principle in IT Security ................................................... 1.18 How to Spend Resources Wisely and Transparently: Reputation and Emotions ................................................................. 1.19 No Business Value Without Business Knowledge ........................... 1.20 Smart Behaviour for IT Security Practitioners ................................ Link to MBA Management Models ............................................................
15
19 20 20 21
2
Security and IT Background.................................................................... Professional Outlook and Profiles for IT Security ...................................... 2.1 IT Security Workforce ..................................................................... 2.2 Basic IT Security Profiles ................................................................ 2.3 Extended IT Security Profiles .......................................................... 2.3.1 Technical IT Security Profiles.............................................. 2.3.2 IT Security Governance Related Profiles ............................. 2.3.3 Provision of IT Security Expert Advice............................... 2.3.4 IT Security Marketing .......................................................... 2.4 The Coordinator, the Facilitator and the Trainee ............................. Skills and Backgrounds for Team Members ............................................... 2.5 Technical Skills ................................................................................ 2.6 Soft Skills ......................................................................................... 2.7 Possible Backgrounds Present in the Team...................................... Security Studies .......................................................................................... 2.8 Engineering or Management ............................................................ 2.9 Alternative Paths to Obtain IT Security Expertise ........................... 2.10 What to Study .................................................................................. Link to MBA Management Models ............................................................
23 23 24 24 25 25 26 27 27 27 30 30 32 35 36 36 37 38 41
3
The Team–Individual Contract ............................................................... How to Create Win-Win Deals on the Team–Individual Contract.............. 3.1 Contract Between the Team and the Team Member ........................ 3.2 Basic Terms and Conditions of the Agreement: Creating a Team’s Culture................................................................ 3.3 What Is Motivation? Herzberg and Maslow .................................... 3.4 Internal Balance in Human Beings .................................................. 3.4.1 The Work Dimension ........................................................... 3.4.2 The Social Dimension .......................................................... 3.4.3 The Personal/Spiritual Dimension ....................................... 3.5 Identification of Internal Balance Coordinates ................................ 3.5.1 The Work Dimension ........................................................... 3.5.2 The Social Dimension ......................................................... 3.5.3 The Spiritual Dimension ......................................................
43 43 44
15 17 18
44 46 48 49 49 49 50 50 52 52
Contents
Behavioural Guidelines for Team Leaders.................................................. 3.6 Communication, Communication and Communication .................. 3.7 Time Availability for the Team ........................................................ 3.8 Adoption of Preventive Measures for the Team............................... 3.9 Proposal of Mentoring Services ....................................................... 3.10 Care but No Intervention.................................................................. 3.11 Design of Easy Processes and Assignment to Wise People ................................................................................. 3.12 Public Praise Sessions and Private Criticism ................................... 3.13 Support of Team Members............................................................... Resourcing the Team................................................................................... 3.14 New Team Members Joining the Team............................................ 3.15 Profile Preparation for a New Team Member .................................. 3.16 Advertising the Vacancy .................................................................. 3.17 Assessing Applications: Three Basic Principles .............................. 3.18 Preparing the Selection Process ....................................................... 3.19 Elements of the Selection Process ................................................... 3.19.1 Day 1 Test: Phone Interview .............................................. 3.19.2 Day 2 Test: Tests and Face to Face Interview .................... 3.20 How to Say Goodbye to the Team ................................................... Link to MBA Management Models ............................................................ 4
What to Do: The IT Security Roadmap.................................................. Founding Activities on Principles ............................................................... 4.1 IT Security Teams Should Not Occupy Their Days Mostly with “Fire Alerts” ................................................................ 4.2 Basic Security Principles: The Foundation of the IT Security Activities ............................................................................ 4.2.1 Defence in Depth ............................................................... 4.2.2 Protection of the Crown Jewels.......................................... 4.3 Additional Security Principles ......................................................... 4.3.1 Least Business Privilege Required ..................................... 4.3.2 Segregation of Duties ......................................................... 4.3.3 Four-Eye Principle ............................................................. 4.4 Software Development Security Principles ..................................... Stock-Taking Exercise and Prioritisation .................................................... 4.5 Vulnerability Analysis: Inventory Exercise ..................................... 4.5.1 Planning ............................................................................. 4.5.2 Information Gathering/Discovery ...................................... 4.5.3 Vulnerability Identification/Attack .................................... 4.5.4 Reporting ............................................................................ 4.6 Threat Analysis: Military Strategy Revisited................................... 4.7 How to Set Priorities ........................................................................ Provision of Security Services .................................................................... 4.8 Security Services .............................................................................. 4.9 How to Build the To-Do List ...........................................................
xvii
53 54 55 55 56 56 57 58 58 59 59 60 60 60 61 62 62 64 65 66 67 68 68 68 69 69 70 71 71 72 72 73 73 74 74 75 75 75 76 79 79 80
xviii
5
Contents
4.9.1 Networks ............................................................................ 4.9.2 Data .................................................................................... 4.9.3 Systems .............................................................................. 4.9.4 Applications ....................................................................... 4.9.5 Identities ............................................................................. 4.10 IT Security Specialities: Teams Within the Team ............................ 4.10.1 The Red Team: Security Testing and Incident Response ....... 4.10.2 The Blue Team: Identity and Access Management............ 4.10.3 The Green Team: Security Device Administration and Monitoring ................................................................... 4.10.4 The Yellow Team: Security Governance, Compliance and User Awareness ....................................... 4.10.5 The White Team: Changing Security ................................. 4.11 Activities That an IT Security Team Should Avoid ......................... Link to MBA Management Models ............................................................
80 81 81 82 82 83 83 84
How to Do It: Organise the Work in “Baby Steps” ............................... Shaping the Daily Reality ........................................................................... 5.1 Threats to the Performance of the Team .......................................... 5.1.1 Service Requests ................................................................ 5.1.2 Organisational Confusion (Politics) ................................... 5.1.3 Time Thieves ...................................................................... 5.2 Plan in “SMALL Baby Steps” ......................................................... 5.2.1 Every Trip Starts with a First Step ..................................... 5.3 Baby Step Assignment Within the Team ......................................... 5.4 Responsibility Transfer .................................................................... 5.5 How to Plan the Team’s Time .......................................................... 5.6 Compulsory Ingredients for the Planning ........................................ 5.7 Multiple Tasks at One Time ............................................................. 5.8 Finalising Baby Steps ...................................................................... 5.8.1 Provision of “IT Security Win Rides”................................ 5.8.2 Increase in Levels of Self-management and Independence ............................................................... 5.8.3 Increasing Comfort Levels ................................................. Managing Expectations............................................................................... 5.9 Stakeholder Analysis ....................................................................... 5.9.1 Top Senior Management .................................................... 5.9.2 Line Management .............................................................. 5.9.3 Business Areas ................................................................... 5.9.4 Final Users ......................................................................... 5.9.5 Other IT Teams in the Organisation ................................... 5.9.6 IT Security Teams Members .............................................. 5.9.7 IT Security Team Members’ Social Circles ....................... 5.10 How to Communicate with Stakeholders.........................................
91 92 92 92 93 93 94 94 96 97 98 99 100 100 100
85 86 86 87 89
100 101 101 101 102 102 102 103 103 104 104 105
Contents
Managing Activities .................................................................................... 5.11 How to Report Activity Progress ..................................................... 5.12 How to Track Activities Internally................................................... 5.12.1 The Morning Gathering ..................................................... 5.12.2 Online Weekly Reporting................................................... 5.13 External Deadlines ........................................................................... 5.14 How to Invite Team Members to Perform New “Baby Steps” ........ 5.15 How to Deal with Red Tape ............................................................. 5.16 Basic Communication Tools for the Team and the Organisation ........................................................................ Link to MBA Management Models ............................................................ 6
Team Dynamics: Building a “Human System” ...................................... The IT Security Paradox ............................................................................. 6.1 Traits of the IT Security Profession ................................................. 6.1.1 Passion ............................................................................... 6.1.2 Heterogeneous Background ............................................... 6.1.3 Brief History ...................................................................... 6.1.4 Continuous Change ............................................................ 6.1.5 Hacking Comes From Curiosity ........................................ 6.2 How to Build the IT Security Castle ................................................ 6.2.1 Archers Ready to Battle from the Battlements .................. 6.2.2 The Keepers of the Gatehouse ........................................... 6.2.3 The Drawbridge ................................................................. Interaction Patterns Within the Team .......................................................... 6.3 Technical Versus Non-technical Mini-teams Within the Team........ 6.4 The Guru Working with the Non-gurus ........................................... 6.5 Tasks for the User Access Administration Team Members ............. 6.5.1 Juniors Run the Identity Shop ............................................ 6.5.2 Release Skilled Members from Identity Management Tasks ............................................................. Life Always Finds Its Way: Working in the Organisation .......................... 6.6 How Team Members Deal with Problems: Using the Socratic Way.................................................................... 6.7 How to Manage Working Time ........................................................ 6.8 How to Fine Tune the “Human System”.......................................... 6.8.1 Task Rotation ..................................................................... 6.8.2 Trial and Error .................................................................... 6.8.3 Competition in the Team .................................................... 6.8.4 Types of Contracts in the Team .......................................... Team Member Development and Appraisal ............................................... 6.9 Training Measures............................................................................ 6.9.1 On-the-Job Training ........................................................... 6.9.2 Certified Trainings .............................................................
xix
106 106 107 107 107 108 108 109 110 111 113 114 114 114 114 115 115 115 116 116 118 120 122 122 123 124 124 125 125 125 126 128 128 128 129 129 130 130 130 131
xx
7
Contents
6.9.3 Security Conferences ......................................................... 6.9.4 Product-Related Trainings ................................................. 6.10 Appraising Team Members .............................................................. 6.10.1 Performance Planning ........................................................ 6.10.2 Supporting Performance .................................................... 6.10.3 Reviewing Performance ..................................................... Link to MBA Management Models ............................................................ Link to Nature Management Models ..........................................................
131 132 132 132 132 133 134 135
Viral Marketing......................................................................................... Communication to Sell IT Security Services .............................................. 7.1 Why Should IT Security Teams Communicate? .............................. 7.2 To Whom Should the Team Communicate? Their Audience: Their Stakeholders ........................................................................... 7.2.1 Top Senior Management .................................................... 7.2.2 Line Management .............................................................. 7.2.3 Business Areas and Final Users ......................................... 7.2.4 IT Teams in the Organisation ............................................. 7.3 Communication Principles to Follow .............................................. 7.4 What Should the IT Security Team Communicate?......................... From Raising Awareness to Marketing IT Security .................................... 7.5 Characteristics of Services: From Awareness to Marketing ..................................................................................... 7.6 The Extended “Marketing Mix” for IT Security.............................. 7.6.1 Product/Service .................................................................. 7.6.2 Price ................................................................................... 7.6.3 Place ................................................................................... 7.6.4 Promotion ........................................................................... 7.6.5 Physical Evidence .............................................................. 7.6.6 The Emergency Room Effect ............................................. 7.6.7 Processes ............................................................................ 7.6.8 People................................................................................. 7.6.9 Power to the Users ............................................................. 7.7 How to Position the IT Security Team ............................................. 7.7.1 The Market ......................................................................... 7.8 Viral IT Security Marketing ............................................................. 7.9 An IT Security Viral Marketing Example: Identifying Socially Connected Colleagues ..................................... 7.10 The Role of the Incident Response Team in Guerrilla Marketing ..................................................................... Security Stories to Sell and Human Psychology Aspects ........................... 7.11 The Security Stories ......................................................................... 7.11.1 Stories for End Users ......................................................... 7.11.2 How to Approach the Elaboration of Security Policies ............................................................
137 138 138 138 139 139 139 139 141 141 142 143 143 144 144 145 145 146 147 147 148 148 148 148 150 151 152 153 153 153 154
Contents
8
9
xxi
7.11.3 Stories for Managers .......................................................... 7.11.4 Stories for Other IT Teams................................................. 7.12 Behavioural Economics to Consider When Marketing IT Security ....................................................................................... 7.12.1 Decisions, Cheating and Ethics .......................................... 7.12.2 Subjective Expectations About Money and Prices ............................................................... Link to MBA Management Models ............................................................
155 155
Management Support: An Indispensable Ingredient ............................ Executives in Organisations Need to Manage Risks of Different Nature ...................................................................................... 8.1 Managers: Decisive Stakeholders of the IT Security Team ............. 8.2 Risk Management Could Become a Management Innovation......... 8.3 Risk Sources and Risk Types Affecting the Organisation ............... Two Risk Containers: Operational and Enterprise Risk Management ....................................................................................... 8.4 Operational Risk .............................................................................. 8.5 Enterprise Risk Management: A New Dimension of Risk as an Opportunity ................................................................ A Model to Understand Risks and a Decalogue to Work with Managers ............................................................................... 8.6 The “Risk House” Model: How Executives Can Treat Risks .......... 8.6.1 The Risk Management Block ............................................. 8.6.2 The Information Block ....................................................... 8.7 The Ten Commandments to Transform Executives into Our Best Allies ......................................................................... Link to MBA Management Models ............................................................
161
Social Networking for IT Security Professionals ................................... Human Beings Are Social Beings............................................................... 9.1 Reasons for Networking in IT Security ........................................... 9.1.1 Quicker Way to Learn New Tendencies ............................. 9.1.2 Easier Way to Understand Society ..................................... 9.1.3 Open Door for Future Professional Changes ..................... 9.2 Social Networking Foundations for IT Security: The “Spiral of New Value” ....................................................................... 9.2.1 When Professionals Share Information, They Create Value .............................................................. 9.2.2 Networking Requires Time ................................................ 9.2.3 The Significance of People and Not Organisational Charts......................................................... 9.2.4 A Smile Can Take IT Security Far Far Away..................... Networking Inside the Organisation ...........................................................
155 155 157 158
162 162 163 164 166 166 167 168 168 169 169 170 173 175 176 176 176 176 176 177 177 177 177 178 180
xxii
Contents
9.3 Targets for the Networking Efforts of the IT Security Team ........... 9.3.1 IT Security Customers ....................................................... 9.3.2 Other IT Teams .................................................................. 9.3.3 Security Colleagues in the IT Security Team..................... 9.4 Locations to Practice Networking .................................................... 9.4.1 Common Use Facilities ...................................................... 9.4.2 Meetings with Business Areas ........................................... 9.4.3 Any Interaction with Customers Is a Potential Opportunity .................................................. 9.5 How to Proceed with Networking .................................................... Networking Outside the Organisation....................................................... 9.6 The IT Security Community ............................................................ 9.6.1 The IT Security Community in the Same Industry ............ 9.6.2 How to Share Security-Related Information When Networking .............................................................. 9.6.3 The IT Security Community Working in Different Industries ........................................................ 9.7 Examples of IT Security Fora .......................................................... 9.7.1 IT Security Governance-Related Networking Possibilities .................................................... 9.7.2 Technical IT Security Related Networking Possibilities ........................................................................ 9.7.3 Worldwide Known IT Security Conferences ..................... 9.8 How to Network with Academia: Schools and Universities ............ 9.9 How to Network with Law Enforcement Agencies ......................... 9.10 How to Network in the Local Community....................................... Networking for the Personal IT Security Brand ......................................... 9.11 Networking to Increase the Value of the IT Security Professional ....................................................................... 9.11.1 Small and Medium Enterprises (SMEs) Demand IT Security Services ............................................ 9.11.2 Big Corporations Focus on Their Core Business and Outsource Support Functions ....................... 9.12 How to Build IT Security Reputation .............................................. 9.12.1 Provision of Value to the IT Security Community ............. 9.12.2 Provision of Value to the IT Management Community......................................................................... 9.13 Recommendations to Build an IT Security Personal Brand ............ 9.13.1 Security by Default Does Not Mean Social Isolation ................................................................... 9.13.2 Modesty and Honesty......................................................... 9.13.3 Preparation for the Unknown ............................................. 9.13.4 The Company of Better People .......................................... 9.13.5 A Permanent Ambassador Role ......................................... Link to MBA Management Models ............................................................
180 180 181 181 182 182 182 183 183 184 185 185 185 186 186 187 188 189 192 193 193 195 195 195 196 197 197 199 199 199 199 200 200 201 203
Contents
10
Present, Future and Beauty of IT Security ........................................... The Present of IT Security ........................................................................ 10.1 The Relevance of IT Security Now .............................................. 10.1.1 First Worldwide Reactions ........................................... 10.2 IT Security in Small and Medium Enterprises............................. 10.3 The Attackers’ Industry ............................................................... 10.3.1 IT Technical Experts .................................................... 10.3.2 Fraud Brains ................................................................. 10.3.3 Internet Mules .............................................................. 10.4 IT Security Information Analysis ................................................ The Future of IT Security ......................................................................... 10.5 The Emergence of Complexity .................................................... 10.5.1 Code Complexity ......................................................... 10.5.2 Complexity in the User Interface ................................. 10.6 A Possible Filtering Mechanism: Reputation Scores................... 10.7 The Death of Personal Privacy ..................................................... 10.7.1 Internet-Based Intelligence Collection......................... 10.8 Critical Infrastructure Protection ................................................. 10.9 Change of the Security Paradigm: From an Onion to an Onion Ring .......................................................................... 10.9.1 Multi-organisational Value Chains............................... 10.9.2 Labour Market Events .................................................. 10.10 IT Security for Virtual IT and for “The Cloud” ........................... 10.10.1 Virtualisation ................................................................ 10.10.2 Virtual IT Infrastructure Services: Cloud Computing ......................................................... 10.11 Mobile IT Security ....................................................................... 10.12 Additional Leads on the Future of IT Security ............................ 10.12.1 Expert Forensic and Legal Support .............................. 10.12.2 The Importance of Laziness and Logs ......................... 10.12.3 Risk Management and Decision Making ..................... 10.12.4 IT Security and the Threat of Compliance ................... The Beauty of IT Security. An Attractive Field to Work In .................... 10.13 Creativity in the Social Realm of IT Security .............................. 10.13.1 IT Security Creativity for Human Groups ................... 10.13.2 Creativity for IT Security Professionals....................... 10.14 Creativity in the Technical Arena of IT Security ......................... 10.14.1 Cyberwar Weapons ...................................................... 10.14.2 Digital Security Ants.................................................... Link to MBA Management Models ............................................................
xxiii
205 206 206 207 209 211 212 212 212 213 213 214 214 215 216 217 217 218 219 219 219 220 220 220 221 222 222 223 223 224 224 224 224 227 227 227 228 230
Annex 1. Example of an Information Security Test ..................................... 231 Annex 2. Security Incident News Example ................................................... 235
xxiv
Contents
Annex 3. IT Security Starter Kit ................................................................... 237 Index of MBA Models Referenced at the End of Every Chapter ............... 239 References ........................................................................................................ 241 Index ................................................................................................................. 245
Audience of This Book
Any fluent English reader can read this book and probably they will find useful tips even if they are far away from practising IT security but close to creating or coordinating a team. Nevertheless, the authors target three clusters of readers: – IT security professionals, especially those recently entrusted with the daunting task of creating an IT security function, and a team, within an organisation or as an independent entity providing services to different customers.1 – Chief Officers in organisations considering, making or supporting the decision to create an IT security team. – IT and IT security pre-graduates or graduates with the intention to take part in the challenging experience of working in IT security.
Although we mostly consider in the book the case of a team within an organisation, teams located in firms that provide managed security services to customer organisations can also benefit from this book.
1
xxv
IT Securiteers – Setting up an IT Security Team
The Human and Technical Dimension Working for the Organisation Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry. More often than desired, these teams are only useful for companies’ executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems. This book provides an insight into how to create and grow a team of passionate IT Security professionals. We will call them “securiteers”.1 They will add value to the business, improving the information security stance of organisations.
Chapters Overview This book is broken down into the following chapters: 1. Vulnerabilities, Threats and Risks in IT First, we define and explain what are vulnerabilities, threats and risks using industry standards. Contrary to the initial belief, these concepts are not well and broadly understood and not applied in IT security systematically. Second, we propose an approach to provide IT security that brings value to the business based on the organisation’s IT risk appetite.
1
More about the term “securiteers” on Section 2.7. xxvii
xxviii
IT Securiteers – Setting up an IT Security Team
2. Security and IT Background The demand of IT security experts is high. This means that not all team members will have an IT security background. Probably some of them will come from other fields, inside or outside IT. Team leaders need to make a strength out of this initial weakness. We highlight how security teams benefit from enrolling developers, script-authors and attentive-to-detail individuals with a drive for achievement. IT security is a relatively new vocation. We also provide input about what and where to study, both in the technical hands-on and the theoretical analytical dimensions. 3. The Team–Individual Contract Motivation is an inner driving force. Motivating team members is a pre-requisite for the performance of the team. Some elements need to be present but they will not create additional motivation, these are the hygienic factors. On the contrary, motivating factors, also known as motivators, are not always present. When they are, they are different for each team member. Every individual has three dimensions (spiritual, social, professional), which need to be in balance. The team will require everyone’s skills and sometimes passion. How to achieve something that cannot be imposed? The key is in the team leader. We propose leaders to let people leave and create a daily scenario that is appealing to work and to grow professionally for current and new team members. 4. What to Do: The IT Security Roadmap What to do day by day? IT security experts tend to become firemen. This is a reality they need to avoid. “IT securiteers” should base their activities on proven security principles. A threat and a vulnerability analysis will help the team to prioritise their activities. Our proposal is to package security activities as services. A to-do list will call for the creation of specialised mini-teams within the team. Finally, we also refer to some activities an IT security team should not embark on. 5. How to Do It: Organise the Work in “Baby Steps” How can the team organise the IT security work? We propose the concept of performing “small baby steps” that follow the “underpromise and overdeliver” premise. We perform an analysis of the threats that can affect the team and we recommend planning some “unplanned time” and to avoid individual multitasking. We continue with proposals on how to assign activities, stressing the importance of quality assurance and deadlines. Later on, we suggest how to track and report activities together with how to communicate the team’s activities based on a stakeholder analysis. 6. Team Dynamics: Building a “Human System” Every activity starts with an emotion. We first describe the traits of the IT security profession and we present the main role that the “team board” will play building a “human-based protection system” for the organisation. We then proceed to discuss typical interaction patterns occurring within the team, e.g. how technical and non-technical colleagues interact. We present useful tips to sustain the “human
IT Securiteers – Setting up an IT Security Team
xxix
system” in the team and, finally, we conclude with our view on training and appraisal methods. 7. Viral Marketing How can customers become the implementation engine of IT security services? In this chapter we justify why and how the team need to sell their products, which are mainly services. We base our proposal on the stakeholder analysis we performed in Chapter 5. We provide some communication principles and we link them with marketing elements as the “extended marketing mix” for IT security. We position the team ready to shift from traditional security awareness campaigns to a more comprehensive viral marketing activity. Even the incident response team could perform punctually some guerrilla marketing. We finalise the chapter with an introduction to the “security stories” the team need to sell and with some observations on human psychology that they need to consider in their security actions to increase success rates. 8. Management Support: An Indispensable Ingredient Management support needs to be present in the air that any IT security team breathe. However, this air is difficult to find and to keep. In this chapter, we propose that IT security help executives achieving innovations related to risk management. We justify why management support and sponsorship is so crucial for risk management using current risk-related literature. We proceed with an enumeration of existing risk sources and risk types and we include an introduction to operational risk and enterprise risk management. Afterwards, we propose a basic model, “the risk house model” to understand how risks affect organisations and the role of committed management. Finally, we suggest a decalogue for IT security professionals and managers to work in harmony. 9. Social Networking for IT Security Professionals Networking is a fundamental element for any IT security professional: It opens the door to tendencies, to understand society and to prepare for future professional changes. It requires time and effort but it has the potential to create value for all parties involved. IT security professionals should network both inside and outside the organisation where they provide their services. In this chapter, we present elements of the IT security community such as the most relevant fora and conferences. We also suggest ways to network with academia, physical security colleagues, law enforcement agents and local communities. Finally, we deal with the concept of the personal IT security brand, an asset that the IT security professional needs to actively look after and to grow. They need to provide value to the IT security community and to the market so that they can enjoy a future-proof career. 10. Present, Future and Beauty of IT Security Digital infrastructures constitute already a relevant strategic and economic asset. States start to launch technical and legal measures to protect them. The digital world is also highly attractive for fraudsters, since the profit to risk ratio (PRR) is
xxx
IT Securiteers – Setting up an IT Security Team
high. We highlight a new and promising market for IT security professionals: The introduction of IT security in small and medium enterprises (SMEs). Subsequently, we mention technical and social trends that will be key for IT security in the coming decade (the emergence of complexity, reputation scores, the death of privacy, the role of IT systems in critical infrastructures, the paradigm change from “an onion” to an “onion ring”, virtualisation, security in “the cloud”, mobile security, micro risk management, the threat of compliance, the potential application to IT security of neuroscience studies and creativity in the technical IT security arena). The journey will not be easy but it will be an exciting lifetime experience. All chapters incorporate a final section titled “Link to MBA Management Models”. In that section, we provide leads to models that have deserved careful attention in MBA syllabus. They are powerful instruments that can help the reader to manage complexity in IT security.
List of Tables
Table 2.1 Table 2.2
Basic division of profiles in the IT security team Division of profiles in the IT security team
Table 4.1
Allocation of profiles in the mini-teams within the IT security team
Table 8.1
Management roles before, during and after the implementation of risk management in the organisation
xxxi
List of Images
Image 1.1 False impression of security. Closing the gap Image 1.2 Different organisations have different appetites for IT risk Image 1.3 Public information displays have already been hacked. What about if someone modifies the display showing the leaving times of the trains in a train station? Image 2.1 Image 2.2 Image 2.3 Image 2.4
The IT security leader’s goal: orchestrating security Leading and coordinating, but not micro-managing Time management, a skill not to take for granted Building the foundations of security
Image 3.1 A basic contract will set the team member in motion Image 3.2 Knowing what motivates the team member opens a window of opportunity Image 3.3 Leaders need to locate every member in the team’s map Image 3.4 Leaders need to monitor closely their team Image 3.5 Professional paths are inextricable Image 4.1 The onion approach: different layers to defend the “crown jewels” Image 4.2 Image 4.3 Image 4.4 Image 4.5 Image 4.6 Image Image Image Image
5.1 5.2 5.3 5.4
Critical actions require different players working together IT security should keep complexity away: it is the gate to encounter risks What cannot be measured, cannot be managed Business users need the right tools Change management is a keystone in IT The team need to enjoy the reality they create The team base their plan on “baby steps” Team members need to close doors before they open new ones Everyone in the team should share the load of bureaucracy
xxxiii
xxxiv
List of Images
Image Image Image Image
6.1 6.2 6.3 6.4
Building the IT security castle The “gatehouse keeper” checks who joins the team Team leaders need to keep the team in contact with reality IT security teams require result-based control towers
Image Image Image Image
7.1 7.2 7.3 7.4
Security should explain why, not scare Users will understand risks only by experimenting themselves IT security facilities can be a marketing element Security should take note of how human beings tick
Image 8.1 Image 8.2
People and technology: two sources of risk IT security guide executives through the risk labyrinth
Image 9.1 Image 9.2 Image 9.3
Positive emotions facilitate human relationships Face to face interactions build stronger links Networking is like grapes that produce good wine, they need care and attention since day 1 The personal IT security brand is a treasure to look after
Image 9.4
Image 10.2 Image 10.3
IT security professionals need to guide small enterprises in the digital world IT security should not be complex for the user The gate for IT “securiteers” to the 21st century IT security
Image A1
On the top of a waterfall
Image 10.1
List of Figures
Fig. 1.1 Fig. 1.2
Impact probability-graph A risk consists of a threat agent taking the chance of a vulnerability
Fig. 4.1 Fig. 4.2 Fig. 4.3
Priority setting. First step Priority setting. Second step Priority setting. Third and fourth steps
Fig. 5.1
Stakeholder analysis and suggested movement direction
Fig. 6.1
A fact-based result-oriented performance management model
Fig. 8.1
The “risk house” model
Fig. 10.1 Every new version of MS Windows has more lines of code that the previous one Fig. 10.2 The number of lines also increase in Debian Linux
xxxv
Chapter 1
Vulnerabilities, Threats and Risks in IT
Chapter 1: What will the reader learn? This chapter answers the following questions: • • • • • • • •
Whatisarisk,athreatandavulnerability? HowcanITsecurityprofessionalsdescribearisk? Whatisaninformationriskmanagementmethodology? HowcananITsecurityteamuseit?Twotellingexamples. HowcananITsecurityteamprovideadviceinanorganisation? Whatistheorganisation’sITriskappetite? WhichriskmanagementstrategyshouldanITsecurityteamfollow? SmartmovesonITsecurity.
Inthisinitialpartofthefirstchapterwedefineandexplain,withthehelpoftwo very different examples, the three most important risk foundational concepts togetherwithanintroductiononpresentinformationriskmanagementmethodologiesandtheircommonsteps.
Foundational Concepts 1.1
Three Definitions: Vulnerability, Threat and Risk
The International Standards Organisation, ISO,1definesriskas“the combination of the probability of an event to happen and its consequence”,withnopositive ornegativeconnotation.However,mostofthetimestheconceptofriskcontains
1
ISO (2002), pp. 1–16.
A. Partida and D. Andina, IT Security Management: IT Securiteers - Setting up an IT Security Function, Lecture Notes in Electrical Engineering 61, DOI 10.1007/978-90-481-8882-6_1, © Springer Science+Business Media B.V. 2010
1
2
1Vulnerabilities,ThreatsandRisksinIT
anegativemeaninginthesenseofanundesiredeffect.Wedefineriskusingtwo familiarandadjacentconcepts:Vulnerabilityandthreat. A vulnerabilityis“aflaworweaknessinasystem,inaprocedure,inadesign, inanentity,inanimplementation,orinaninternalcontrolthatcouldbeexercised (accidentallytriggeredorintentionallyexploited)byathreatandresultinasecurity breachorviolationofthesystem’ssecurity.”2 A threatis“apotentialcauseofanincidentthatmayresultinharmtoasystem or organisation.”3Threatsnormallyrequireanactivesubjecttomaterialisethedamage, the threat agent. A risk,initsusuallynegativeconnotation,appearswhenagiventhreatmaterialises,makesuseofavulnerabilityandproducesanundesiredeffect. This may be a surprise for the reader, but it is common to find difficulties to distinguish between these three concepts: Vulnerabilities, threats and risks. The difference probably blurs due to colloquial language, where it is frequent to exchangethem,e.g.“Aliceisariskforthecompany”or“Aliceisathreattothe company” or “system X constitutes a risk (or a threat) for the company. These conceptsarerelatedbuttheyarenotexchangeable.Wefocusfirstonkeyaspectsof theirdefinitiontobeabletodifferentiatethemthroughacoupleofexamples.
1.2
Examples of Threats, Vulnerabilities and Risks
A vulnerability is an internal property of the systemwearefocusingon,thesame wayitisitscolour,sizeorlevelofhardness. Example number 1: Inthechildren’staleofthethreelittlepigs,thefirstlittlepig builds a house out of straw. The wolf blows it down and eats the little pig. The housemadeofstrawhadthevulnerabilityofbeingmadeofsuchalightmaterial thatitcouldbeblownaway,leavingthelittlepigunprotected. Example number 2: Weproposetoimagineameetingroom,locatedwithinacompany’sfacilities,wherealaptopisconnectedtotheircorporatenetwork.Thelaptop presentstheuserlog-inscreen.Itisattachedtothemeetingtablewithasecurity steelcable(lockedwithafour-figurecombinationlock).Onevulnerabilityinthis laptopcouldbethatsomeonecouldbootitfromtheCDdriveusingaliveCD.4 This way,theycouldhaveIPconnectivity,andtherefore,initialaccesstothecorporate localnetwork.
AdaptedfromNIST(2002a),pp.1–F1. ISO (2004), pp. 1–28. 4 AliveCDisaCD-ROMwithaself-containedoperatingsystem,usuallyaflavourofLinux, which provides an almost fully-fledged operating system platform from where to work on regardless of the operating system installed on the computer’s hard disk (e.g. Backtrack, Ophcrack, Helix, Ubuntu). See a list of live Linux CDs at http://www.livecdlist.com. Last accessed 8-11-2009. 2 3
1.2ExamplesofThreats,VulnerabilitiesandRisks
3
Inbothexamples,thedescribedvulnerabilityalone,ahousemadeonlyofstraw andanunattendedlaptopconnectedtoacorporatenetwork,donotcreateanincidentbyitself.Thereisalwaystheneedforanexternalsubjecttotakeadvantageof thevulnerabilitytoprovokeaspecificincident.Thisisthethreatagentor,simply, the threat. A threat implies an actionoriginatedbyaparty,externaltothesystemthatis thesubjectofanalysis,i.e.anactivesubjectoragentexercisinganactiononit.Inthe examplenumber1,thethreatissomeone,thewolf,gettingclosetothehouseand blowingtoteardownthelittlepig’shouse.Thewolfisathreat agent.Inourexample number2,athreatisthensomeonesneakingintothemeetingroomandbootingthe laptopfromaliveCDthattheycouldcarrytoobtainaccesstothecorporatenetwork. Oncetheinternalnatureofavulnerabilityandtheexternalsubjectnatureofa threatareexplained,theconceptofriskisstraightforward.Riskiscomposedof two elements: The conjunction of a given threat exercising a vulnerability. The imageofa threat making use of a vulnerabilityandproducinganormallyundesired event is essential to understand the notion of risk. The probability of this event happening and its impact describe the risk (typically graded as simply as high,mediumorlow). Inthefirstexample,theconjunctionofahousemadeoutofstraw(vulnerability) andawolfwillingtoblowthehouseaway(threat)constitutesariskforthelittle pig.Theriskisthatthelittlepiglosesitshouseandthewolfeatsthelittlepig.The answerstothefollowingthreequestionsfacilitatethedescriptionofrisksandtheir subsequentcommunicationtokeystakeholders: – Whatcanhappen?(Descriptionofthepotentialincident) – Howcanithappen? – Whenandwhycanithappen? Followingupwiththesecondexample,someonebootingupthelaptopfromalive CDandaccessingthecorporatenetworkconstitutesarisk.But,somehow,thisisa generic risk and this was coming from our original, pretty undetermined, threat. Thisisthewaywecangetconfusedwiththeconceptofrisk.Toavoidthisconfusion,weneedtocontinuespecifyingthescenario,e.g.someoneaccessingthenetworkandcausingadenialofservicetooneofthecompanyservers.Thisstartsto beamorespecificandunderstandablerisk. With these simple examples, we show one of the difficulties present in risk assessment:Frequently,ITsecurityprofessionalsdelivergenericstatementsintheir risk analysis. In our first example, the risks mentioned are descriptive enough.5 However,inoursecondexample,theriskwas“someoneaccessingthenetwork”. Whatdoesthismean?Implicitly,thiscouldmeanalottoanITsavvypersonbuta decision-makerinthecompanywillprobablynotgraspalltheconsequencesofthis networkaccess.The more specific the description of the risk, the easier the risk assessment will be understood.
5
The piglet could lose its house and its life.
1Vulnerabilities,ThreatsandRisksinIT
4
We suggest, therefore, that IT security professionals should complement risk descriptions with real details about the risk scenario. The application of this statementtothesecondexamplewouldbe:Someoneaccessesthenetworkusing IT tools that are easily available and produces a denial of service to the internal email server, leaving users in the organisations with no email service for several hoursordays.
1.3
Impact and Probability Graph
Apowerfulwaytocommunicateriskstosystemanddataownersistolocatethem inatwo-dimensionalgraph,accordingtotheirimpactandprobability.Normally, they-axisrepresentstheimpact,theforcefulconsequence6oftherisktakingplace. Thex-axisrepresentstheprobabilityoftherisktohappen,thelikelihoodthatthe riskmaterialises.Thedisplayofdifferentrisksonthisgraphfacilitatesdecisionmakerstheprioritisationofsecuritymeasures. Acommonstrategyproposestomitigatefirstriskswithahighimpactandahigh probabilitytooccur.Thoseriskswithonlyeitherahighimpactorahighprobability arethesecondpriority.Fromthosetwotypes,normallyriskswithhighimpacttake precedencetorisksonlywithhighprobabilityofoccurrence.Finally,riskswithlow impactandlowprobabilityoccupythelastplaceinITsecurityorderofpriority. Impact and probability graph’s detractors argue that although the impact can objectively be assessed and quantified, the risk probability value is a subjective estimate.Thisisthereasonwhyweproposetokeeptrackofsecurityincidentshappeningintheworldtosimilarorganisations.7Thisknowledgewillproviderealism toanyprobabilityestimation. The probability dimension is strongly related to the attractiveness that threat agentsfindtomakeuseofavulnerability.Thisattractivenessisdirectlyproportional tothethreatagents’profittoriskratio:Thepotentialprofittheattackercouldhave comparedwiththerisktheyrun(Fig.1.1).8
1.4
Risk and Active and Passive Voices in Grammar
Wealreadymentionedthateverydaylanguageusuallybringssomeconfusiontothe conceptsofthreat,vulnerabilityandrisk.Thepossibilitytouseeithertheactivevoice (thewolfeatsthelittlepig)orthepassivevoice(thelittlepigiseatenbythewolf) todescribethesamescenarioisgreatasalanguagetoolbutitpuzzlesreaderswhen risksandthreatsarethetopicsofdiscussion.
Definitionofimpactfromthewebsitewww.wordreference.com. Last accessed 20-09-2009. See Section 1.15. 8 See Section 1.16.
6 7
1.5InternalandExternalElementsinaRisk
5
high
Impact
low
medium
priority 3
priority 2
priority 3
Probability
0
low
medium
high
Fig. 1.1 Impact–probabilitygraph
The wolf destroys the house
Threat agent
Entity with vulnerability
The wolf eats the little pig
Fig. 1.2 Ariskconsistsofathreatagenttakingthechanceofavulnerability
Since the threat agentplaysanactiveanddecisiverole,werecommendusing onlytheactivevoicesothatwecanalwaysidentifythethreatwhenlookingatthe subjectofoursentences,e.g.thewolfblowsthelittlepig’shouseawayandeatsthe littlepig(Fig.1.2).
1.5
Internal and External Elements in a Risk
Asasummary,itisessentialtoremember: – Theinternalnatureofavulnerabilityinanysystem. – Theexternalnatureandactiveroleofathreat. – The existence of a risk by the conjunction of these two elements causing an undesiredevent.
1Vulnerabilities,ThreatsandRisksinIT
6
Themorespecificthedescriptionoftheevent,theeasieritwillbetounderstand therisk.Theconsequencethattheriskproducesifithappensandtheprobability thatitoccursconstitutetwocommondimensionstodescriberisks.
Information Risk Management Theory Weintroducetheconceptofriskmanagementmethodologiesandapplyittoour twoexamplestofinalisethefirstpartofChapter1.
1.6
Information Properties
Risksposedtoinformationemergefromthreatstargetingoneormoreinformation properties.ThethreemaininformationpropertiestoconsiderconstitutetheCIA9 acronym: – Confidentiality:Onlyauthorisedindividualsorentitiescanaccessinformation. – Integrity:Informationisaccurateandcomplete. – Availability:Informationisaccessibleandusablebyanauthorisedentity. TherearemoreinformationpropertiesadjacenttoCIA,suchas: – Auditability(possibilitytocheckactionsperformed) – Non-repudiation (authorship guarantee) – Non-mediation(noknowledgeoftheexistenceofthepieceofinformation) However,thethreemainproperties,CIA,coverthemajorityofpossiblethreat vectors.
1.7
Risk Management Activities
ISO10 and NIST,11twoworldwideknownentitiesproducingstandardsandindustry bestpracticeguidelines,breakdownthefoundationsofriskmanagementmethodologiesintofourdifferentactivities:Riskassessment,riskmitigation,riskacceptance(termusedbyISO)andriskcommunication.
AdaptedfromISO(2005),pp.1–115. ISO (2002), pp. 1–16. 11 NIST(2002a),pp.1–F1. 9
10
1.7RiskManagementActivities
1.7.1
7
Risk Assessment
Anundesiredevent,arisk,iscategorisedintwodimensions:Theprobabilityofthe eventhappeningandtheimpacttothesystem(andtherefore,tothebusiness).Risk assessmentconsistsofriskidentificationandevaluation(probabilityandimpact)plus therecommendationofrisk-reducingmeasures.Thequalityoftheriskassessments performedbyITsecurityteamsdependsonwhethertheyareunderstoodbytherecipientsandwhethertheytriggertheimplementationofappropriatemitigatingmeasures. The risk assessment methodology proposed by ISO12 comprises three major activities, being risk identification, risk analysis and risk evaluation. NIST13 proposes a more comprehensive risk assessment methodology encompassing nine primarysteps,currentlyconsideredindustrybest-practices: 1. Systemcharacterisation 2. Threat identification 3. Vulnerabilityidentiication 4. Controlanalysis 5. Likelihooddetermination 6. Impactanalysis 7. Riskdetermination 8. Controlrecommendations 9. Resultsdocumentation Thedecisiontofocusonathreatanalysisoronavulnerabilityanalysisoronboth ofthemisnotaneasyone.Itwilldependonavailableresources,intermsofsecurityandbusinessexpertise,timelinerequirementsandcompanypolicies.
1.7.2
Risk Mitigation
Itconsistsofprioritising,implementingandmaintainingtheappropriateriskreductionmeasuresrecommendedintheriskassessmentprocesstominimiseriskstoan acceptablelevel.14
1.7.3
Risk Acceptance
Remaining risks need to be re-evaluated and mitigated with new measures or acceptedbyinformationownersandseniormanagement.
ISO (2002), pp. 1–16. NIST(2002a),pp.1–F1. 14 AdaptedfromNIST(2002a),pp.1–F1. 12 13
1Vulnerabilities,ThreatsandRisksinIT
8
1.7.4
Risk Communication
Acceptedrisksneedtobetransparentlycommunicatedtokeystakeholderstoavoid afalsefeelingofsecurity. Wereverttoourexamplesandapplythesesteps.Atthesametime,wealsotake thechancetointroducetheconceptof“appetite for risk”.15
1.8 1.8.1
Risk Management: Example Number 1 Risk Assessment
Forthelittlepig,thepiglet,andtheriskofhim(weusehimandnotit)losinghis houseandbeingeaten,thereisahighprobabilityofthatoccurringifthewolflives aroundandseeshim.Theimpactonthelittlepigoflosinghishouseisconsiderable,but,itiscertainlylessthanthewolfeatinghim. Aswecanseeinthisexample,ausefulwaytodescribetheimpact(andsubsequently,therisk)isbyusingclearcomparisons(forthepiglet,theimpactoflosing thehouseissmallerthantheimpactofbeingeaten).
1.8.2
Risk Mitigation
Examplesofmeasuresthatthepigletcantaketomitigatethisriskare: 1. Building an electrified fence all around its house. 2. Hiring a physical security (hunting) service to keep the wolf away from the house. 3. Buildinganinconspicuoushousesothatthewolfdoesnotpayattentiontoit. WecanalwaysfindamyriadofmeasuresthatanITsecurityteamcanimplement to mitigate a risk. The key is to reach the right balance between the resources devotedtoitandthevalueoftheassettheyareprotecting.Thisiswherecurrent riskmanagementtheoriesreallyneedaclosecontactwithreality(e.g.intheform ofriskquantificationandassetvaluation16).Lateronthischapter,wewillvisitthe
See also Section 1.13. Traditionalriskmanagementmethodologiescanleadtoa“permanentlyunfinishedanalysis”due totherapidchangeofvalueinassets.CondensedfromaninterviewinSpanishsecuritymagazine SIC to Santiago Moral, available at http://www.revistasic.com/revista62/entrevista00_62.htm. Last accessed 31-10-2009.
15 16
1.9RiskManagement:ExampleNumber2
9
ideaofthevalueoftherisk-mitigatingmeasuresandthevalueoftheprotectedasset andhowtheformerisnotalwayslessthanthelatter.17
1.8.3
Risk Acceptance
Ourfriend,Mr.Piglet,willsurelyhavealimitedbudgettoimplementsomeofthe risk mitigating measures. Probably he cannot afford hiring a hunting service to protecthimfromthewolfatanytime.However,hecanbuildadecentfencewith thelimitedbudgethehas.Somehow,heisthenobligedtoaccepttheremainingrisk (thewolfcouldjumpoffthefenceandbreakhavoc).Thedimensionsandquality ofthefencedependonaveryelegantconceptnamed“appetite for risk”. In plain words,howmuchriskisMr.Pigletwillingtoacceptforhishouseandforhislife consideringalsotheresourceshecanusetoprotecthimself.Section1.13delves deeperintothiskeyconcept.
1.8.4
Risk Communication
Oncethemitigatingmeasureshavebeendecided,theyneedtobeimplementedand the remaining risk needs to be communicated and accepted by the stakeholders, especiallythoserunningtherisks.Inthisexample,MrPigletplaystwodifferent roles:Theonedecidingwhichriskmeasurestoimplementandtheoneexposedto therisk.Theriskcommunicationexerciseistrivialinthiscase. Inbigorganisations,however,playersmakingrisk-mitigatingdecisionscan befarawayfrombusinessowners.Thisisduetocomplexhierarchicalstructures and ineffective decision making processes. In those cases, organisation boards requireaclearcommunicationoftherisksthattheirorganisationrunsatanytime. Theownersoftheorganisation(normally,theownersoftheinformation)runthe realrisk.Wehaveacloserlookatthisinthesecondexample.
1.9 1.9.1
Risk Management: Example Number 2 Risk Assessment
Alaptopconnectedtothecorporatenetworkinanemptymeetingroom:Ifphysical accesscontrolmeasuresexisttoentertheorganisation’sfacilities,thereisasmall probabilityofsomeoneenteringtheroomunescortedandaccessingthenetwork. Theimpactofthisaccess,however,ifkeyservers,holdingessentialinformationfor thebusiness,areconnectedtothesamecorporatenetwork,ishigh(e.g.adenialof serviceattackononeofthem). 17
See Section 1.16.
1Vulnerabilities,ThreatsandRisksinIT
10
1.9.2
Risk Mitigation
Therisk-mitigatingmeasuresinthiscasemaycomefromverydifferentangles,for example: 1. Physicalsecuritystaffcanissueanorganisationalguidelinestatingthatnounescortedvisitorcouldenteranymeetingroomalone. 2. TheycanalsoinstallaCCTVsysteminallmeetingroomstodeterfromstealing ormisusingthoselaptopsduringthetimeavailablebetweenmeetings. 3. ITstaffcandisabletheoptiontobootfromanyotherdevicethantheharddisk inanylaptoppresentinanymeetingroom. 4. Theycanalsoremovealllaptopsfrommeetingrooms.
1.9.3
Risk Acceptance
Ifweimaginethatthismeetingroomisinaservicecompanywhosemainassetis information(e.g.acustomerdatabasemadeoutafterdecadesofrunningthebusinesswithmillionsofcreditcardnumbersstoredinacentraldatabase),thenitseems reasonabletothinkthattheownerofthecompanywouldhavealimited“appetite for risk”andtheywillaccepttheremainingriskofsomeoneaccessingthecorporate networkonlyafterhavingimplementedthefirstthreemeasuresproposedintherisk mitigationsection.
1.9.4
Risk Communication
In a big organisation, it would already be a success if the IT security team is in chargeofperformingtheriskassessmentofourexample.Theyshouldcommunicaterisksundergonebytheorganisationonthisscenarioliterallytotheownerof theorganisation.Thisentailstheuseoftheappropriatebusinesslanguage(andnot ITjargon)andefficientmechanismssuchasquarterlyreports,riskdashboardsand othertoolsthatweproposeinthisbook.18 Equally,theowneroftheorganisationshouldcommunicateclear“appetitefor risk”criteriatorisk-relatedfunctionssuchastheITsecurityteam.Thewaytocommunicate the risk acceptance threshold is usually through money-related figures (budget, affordable losses, brand value) and/or through assertive and transparent risk-relateddecisions.19 SeeChapters5and7. See Section 1.13.
18 19
1.10ITSecurityGettingClosetoReality
11
Appetite for IT Risk: Let the Business Lead Thesecondpartofthefirstchapterbringsthependulumfromtheorytopractice:How theITsecurityteamcankeepclosecontactwithrealityandwiththeorganisationwhere theteamworks.WecanapplythesespecificlearningpointstotheITsecurityteamas fromday1.Thestartingpointisgettingtoknowtheorganisation’sITappetite for risk.
1.10
IT Security Getting Close to Reality
Currently,organisationsareadoptingcomprehensiveriskmanagementmethodologies to comply with industry standards and stakeholders’ requirements. IT standards, such as ISO 20000 or its implementation, the best practices collected in ITIL,includeaninformationsecuritymanagementchapter. EveryITsecurityexpertshouldknowandmastertheriskmanagementfoundationspresentedearlieroninthischapter.However,riskmanagementmethodologiesgiveorganisationsanimpressionofbeingsecurethat,unfortunately,is notbasedonreality.Tostartwith,ITsecuritygroupsneedtoidentifythegap betweenthisformalimpressionandtherealstateofITsecurityintheorganisation.Then,theyneedtoactivelyclosethisgap.Thisbookshowshowtoachieve this(Image1.1).
Image 1.1 Falseimpressionofsecurity.Closingthegap
1Vulnerabilities,ThreatsandRisksinIT
12
1.11
IT Provides Solutions to the Business
ThereasonofbeingofeveryITdepartmentistoprovideIT-basedsolutionstothe business.ITgroupsfollowaproject-basedmethodologytobringtheseITsolutions tothebusiness.BusinessandITmanagersentrustaresourcefulgroupofexperts, theprojectteam,withanewIT-relatedactivitytoprovideasolutioninagiventime framewithacertainamountofresources. Thetheoreticalapproachconsistsoflinkingtheriskmanagementmethodology in place in the organisation with the project management methodology used in-house.Thisrecommendationsoundslogicalandappropriate.However,itisnot sufficient:RealitytellsthatnowadaystheprovisionofITsolutionsneedstobeagile andtoaccommodatecustomers’businessneedsinafastandchangingmanner. Realistically,thetriadicmantraforanITprojectistoprovidetheITdeliveryon time,onbudgetandwitharequiredquality.ITsecuritycanonlyslightlychangethe directionofaprojectandimprovealittlebitthisprojecttriad.TheearlierITsecurityworkswiththeprojectteam,thegreateritsinfluencewillbe.
1.12
IT Provides Secure Solutions to the Business Business is in business to do business20 (Mike Poor 2007)
These words by Mike Poor say it all. We would add to these words: “…and not security”.Inmostorganisations,ITandITsecurityareonlysupportareas,notcore businessareas.ManagementboardstendtoconsiderITandITsecurityasanyother supportfunction:Animportantfunction,certainly,maybeessential,butnotthecore ofthebusiness. Making business is taking risks:ITsecurityneedstoprovidebusinessmakers withaclearriskdescriptionsothattheycanmakeinformedrisk-relateddecisions. Moreoftenthandesired,securityactsastheobstacleforthebusinesstorunrisks, someofthemevenunknowntothedecision-makers.TheultimateroleofITsecurityistoinformtheownerofthebusinessofITrisksrunbytheorganisation. Therefore,ITsecurityprofessionalsshouldforgetthesentence“youcannotdoit,itisvery insecure”andchangeitfor“wewilldoitinamoresecureway”.
The100%secureITsystemistheonethatisoffandburiedinablockofconcrete. However,thatsystemisofnousetothebusiness.TheITsecurityteamprovideadvice on how to deliver the functionality demanded by the business, and not on how to preventthebusinessfromgettingtheirideamaterialised.Thebusinesswillimplement theirideaanyway.Therefore,itisbetterfortheorganisation(andfortheteam)that theydoitwiththeITsecurityteam,ratherthaninatotallyuncontrolledmanner. MikePoor,ITsecurityprofessionalandSANStrainer(2007).Seehttp://www.sans.org/training/ instructors.php#Poor. Last accessed 22-09-2009.
20
1.13HowtoDeriveAppetiteforITRiskFromManagementDecisions
13
ThetaskofITsecurityistolettheprojectteamdeliverasolutionaccordingto the organisation’s appetite for risk21 by providing expert advice on the risks the organisationfacesduetotheITsolution.Theprojectteamcanonlydeliverasecure ITsolutioniftheyareawareofITsecurityrequirements.Ideally,iftheorganisational setup allows it, the IT security team in the organisation should be able to adviseprojectteammembersdirectly.
1.13
How to Derive Appetite for IT Risk From Management Decisions
ItisrarethatamanagementboardprovideinputtoanITsecurityteamonthepreciserisktheorganisationiswillingtorun,orbettersaid,therisktheyarewilling totake.Eventhoughthisquestiondeservesananswer,soonITsecurityleaderssee thatitisneverdirectlyanswered.Why?Weexplorethefollowingscenario:How could we answer how much money would suffice us to live happily ever after? Wouldn’twebetemptedtospeakup,lettingourimaginationrun,andanswerwith anextravagantlyhighsum? The appetite for risk question produces an output similar to the “money to live happilyeverafter”question:Mostofuswouldanswerwithaninaccurateandextravagantresponse.Itisfrequenttolistentoanswerscoveringthefullrange,from: – Theorganisationcannotacceptanyrisk,to – Theorganisationwillacceptanyrequiredriskforthebusinesstogoon. BothextremesareequallyuselesstodeterminetheITsecuritymeasurestheorganisation needs. We suggest that IT security professionals follow this practical approach: 1. Gettingtoknowthecorebusinessprocessesoftheorganisation.Thedescription infewsentencesbasedonthemissionstatementoronthemainmarketingslogan isinsuficient.Beingcompletelyabletofollowabusiness-relatedmeetingora conversationwithpeersinthecustomerbusinessareasshouldbeenoughtofulil thisirstrequirement. 2. Establishingpermanentcontactswiththebusinessareas.TheITsecurityteam shouldknowonwhattheyareworkingandparticipateintheirmainbusiness developmentsandplans.Thisway,theteamcanunderstandhowmuchriskthe businessrunonotherields(creditrisk,marketrisk,reputationalrisk). 3. Understanding the strategy of the customer business areas and following that strategy while delivering IT security products (risk assessments, mitigating measures,securityadvice).
21
See Section 1.13.
14
1Vulnerabilities,ThreatsandRisksinIT
Image 1.2 DifferentorganisationshavedifferentappetitesforITrisk
ThesethreepointsconstituteaneffectivewayfortheITsecurityteamtoprovide value to the organisation using their IT risk management and IT security skills. However,theyaredifficulttoputintopracticebyanyITsecurityteambasedonlyon ITknowledge.Thisisstillthecaseinmostorganisations.Veryseldom,ITsecurity teammembersenjoyseasonedbusinessacumen.Althoughrare,economic,socialand psychologicalexperienceisalsoveryvaluableforanITsecurityteam(Image1.2).22
1.14
Risk Perception by Human Beings
Inthelastdecades,evolutionarypsychologyandneuroscienceprovideevidenceon how human beings perceive risks.23 We use different “mental calculators” that, dependingonwhattheyarebasedon,makethembadorgoodriskassessors.From theriskmanagementpointofview,werecommendtakingthisfactseriouslywhen dealing with high-level qualitative risk probability considerations: Often human beingsarefarawayfromprovidingrealisticriskestimations. Forexample,thereisanincreaseintheperceptionofriskmaterialisationifwe continuously encounter information in mass media about worst case scenarios happening. We lose focus on how improbable is the happening of that event. StevePinker24confirmsthattheviolentdeathrateinhumanssince2000isliterally SeeChapter2. Seereferenceinthepresentation“riskperceptionandtheproblemswemakeforourselves”,availableathttp://www.ramas.com/wttreprints/sranortheastReprint1.pdf. Last accessed 22-08-2009. 24 ProfessoratHarvardDepartmentofPsychology.Seehttp://pinker.wjh.harvard.edu/index.html. Last accessed 22-09-2009. 22
23
1.15HowtoKeepITSecurityWorkRealbyAvoidingDoomsdayTellers
15
decreasing,while,ifwefollowmassmedia,weallhavethefeelingthatthenumber ofviolentactsisincreasing.
Where to Focus: Business Value of IT Security Afterexplainingthefoundationsofriskmanagementandthewaytounderstandthe organisation’s appetite for IT risk, we propose a set of measures to IT security professionalssothattheycanprovidebusinessvalue.TheITsecurityteamneedto explain their colleagues their tasks and why they are important for the business. Traditionally,ITprofessionals,andespeciallyITsecurityexperts,payinsufficient attention to this dimension of their work. In the following sections we propose measurestoincreasetheunderstandingoftheneedofITsecuritythroughoutthe organisation.25Chapters4and5delvedeeperonwhattodoandhowtodoit.
1.15
How to Keep IT Security Work Real by Avoiding Doomsday Tellers and Collecting News
Onlywhatitisdetectedisreal.Organisationsdonotwelcomeriskvisionaries.Itis notwisetopermanentlyraisethealarmintheorganisation.TheITsecurityteam needtorefrainfromusingthe“crywolf”approachintheformofinforming26about everypotentialriskthatcouldhappen.Whenevertheyneedtoreportaboutareal risk,weproposedtoaccompanythefactualdescriptionoftheriskwithtwoproposalsforasolution,ashort-termpatchandalong-termsetofsecuritymeasures. ITsecurityneedstobasetheirrisk-relatedadviceonlyonrealevents.Awayto achievethisistomaintainaconstantflowofsecuritynewsintotheorganisation: Securityincidentshappeningtosimilarorganisations,newvulnerabilitiesandnew threats appearing on a daily basis on reputable media.27 Annual trends, data breachesandtoprisksreportsfromindustryplayerssuchastelecommunications providers, government agencies and security-related organisations are excellent sourcesofinformation(Image1.3).28
OECD(2003). Morethaninforming,sometimesITsecurityteamsthreatenorganisationswiththeir“apocalyptic” statements. 27 SeeanexampleofsecurityincidentnewsinAnnex2. 28 Forexample: –The2009databreachinvestigationreportfromVerizon.Availableathttp://www.verizonbusiness. com/products/security/risk/databreach/. Last accessed 13-10-2009. –TheXIVInternetSecurityThreatreportfromSymantec.Availableathttp://www.symantec.com/ business/theme.jsp?themeid=threatreport. Last accessed 13-10-2009. –The2008CSIComputerCrimeandSecuritySurvey.Availableathttp://gocsi.com/forms/csi_survey. jhtml. Last accessed 13-10-2009. 25 26
16
1Vulnerabilities,ThreatsandRisksinIT
Image 1.3 Publicinformationdisplayshavealreadybeenhacked.Whataboutifsomeonemodifiesthedisplayshowingtheleavingtimesofthetrainsinatrainstation?
WesuggestsharingthisITsecuritynewswiththeorganisationstakeholdersin anattractiveformattoenticethemtoreaditregularly,addingevensomefunnyIT securityincident,e.g.hacksindigitalpublicannouncementdisplaysortrafficroad signs.29 Weproposetoinformalsoabouthowidentifiedrisksaremitigatedinreality bycompetitorsorsimilarorganisations.Thereisasimplewaytopackageinformation that, under the right circumstances, can make it irresistible30: Offering specificexamplesofdocumentedincidentswithoutoveremphasizingthem.Even better, playing them down and just adding a cunning “it could very rarely also happen here”. The knowledge that the team get from these security events feeds their risk assessmentprocess.Theycancreatealistofthreats,vulnerabilitiesandmitigating measuresoutofthosesecurityincidents.Thislistcouldstartmodestly,butitwill soonbetheteam’sthreat,vulnerabilityandmeasuresdatabase.Thisdatabasewill offerthesecurityteamaconsistentwayofassessingrisks.Theteamneedtomaintainthisrisk-relateddatabaseupdatedandre-visititfrequently.Thisway,theirrisk assessmentswillbefoundedonreallifeevents.Thisisfundamentaltojustifytheir securityadvice. 29 Asanexample,wecanreadthispieceofnewsreportingonahackedtrafficdigitalsign,available at http://www.dallasnews.com/sharedcontent/dws/news/localnews/transportation/stories/013 009dnmetzombies.1595f453.html. Last accessed 20-07-2009. 30 Gladwell(2000)p.73.MoreonthistopicinChapter7.
1.16ProfittoRiskRatio
17
ItisrecommendabletocomplementthatcollectionofITsecuritynewswiththe follow-upmeasuresthataffectedorganisationsimplementedtorecoverfromtheincidentandtopreventnewoccurrences.Thistypeofinformationisusuallymore difficulttogather.Weproposetomakeuseofindustrypublications,contactsin theindustryandpublicresourcessuchasInternet(especiallytrustworthysites). Securityincidentshappeningtotheorganisationarealsoaveryvalidsourceof information.Real-timemonitoringshouldbepartofthedailyITsecurityactivities. Itwillenabletheteamtodocumenttherealthreatsthattheydetect.Onlythosereal threatswilljustifybudgetforsecuritymeasures.Theultimategoaloftheteamisto protecttheorganisationfromthosedetectedthreats. WesuggestcreatinganITsecurityincidentresponseteamwithintheITsecurity team,basedonclearlycut,swiftandeffectiveprocedures.TheywillbethecornerstonetoinvestigateandreplytosecurityincidentswhilebeingasilentbutimpressivemarketingtoolwithintheorganisationonwhytheyneedanITsecurityteam for their business.31 Whenever an IT security incident will happen, they will be readytocopewithitwithapre-testedplan.32 Thesecurityincidentscenarioisinconstantchange.However,thereisapermanentelementinallofthem:Intention.Thereisanagent(thethreat)performingan action(takingthechanceofavulnerability)withaspecificpurpose.Unintentional eventscanalsocauseITsecurityincidents(e.g.morethan500,000laptopsarelost everyyearonU.S.airports33).However,withthelackofanintendedpurpose,they canbemitigatedmoreeasily.
1.16
Profit to Risk Ratio
Theprice-earningsratioofalistedcompanyisavaluationratioofthecompany’s current share price compared to its per share earnings.34 This is a useful way to comparesharesinstockexchanges.Thegreatertheratio,themoreexpensivethe companyshareis. Ausefulwaytocompareriskswillbetheratiobetweentheprofitthatapotential attackercouldhavewhenexploitingavulnerabilityandtherisktheattackerruns whenusingthevulnerability.Thegreatertheratio,themorefrequentlythisriskwill materialise.Therewillbepotentialattackersintendingtotaketherisk:Theycould obtainarelativelyhighprofitrunningarelativelylowrisk.Ifthereisaspecifictype ofattackthatworks,threatagentswilluseit. SeeChapter7. SeeacommentonthisrespectfromRichardBejtlich,DirectorofIncidentResponseatGeneral Electric,availableathttp://taosecurity.blogspot.com/2008/09/is-experience-only-teacher-in-security.html. Last accessed 13-10-2009. 33 See http://www.pcworld.com/businesscenter/article/147739/laptops_lost_like_hot_cakes_at_ us_airports.html. Las accessed 22-09-2009. 34 Definitionprovidedbyhttp://www.investopedia.com. Last accessed 22-08-2009. 31 32
1Vulnerabilities,ThreatsandRisksinIT
18
TheITsecurityincidentdatabase35shouldconfirmthisfact.Itshouldcontain multiple examples of high profit to risk ratio incidents. The team will base their profittoriskratiofiguresonrealdatatheyarecollectinginthesecurityincident newsdatabase.36Securityactivitiesandmeasuresshouldfocusonmitigatingthose scenarioswithahighprofittoriskratio(PRR).Attackerswilltargetthem:They havealottoearnandnotmuchtolose.Oncetheteamhaveidentifiedthosesecurity activities,wesuggestkeepingalimitednumberofthemrunninginparallel.37 Too much variety running simultaneously brings complexity and lack of focus. Few selected IT security endeavours with smart38 objectives and committed deadlines willbringsuccesstotheteamand,moreimportantly,totheorganisation.39
1.17
Smart Selection of Risks to Mitigate Following the Pareto Principle in IT Security
TheParetoprinciple,alsoknownasthe80-20rule,showshow,inmanyanddiverse situations,80%oftheeffectscomefrom20%ofthecauses.40ITsecuritydoesnot escapefromthisprinciple:80%oftheconsequencesthatthematerialisationofa riskbringsstemfromtheuseof20%oftheexistingvulnerabilities.Thedrawback, though,liesonhowtoidentifythat20%ofvulnerabilitiesthatwillbeexploited. Thereisnosilverbulletforthis. Impact–probabilitygraphsandtheprofit-to-riskratiohelptoapplyPareto.We identifytwosetsofrisks,consideringthatITsecuritybudgetsareneverenoughfor everythingthatanITsecurityteamwouldliketoimplement: • Risks severely affecting the organisation, i.e. those ones with the greatest impact. • Risks with the highest profit-to-risk ratio, i.e. those ones that are extremely attractivetoattackers,basicallyduetotwosimplereasons: – Attackersputhardlyanythingatstakewhenperformingtheaction. – Ifsuccessful,thebenefittheyobtainisjuicy. Weaddtheprobabilitydimensiontobothsets.ThedatabasecollectingITsecurity incidentshappeningintheworldisusefultoobtainatleastanestimationofhow probableitisthatthoseriskswilloccurintheorganisation.Theteamneedtodistinguishbetweenprobablerisksandpossiblerisks.
See Section 1.15. See Section 1.15. 37 AswementioninChapter5. 38 See http://en.wikipedia.org/wiki/SMART_criteria. Last accessed 20-09-2009. 39 SeeChapters4and5. 40 Paretoprincipledefinitionfromwww.wikipedia.org. Last accessed 20-09-2009. 35
36
1.18HowtoSpendResourcesWiselyandTransparently:ReputationandEmotions
19
Weproposetoprioritisethework,andtheexpenditures,followingthe80-20rule. Teamswilldefineand implement,first,ITsecurity mitigatingmeasures forthose riskswithahighimpact,highprobability41andhighprofittoriskratio,andfor thosescoringhighinatleasttwoofthesethreedimensions.Thisapproachwillprovidethebest“bangforthebuck42”intermsofITsecurityfortheorganisation.43 The reader can however think that a remote, improbable and not known risk couldanywaymaterialiseandtakeallriskmitigatingplanstorealfailure.Thisis indeedpossible,althoughnotprobable,andthereasonwhythesettingupofawelltrainedsecurityincidentresponsefunctionwithintheITsecurityteamscoresalso highintheactivityprioritisationlist.44
1.18
How to Spend Resources Wisely and Transparently: Reputation and Emotions
Thegeneralprincipleproposestoavoidspendingmoreresourcesinassessingrisks thanthosethatwouldbespentiftheproblemsreallyoccurred45andprovidefinancialtransparencytorisk/returnmetrics.46Otherwise,ITsecuritydetractorsinthe organisation,followingdifferentgoals,haveaneasyandpowerfulwaytoshowthe ineffectivenessofITsecuritymeasures. There are occasions when the team need to mitigate risks spending more resourcesthanthoselostiftherisksmaterialise.Theseexceptionalsituationsexist andtheyaretightlyboundwithemotionsandreputation. Regardingemotions,asanexample,itisfrequenttofindhigh-valuearmoured doorsprotectinghomeswithloweconomicvalueinside.Theemotionthattheowners would feel if their home is broken in leads them to spending more in protecting theirhomethattheactualvalueoftheirbelongings.Althoughthisisarudimentary example,similarsituationsexistinbusiness. Aboutreputation,thevalueofsomepublicorganisationsresideontheirreputation,asecurityincidentprovokingrelativelylowlosesgoingpubliccouldputthem outofbusinessduetothelossintheirimageandreputation. Inadditiontothis,organisationsneedtoavoidbeingthelastoneintheirindustry takinganysecuritymeasure.47Inanyindustry,beingthelastcompanyimplementing
SeeFig.1.1andChapters4and5. Aaboetal.(2004),pp.1–34. 43 SeeChapter4. 44 Sothattheycanquicklyapplycorrectivemeasuresifanincidenthappen. 45 DillonandPaté-Cornell(2005),pp.15,17,18and24. 46 Rinnooy(2004),pp.26–31. 47 IdeacomingfromaconversationwithSantiagoMoral,ITsecurityprofessional(2007).
41
42
20
1Vulnerabilities,ThreatsandRisksinIT
aspecificsecuritymeasurecanhavenegativeconsequences,bothfromthereputational and the operational side: – Intermsofreputation,competitorscouldeasilyusethatfacttoattractdisappointed customersoutofthatcompany. – Operationally, attackers will target that company for as long as they do not implementthecorrespondingmitigatingsecuritymeasure. Ifwewereabletoprovideaneconomicvaluetoanemotionandtoacertainreputation, thesetwoexceptionswillalsofallunderthegeneralprinciplementionedinthissection.
1.19
No Business Value Without Business Knowledge
TheITsecurityteamneedtograsptheimportanceoftheirrolefortheorganisation. Slowly but surely, they need to comprehend that their mandate is to support the business with their IT security advice and actions. They need to understand the businessoftheorganisationandtheroletheyplayinit.48 Inthefirstexample,49Mr.Pigletcoulddefendhimselffromthewolfinaneffectivewayifhewouldstudythehabitsandactsofthewolf. Inthesecondexample,theriskstheorganisationfacesbysomeoneknockingout thecustomers’databaseserverthroughadenialofserviceattack,launchedfroman unattended laptop, could translate into a severe lack of revenue. The IT security team can make this translation only if they are into what is being cooked in the organisation: If the team know that the marketing department constantly use the databaseduringbusinesshours.Everytimeacustomercontactsthehotlinethrough the phone or the web, their information is pulled out of the database into a nice graphicalinterfaceusedbytheassociateansweringtheirrequest.
1.20
Smart Behaviour for IT Security Practitioners
HowcantheorganisationlearnaboutthevaluethatITsecurityprovides?Weproposethesethreebasicactions: 1. ReportingachievementsinaclearandconcisewaytoITcolleaguesandmanagementandtobusinesscolleagues. 2. Proposing pro-active measures when detecting an IT security risk. With proactivewemeanthateliminatingthevulnerablebusinessprocessisnotanoption, butmodifying,improvingorreplacingitisanoption. 3. Focusingtheavailableenergyonsmarttargetsandavoidingturfwarswithinthe organisation.Theydemandtheenergyrequiredinmoreimportantields,suchas todotheITsecurityjob. AdaptedfromGlen(2003),p.16.UsefulreferencetoleadITgeeks. See Section 1.8.
48 49
1.20SmartBehaviourforITSecurityPractitioners
21
Inthischapter,wehavedealtwiththetheoreticalandpracticalfoundationsofIT security:Risks,riskmanagement,appetiteforriskandprovisionofbusinessvalue. Chapter 1: Learning points • Ariskisathreat(anactiveagent)makinguseofavulnerability. • Impact–probabilitygraphsdescriberisks. • ITriskmanagementneedtobecomplementedbyrealdata. • ITneedstoprovidesolutionstothebusiness.ITsecurityaswell. • Businessownersneedtounderstandtheriskstheyrun. • ITsecurityteamsneedtoknowthebusinessanditsITriskappetite. • ITsecurityisasupportarea. • ITsecurityshouldfocusonrealthreatsthatcreaterealrisks. • Theyneedtobecarefulwithhighprofittoriskratio(PRR)risks. • ITsecurityneedstoprovidebusinessvalue.
Link to MBA Management Models Wehaveselectedtwomodelsthatcouldhelpusintheanalysisoftheexternal andinternalenvironmentsurroundingyourITsecurityteam: PESTLIED model Externalenvironmentalfactors(amongothers,political,economical,social, technological,legalfactors)thanaffectourorganisationandourteam. The 7 ‘S’ framework (by Mintzberg and Quinn, 1991) Interconnectedinternalfactorsthatinfluencetheorganisation’seffectiveness, especiallyitsabilitytochange(staff,strategy,skills,style,systems,structure, sharedvalues). More generically, a SWOT analysis (strength, weakness, opportunities and threats by Johnson and Scholes, 1989) can also aid in understanding the internalandexternalcontextoftheteam. Seereferences:HardingandLong(1998)andlinks: http://www.valuebasedmanagement.net/methods_PEST_analysis.html http://www.valuebasedmanagement.net/methods_7S.html http://www.valuebasedmanagement.net/methods_swot_analysis.html
SeeAnnex1foranexampleofatesttoassessunderstandingofthebasiccontents of this chapter.
Chapter 2
Security and IT Background
Chapter 2: What will the reader learn? This chapter answers the following questions: • • • • • • • •
WhatdoestheITsecurityworkforcelooklike? WhichbasicprofilesdoesanITsecurityteamneed? WhichspecificprofilesdoesanITsecurityteamneed? Whichtechnicalskillsdoestheteamneed? Whichsoftskillsdoestheteamneed? Wherecantheteamleaderfindtheserequiredprofiles? Whereandhowcananyonestartinsecurity? Whattostudy?
Professional Outlook and Profiles for IT Security TheITsecurityteamneedstobebuiltofexperts,professionalindividualswilling andmotivatedtoprovidevaluetotheircustomerorganisation.Thisiseasiersaid than done. This chapter provides a path to compose a team with the potential to excel in their mandate.1 The profiles and skills mentioned constitute a necessary conditiontocreateacapableteam.Unfortunately,itisnotasufficientcondition. Otherelementssuchasmotivation,organisationandteamdynamicsplayanimportantroleaswewillcommentonthesubsequentchapters.
1
ToprovideITsecurityexpertise,seeSection1.19.
A.PartidaandD.Andina,IT Security Management: IT Securiteers - Setting up an IT Security Function,LectureNotesinElectricalEngineering61, DOI10.1007/978-90-481-8882-6_2,©SpringerScience+BusinessMediaB.V.2010
23
24
2.1
2SecurityandITBackground
IT Security Workforce
TheITsecurityprofession,althoughwithancientfoundationsonphysicalsecurity andmilitarytopics,isveryyoung.Intermsofdegreeofevolution,ITsecurityis stillababy.ThenumberofITsecurityprofessionalsintheworldisestimatedtobe 1.66million.2Thisfigureissupposedtoincreaseupto2.7millionprofessionalsin 2012.Threefigurestohelpunderstandingthisincreaseinthenumberofprofessionals: In2009,reportsmentionthattherearebetween100and150millionwebapplicationsontheInternetandhardlylessthan10%ofthemhaveundergoneanykindof securitytestbeforegoinglive.3 IT security is relatively anti-cyclical. Traditionally, strong industries, such as banking,automotive,telecommunicationsandpharmaceutical,demandITsecurity experts. Even during periods of economic downturn, when the entire IT market suffersfromlayoffs,securityisoneofthefieldsthatbestresisthardtimes. Salaries for IT security professionals are high. They are mostly placed in the upperrangeofITsalaries.In2008,outofasurveymadebySANSwithover2,100 respondents,438%ofthemearnedUS$100,000ormoreperyear.Regardingeducationallevels,thesamesurveymentionedthat75%ofsecurityprofessionalsholda bachelor’sdegreeorhigher. In the majority of companies, IT security is still growing in importance and budget.ThisiswhycompaniesstrivetocreateacapableanddependableITsecurity teamevenwhenthereisstillasmallnumberofreputableuniversitiesprovidingIT securitycurricula.
2.2
Basic IT Security Profiles
The concept of IT security entails a wide variety of activities and specialities. Nowadays,wecanstatethatnohumanbeingcanmasterallofthemsimultaneously. This is why, asin othercomplexdisciplines,onceanorganisationhasreacheda certainsize,theITsecurityfunctionrequiresateamandnotonlyoneindividual. Theinitialdivisionoflabourisratherbasic:Therearetechnicalandgovernance relatedactivities.Technicaltasksrequireacommandlineoragraphicalinterface andpolicy-relatedtasksrequireawordprocessor.Theformertasksneedhandson IT security skills and the latter ones drafting, synthesis and communication skills,togetherwithabasicunderstandingofsecurityprinciples5andtechnical implementations.
Frost&Sullivan(2009),p.6. Minute46–48inepisode149ofpauldotcompodcast,availableathttp://pauldotcom.com/2009/04/ pauldotcom-security-weekly---e-5.html.Lastaccessed20-09-2009. 4 SANS(2009a),p.0. 5 SeeSections4.2–4.4foradditionalinformationonsecurityprinciples. 2 3
2.3ExtendedITSecurityProfiles
25
Table 2.1 BasicdivisionofproilesintheITsecurityteam BasicITsecurityprofiles Technical Governancerelated Network Securitypolicies Operatingsystems Applications
Technical IT security skills constitute a set comprehensive enough to deserve carefulanalysis.ITelementscanbebrokendownintonetworks,systemsandapplications.ThesamedivisionisvalidforITsecurity: – Network security: Ability to technically apply IT security principles in networks.ThismixrequiresITnetworkadministrationandITsecurityexpertise. – Operatingsystemsecurity:Abilitytosecureandtestoperatingsystems.Thetwo maincurrentflavoursareWindowsandLinux/Unix. – Applicationsecurity:Abilitytosecureapplications.Thisisaverybroadterm. Adatabasecanbeconsideredanapplication.Awebserverisalsoanapplication. In this case, depending on the applications used by the organisation, the teamwillrequireknowledgeonhowtosecurethem. Securitygovernanceincludesacomprehensivesetofsecuritypolicies.Theyneed anauthor:SomeoneabletounderstandthebusinessuseofanITcomponentandto draftanunderstandablepolicywhichconsidersbusinessandsecurityrequirements. ThekeytosucceedistoallowforthebusinessuseoftheITelementwhilepreservingthesecurityoftheorganisation’sinformation. These two profiles, technical and governance, although different, need to exchangeinformationandunderstandeachother’swork.Securitypoliciesarenormallyindependentfromtheunderlyingtechnology.However,theirimplementation entails the creation of hardening procedures. This requires technical IT security skills.Thus,bothprofiles,althoughdifferentinactivities,needtofollowacommon strategy(Table2.1).
2.3
Extended IT Security Profiles
Havingthebasicdivisionofprofilesinmind,weadditionallyproposeapractical divisionofprofilesorrolesbasedoneverydayactivities.Dependingonthesizeof theorganisation,thesamepositioncouldpotentiallyperformmorethanonerole. WebeginwiththetechnicalITsecurityprofilesandsubsequentlywewillmention thegovernancerelatedroles.
2.3.1
Technical IT Security Profiles
The first profile we focus on is the security tester.Theyperformtechnicalsecurity testsincludingpenetrationandvulnerabilitytests.Thisisaverytechnicalprofile,
26
2SecurityandITBackground
requiringexpertiseonITnetworks,operatingsystemsandapplications.Thetechnical skillsofasecuritytesteraretheonesrequiredalsotohandleanITsecurityincident. Therefore,thesecuritytestercanalsoplaytheroleofanincident handler,the second technical IT security role we include. There is one decisive difference betweentheincidenthandlerandthesecuritytester,butitisnottechnical:Thefirst onerequirestheabilitytoworkunderpressure.Thesecondonehastheprivilegeto plantheirtests. Thethirdprofiletohighlightisthesecurity administrator.Therearesecurity devicesthatneedtobeadministered:Theseare,amongothers,firewalls,authenticationdevices,intrusiondetection(andprevention)systemsandvulnerabilityscanners.Theadministrationofthesedevicesshouldfallundertheresponsibilityofthe securityadministrator. Thisprofileisstillpopularlyknownastheoneinchargeofuseridentitymanagementinanorganisation.Useridentitymanagementisaverybroadandcomplex field that covers all IT user provisioning and user administration activities. Traditionally, security administrators have created identities and allocated access rightsintheinformationsystemswithintheorganisation. Wesuggesttosplitthesecurityadministrationprofileintotwo:Security device administratoranduser identity and access administrator.Theyrequiredifferent technical skills and their activities can reach different degrees of automation: In userandaccessmanagement,asmartidentitymanagementimplementationcould automatemanyoftheITusercreationsteps.Insecuritydeviceadministration,even with the existence of a centralised management console, automation is not a plausiblepriority,mainlybecausethisactivitydoesnotconsistofrepetitiveselfcontainedsteps. Thelasttechnicalprofileweproposetoaddtotheteamisasecurity monitoring operator.Slowlybutsurely,securityactivitiesintheteamwillincludeanincreasingnumberofmonitoringtasks.Thisprofilewillstartoffsecurityactivitiestriggered by the occurrence of a specific combination of log entries. Their tasks range from gathering, monitoring and reacting on logs to creating automated alertsbasedontheircriticality.Theoperatorwillinitiatesecurityproceduresthat should already be established and tested, including those designed to answer criticalevents.
2.3.2
IT Security Governance Related Profiles
Adjacenttothetechnicalcoreoftheteam,theorganisationwillrequireITsecuritygovernancerelatedprofiles.Theysetthepolicyframework,asetofITsecurity “playingrules”thatwillguidetheentireorganisation,andtheITsecurityteam,in theirdailybusiness. ThefirstprofilethatwedescribeistheITsecuritypolicy writer.Thesecureuse andconfigurationofITsystemsusuallyrequirestheelaborationofacontractstatinghowthesystemmaybeused.Thisisthestartingpointofasecuritypolicy.The writerofthosepoliciesneedstobeabletounderstandbasicsecurityprinciplesand
2.4TheCoordinator,theFacilitatorandtheTrainee
27
transpose them into specific security policies. A mixed technical and businessrelatedbackgroundisoptimalforthisprofile. Security policy writing is a complex task. The inhabitants of the organisation needtounderstandthepolicyanditspurposeandtobeabletoapplyitwhileperformingtheirbusinessactivities.Conciseness,consistencyandapplicabilityneedto befeaturesofeverysecuritypolicyintheorganisation. Thesecuritypolicywriterneedstofindthesweetspotintheorganisationsothatbusinesscanproceedand,atthesametime,securityisnotneglected.Securitypoliciesare partofITsecuritygovernance,togetherwiththeinnovativecreationofITsecuritylinks tootheraspectsofITgovernanceandcorporategovernance.Thistoughgoalrequires additionalsupportfromanewprofileweaddtotheteam,thesecuritycommunicator. The security communicatoristhesecondprofilewecite.Anextrovertfigure, preferablywithamixoftechnicalandgovernancerelatedskills,thatwillplayakey role in two scenarios:
2.3.3
Provision of IT Security Expert Advice
TheywillbecomekeyITsecurityresourcesin“changingactivities”likeITprojects. Therefore, professionals performing this role should cover the three main technicalsecurityfields:Network,operatingsystemandapplicationsecurity.6
2.3.4
IT Security Marketing
InadditiontoprovisionofITsecurityknowledge,securitycommunicatorsneedto showtheneedforcurrentorganisationstofollowITsecurityprinciples.Theywill: – Leadsecurityawarenesscampaigns. – Facilitate the introduction of new security policies in the organisation by explainingthemtothebusinessareaswhenrequired. Thisroleissimilartothesoftwareproductevangelistrolepresentinmanycompanies sincethe1990s:Experttechnicalknowledgeplusexcellentcommunicationskills withtechnicalandnon-technicalaudiences.Simplebuttellingandeye-opening demonstrationswillbeamongtheactivityportfolioofthesecuritycommunicator.
2.4
The Coordinator, the Facilitator and the Trainee
AllprofilesmentionedwillleadahandfulofongoingactivitiesatanytimeintheIT securityteam.Theseactivitiesrequireadegreeofsynchronisationandacommontempo. Thecoordinationoftheteamcallsforanorchestraconductorrole:Amulti-disciplinary 6
SeeSection2.2.
28
2SecurityandITBackground
profile that we will call security coordinator.Theywillhaveexperienceintechnical security, security governance and business analysis. The coordinator will keep the harmonywithinthesecurityteam,setthestrategytofollowanddrivetheinteraction withtherestoftheorganisation.Hopefullytheyarenottheonlysourceofinspiration withintheteam,buttheydefinitelyneedtobeoneoftheinspiringforces. Wehavenotusedthewordmanageronpurpose(apartfromthespecifictasksof user identity and access and security device management). Management tasks withinthesecurityteamarenotexclusivetothecoordinatorrole.Mostprofilesin theteam will manage time, budget, resources, including additional workforce to accomplishaspecificproject.Themaindutyofthesecuritycoordinatoristotune allmanagementactivitieshappeningwithintheteam(Image2.1and2.2). Traditionally,theexistenceofamanagerimpliestheexistenceofahierarchical command line. Hierarchy should be kept as flat as possible within the security team. Expertise and specialised knowledge are more important that hierarchy. Everyteammemberisthemanagerintheirfieldofexpertise. The coordinator will lead and be responsible for the overall decision making process.Thisistheonlypossiblewaytoeffectivelyfulfilthemandate7oftheteam. Therearetwoimportantfigureswithinthesecurityteamthatwehavenotmentionedyet:Theteamfacilitatorandthetrainee. The security team facilitatorveilsforthesmoothfunctioningoftheteaminall termsdifferentfromITsecurity.Typicalactivitiesfallingundertheirresponsibility are budget monitoring, contract procurement, maintenance of published security informationintheorganisationandtaskprogressmonitoring.
Image 2.1 TheITsecurityleader’sgoal:orchestratingsecurity
7
ToprovideITsecurityexpertise,seeSection1.19.
2.4TheCoordinator,theFacilitatorandtheTrainee
29
Image 2.2 Leadingandcoordinating,butnotmicro-managing
Thefacilitatorworkstightlywiththecoordinator.Together,theyensurethatallteam memberscanworkandthatplannedactivitiesmoveonaccordingly.Theirchallenge, workingtogetherasonereportingandmonitoringunit,istoforeseeteamrequirements andtoanswerthemor,atleast,toidentifythemsothatactivitiescanprogress. Withregardtoindividualneeds,weproposetouseathree-dimensionalsystem: Everyteammemberhasaprofessional,asocialandapersonal/spiritualsidethat requiresacertaindegreeofbalance.WewillelaborateonthisinChapter3. Thelastprofilethatanyfuture-proofITsecurityteamshouldhaveconstitutesa linktothecurrentacademicworld:Thesecurity trainee.8Traineesprovidefreshair totheteam.TheywillnormallybestudentsintheirlaststageoftheirITsecurityor ITdegree,preparingtheirdissertationorfinalisingtheirlastsubjects. This initiative is a win-win deal. They have the possibility to attain real-life experienceatfirsthandworkingwithITprofessionalsandtheteamhastheopportunitytolearnnewITtrendsandtools,e.g.fromtheuseofsocialnetworksasa replacementofemailtothelastusefulswitchesforthenmap9command-line. Traineesrequiresupportandmentorship.Oursuggestiontoachieveawin-windeal withtraineesisthefollowing:Theybenefitprofessionallyfromtheirstaywiththesecurityteamandthecustomerorganisationgetsvaluefromthem.Werecommendappointingacommittedseniorteammemberasthetrainee’smentor.Eachseniorteammember shouldmentoroneor,atthemost,twotrainees.Thisway,teamscanallocatesufficient timefromtheirseniormemberstolookafteranddeveloptrainees.Especiallywhenthe Annex3presentstheITsecuritystarterkit:UsefulreferencesforpotentialITsecuritytrainees. Nmap is a security scanner originally written by Gordon Lyon (also known by his pseudonym Fyodor). Nmap is a “Network Mapper”, used to discover computers and services on a computer network.Informationobtainedfromhttp://en.wikipedia.org/wiki/Nmap.Lastaccessed20-09-2009. 8 9
30
2SecurityandITBackground Table 2.2 DivisionofproilesintheITsecurityteam ITsecurityprofiles Technical Governancerelated Securitytester Securitypolicywriter Incidenthandler Securitycommunicator Securityadministrator: – Securitydeviceadministrator – Useridentityandaccessadministrator Securitymonitoringoperator Securitycoordinator Securityteamfacilitator Securitytrainee
teamisjustcreated,werecommendlimitingthenumberoftraineepositions.Asarule ofthumb,notmorethanatraineepositionperfiveteammembersisadvisable. ThisconcludestheinitialenumerationofprofilesforanITsecurityteam.We summarisetheminTable2.2.
Skills and Backgrounds for Team Members We present the magical success recipe for the IT security team: A set of skills, technicalandsofttraits,optimaltobuildanITsecurityteam.Wealsoprovidein thesesectionspossiblebackgroundsfromwhichtheseprofilescouldcomefrom. Informationprovidedhereisveryvaluabletoprepareselectionprocessesthatwill fillpositionsintheteam.
2.5
Technical Skills
Wepresentthelistoftechnicalskillsforeachprofile.Theycanbeincludedinthe descriptionofanopenvacancyfortheteam.Itmaybedifficulttofindrealresumes thatfulfilcompletelythetechnicalskillsmentionedhere.Wesuggestusingthislist asaguidelinetoassesswhattheteamalreadyhaveandwhattheyneedtodevelop, acquireorlearn. Security tester: Hands-on mastery of security testing tools such as vulnerability scanners,networkscannersandpenetrationtestingtoolsisessentialfortheseteam members.Scripting,10programminganddatabaseexperienceneedtoappearonthe listofskillstoo.CandidateswillprobablyhaveagoodknowledgeingeneralITand security principles. Should the latter be lacking, they could surely obtain them whiletheyworkandprovidevaluetotheteam. Incident handler: GeneralITandsecurityprinciplesknowledgewithasufficient levelofdetailaboutnetwork,applicationandoperatingsystemsecurity.Theyneed 10 “Lazy” professionals with scripting skills will automate as much as possible to free up their workingtime.TheyareoptimalcandidatesfortechnicalITsecurityteams.
2.5TechnicalSkills
31
to be able to follow and understand security testers and security administrators. Hands-on knowledge in security tools, network and system forensics, scripting, development(programminglanguages)mustalsobepartoftheirtoolbox.Finally, theyrequirewritingskillstoelaborateincidentreports. Security device administrator: Firewall management skills, basic Unix and MS Windows operating systems knowledge and network concepts are in their list of technicalskills.Theyalsoneedtoshowreadinesstohandlenewuserinterfaces(be itatoken-basedauthenticationserver,aVPNterminator,etc.)andabilitytofollow anoperationalprocedure. User identity and access administrator: They need to offer operating system knowledgeinthemostcommonflavours(MSWindowsandUnix/Linux),abasic understandingofuserrepositoriestechnologies(LDAPandActiveDirectory)and certainknowledgeofthebasicsecurityprinciples(suchassegregationofduties, four-eye principle and least required business privilege). They should be able to writeandtofollowanoperationalprocedure. Security monitoring operator: The portfolio of skills should include a basic knowledgeincommonoperatingsystemsandnetworkingprotocols,abilitytowrite andfollowanoperationalprocedureandunderstandingofthegeneralconceptof eventmonitoringandalertresponse. Security policy writer: Theyneedtohaveabasicunderstandingofthebusinessprocessestakingplaceintheorganisation.Theywillusetheirprocessanalysis,synthesis anddraftingskillstopreparesecuritypolicies.Theywillalsousetheirnegotiationskills toagreeonbasicsecurityprinciples(thattheyneedtounderstandanduse)withbusinessareas.PolicywritersrequirealsoexperiencewithtechnicalITsystemconfigurationandauditprocesses.Currentcomplianceinitiativesinorganisationsrequirethemto knowandunderstandITgovernanceframeworkssuchasCOBIT11andISOstandards. Security communicator: TheyneedtobeskilledontechnicalITsecurityconceptspresent in networks, operating systems and applications, together with general security principlesandbasicbusinessanalysisskills,sothattheycanapplythemintheirengagementsandadvertisethemusingtheirmarketing,publicrelationsandsellingskills. Security coordinator: Theyneedtobuildtheirbusinessandstrategy-settingexpertise ontopoftheirpastexperienceontechnicalsecurityandsecuritygovernancepositions. Business-relatedcertifications,suchasanMBA,confirmingtheirbusinessanalysis skills,wouldbeaplus. Security team facilitator: TheyneedtobeabletounderstandbasicITandITsecurity principlestogetherwithessentialbusinessprocesses.Theteamwilldefinitelybenefit fromtheirabilitytosynthesiseandcomprehendthebiggerpictureintheorganisation.
11 TheControlObjectivesforInformationandrelatedTechnology(COBIT)isasetofbestpractices(framework)forinformationtechnology(IT)managementcreatedbytheInformationSystems AuditandControlAssociation(ISACA),andtheITGovernanceInstitute(ITGI)in1996network. Informationobtainedfromhttp://en.wikipedia.org/wiki/Cobit.Lastaccessed20-09-2009.
2SecurityandITBackground
32
Security trainee: They are students finalising (or just graduated) an IT or an IT security degree. They need to feel comfortable both with the command line and withawordprocessor.
2.6
Soft Skills
Afterpresentingthetechnicalskillstheteamshouldenjoy,weproceedtodealwiththe otheressentialhalfofthemagicalsuccessrecipe,thecollectionofsoftskillsthatneed tobepresentintheteam.Weproposetotalkaboutskillsthattheteamshouldhaveas acollectiveentity.Notallmemberswillhaveallofthembuttheteamneedtoshow themasagroup.Thismeansthatthemajorityofteammembersneedtopossessthem orshowclearsignsthattheycouldadoptthemfollowinggroupdynamics. Attention and attraction to detail: Carefulnessisattheheartofthebasicsecurity principles.Abignumberofsecurityvulnerabilities,especiallyapplicationdevelopmentbugs,comefromthelackofattention,mostlyrootedinlackoftime,when developing applications. Security team members need to observe and react upon thedetailsofanysituationtheyworkon.Thisskillcontributestobuildanimageof qualitydeliveredbytheteam. Drive to achieve: Thesecurityteamneedstocompletetasks.Notonlytostartthem butalsotofinalisethemwithinthetimeframeagreed.Thereisapatentthreatnot tofinishtasks,eitherbecausenewandmoreurgenttasksappearinthehorizonor becauseundertakentasksneedtheconcourseofstakeholders,externaltotheteam, thatarenotavailableorworkwithadifferentprioritylist. Failure acceptance: Unfortunately,someactivitiesperformedintheteamwillfail. Thisisauniversalfactthathappensinallhumanactivities.However,thesefailures shouldbetakenintheteamasalostmatch,thatisall.Thechampionshipcontinues. Teammembersshouldberesilienttofailure.Theyneedtolookforwardandaccept failureasanessentialelementoftheirprofessionallife.Newtasks,newpossibilitieswillappearsoonerthantheythink. Thisishardtoaccomplish,especiallyforITliteratepeople:Itwasbyspending hoursanddaysthattheyreachedarespectablelevelofexpertiseonaspecificoperatingsystem,applicationordevice.Theyhave,consequently,difficultiestofindthe righttimetoleaveoutthatcodethatitdoesnotcompile,theapplicationthatdoes notbehaveasexpected,andsimilarcases.Thisdoesnotmeanthattheyjusthave totryonceandletitgo.Findingtherightbalanceisasignofseniorityandexpertise.ITsecurityprofessionalsworkinginateamunderadefinedactivityplancan affordneithertobeperfectionistsnortobeledbyfrustration.Theycanonlyexerciseperfectionismduringtheirfreetime,andthelittletheywillhave,theywould needtofindpersonalbalanceworking,orenjoying,notinfrontofascreen. Tolerance: ApassionateITsecurityprofessionalwillfindsecuritybreachesfromday1, or even from day 0, before reaching their office, via the Internet. Minutes after
2.6SoftSkills
33
entering the organisation’s facilities, they will observe visitor announcement and escortproceduresandtheywouldalreadystartassessingthem.Thisbehaviourisin theirnature,similartoamedicalvocation.Theylivesecurity.Theyenjoyhavinga security mind and, even better, these professionals are usually well paid for this. However,theyarenotaloneintheorganisationand,asMikePoor12says,“business isinbusinesstodobusiness,notsecurity”.ITsecurityteammembersneedtounderstand this premise and behave accordingly as professionals. Arrogance is not an option.Theyneedtoshowacertaindegreeoftolerance. Given their broad IT expertise, security professionals will interact regularly insideandoutsidetheorganisationwithindividualswithdifferentfieldsofexpertiseandsurelylowerlevelsofsecurityeducation.Theyneedtointeractpeacefully andconstructivelywiththem. Communication: ThisisalwaysabigchallengeamongITpeople.Anexampleof this,avaluableITsecuritygurucanattend,asastudent,a6-dayspecialisedsecuritytrainingandtalklessthantwowordsperdaywiththeirneighbourseatednext tothem.ITsecurityprofessionalsneedtobeabletocommunicatewithothertechnicalandnon-technicalpeople. Self-organisation: Theteamwillhaveabusyactivityplan.Regardlessofthesize of the organisation, human resources devoted to security will probably be overbooked.Membersoftheteamneedtobeabletoorganisetheirtime,resourcesand prioritisethemaccordingtotheteam’sandorganisation’sstrategy,withoutfalling intoundesiredstatesofanxiety.Theyneedtofeelcomfortableworkingindependentlywithoutadailysupervisionthatcanleadtoexcessivedosesofmicromanagement(Image2.3). Continuous learning: IT professionals require a permanent updating process in terms of new products, solutions and technologies appearing in the market and providingvaluetotheindustry.ITsecurityprofessionalsnecessitateacontinuous knowledge recycling, even more than in other disciplines. Reading, studying, sharpeningtheirhands-onskills,followingtop-notchsecuritysitesneedtobean inherentpartofevery“securiteer”(apassionatesecurityprofessional). Awaytoshowacontinuouslearningprocessisthroughsecuritycertifications. Itmaybenottheperfectway,since,outthere,inthejobmarket,thereareexperiencedexam-takersthatcanpassalmostanyexamwithsufficientpreparationbut without sufficient technical knowledge. Preparing a test does not always mean hands-onworkingexperiencewiththetopicoftheexambut,atleast,severalreputablecertificationsguaranteesometechnicalfoundationspresentinthecertificateholder,especiallyifthecertificaterequiresaregularrenewal. Stress-resilience: Itisfrequenttofindplayersintheorganisationwithclearandexpeditegoalsthat,somehow,clashwithbasicsecurityprinciples.Typicalcasesareproject
MikePoorisaSANStrainer,founderofthecompanyInguardians.Hepronouncedthesewords inaSANStraininginIreland,2007.
12
34
2SecurityandITBackground
Image 2.3 Timemanagement,askillnottotakeforgranted
managerscarryingontheirprojectswithverydemandingbusinessrequirementsand verylittlesecuritycontent.AlthoughitisabroadlyacceptedprinciplethatITsecurity shouldbefrontloadeduptotheveryinitialconceivingphasesofanyproject,inpractice, it is still not always the case. In those unfortunate occasions, team members, requiredbyprojectmanagersinlatestagesoftheirprojects,needtobecapabletocope withextraordinarypressureexertedbyprojectstakeholders.Thisisnotbecausethey dislikesecurity,but,simplyput,becausetheyhavedifferentgoals. Securityprofessionalsneedtoliveuptotheirmandate,providingexpertadvise onITsecuritytopics,withoutendangeringtheflowofbusiness,eventhoughsometimesthiscanmeanreportingseriousvulnerabilitiesandwitnessinghow,nevertheless,thesystemgoeslive.Thisisoftenacauseofstress.Thekeypointistokeep businessownersupdatedsothattheycantakeaninformeddecision. Healthy passion: Humanactionsaretriggeredbyemotions.13 A passion is a strong emotion.14 The team need members that are driven by their love to security and theirdesiretoseethingswelldone.Iftheyaredrivenbybothloves,excellent.If not,atleastoneofthose,tosecurityortoquality,mustappear. Versatility and innovation: Aswementioned,ITsecurityprofessionalsneedtohave awidevarietyofskillsand,ideally,theyneedtointroducenewelementsintotheir deliverables,alwayswiththeaimtoincreasethevalueaddedtothebusiness. Thelistofsoftskillscanbeendless.Asmentionedwiththetechnicalskills,this listisusefultoidentifyexistinggapsintheteam.
Damasio(1994),pp.127–165,Chapter7,titled‘Emotionsandfeelings’. Seehttp://www.wordreference.com/definition/passion.Lastaccessed20-09-2009.
13 14
2.7PossibleBackgroundsPresentintheTeam
2.7
35
Possible Backgrounds Present in the Team
Oncewehaveproposedtheoptimalcompositionoftheteamintermsoftechnical skillsandpersonaltraits,wepointoutpossibleoriginsfromwhereteamleaderscan recruittheseprofiles. The first possible background everybody can think of is the vocational one. IT securityteamsfindcandidateswithastrongITbackgroundwhoarepassionateabout security.Theyliveandlovesecurity.Theybreathesecurityandtheycannothideit. Thisisactuallyanadvantagefortherecruiterbecauseitwillnotbedifficulttofind andinspirepassionatecandidates.TheirgoalistoworkinITsecurityandtodevelop professionallyfurtherandfurtherinthisexcitingfield.Ifpossible,therecruitershould firsttrytopopulatetheteamwiththistypeofvocationalindividuals. Weliketocallthem“securiteers”(usingasimilarapproachthaninmarketing withtheinformalandcontemporaryeuphemism“marketeer”15andalsoreminding usoftheancient“musketeers16”).Ourexperienceshowsthatatleastagoodthird oftheteamshouldbepassionate“securiteers”. The second possible background is the traditional IT field. Professionals with strongIThands-oncapabilities,butunfortunatelynotsopassionateforsecurity,are also required for the team. Their knowledge on coding (using programming languages),scripting,commandlineinterfaces,systemadministrationanddatabases definitelyenrichthecollectiveprofileoftheteam. Theartandthesoftskillsofthesecuritycoordinatorcomenowintoplay.These ITexpertsneedtounderstandandapplybasicsecurityprinciplesthattheymaynot be yet familiar with on their everyday activities. The security coordinator has to createtheadequateenvironmentsothattheseseniorITexpertsareinoculatedwith a“clearsecuritymind”whiletheydonotlosetheirgenuineITexpertiseandinitiative.Otherwisetheywillsoonfeelalienatedandtheywillfleefromtheteam.We providesometipstoachievethisenvironmentinthefollowingchapter. Thethirdoriginofcandidatesisthebusiness,theindustrywheretheteamwork. Business specialists, with a deep and extended understanding of business process analysisorsimplywithbroadandwideunderstandingofwhatitisbeingdoneinthe organisation, are potential candidates to complement the technical profiles in the team,speciallyiftheyarewillingtochangeandswimintheITtechnicalpool. Businessprofilesareveryvaluable.Theyactasafirstsoundingboardwithinthe teamwhenasecurityproposal(beitanewsecuritypolicyorprocedure)leaves theteamtoreachpartortheentireorganisation.Theyareoptimalcandidatesforthe communicatorandthepolicywriterprofilesiftheyalsohavesomeITbackground.
Seehttp://en.wikipedia.org/wiki/Marketeer,probablywithsomeremotelinkstothesuperhero Rocketeer,seehttp://en.wikipedia.org/wiki/Rocketeer.Lastaccessed20-09-2009. 16 MembersofamilitaryunitcreatedinFrancein1622withhighspritdecorpsandcan-doattitude. They were made popular by Alexander Dumas’s novel published in 1844. Adapted from http://en.wikipedia.org/wiki/Musketeer.Lastaccessed20-09-2009. 15
36
2SecurityandITBackground
Image 2.4 Buildingthefoundationsofsecurity
WesuggestcheckingintheorganisationwhetheranHRprogrammetoswap positionsexists.Itcouldhelptoattractbusinesspeopleintotheteam.Intermsof numbers,ourproposalissimilartotheonewementionedfortrainees.Onepositionpereachgroupoffiveteammemberscaneasilyproceedfromthebusiness world.
Security Studies Thefollowingsectionsdelveintotheacademicstudiesandalternativepathsthat canleadtomasteringITsecurity(Image2.4).
2.8
Engineering or Management
How can anyone study IT security? Currently there are already several bachelor degrees specialised on IT security.17 This is becoming a real study option.18 Traditionally,studentsfirstaccomplishedanITbachelor’sormaster’sdegreeand
17 Asanexample,theISC2organisationprovidesaresourcelistathttps://resourceguide.isc2.org/ educational.asp.Lastaccessed20-09-2009. 18 SeeforexamplearecentlycreatedEthicalHackingBachelor’sdegreeinNorthumbriaUniversity, UKInformationavailableathttp://www.northumbria.ac.uk/?view=CourseDetail&code=UUSETH1. Lastaccessed9-10-2009.
2.9AlternativePathstoObtainITSecurityExpertise
37
afterwardstheyspecialisedinITsecurityviapost-graduateeducation,eitherinthe formofadoctorateoramaster,orviaon-the-jobexperience,especiallyiftheirend ofdegreedissertationdealtwithanITsecuritytopic. Broadly,therearetwomainschoolsinITsecuritythatcoincidewiththebasic divisionofsecurityprofiles,19technicalsecurityandgovernanceorprocess-related security. The first school requires a deep technical understanding of IT and the secondschoolrefersmuchmoretogovernanceprocessesandinformationsecurity practices.Theidealprovideristheonemergingbothschoolsandcurriculaorat leastofferingsubjectsfrombothworlds.Nevertheless,thisisafirstchoicethatthe potentialstudenthastotake,tofocusonthecommandline,hands-onITsecurity20 or to stress the educational path to sharpen information security procedural and governanceaspects.21ThefirstschoolisalsoknownasITsecurityengineeringand thesecondoptionisknownasinformationsecuritymanagement.
2.9
Alternative Paths to Obtain IT Security Expertise
Similartowhathappensinmostprofessions,therearealternativeeducationalpaths togetITsecurityexpertise.Theobviousoneison-the-jobtraining.ITsecurityis not an exclusive field to university students. Candidates willing to learn IT and showing big doses of soft skills22 and sound analysis and synthesis skills can becomeexcellentsecurityprofessionalsiftheyarementoredduringseveralyears byexperienced“securiteers”. Thereisanalternativeeducationalpaththatitisworthreferringto.Professionals comingfromthephysicalsecurityworld(militaryorlawenforcementforces)constituteaveryvaluableassetforITsecurityprovidedthattheyunderstandandhave expertise on IT or, as a minimum, that they are willing to get comprehensive IT training,comparabletoarespectableITbachelordegree. ThebasicprinciplesusedinITsecurityhavetheirfoundationsonoldersecurityrelateddisciplines23suchaslawenforcement,militarystrategyandfraudprevention.Forexample,principlessuchasdefence-in-depthcomefromancientmilitary strategy.24ITisjustanewfieldofapplication.Theteamwillbenefitfrommembers withphysical-securityexperiencethatarewillingtojointheITfield.Thisisalso whyitisnotraretofindbothteams,ITsecurityandphysicalsecurity,neareach otherinanorganisation’schart.
MentionedinSection2.2. Forexample,visithttp://www.sans.edu/programs/msise/.Lastaccessed20-09-2009. 21 An example, visit http://www.isaca.org/Content/NavigationMenu/Students_and_Educators/ Model_Curriculum/Model_Curriculum_Info_Sec_Mgmt_15Dec08.pdf.Lastaccessed20-09-2009. 22 SoftskillsasmentionedinSection2.6. 23 AsmentionedinSection2.1. 24 Seehttp://en.wikipedia.org/wiki/Defence_in_depth.Lastaccessed20-09-2009. 19
20
38
2SecurityandITBackground
WecanalsofindlinksbetweenITsecurityprinciplesandbiology,andthisisnot only because of the use of concepts such as virus and worms in IT. The threephaseddefenceconceptofprevention,detectionandcontrolusedinbiologyisalso repeatedlyappliedinsecurity.Althoughitisratherunusualtofindprofessionals comingfromnaturalscienceswillingtojoinITsecurity,thisnoteisjusttodiscourage any initial prejudice against any alternative professional field like biology, economics, statistics, sociology, psychology, physics and many more joining the team.Teamleaderscanrecruitthemprovidedthatthereisapatentdeclarationof intentthatITknowledgeisorwillbeundertheirbeltintheshortormiddleterm.
2.10
What to Study
ThesyllabusvariesdependingonwhetherthefocusisonITsecurityengineering oroninformationsecuritymanagement. InthecaseoftheITsecurityengineeringpath,weproposethefollowingsyllabusforanITsecuritybachelor’sdegree.25 Year 1 – IT and business foundations – Risk management foundations – Security foundations Followingwhatwehaveproposedinthesefirstchapters,studentswillneedtohave asolidfoundationonITandbusinessconcepts,riskmanagementmethodologies togetherwiththeabilitytounderstandwhatavulnerability,athreatandariskare. Thisfirstyearwillalsopresentandworkonthecollectionofbasicsecurityprinciplessuchasdefence-in-depth,leastrequiredprivilege,segregationofduties,audit andmonitoring,four-eyeprincipleandsimilarfoundations.26 Year 2 – – – –
Operating systems Networking Applications: Databases, web servers Scripting languages
ThesecondyeargoesdeeperthantheITfoundations.Thismeansthatoperating systems,networkingandapplicationmodelswillbetheheavyweightsofthecurricula.Studentswillgraspthesesubjectsapplyingaverypracticallearningapproach withcasestudies,workshopsandcontinuousassessmentthroughlabassignments.
ArealexampleofthesyllabusofanEthicalHackingBachelor’sdegreecanbefoundathttp:// nuweb.northumbria.ac.uk/live/webserv/modules.php?code=UUSETH1.Lastaccessed9-10-2009. 26 MoreaboutsecurityprinciplesinSections4.2and4.3 25
2.10WhattoStudy
39
Scriptinglanguagesandtheirlinkwiththeuseofweb-basedapplicationsand databases appear already in this second year. Students need to obtain a practical mastery in scripting. They will be automating security actions through scripting duringtheirprofessionallife. Year 3 – – – –
Security testing Intrusion detection Hacking methods Defence-in-depth techniques
Thethirdyearisdealswithsecurityproductsanddeliverablesthatorganisationsare currentlydemandingfromITsecurityprofessionals.Focused,practicalandvalueaddingtopicsthatareincreasinglyrequestedbybigorganisationsandthat,rather soonerthanlater,willalsobedemandedbysmallandmediumenterprises.27 Fortheinformationsecuritymanagementpath,year1couldbesharedwiththe ITsecurityengineeringpath.Theproposalforyears2and3wouldbe: Year 2 – – – –
Information security standards and frameworks Project management Marketing and Security awareness communication Policy and procedure elaboration
Informationsecuritymanagementistightlycoupledwithcorporatecompliance. StudentsneedtofamiliarisewithexistingISOstandardsandindustryframeworks such as ITIL and COBIT. In addition to this, they need to understand and apply projectmanagementtechniquessincethereisanimportantcoordinationelementin informationsecuritymanagement. Aswementionedbefore,describingthesecuritycommunicatorprofile,thereare importantawarenesscampaignstoperformwithinorganisations.Informationmanagersneedtodrivethemasrealmarketingandcommunicationactivities,therefore, theyrequiremarketingandcommunicationfoundations. Thissecondyearalsoincludeslearningpointsonhowtowriteeffective(policy) documentsandproceduresthatcanbeapplied,followedand,aboveall,accepted. Year 3 – Information security management – Measuring and monitoring – IT and corporate governance Thethirdyearforsecuritypolicy-relatedstudentswillprovideaglobalconceptual umbrellaonhowtoreallymanageinformationsecurityandlinkitwithITstrategies
SeeSection10.2
27
40
2SecurityandITBackground
and corporate governance. A key element for this management task will be the constructionofkeyperformanceindicatorstomonitorsecurityeventswiththeaim tomeasureprogressandrisks. Inadditiontothesesubjects,weproposetoenrichthesyllabuseveryyearwith non-IT related disciplines where technical and policy students will be together. Theseareforexample: Year 1 – Theatre workshops – Writing workshops (analysis and synthesis) Securitystudentsneedtobecapableofmakingthemselvesunderstoodbothverballyand inwrittenandaddressingdifferenttypesofaudience(technicalandbusinessliterate). Theywillneedtogetmultiplereferencesandinputsand,inashorttime,understandthe underlying process, share and discuss security views and produce recommendations themselves.Thisiswhytheyneedtopractisetheirsynthesisandanalysisskills. Year 2 – Time management. Resource prioritisation – Music foundations Itisfrequenttoseesecurityprofessionalsdrowningintoendlessto-doliststhatare nevercompleted.Itisalsoveryfrequentforsecurityteamstostartmultipletasks andtoleavethemincomplete.Weproposetoprovidestudentswithastrongfoundationonhowtomanagepriorities,resourcesand,aboveall,time. Why do we include music in this second year? Music28 is a form of art using soundsthatrequiresunderstandingharmonyprinciples.Itisalsoacreativeactivity completelydifferenttoallotherproposedsubjects.Studentswillbenefitofthisbreak andunderstandtheimportanceofachievingharmonyintheirsecurityactivities. Alternatively,wecanalsofindsimilaritiesbetweenreadingamusicscoreand tryingtomakesenseofanencryptedtextwhendoingcryptanalysisorunderstandingapieceofcode. Year 3 – Public relations – Psychology Non-ITproposalsforthethirdyeararemuchmorefocusedonprofessionalrequirements.Securitystudentsneedtounderstandandpractisehowtopresentideasand gather acceptance or even leadership. Finally, understanding some notions of humanpsychologyandhowemotionsandactionsarerelatedwillbenefitstudents intheirprofessionallives.
See http://en.wikipedia.org/wiki/Music. Last accessed 20-09-2009. We know prominent IT “securiteers”playinginabandasahobby.
28
2.10WhattoStudy
41
Studentswouldcontinueafterthese3yearswithayearworkingpart-timeina securityteamwhiletheypreparetheirend-of-degreedissertation.Thiswouldconsistoftwoindependentelements: – Apracticalpaperonasecurityimplementationperformedinthehostingcompany. – Andanentrepreneurialproposaltolaunchanewsecurityserviceorproduct. To finalise this chapter, this radically different syllabus does not exist yet in any educationalinstitution.Weencouragedecision-makersandgovernmentstoallocate resourcestothisideathatwewillhappilycontributetosetitintomotion. Theauthorsareconvincedthatinnovationinsecurityeducationwillprovidebetter valuetoorganisationswitha“business-awareITsecuriteer”:Anindividualcapable ofprovidingsecurityexpertisewhileunderstandingthesurroundingcontext. Chapter 2: Learning points • ITsecurityprofessionalsaregrowinginnumberandimportance. • Twomaintypesofprofilesintheteam:Technicalandpolicy-related. • Therearemoretechnicalprofilesthanpolicy-relatedones. • Theirtechnicalskillsareveryspecialisedandprofound. • Theirsoftskillsareasimportantastheirtechnicalskills. • Therearethreemainpossiblebackgroundscandidatescancomefrom. • Securitystudies:Engineeringorinformationsecuritymanagement. • Therearealternativepathstostudysecurity. • ProposalofanalternativesyllabusforanITsecuritydegree.
Link to MBA Management Models WehaveselectedtwoHR-relatedmodelsthatcouldhelpuswhenforming andgrowinganITsecurityteam: Belbin’s team roles model (by Belbin, 1984) Thismodelproposesthatthereareeightrolesthatinteracttoconstitutean effectiveteam. Group development (by Tuckman and Jensen, 1977) Groups undergo a lifecycle: Forming, storming, norming, performing, adjourning. Seereferences:HardingandLong(1998)andlinks: http://en.wikipedia.org/wiki/Belbin_Team_Inventory http://en.wikipedia.org/wiki/Group_development(Tuckman’sstages1977)
Chapter 3
The Team–Individual Contract
Chapter 3: What will the reader learn? This chapter answers the following questions: • • • • • • • • •
Whatistheteam–individualcontract? Whichbasicprinciplescontainthiscontract? Howcanteammemberscreateandgrowtheirmotivation? Whatistheinternalbalancetheorywepropose? Howcanateambeinharmony? Howdoesmotivationaffectteamperformance? Whydoleadersneedtoassessmotivationandinternalbalance? Whatdoteamleadersneedtocareabouttheteamascoordinators? Hownewcolleaguesjointheteamandformeronesleave?
How to Create Win-Win Deals on the Team–Individual Contract TheITsecurityteamconsistsofanumberofprofessionals.Theseprofessionalsare human beings. Each of them is an individual with their needs, expectations and feelings.Theteamwillonlyperformwellifcertainconditionsforeachofitsmembersaremet.Teammembersneedtofindmotivationtosetsecurityactivitiesinto motionandtoleadthemtoasuccessfulend.Frustrationisapermanentthreattothe team.Theteamleaderneedstoadoptmitigatingmeasuresagainstthisthreat.This chapterproposesawaytochannelteammembers’motivationwhilelookingafter thereasonswhyaprofessionalwouldjoinandworkintheteam.
A.PartidaandD.Andina,IT Security Management: IT Securiteers - Setting up an IT Security Function,LectureNotesinElectricalEngineering61, DOI10.1007/978-90-481-8882-6_3,©SpringerScience+BusinessMediaB.V.2010
43
3TheTeam–IndividualContract
44
3.1
Contract Between the Team and the Team Member
Weconsiderinthischapterthattheteamleaderrole,thepersoninchargeofthe creation and maintenance of the team, plays also the security coordination role described in Section 2.4. Therefore, we assume that the coordinator has a clear interesttosucceedinthecreationandsustainabilityoftheteam.Ifbothrolesfall underdifferentindividuals,everythingweproposeinthischapterappliesalsoto thatscenario,withtheadditionalrequirementthatbothplayersneedtobealigned withtheteam’sobjectivesandneedtosucceed. Eventhoughthetitleofthechapterreferstothecontractbetweentheteamand the individual, in reality the contract is based on a tacit agreement between two individuals: – Theprofessionaljoiningtheteam,thenewcomer. – Andtheleaderandcoordinatoroftheteam.1 Thenon-writtentermsandconditionsthatthesetwoplayersagreeuponwillgive shapetothenatureofthemembershipthatthenewcomerwillhaveintheteam. Harmonyisoneofthenecessaryconditionsfortheteamtoperformasexpected. However,itcanonlyexistifthereiscertainbalanceintheminds,spiritsandbodies of its members. This is the reason why the establishment of the team–individual contract is so paramount.2 Depending on those agreed terms and conditions, the individualwillbeable,ornot,tofindtheirbalanceandthemotivationtoachieve resultswithintheteam. Thecontractwerefertoisfarmorecomplexthanacollectionofwrittenpagesthat two legal entities can sign and be bound to. The typically non-written part of the agreementbetweenthenewcomerandtheteamleaderisasimportantasthewritten employmentcontractsignedbetweentheorganisationandtheemployee.Thenext section suggests some key elements that this agreement should cover. Since this agreementisnotwritten,itisnecessarytocommunicateitrightandavoidaccessory noise.Thegreatertheeffortthattheleaderandtheteammemberdevotetoshapethis agreement,thehigherthechancetokeepandgrowmotivationonthem(Image3.1).
3.2
Basic Terms and Conditions of the Agreement: Creating a Team’s Culture
Humanactionsaretriggeredbyemotions.3Theteamleaderneedstostartoffthe rightemotionsintheprofessionaljoiningtheteam.Theseemotionswillconstitute the initial hotbed for their motivation. They will enable the creation of an entire Thecultureoftheorganisationplaysdefinitelyaroleinthiscontext.SeeChapter8. Mallol(2008),p.72. 3 Damasio (1994), pp. 127–165, Chapter 7, titled ‘Emotions and feelings’. As mentioned in Section2.6. 1 2
3.2BasicTermsandConditionsoftheAgreement:CreatingaTeam’sCulture
45
Image 3.1 Abasiccontractwillsettheteammemberinmotion
team within a professional working environment. We propose a set of basic principlesthatwillnurturetheteam–individualcontractandhencetheywillcreate ateam’sculture. Thefirstprincipleoftheagreementisrespect.Theindividualneedstorespect allotherindividualspresentintheteamand,broadly,intheirworkingenvironment, notonlytheirpeersandcolleaguesintheorganisationbutalsoanyindividualthey needtointeractwithduringtheirprofessionalcareer.Wetakethisconsiderationto the extreme and we propose that they need to show respect towards any human beingtheycommunicatewith.Respectisthebaseforeveryhealthycommunication.Althoughitseemsanintrinsichumanvirtue,itisnotalwaysputsystematically intopractice. Anyshowoflackofrespect,suchasaharmlessshoutatacolleague,orjustan act of disdain, gives exactly the opposite message that security people need to broadcast:Calmnessandsovereignty.Alackoftechnicalsavvinesscanbetreated andimproved.Alackofrespectismuchmoredifficulttotreat,especiallywithina teamthatneedstoworktogetherfromday1on. Thesecondprincipleoftheagreementistransparency.Allteammembersneed tobeabletoclearlygraspteamandorganisationalaspects.Theyallneedtorealise thatteamleadersfavourthosememberswhoworkbetterormakeagreatereffort.4 Anysignofopaquenessonpeopleandteam-relatedtopicswillendangermembers’ commitmentwiththeteam’smission.Itisespeciallyimportanttobringtransparency to any decision made affecting team objectives, strategy and performance.
4
Mallol(2008),p.129.
46
3TheTeam–IndividualContract
Eveniftheydonotagree,teammembersneedtounderstanddecisionsandchanges madeintheteam. Thethirdlegonwhichtheagreementwillrestonisresponsibility.Everyteam memberisresponsiblefortheiractivities.Wheneverateammemberstartsoffatask oranswersacustomerrequest,theyareresponsibleforitssuccessfulending.For example, devoting time and effort to hand over tasks to another team member beforeaplannedleaveorbeforeascheduledtrainingisasimpledemonstrationof thisbasicprinciple.Thisseemstobeanobvioussubject.However,theteamcoordinatorwillneedtoinvestplentyofenergytomakethisprincipleareflexactionin everyteammember’sbehaviour. Challenging realityisthefourthprinciple.Newmemberscanbringfreshand newideastotheteamonlyiftheyareencouragedtoairtheirthoughts,5 concerns and make alternative proposals before they accommodate to the team’s way of working.Thisisoneofthefewnaturalwaysthatteamshavetoevolveandteam leadersneedtolookafterit. Providedthatthesechallengesarerespectful,structuredandfact-based,theteam coordinator should, at a minimum, devote some time alone or with other senior team members to scrutinise the validity and the possibility of implementation of everynewproposal.Iftheteameventuallyadoptsaproposal,thenwesuggestthe “challenger” member be the one leading its implementation supported by the team’s decision-makers. Should the proposal be rejected, then the team leader needstoobjectivelyjustifythereasonofthenon-acceptance6tothe“challenger”.
3.3
What Is Motivation? Herzberg and Maslow
Everyhumanactionhasaspecificdirectionandisframedwithinaspecificbehaviour.Motivationistheinternalconditionthatsetsthatdirectionandactivatesthat behaviour.7Intheteam,theleaderneedstocreatetheappropriateenvironmentfor everyteammembertofindtheirinnermotivation.8
Mallol(2008),p.129. Asanadditiontothetermsandconditionsexplainedhere,RudolphW.Giulianiinhisbooktitled “Leadership”(Giuliani2002)mentionsthefollowingrelevantprinciples: – Firstthingsfirst – Preparerelentlessly – Everyone’saccountable.Allthetime – Surroundyourselfwithgreatpeople – Reflect,thendecide – Underpromiseandoverdeliver 7 Seehttp://en.wikipedia.org/wiki/Motivation.Lastaccessed20-09-2009. 8 Motivation is based on the individual’s autonomy, mastery and purpose. See Dan Pink’s TED conference, available at http://www.ted.com/talks/dan_pink_on_motivation.html. Last accessed 9-10-2009. 5 6
3.3WhatIsMotivation?HerzbergandMaslow
47
A first step towards the creation of that environment, the “hotbed” for the motivation,istheestablishmentofthefourbasicprinciples.9Asecondstepisto acceptthatthis“hotbed”isdifferentforeachteammember.Theartoftheteam leaderwillbetoamalgamatethenecessaryingredientssothatthemajorityofteam membersaremotivated.Itisonlythenwhenwecantalkofmotivatedteammembers andharmonyintheteam. Critical mass10istheminimumnumberofteammembersthatneedtobemotivated for the team to make progress. The task of the team leader is to keep that criticalmassstableandtoincreaseitprogressively. Thecreationofthiscriticalmassisadailyjobfortheteamleader.Theyneedtopreparethemotivation’s“hotbed”.Herzberg11proposeshygienicfactorsandmotivators. Hygienic factors do not motivate individuals but their absence completely demotivatespeople.Hygienicfactorsare,amongothers,salary,administration, management,statusandworkingconditions.Motivatorsmotivatewhentheyare present.Amongothers,someofthemareachievement,recognition,responsibility, advancement,growthandnatureofwork.Hygienicfactorsandmotivatorsarenot equalforallindividuals. Thesefactorsareimportanttoconsiderineveryhumanteamatwork.Theyalso applyinanITsecurityteam.Althoughitisanoverlyrationalexercise,incaseof lackofmotivationinateammember,agoodfirstdiagnosisactionistoidentifyfirst whichtypeoffactorsarepresentandwhichmotivatorsareabsentfortheircase. Hygienicfactorsneedtobepresentbeforeanymotivatorcantriggeraneffective (andmotivated)behaviour. Maslowreferstoahierarchyofneeds.12Hestatesthateventhoughpeoplehave differentneeds,theyallhavesimilarfundamentalneedpatterns.Theyareordered inwhathecalledahierarchyofneedsandhumanbeingsallmovealongthishierarchy in similar ways, depending on the circumstances that surround them. Startingfromthemostbasicmusts(lowerinthehierarchy),tothemostelaborate desires (higher in the hierarchy), we all have physiological, safety, social, selfesteemandself-actualisationneeds.Basicneedsareeasytosatisfyandelaborate needsarenot. It is useful to diagnose where in this hierarchy each team member is located. Withthisanalysis,leaderscanmakeaplantoaddressclearneedssothattheteam membercanworryonlyabouttheirself-esteemandself-actualisationneeds.These aretheneedsweexpectteammemberscansatisfywhileprovidingvaluetotheIT securityteam. These two human resources motivation-related models help to find out the action source for each team member, including the leader and coordinator.
ProposedinSection3.2. Weadapttheterm“criticalmass”usinginnuclearchainreactionstotheITsecurityteamworld. Seehttp://en.wikipedia.org/wiki/Critical_mass.Lastaccessed20-09-2009. 11 Herzberg(1968),pp.53–62. 12 Maslow(1954,1987),pp.90–150fromeditionin1954. 9
10
48
3TheTeam–IndividualContract
Image 3.2 Knowingwhatmotivatestheteammemberopensawindowofopportunity
The action source is an x-ray picture of their motivation’s health: For each individualintheteam,thecurrentstatusoftheirhygienicfactorsandmotivators, togetherwiththeircurrentlocationinthehierarchyofsatisfiedneeds(Image3.2). Asafirststep,theteamleaderneedstofindtheaction sourcestatusforevery team member by talking and interacting with them. Second, the leader together withtheteammemberwillrevisittheaction sourcestatusatleasteveryquarter. Thissuggestedfrequencyappliestoteammembersthatareperformingoptimally. Lowerperformancelevelsrequiremorefrequentaction sourcestatuscheck-ups.
3.4
Internal Balance in Human Beings
Wetendtocompartmentalisealltheactivitieswedoinourlives.WetalkofAlice atwork,AliceathomewithherfamilyandfriendsandAliceasaperson.Weall haveanumberofrolesweplayeveryday.Alltheserolesarerelatedtoadegree that we usually do not suspect. We propose to talk of any act performed by an individual as the result of an emotion coming from three dimensions interacting amongeachothercontinuously:Theworkdimension,thesocialdimensionandthe personalorspiritualdimension. Withtime,ineveryoneofus,thesethreedimensionsneedtobeinbalance.In theITsecurityteam,thismustalsobethecase.Onlyindividualswithabalanced mixoftheirthreedimensionscanbemotivatedandaimatperformingoptimally withinateamonapermanentbasis.
3.4InternalBalanceinHumanBeings
3.4.1
49
The Work Dimension
Itreferstothehumanbeingwithintheirworkingrelationshipcontext.Inthecurrent society, the most frequent case for a large amount of people is that they need to worktopayuptheirbills,keepacertainlivingstandardand,ifpossible,satisfya professionalvocation.
3.4.2
The Social Dimension
Humanbeingsinteractwitheachother.Theyneedtosharetheirvictories,tocelebratethem.Peopleneedsupportfromtheirlovedoneswhentheyfailorhaveproblems. Although there are different degrees of interaction, introvert and extrovert people,theyallaresocialcreaturesthatnormallycommunicatewithbothfamily membersandwithpartners,colleagues,friends,neighboursandanyotherhuman beinglivingwithintheirscopeofdailyinteraction.
3.4.3
The Personal/Spiritual Dimension
Ourbrainhatesthelackofstimuli.13Uptoapointthat,whenwearesleeping,we dreamsothatpartsofourbrainkeeponreceivingstimuliandworkingwiththem. Thewaywefeel,thewayweareandthewayweactaretheresultofauniquemix coming from our genes, our current and past environment and our expectations. Thisiswhateventuallyconstitutesourentityashumanbeings.Ourpersonal/spiritualdimension. SimilarlytoSection3.3,weproposethisthree-dimensionalmodelasauseful tooltoanalysehowtheteammemberscoresoneachofthesedimensionswiththe objectivetoofferabetterwin-windealontheirteam–individualcontract. Inthemiddleandlongterm,imbalancesamongthesethreedimensionsproduce suboptimal results in team members’ lives and deliverables. We need, first, to assesswheretheleaderandtheteammemberareand,second,tore-visittheassessmentonaregularbasis. We propose to use the models presented in Sections 3.3 (motivational factors and needs to satisfy) and 3.4 (internal balance dimensions) in regular interviews betweentheleaderandeachteammember.Inaforthcomingsectioninthischapter, wementionsomeunavoidabletasksthataleaderneedstoaccomplishtolocatetheir team’sactionsource. Nevertheless, every interview is a bi-directional communication process. This means that the leader needs to get ready to share with their team members their Lupien(2007).Videoofherconference.
13
50
3TheTeam–IndividualContract
assessmentusingbothmotivationandinternalbalance-relatedtools.Theinterviewee willonlyconsidertheassessmentprocessfairifbothinterlocutors,leaderandteam member,sharetheirrespectiveanalysis.14
3.5
Identification of Internal Balance Coordinates
After introducing the three dimensions present in every individual’s internal balance,weprovideinthissectionaseriesofprobingquestionsthatassistteamleaderstofindoutthepositionofeachteammemberinthisspace.Thisassessmentof theinternalbalancedisplayedbytheITsecuritycolleagueswillhelptheleaderto findcluesthatcouldeventuallybecomecollaborationthreadsandvalidcommunicationchannelswitheachofthem.
3.5.1
The Work Dimension
TheITsecurityteamleaderneedstohaveananswerforthreequestionsfromeach oftheteammembers.Itisnotadvisabletoposethesequestionsasiftheywerepart ofahiringinterview.Thereistheriskofreceivinganicelyprepared,almoststandard,answerthatwouldbringnothingtotheassessment.Leadersshouldhavepossibilities to obtain an honest answer if they have shown trustworthiness and opennesswhencreatingthecontractwiththeteammember.15 Question a: What do you feel most proud of among your latest work achievements? Anhonestanswertothisquestionprovidestheteamleaderwithvaluableinformationtolocatetheteammemberwithintheworkdimension.Humanbeingstend todevotetheireffortsandattentiontoactivitiestheylike.Withthisanswer,theytell whattheylikeatwork.Theleadershouldtrytoassignorcreateactivitiesthatarein linewiththeanswerstheygive.Asaminimum,theyshouldhaveachancetoapply theknowledgeand/orskillsacquiredandtoliveagainasuccessfulexperience. Questionb:Which latest failure at work you would not like to be repeated again? Theteamleaderneedstoanalysetherepliesandworkhardtoavoidthatthey experienceasimilarscenariowhiletheyarepartoftheteam.Thosescenarioscan have negatives consequences both for the team member and for the entire team. Leadersshouldprovideteammemberswithtoolsthatcouldimprovetheirresilience,
The“Johariwindow”,acognitivepsychologicalcreatedbyJosephLuftandHarryInghamin 1955 in the United States to help understanding interpersonal communications (see http://en. wikipedia.org/wiki/Johari_window. Last accessed 20-09-2009.). Using their terms, we propose leaderandteammemberstolocatethemselvesinthe“arena”perspective(comparedtotheblind spot,façadeandunknown).WestandTurner(2008),p.274. 15 SeeSections3.1and3.2. 14
3.5IdentificationofInternalBalanceCoordinates
51
shouldtheyfaceasimilarfailureevent.Asanexample,theirresiliencecouldget betteriftheytraintheircommunicationskills,theirpresentationskills,theirempathyortheirabilitytoseetheglobalpicture:Doestheorganisationfulfilitsmission andaretheteam’sgoalsalignedwiththeorganisation’sgoals? Question c: It is Sunday evening and you think about the work that is expecting you next morning in the office.… How do you feel about it? The answer to this question tells the leader whether they are happy with the worktheyarecurrentlydoing.Iftheleaderidentifiesunhappinessintheinterviewee, and they are a professional worth keeping in the team, the leader’s priority willbetoarrangeanewcontractwiththem16thatwouldimprovetheirsituationand theirhappinessintheteam,e.g.newtasks,differentdesk,newtrainingobjectives orsimplyabrandnewwayofcommunicationbetweenthemandtheleader. Inadditiontothis,theansweralsotellstowhichofthesetwogroupsofprofessionalstheybelongto: – Thosethatarepassionatefortheirworkattheoffice. – Thosethatexchangetheirtimeandprofessionaleffortjustformoney,statusor evenbetter,tobeabletoworkatwhattheyarereallypassionateforafterleaving theoffice. Everyhumanbeingisreadytodevoteahugeeffortandagreatdoseofattention intoanyactivitytheyarepassionatefor.Passionsaretheoppositetoobligations. AboutthefactofbeingpassionateornotfortheITsecurityjob,mostteamshaveboth typesofprofessionals.Itishealthytohavebothworkingapproachesinthesameteam. LeadersshouldprovidetopeoplepassionateforITsecuritythepossibilitytoexcel and go deeper in their passion. They should encourage them to publish papers, to makepresentationsatsecurityconferences,etc.Forexample,iftheylikecodingand theyhavegoodscriptingskills,theywillwelcomeencouragementtogoanddevote extratimetofindzero-dayvulnerabilitiesinpopularpiecesofsoftware.Theycould afterwardsreportthemfollowingresponsiblevulnerabilitydisclosureprinciplesand theirprofessionalreputationwouldincreaseinsideandoutsidetheorganisation. Thoseprofessionalsthatworkintheteambuttheyarenotreallypassionatefor ITsecurityneedtofeelthattheirhigh-valuedeliverablesareadequatelyrewarded. Forthem,workisameanstobeabletolivetheirrealpassionoutsideworkbutthey alsoneedtoseetheyarehighlyappreciatedintheteam. ThebeliefthatITsecurityteamsneedtoconsistpurelyofITsecuritypassionate membersisunrealistic.Therewillbecriticaltasks,includingactivitiesbasedonstringentproceduressuchasincidentresponse,inwhichnon-passionateprofessionals,given theiremotionaldetachment,canperformevenbetterthanpassionateprofessionals. Bytheway,leadersshouldtrytofindoutthepassion,otherthanITsecurity,that theseteammembershave,beitnature,sports,theatre,arts....Itcanfacilitatetherelationshipwiththemandeventuallyunveilthat,maybe,theyhaveasimilarpassion.
SeeSection3.1.
16
52
3.5.2
3TheTeam–IndividualContract
The Social Dimension
Thisassessmentintendstoidentifythedegreeofsocialinteractiontheteammember feelscomfortablewith.Againweproposethreequestionstoperformaninitial“triage”: Question a: Remember an important academic or business-related occasion you lived lately (e.g. your graduation day, a promotion at work, etc.). How did you celebrate it? The number of people they mention in the answer, their relationship with the individual,thewaytheycelebratedandtheoccasionstheyrememberprovideinput toassesswhethertheindividualisdefinitelyapeoplepersonorratheranintrovert subject with a small but very loyal group of friends or any other type of person betweenthesetwoextremes. Themagicreciperegardingthistopicconsistsoftryingnottomovetheperson outoftheircomfortzone.Consideringtheentireteam,teamleadersneedtobuild aclusterofreasonablydifferentbutnotconflictingsocialbehaviours. Questionb:In your past but recent working experience (or study experience if they currently live their first working experience), how often did you meet with your colleagues outside the office? Thefrequencytheymentionintheiranswerhelpsteamleaderspositioningthe individual within the team’s behaviour spectrum. Leaders should bear all team members’answersinmindwhenplanningsocialactivitieswiththeteamoutside thebusinesscontext. Question c: This question only applies to those team members who have been working with the team for longer than a year. Did you celebrate this year your birthday with your team peers? Smart leaders make an attempt to answer this question just by checking with other senior team members to avoid posing the query directly in the interview, whichcouldbeseenasaclumsyandindiscreteact.Thetellingfactonthistopicis change.Iftheyusedtodoitbeforebuttheydidnotplanitinthelastyear,itcould meanthatnowtheyhaveareason,maybeademotivatingexperiencelivedinthe office,nottodoit.Itistheleader’stasktoinvestigatethis.
3.5.3
The Spiritual Dimension
What keeps our brain busy? To assess this dimension we propose a cognitive techniqueusedinpsychologylatelytohandlegeneralisedanxietydisorder17: The descending arrow.Itconsistsofaseriesofchainedquestionsandanswers,allof themaroundthesourcesofworryfortheindividual.Apracticalexamplewould betostartaconversationwiththequestion“what worries you at this moment?”. ÖstandBreitholtz(2000),pp.777–790.
17
3.5IdentificationofInternalBalanceCoordinates
53
Image 3.3 Leadersneedtolocateeverymemberintheteam’smap
Usingthepreciseanswertothisquestion,theinterviewerasksagain“from this answer, what worries you precisely if that situation takes place?”.Thistechniquecontinuesup toapointwhentheoneortwomostbasicworriesoftheindividualarepatent. Withalltheleadsobtainedbyfollowingthisinternalbalanceassessment,theIT securityleadercanlocateteammembersandthemselvesinthethreeinternalbalancedimensions.AsadvisedinSection3.3,theassessmentisacontinuousprocess withregularcheck-upsessions18throughouttheworkingyear(Image3.3). Teamleadersshouldnotunderestimatetheamountoftime,attention,careand energythatthiscontinuousassessmentdeservesandrequires.Theyalwaysneedto summarisetheinterviewsusingwrittennotesfortherecordandsharethemwiththe teammember.
Behavioural Guidelines for Team Leaders Theleaderoftheteamhasasetofobjectives,amission,toaccomplishwiththe helpofallteammembers.Theleaderaloneisnotabletoaccomplishthemission. Leadersneedtoleadbyexampleand,slowlybutsurely,needtobringteammembersonboardand,althoughsomevoicesarguethattaskscanbeimposed,weare certainthatnowadaysnoactivitycanbebluntlyimposedtoanyprofessional. Impositionworksonceandonlyforaveryshorttimeandteamleadersneedto care for a durable team. This is the reason why it is of great importance for the leader to follow the behavioural guidelines we propose in the coming sections. Checkupsessionscanalsohappenwithoutholdingaformalmeeting.
18
54
3TheTeam–IndividualContract
TogetherwiththeprincipleswesuggestedinSection3.2,theyconstitutetherecipe towardscreatingadependableITsecurityteamworkingforalong-termmission.
3.6
Communication, Communication and Communication
This is requirement number one for the leader. They need to understand how communicationamonghumanbeingstakesplace.Theycommunicatewiththeir voice, body language and words.19 Leaders’ communication acts need to be predominantly face to face and verbal. If their organisational guidelines advise to communicateinwritten,usingmemosoremail,theyneedtofollowthoseguidelines, fortherecord,butalsotodoitverbally. Allofusreceivemuchmorevaluableinformationinafacetofacecommunication.Precisely,whatmakessometimesemailsbemisunderstood,givinggroundfor conflict,isthelackofbodylanguageandvoicefeatures. Whenleaderscommunicate,theyneedtoshowthattheycareastheywouldlike thattheircolleagueswouldcareforthem.20Leadersalsoneedtolettheteamknow thattheyarepersonallycommittedwiththeteam’smissionandwitheveryonein theteam.Theirpermanentcommunicationtaskissharingtheirconvictionthatthe teamwillsucceedwithallteammembers. Leadersshouldrememberthattheyfirstneedtogive,andmaybe,lateron,they receivesomethingvaluableinexchange.21Theirbodylanguageneedstoshowconviction and their voice needs to transpire assertiveness in their communications. Human beings at the receiving end of the communication channel will instantly noticeitifthisisnotthecase.And,whatitisworse,teammemberswillspotitand willactconsequently,beitworkingwithlessinterest(astheleadershowedintheir communication),beitpreparingtheirleaveifthisisapermanentsituation. Introvertindividualscanbegoodteamleaders,buttheywouldneedtofinetune theircommunicationskillsfromday1inoffice.Weproposethefollowingpractical tipstocommunicate: – Preparingthescriptbeforehand,evenifitisonlyamentalsketchofwhatthe messagewillbe. – Rehearsingthepitchinfrontofamirror(orusingavideocamera).Realitycan becruel. – Keepingmessagesshortandtothepoint. – Avoidingboredomamongtheaudience. – Providinganchorswithexamplesorvisualaidstoreinforcethemessage. – Aboveall,avoidingmonologues.Theyarethemainsourceofjokesamongteam members. 19 AccordingtoAtkinson(2005),Chapter11,figuresare:Toneofvoice:55%,bodylanguage:38% andwords:7%. 20 Mallol(2008),p.202. 21 Mallol(2008),p.202.
3.8AdoptionofPreventiveMeasuresfortheTeam
3.7
55
Time Availability for the Team
Teamleadersandcoordinatorsinteractmanytimesadaywithteammembers. It is on them to foster and to reward the behaviour that favours face to face interaction against email exchange. The latest research studies performed on groupdynamicsshowhowhumanbeingsfeelcomfortablebeingpartofgroups consistingof5to8people.22Iftheteamhasahighernumberofmembers,itis time to create mini teams within the team, probably with different but synchronisedleaders. Itispossibletopostponecontactswithteammembersfor1or2daysifthere isanurgenttopicrequiringtheleader’sattention:AnITsecurityincidentorimminentproblemswiththebudget.Thislackofrapportwiththeteamshouldnotbe longerthanaweek,oreventhelengthofsomeholidays.Whentheleaderisback inbodyandmind,theyneedtotakeupagainthepersonalcontactwiththeirteam members. This requires the leader’s attention and time, and it has priority over readingemails. Leadersshouldacknowledgethataleadershiprolerequiresapredominanthuman contactelementeveryworkingday.Thisisprobablydifferentfromtheirprevious positioniftheycomefromatechnicaljobinwhichtheirobjectivesdependedmostly ontheirtechnicalknowledgeandnotonotherpeople’sperformance.
3.8
Adoption of Preventive Measures for the Team
Apartfromusualbusinessrelatedfollow-upmeetingswithteammembers,leaders needtoplanfrequentmotivationandinternalbalanceassessmentsessions.23They needtodevotesufficienttimetotheseassessments.Onaverage,thefirstsessions could take longer than 60 min, and, once everyone is familiar with the process, between40and50min. Everyteammembershouldhavetheopportunitytotalktotheleaderprivately every8–12weeks.Thisfrequencywillbeinverselyproportionaltothedegreeof seniorityandsynchronisationalreadyexistingbetweeneachoftheteammembers andtheleader. Mastering these sessions is a complex skill that the leader needs to acquire. Teammembersandleadersshouldbenefitfromeachfollow-upsession.Members needtofeelthatsessionsaretailor-madefortheirparticulartraitsandleadersneed to receive valuable input to know their team better. The threat to mitigate is the possiblebeliefthatthesemeetingsarepartofanunfairwaytheleaderhastoobtain privilegedinformationtomicromanageeverysingleaspectoftheteam.
VanVugtetal.(2008),pp.182–196. IntroducedinSections3.3–3.5
22 23
56
3TheTeam–IndividualContract
Finally, leaders should be aware that sharing an evening or a weekend, every now and then, with the team, outside a business context, can provide them with valuableinputonhowtheyfeelandwhatisworryingthem.Actually,assessment sessionsafterasocialeventaremucheasiertosteer.Thesesocialgatheringscontributetocreaterapportbetweentheteamandtheleader.Theleaderwillbeseenas muchmoreapproachableandhuman.
3.9
Proposal of Mentoring Services
Theleader’sexperiencebothasateamcoordinatorandasanITprofessionalcan beveryusefulfortheprofessionaldevelopmentofmostteammembers.Proactive leaders need to inoculate the desire for a continuous professional and personal growthamongteammembers. However,notallmemberswillappreciatethattheircoordinatorwouldpropose areasforimprovement,orsimply,todevelopfromscratchbecausetheyjustdonot havethoseskills.Therefore,toavoidconflictingviews,leadersshouldsimplyoffer theirmentoringservices,withoutimposingthem,tothosemembersthataretruly interestedinreceivingthis,andsometimesnot-nice-to-hear,input. Typicalexamplesofvoluntaryandadvisorycareerdevelopingservicesare: – – – – –
Acquiringforeignlanguagesreading,speakingandwritingskills. Tipstoimproveslidesusedinpresentations. Adviseonhowtopresentinpublic. Waystoprepareandpresentaresumeandajobinterview. Specialised IT security fields in which the team member could excel if they makeanextraeffortsuchasforensics,malwareanalysis,vulnerabilitytesting, securecodedevelopment,etc.
Usualcandidatesthatwillbenefitfromtheseservicesaretraineesandjuniorprofessionalswiththedrive,willandtimerequiredtodevelopfurther.Afterall,coming acrossformerteammembersandconfirmingthattheyhaveprogressedpersonally andprofessionallygivesteamleadersafeelingofusefulnessandrealisationand, whynot,alsosomedosesofhealthypride.
3.10
Care but No Intervention
Everyhumanbeingisunique.Weallperceiverealitydifferently.Conflictingviews, verbal collisions and clear disagreement will appear among team members. All teammembersneedtoacceptthisreality.24Theleader’staskisnottotrytosolve
Chapter6providescomplementaryinputonthisfact.
24
3.11DesignofEasyProcessesandAssignmenttoWisePeople
57
Image 3.4 Leadersneedtomonitorcloselytheirteam
everysinglemisunderstandingcreatedwithintheteambuttoveilthattheprinciples mentionedinSection3.2arealwaysrespectedbyallteammembers. Theleader’sinterventionisrequiredonlyinthoseepisodeswhenateammemberhasavalidreasontoasktheleadertotakepartonitorwhenitispatentthatthe basicprinciplesofrespectandcoexistencehavebeenneglected(Image3.4).
3.11
Design of Easy Processes and Assignment to Wise People
Followingstepswithinanyprocessisnotataskthathumanbeingsperformwell andateaseunlessthereareacertaindegreeofinterestandacertainextentofrepetition. This is why important processes happening at critical moments, such as a planetaking-offandlanding,areperformedfollowingchecklistsandagreedprocedures.Pilotsfollowpreciselythesechecklistsoneveryoccasion. WithinITsecuritytherearealsocriticalprocessesthatteamsneedtoperform withhighquality,beitrespondingaccuratelytoasecurityincident,providingthe requestedaccessrightstoanend-userorreactingtoasecuritymonitoringalert. Complexity will arise in reality from unexpected sources. Processes in place shouldnotaddontothiscomplexity.Itistheleaderandtheirseniorcolleagues’ tasktodesignandestablisheasy-to-followprocessesandtoplacewiseprofessionalsinkeypositionstofostertheirimplementationwithintheteam25withtheobjectivetomanageencounteredcomplexity. Mallol(2008),p.202.
25
58
3.12
3TheTeam–IndividualContract
Public Praise Sessions and Private Criticism
Everybodymakesmistakes.Teammembersandleaderswillalsomakeplentyof mistakes.Everyoneneedstoacceptmistakesandfailuresmadebytheteam.The leader’ssmartmoveonthistopicwillbetomaketheteam,asacollectiveentity, andteammembers,asindividuals,learnfrommistakes. The problem is not that the team make the same mistake twice or even more times.Teamleadersalwaysneedtosupporttheabilitytorectify,learnfrommistakes and show understanding to all team members. The real issue arises when mistakes are accepted as a common way of working and even institutionalised withintheteam.Theleader’sroleistoavoidthatsituation. Therewillbeoccasionswhentheteamleaderneedstohaveaseriousconversationprivatelywiththeauthorofamess.Leadersshouldobjectivelycriticise,always basedonfacts,notonpersonaltraits.Inordertobeabletodemandachangeof action for future occasions and obtain the team member’s commitment, leaders needtotakewrittenrecordoftheagreedmitigatingandimprovingmeasuresand thedatewhenafollow-upsessionwilltakeplace. Theothersideofthecoinismuchmorepleasant.Therewillbesuccessesto celebrate within the team. When there is a clear achievement thanks to a team member’sdecisiveactionandresolution,theleaderneedstopraisetheminthe next group meeting and add a basic learning point in order to make the team aware that similar efforts and behaviours will always be rewarded during their leadership. Rewardscantakemultipleforms,fromamoreflexibleworkingschedulearrangement(dependingontheorganisation’sguidelines,leavingearlyoncertainoccasions orallowingtele-workingduringvalleyseasonscouldbetwoeffectiveexamples)to fullsupportforateammembertoobtainawishedtrainingmeasure.Leadersshould not underestimate nor forget the need to reward their best performing members. Beingforgetfulonthistopiccanleadtoageneralisedlackofmotivation.
3.13
Support of Team Members
AsstatedinChapter1,ITsecurityprofessionalskeepacomplexrelationshipwith the organisation they work for. They should make the organisation’s decisionmakersawareoftheriskstheyrunandprovideadviceonrisk-mitigatingmeasures whenactuallythebasicnatureofeverybusinessistakingrisks. Eachteammemberrequirestheleader’ssupportinanypotentialconflictwith colleaguesoutsideITsecurity.Thissupportisapre-requisiteforthecontinuityof theleader. Iftheteamleaderfindsthatsomesecuritymeasuresproposedbytheteammemberareactuallygoingtoofarand,giventhenatureoftheirorganisation,theyreally
3.14NewTeamMembersJoiningtheTeam
59
hampercriticalbusinessprocesses,itistheleader’stasktomaketheteammember see the gap between their theoretically impeccable stance and the organisation’s reality.However,leadersshouldalwaysperformthisSocraticexerciseprivatelyand notinfrontofothercolleaguesoutsidetheITsecurityteam. Theleader’sfullsupporttotheteammember,speciallywhenworkingparties externaltotheteamarepresent,iskeytoshownon-ITsecuritycolleaguesthatthe leadercaresabouttheirteammembers’work.Fullsupportdoesnotalwaysmean tostartwithanopenconfrontationagainsttheotherparty.Agoodexampletoshow non-conflictingsupportcanbeappliedtothosechainsofnastyemailsinwhichone oftheteammembers’proposalischallenged,butnotbasedonfacts,byaproject managerorsomeoneinthemiddlemanagementlayerwithintheorganisation,with simplydifferentobjectivesthantheITsecurityteam. Even though the leader’s first reaction (coming from the reptile side of their brain)wouldbetofirebackwithabluntemail,itiskeythatleaderslettimetothe rationalevolvedsideoftheirbraintosimplyrelax,sleepoverthetopicandadvise the team member not to embark on those endless time-consuming email chains. EffectiveITsecurityleadersshouldencouragetheuseoftheemailexclusivelyto conveyfactsandtoappreciateacolleague’swork. Some of the conflicts affecting the team will disappear without the need to applyanyenergytothem.Theywillsimplylosemomentumorbecomeobsolete. Some others will stay and will require the leader’s attention. We recommend high doses of meditation and strategic fact-based decisions to solve or just to skipthem.
Resourcing the Team 3.14
New Team Members Joining the Team
Inthischapterwehavesuggestedwaystooptimisetherelationshipamongteam members and the leader as a necessary foundation to obtain high-value performance. The proposed recipe started with some basic co-existence principles and continuedwithassessmentsbasedonmotivationaltheoriesandanattempttocomprehendbalanceinhumanbeingsbasedonthreedimensions. Giventheimportanceoftheleadershiprole,wehavesuggestedasetofguidelines for the team leader. The last element to introduce in this team-individual puzzleishowtoidentifypotentialnewteammembers.Theselastsectionsofthe chapterdealwithkeypointstoconsiderwhenwelcomingnewteammembersand whensayinggoodbyetocurrentteammembers. It is healthy to keep a flow of professionals joining and leaving the team. Newcomers’ motivation is unique and the experience leavers gather outside the teamisvaluablefortheentireteam,shouldtheyreturn.
60
3.15
3TheTeam–IndividualContract
Profile Preparation for a New Team Member
Apre-requisitetowelcomeanewteammemberintotheteamistodesignthepositiontheyaregoingtooccupy.Thedesignincludesthefollowingaspects: 1. Activitiesthenewcomerwillperform. 2. Lengthoftheengagement. 3. Technicalskillsrequired. 4. Softskillstobeneittheteam’sbalance. 5. Nameofthementorandguidethroughtheorganisation. 6. Physicallocation. The main source of answers for questions 1–3 is the strategic plan26 the team follows.Points4–6refertotheoverallresultsoftheassessmentexercisesproposed inearliersectionsofthischapter.
3.16
Advertising the Vacancy
Once there is a definite design of the profile, the team needs to advertise the vacancy.Ourrecommendationistospreadthewordthrougheveryteammember’s formalandinformalnetworks:Professionalcommunities,formercolleagues,formermanagers,formerteachersandprofessors,relatives,neighbours,etc.‘Wordof mouth’cansavetimeandpotentiallyprovideanoptimalcandidate. Goodprofessionals,likegoodstudents,leaveahalobehindthemthatpeoplerememberandprofessionalcommunitiesarenotsonumerous.Thereisalwaysachancethat someoneintheteamknowsapersonwhocouldmatchtheposition’srequirementsand thatpersonisavailableor,simply,willingtotakeupanewchallenge.Chapter9inthis booktalksabouttheintricaciesofnetworkinginsideandoutsidetheorganisation. Thesecondwaytoannounceitisbypostingthevacancyinreputablefora.These varyfromgeneralpurposemassnewspapersorprofessionalmagazinestoonlineIT securityjobsites.Theorganisationitself,insideandoutsidetheITdepartment,is also a valid source of applicants, especially considering the learning points proposedinChapter2.
3.17
Assessing Applications: Three Basic Principles
The effort required to go through all applications received depends on the number and quality of the applying candidates. If there is no budget planned to advertise the position and team members are not ‘sufficiently networked’, Chapters4and5provideadditionalinputonstrategicplans:WhatanITsecurityteamneedsto doinanorganisationandhowtodoit.
26
3.18PreparingtheSelectionProcess
61
maybe no application is received or just a handful of them that do not really meettherequirements. A golden principle is not to be satisfied with non-matching applications. The temptationtoquicklyfillupthevacancyandfinalisetheselectionprocessisattractive but experience shows that this type of non-matching candidates distract the teamandrequireadditionalattentionandguidancefromtheleaderandothersenior teammembers. Itispreferabletowaitafewweeksandusethesamechannelstoadvertisethe vacancy again. Maybe this time the right candidates would be available and attractedbytheoffer. Asecondprincipletofollowistopickonlysomeonethattheteamneeds,not someone,withnoskills,thattheleaderthinkstheyneedthepositionthemost.This typeofnobleactsendangersthegoodspiritandworkingtermscreatedwithinthe team.Onthelongrun,thesecandidatesprovetobedetrimentalfortheprofessional developmentoftheteammembers. Finally,athirdprincipleisnottoovergrow.Contrarytocurrentbusinesstrends, thatvalueimportanceandrelevanceofgroups,andspecially‘organisationalweight’ ofmanagers,purelybasedonheadcountfigures,effectiveITsecurityteamscanonly growatacertainslowpace.Thedegreeofcohesionrequiredandnumberofshared goalsinanITsecurityteamdoesnotconnectwellwithexcessivegrowthrates. Wesuggestthatsecurityteamsshouldnotgrowmorethan30%inheadcountper year.Highergrowthfiguresmeanthatanewteamiscreatedandhence,anentire teambuildingprocess,startingfromstep1,willberequired.
3.18
Preparing the Selection Process
Theteammemberwhowillmentorandguidethenewcomerthroughtheorganisation leadsthepreparationoftheselectionprocess.Theselectedmentor,togetherwithtwo orthreeseniorteammemberswillformtheselectionpanel.ThepresenceofacolleaguecomingfromabusinessareaorfromadifferentITteamisalsorecommendable,eveniftheyonlyactasobservers.Giventhecentralrolethattheteamleader playsinsettinguptheteam’sculture,27theyneedtobeoneofthepanellistsinthefirst processesandforthosevacanciesdesignedtobeoccupiedbyseniorprofessionals. Theselectionpanel,asacollectivebody,shouldhavetheskillsdemandedinthe vacancy.Maybethisisnotthecaseonaspecialisedtechnicalaspect,butatleastthe panelneedstohaveasufficientdegreeofknowledgetoidentifyvalidanswersto thetechnicalquestionsposedtotheinterviewee. Oncetheselectionpanelisformedandthecandidatespotentiallymatchingthe requiredcriteriahavebeenshort-listed,thefuturementorshareswiththerestof thepaneltheselectionprocessthattheyhavedesigned.Themoreeffortandcare
SeeSection3.2.
27
62
3TheTeam–IndividualContract
frontloadedinthepreparationoftheassessmentprocess,thegreaterthepossibility tosucceedintheselectionofthenewteammember. Theassessmentprocessshouldverifythesepoints: – Requiredtechnicalskillsarepresentinthecandidate.Asaminimum,ifthe newcomerdidnotshowmasteryofthoseskills,theselectionpanelneedsto beconvincedthatthenewcomerisinthepositiontoacquiretheminashort period of time, given their proven IT background and their demonstrated learningskills. – Softskillsrequiredtoworkintheteamandtokeepupwiththeteamspiritare presentinthecandidate.Althoughspecifictechnicalskillscanbequicklylearned if there is a strong technical foundation, sufficient analytical skills and a great dose of willingness, soft skills are much more difficult to improve in a short periodoftime.Thoughpossible,wedonotrecommendthissoftskilllearning processtakingplacewithintheworkingenvironmentofanITsecurityteam. – Thecandidate’sabilitytoanalyseandsynthesisearesufficienttofillthevacant position.
3.19
Elements of the Selection Process
Thissectionintroducesasetofexampleteststhatcouldbeusedinselectionprocesses.Theydonotpretendtobecomprehensivebuttheyconstituteahandytoolbox,alreadyputintopracticeforselectionprocesses.
3.19.1
Day 1 Test: Phone Interview
After the application filtering process, the panel runs a phone interview with a handfulofshortlistedcandidates.Eachcandidateisgivena30–45minslotforthe phoneinterview.Schedulesareorganisedseveraldaysinadvance.Thisgivesthe interested candidate the chance to gather information about the organisation. Equally,werecommendgatheringintelligenceonthecandidateusingtheInternet tosearchfordetailspresentedintheirresume. Theentireselectionpanelispresentandtheinterviewconsistsofthesameelementsforallshortlistedcandidatestoensureobjectivity.Thefuturementorleads theinterviewandtherestofthepanellistsalwaysparticipateaskingclarifyingquestions.Anelementinthemissionoftheinterviewleaderistomaketheinterviewee feel comfortable during the entire conversation. The skeleton of the phone interviewcouldbethefollowing: (a) Tostartwith,thecandidateisaskedtowalkthroughtheirresumein3–5min. Thepanelassessestheadequatelengthandthecontentqualityoftheanswer. Usually,themainpointsmentionedinthissummaryaregoodleadstoestablish agoodunderstandingchannelwiththecandidateafterwards.
3.19ElementsoftheSelectionProcess
63
(b) Thefollowing5–7minaredevotedtoclarifywiththecandidatethosepoints thatseemsomehowobscureorconfusingfromthereadingoftheirresumeor fromtheirintroductoryexercise. (c) The interview continues with a description made by the future mentor of the vacantpositiontosetthesceneandtoconirmthecandidate’srealinteresttoit. (d) Allpanelmembersnowproceedtoaskaseriesoftechnicalquestions.These questionsarepreparedandagreedbeforehandamongallpanellists.Questions andanswersaredistributedtotheentirepanelbeforetheinterview.Wesuggest toraisetwotypesofquestions: – A few questions that the candidate can answer with a 3–4 min speech if required. – Abatteryofshortquestionswhoseanswerisonlyaword,asentenceora briefreferencetoaconcept.Thesequickquestionsshouldbeaskedatafast pace.28Theyaredesignedtofindoutwhethertheseareconceptsthecandidatemastersandusesonadailybasis. (e) Theinterviewgoesonwithtwoorthreesituationalquestionstotrytoindout aboutthecandidate’ssoftskills.Thesequestionsaresetinthepasttenseand theylookforconcreteexamples.Whenthecandidatetalksaboutaspeciicepisodeismuchmoretellingthanwhentheyprovidegenericstatements.Thisis onlyaninitialandrudimentaryattempt.Itiseasyforcandidatestomakethepanel believethattheyareterriblynicepeople.Nevertheless,thesequestionsarea usefultooltodiscardclearcasesofarrogance,lackofteamspirit,lackofcommitmentorsimplylackofunderstanding.Examplesonthesequestionsare: – Tell the panel how did you react that recent past day when you were the last team member leaving office on a Friday evening and just when you got out of the building, your top manager came across you and asked you to amend a firewall rule in production. If you have not experienced this situation, imagine you did. How would you feel about it? – How did you recently deal with a working colleague that always tried to escape from real work? In several occasions you did cover up their mistakes claiming authorship in front of your manager. If you did not live this episode, how would you react if you would? (f) Finally,thepanelleadergivesthecandidatetheopportunitytoaskthepanel aboutthejob,theteamandtheorganisation.Motivatedcandidatesusetoask smartquestionsinthissectionoftheinterview. (g) Thephoneconversationconcludeswiththecommitmentfromthepanelleader torevertbacktothecandidate,preferablybyphoneratherthanviae-mail,on aspeciicdatewiththeresultoftheassessment.Itisimportanttofulilthis commitment.
Withenoughtime,somecandidatescouldmakeuseofInternettoolssuchasGoogle.
28
64
3TheTeam–IndividualContract
3.19.2
Day 2 Test: Tests and Face to Face Interview
Asubsetofthecandidatesinterviewedthroughthephonewillreachthesecondpart oftheselectionprocess.Thistimecandidatescometotheteam’sfacilitieswhere theytakeaseriesofwrittentestsandafacetofacesessionwiththeselectionpanel. Weproposethreeexercises.Eachofthemwithatimelimitof45min: (a) Airstwrittenexerciseassessesthecandidate’sreactiontoaninformationlood. Currently,itispartofeveryITjobtoresearchonatopicusingpublicdatabases andresources,suchastheInternet,andtoconstructaninformeddecisionbased onad-hocinformationproducedoutofilteringthroughvastamountsofdatain averylimitedtime.Thepanelcantakethechanceofthisexercisetodealeither with a very speciic technical topic or with a non-technical topic that could serveasavalidexcusetoafterwardsscanthecandidate’sviewsondetermined softskillsorhumandynamics.Inbothcases,thepanelshouldprovidethecandidatewithvastquantitiesofdataandaskthemtomakesenseofthemwithina shorttime. (b) Thesecondexerciseconsistsofacasestudy.Thecandidatehastochooseone outofthreedifferentproposalsrelatedtothetechnicalcontentoftheposition. Allpanelmembersknowthecasestudyandthepossibleanswersinadvance. (c) Thethirdexerciseconsistsofafacetofaceinterviewwiththeselectionpanel. Theygivethecandidatetheopportunitytoclarifytheiranswersgiventhroughout the irst two parts of the written exercise. The selection panel normally requiresabout30mintogathertogetherandassessthecandidate’sanswers. Duringthistime,werecommendthatsomeonefromtheteam,atraineeora juniorprofessional,looksafterthecandidateandoffersthemsomesmalltalkto relax.Afterwards,smartpanelleaderswouldalsoseekfeedbackfromtheteam member minding the candidate. Day 2 tests end with this clarifying session. The panel leader informs the candidate about future steps of the recruitment process.Thesearesomeusefulquestionsforthepanelinthisinalsessionwith thecandidate: – What is your impression about the entire selection process? – How did you deal with a permanent lack of time to answer exercises today? – In your view, does this assessment process reflect the best of your profile? Is there anything you wish to add? (d) Werecommendpanelmemberstoholdabriefwrap-upsessionrightafterthe interviewtoshareimpressionsaboutthecandidate. Afterinterviewingallpre-selectedcandidatesandscoringtheiranswers,thepanel memberswillgathertogetherandsharetheirrankingofselectedcandidates.The panelleaderwillcontactthefirstpreferredapplicanttoconfirmtheirfinalinterest intheposition.Shouldtheofferbedeclined,thenthepanelleaderwillcontactthe secondpreferredcandidateandsoonandsoforth.
3.20HowtoSayGoodbyetotheTeam
3.20
65
How to Say Goodbye to the Team
Itishealthyfortheteamtoletmemberscomeandgo.Teammembersneedtostay in the team because they like what they do and what they experience and not becauseitisdifficulttoleavetheteamortofindanotherjob.Thesamewaynew professionalsjointheteam,currentmembers,soonerorlater,someofthem,dueto promotion,personalneedsordifferentcareerdevelopmentpaths,willleave. Thelearningpointhereisthattheworldisverysmall,andspeciallyaprofessionalcommunitysuchasITandITsecurity.Itisverylikelythatprofessionalpaths willconvergeagaininthefuture.Teamleadersshouldavoidcriticismwhenateam memberleaves.Itistheidealoccasiontooffertheleavingcolleaguethepossibility toairtheirimpressionsontheexperiencesgatheredduringtheirworkingtimein theteam,theproposalstoimprovetheteamandalso,ifthesituationallowsforit, theirexpectationsonthenewjob(Image3.5). Theywillprovidevaluableinformationfortheteamleaderandforthoseremaining in the team. The script to follow in this exit interview is simple: The leaver organisesameetingwiththeleadersomeweeksbeforethedepartureinaneutral place,ameetingroomwherebothwillbecomfortable,notintheleader’soffice, withsufficienttimeforthechat.Itisconvenientthattheleadertakesnotesinorder nottoforgetkeypointsoftheconversation.Inoptimalcases,theteamleaderloses acolleagueand,atthesametime,winsafriend. Thissectionfinalisesmentioningthatteamleadersalsoleaveteams.Manyreasons can lead them to that decision (family, career changes, new opportunities, etc.).Ouradvicetoleadersisthattheyshouldonlyleavewhentheyfeelthatthey havefinalisedtheirmaintaskandnotearlier(e.g.creatingtheteam,streamlining
Image 3.5 Professionalpathsareinextricable
66
3TheTeam–IndividualContract
theirprocesses,re-invigoratingteammembers,etc.)sothattheycancloseanentire chapterintheirprofessionalcareerandbeproudofit.Nevertheless,everyleader shouldpreparetheirsuccessionfromthefirstdaytheytakeuptheirposition.We suggestteamleaderstoidentifyseveralpotentialsdeputiesandprogressivelyassess themandpreparethemtotakeupmoreresponsibilitieswithintheteam. Chapter 3: Learning points • • • • • • • • • • •
Theteam–individualcontractsetsthecontextforeveryteammember. Respect,transparencyandresponsibilityarebasicprinciples. Everyteammemberhastheirmotivationalfactorsandneeds. Weallhavetobalanceourwork,socialandspiritualdimensions. Teamharmonyrequiresinternalbalanceinindividuals. Onlymotivatedteammembersdeliverlastingresults. Theassessmentoftheindividualhelpstheleadertobuildtheteam. Teamleadersneedtocommunicateandactbyexample. Thegreatertheefforttoselectnewcomersthebetterchancetosucceed. ITsecurityteamsshouldnotovergrowrapidly. Leadersshouldwelcomenewcomersandthankleaversproperly.
Link to MBA Management Models InSection3.3wehaveusedtwoHR-relatedmodelstoassesstheindividual’s motivationandneeds. Herzberg’shygienicandmotivationalfactors(1968). Maslow’shierarchyofneeds(1987). SeereferencesprovidedinSection3.3.
Chapter 4
What to Do: The IT Security Roadmap
Chapter 4: What will the reader learn? This chapter answers the following questions: • • • • • • • •
WhatdoITsecurityteamsneedtodo? Whichprinciplesshouldteammembersfollow? Howvulnerableisthecustomerorganisation? Whataretheorganisation’sthreatsandwhoaretheiradversaries? HowshouldITsecurityteamsprioritisetheiractivities? WhichsecurityservicesshouldanITsecurityteamprovide? WhichteamsexistwithintheITsecurityteam? WhichactivitiesshouldITsecurityteamsavoid?
Chapter1hasdealtwiththemissionofanITsecurityteamthatprovidesrealvalue tothebusiness.Chapter2hasdescribedthetechnicalandsoftskillsthattheteam requiresandChapter3hassuggestedapossibleway,anchoredinmotivationand internalbalance,tomakeateamoutofagroupofprofessionals.Chapter4provides guidance upon the specific activities to perform in the team and Chapter 5 will complement these learning points with practical recipes on how to accomplish theseactivities.
A.PartidaandD.Andina,IT Security Management: IT Securiteers - Setting up an IT Security Function,LectureNotesinElectricalEngineering61, DOI10.1007/978-90-481-8882-6_4,©SpringerScience+BusinessMediaB.V.2010
67
68
4WhattoDo:TheITSecurityRoadmap
Founding Activities on Principles 4.1
IT Security Teams Should Not Occupy Their Days Mostly with “Fire Alerts”
Nowadays IT security teams’ working days, especially in teams with a recent creationdate,oftenresemblethoseofafirebrigade:Theyarereadytoengageinany security incident or topic that unexpectedly affects the organisation. The trigger couldbearealsecurityincident,andthisiscertainlyavalidreasontojumponit, butfrequentlythesuddenactionrequestcomesfromarelentlessmanagementlayer orprojectteam,especiallyfewdays,orevenhours,beforetheirinitialgo-livedate. Itispossibletomaintainthishecticapproachinateamforseveralweeksoreven months.However,inthelongrun,themandateandcontinuityoftheITsecurity teamareindangerwiththis“firemenbrigade”wayofworking.This“modusoperandi”resultsintomanyunsatisfiedcustomersandverysoonintofrustratedteam members: They feel themselves overloaded, discontent and under an extreme degreeofpressureexertedbytheircustomersandmanagers.Eventually,theirstress makes them frequently sick and it even invites them to leave the team and the organisation. Wehavehintedsmartwaystoavoidthisreality.1 The following sections of this chaptergodeeperintotheactivitiesonwhichanITsecurityteamneedtofocus. A team witha smart portfolio of activities soon produces visible outputs and let every decision-maker in the organisation understand that they would obtain a highervalueiftheITsecurityteamworkfollowingaroadmapratherthanasudden requestofquestionableimportance.
4.2
Basic Security Principles: The Foundation of the IT Security Activities
Chapter2includestheconceptof“securityprinciples”asapieceofknowledgethat IT security profiles require2 and mentions some of them such as segregation of duties,four-eyeprincipleandleastrequiredbusinessprivilege.3 Apragmaticwaytoselectwhattodointheteamstartswiththeenumeration of the basic security principles that an IT security team should follow. The list presentedhere,thoughnotcomprehensive,coversmostoftheaspectstoworkat. There are occasions when IT security professionals are questioned about the reasonwhyameasureneedstobeimplemented.Referringtothesesecurityprinciples SeeSections1.14–1.19. SeeSections2.2and2.3. 3 SeeSection2.5. 1 2
4.2BasicSecurityPrinciples:TheFoundationoftheITSecurityActivities
69
constitutes a plausible answer. They are part of ancient foundations in military strategyandinformationsecurity. ThesearethetwomainprinciplestoguidetheITsecuritywork.
4.2.1
Defence in Depth
This is a traditional security principle4 that states the need to rely on a series of security measures, preferably distinct in nature or mitigating risks in a different manner,andnotonlyononesinglesecurityfeature.Thereasontofollowthisprincipleistohaveahigherguaranteethattherewillbenobreachevenifoneofthe securitymeasuresfails. ItiseasytowitnessthisnotionoutsidetheITworld,e.g.towithdrawmoney fromanATM,wefirstinsertourcreditcardandenterourpinnumber(something weknow).Ifsomeonestealsourcreditcard,theywouldstillneedtoknowthepin numbertogetcashfromanATM.Thesetwosecuritymeasures(somethingwehave andsomethingweknow)areeasilydefeatedifthievescloneourcardandrecord the keys we pressed. This is why the principle of defence in depth needs to be appliedforpossibleandprobablethreatvectors.5
4.2.2
Protection of the Crown Jewels
Ontheonehand,noteverythinginanorganisationhasthesamevalue.Acompany couldcontinueitsbusinessprocesseswithout,forexample,twoTVmonitorsbut maybeitwouldstruggletosurvivewithoutitscustomerdatabase.Consequently, assetswithunalikevaluesrequiredifferentprotectionmeasures.Weallfollowthis principleunconsciously:Wemaybeleaveourwinterglovesvisibleandunattended inthecarbutwedonotnormallyleaveourbrandnewmp3playerunattendedin thecarseatwhilewegoshopping. Ontheotherhand,thereareneversufficientresourcestoprotecteveryassetwith anendlessnumberofsecuritymeasures.Itiscentraltoidentifythe“crownjewels”6 of the organisation and to apply appropriate security measures based on the “defenceindepth”principlewiththebudgetthatisavailable.TheITsecurityteam
4 TheSANSInstitutetrainingphilosophyisalsobasedonthisprinciple.SeeStephenNorthcutt’s Security Laboratory: Defense in Depth Series at http://www.sans.edu/resources/securitylab/ threat_vector_did.php.Lastaccessed20-09-2009. 5 A threat vector is the way a potential cause of an incident may result in harm to a system or organisation(AdaptedfromISO2004,pp.1–28). 6 SANSInstitutetrainingphilosophyalsoincludesthisprinciple.
70
4WhattoDo:TheITSecurityRoadmap
Image 4.1 Theonionapproach:differentlayerstodefendthe“crownjewels”
havetoprotectthese“jewels”withcareandattention.7Theyarethereasonwhythe organisation,andtheteamassuch,exist. Teammembersalsoneedtobeawarethatthereareassetsintheorganisation with relatively low economic value but with great “reputational relevance”.8 We takeanexampleof“emotionalassets”presentathome:Ourdigitalphotosareonly asetofbitsinamemorydevicebut,formostofus,theirtheftwouldmeanabig loss,probablyevenmoresignificantthanthelossofthehardwarewheretheyare stored.9 Organisationshaveveryfew“emotionalassets”buttheydohaveanumberof “reputational assets” whose loss, modification or exposure could damage their publicimage(Image4.1).
4.3
Additional Security Principles
Togetherwiththedescribedbasicprinciples,thereareothertenets,mostlycoming frominformationsecuritytechniques,whicharealsoworthmentioning.
SeeSection1.17. SeeSection1.18. 9 Applyingthedefenceindepthprincipleinthisscenario,wewouldrecommendtokeepabackup ofthesephotosinadifferentphysicallocation,e.g.inarelative’shome. 7 8
4.3AdditionalSecurityPrinciples
4.3.1
71
Least Business Privilege Required
This principle proposes to provide business users only with those access rights they require to perform their duties. Its implementation requires breaking down the access right model into single fine-grained units that represent each of the differentaccessrightsusedintheorganisation. Theobjectiveofthisprincipleistoavoidusershavingaccesstosystemsordatathey donotneedfortheirdailyfunctions,fosteringdataconfidentiality.Forexample,only certainHR-relatedcolleagueswouldhaveaccesstostaffmembers’personalrecords. An extreme application of this principle can bring an organisation to a real paralysis,wherethereareasmanydifferentaccessrightsprofilesasusersexistin thesystem.Themanagementoftheserightsbecomesresource-intensiveanderrorprone. This is why current identity management practice proposes the use of a role-basedaccesscontrolmodel.10 Insomebusinessareas,ITsystemadministratorsmustnothaveaccesstobusiness data. This requirement brings additional efforts and cost, e.g. implementing encryptionfordataareaswhilekeepingsystemareasaccessibletoadministrators sothattheycansupportandmakethesystemavailable. Dependingonavailableresources,alternativemitigatingmeasurescouldbeto setupanITsystemadministrationaccessbasedonafour-eyeprinciple(wetalk aboutitfurtherinthissection)andbuildinguparobustmonitoringinfrastructure that will send data access alerts, not modifiable by IT system administrators, to businessarearepresentatives.
4.3.2
Segregation of Duties
Thisprincipleappliestocriticalbusinessprocessesthatconsistofseveralsteps. Ifthesameuniqueentity(individualorgroup)performsallsteps,thepossibilityto misusetheprocessfortheirbenefitisbiggerthanifdetachedandunrelatedentities performasubsetofthesteps. Eventually,theprocessfinalises,butinasituationinwhichnouniqueentityhas fullcontrolorthepossibilitytomodifytheoutcomeoftheentireprocess.Twotypical fieldsofapplicationforthisprincipleare: – Accountingprocedures,wherethepartyspendingthebudgetisdifferenttothe partyassigningandapprovingit. – Usermanagementtasks,11wheretherearethreedifferentactionsperformedby three distinct players: Someone requests access, someone else approves the requestandfinallyauseraccessadministratorimplements12it. Seethe“blue team”inSection4.10andRBACmodelsummaryinhttp://en.wikipedia.org/wiki/ Rbac.Lastaccessed20-09-2009. 11 NIST(2002b),pp.3-3and5-2. 12 SeeSection2.3.
10
72
4WhattoDo:TheITSecurityRoadmap
Image 4.2 Criticalactionsrequiredifferentplayersworkingtogether
4.3.3
Four-Eye Principle
Thistenetisaspecificapplicationofthesegregationofdutiesprinciple.Aprocess followsthefour-eyeprincipleiftheonlypossibilitytoaccomplishitrequiresthe participation of two different individuals. Ballistic missile facilities follow this principle:Missilelaunchingactivitiesrequiretwodifferentkeys,watchedoverby twodifferentindividuals.13 Split passwords are a simple way to practice this principle in IT security: Apasswordisdividedintotwohalves.Oneentitykeepsonehalfandanotherentity keepstheotherhalf.Accesstoasystemrequiresbothentitiestoinserttheirhalf. Thismeansthatatleasttwoindividuals(foureyes)knowingdifferentcredentials arepresenttooperatethesystem(Image4.2).
4.4
Software Development Security Principles
The Open Web Application Security Project (OWASP) has collected a set of securityprinciplesforapplicationdevelopers.14Theyareusefulinthedesignofany security device. Apart from the principles we have already described, the most prevalentonesare: Atleastwarfilmsshowthispoint. Seehttp://www.owasp.org/index.php/Secure_Coding_Principles.Lastaccessed20-09-2009.
13 14
4.5VulnerabilityAnalysis:InventoryExercise
73
Image 4.3 ITsecurityshouldkeepcomplexityaway:itisthegatetoencounterrisks
– Minimiseattacksurfacearea:Everynewfeatureincreasesriskandcomplexity. – Establishsecuredefaults(amongthem,failsecurely15):Securityconfiguration shouldcomebydefault. – Avoidtrustonalienservicesorinput:Filteruserandthirdpartyservicesinput. – Avoidsecuritybyobscurity:Secretswilleventuallybedisclosedorknown. – Keepsecuritymodelsimple:Complexityaddsrisks. – Fixsecuritybugscorrectly:Focusonthesourceofthevulnerability. The IT security activities that the team will perform in the organisation can be basedonITsecurityprofessionalexperienceand,moreimportantly,onatleastone oftheprinciplesmentionedinSections4.2–4.4.Theseprinciplesconstituteastrong argumentwhenweneedtojustifyourproposalsofaction(Image4.3).
Stock-Taking Exercise and Prioritisation 4.5
Vulnerability Analysis: Inventory Exercise
Whenasmallorganisationisborn,thefirstITequipmentisprocuredandinstalled usuallywithnoITsecurityparticipation.Eventually,whenthereisanindividualor agroupinchargeofITsecurity,theywillfirstneedtoactionchanges.Onceleaders Shouldthedevicefailforanyreason,thedeviceshouldreverttoasecurestate.
15
74
4WhattoDo:TheITSecurityRoadmap
have prepared their “principle-based hotbed”, the first hands-on step is to gather informationonthe“stateofart”ofITsecurityintheorganisation.Whatisthere alreadyinplaceinthecustomerorganisation? Weproposetofollowsomeofthestepspresentingenericpenetrationtesting16,17 methodologies:Planning,discovery,attack/exploitationandreporting.
4.5.1
Planning
Stepzeroistoobtainwrittenmanagementapprovalandsponsorshipfortheinventory andplantheresourcesrequiredfortheentireactivity.
4.5.2
Information Gathering/Discovery
Therearenotwoorganisationsalike.Therefore,leadersneedtocustomisethestock takingexercisefortheirorganisation.Theystartwithabasicintelligence-gathering analysis:Findingoutthevision,mission,objectives,strategyandtactics(usingthe VMOST18model)oftheorganisation. This high-level location of the organisation helps them identifying where to placetheiranalysisefforts. Aninitialdivision19ofelementstoanalyseisthefollowing: – – – – –
Networks. Data. Systems. Applications. Identities(ofusersinsystems).20
Therearelimitedtimeandresourcestoperformthisanalysis.Thechecklistbelow willhelptoidentifytheprioritiesineachofthefiveelements: – Howmanyelementsarethere? – Wherearethey?
NIST(2003),pp.3–13and3–14andLongetal.(2006),pp.2,3and96. Backtrack proposed technical steps to pen-testing are: Information gathering, network mapping, vulnerabilityidentification,penetration,privilegeescalation,maintainingaccessandcoveringtracks. 18 VMOSTmodel.SeeSection“LinktoMBAManagementModels”inthischapter.Hardingand Long(1998),p.116. 19 Proposal coming from a conversation with Jess Garcia, IT security professional and SANS trainer.Seehttp://www.one-esecurity.com.Lastaccessed18-11-2009. 20 Identity management in organisations is a challenge: Find out how long it takes to create an identity,howlongittakestorenameanusernameandwhathappenswithidentitiesofusersleaving theorganisation. 16 17
4.6ThreatAnalysis:MilitaryStrategyRevisited
– – – –
75
Whichtechnologyaretheybasedon(softwareandhardware)? Howaretheysupported? Howaretheyrelatedamongthem? Whichonesareholdingthe“crownjewels”?
4.5.3
Vulnerability Identification/Attack
Thesuggestionistoseekanswersusingtwosources:Interviewswithprofessionals workingintheorganisationandfirst-handempiricalresearchtoconfirmtheinput givenintheinterviews.Oncetheteammembershavegatheredtheanswerstothe interviewquestions,theyneedtocomeupwithaplanstatingtheITsecurityactions toperform.Theseactionsconsistofhands-onsecuritytestsaimingtoidentify,and exploit,ifpossible,21existingvulnerabilities.22
4.5.4
Reporting
Subsequently,theteamneedtoprepareabriefbutcondensedmanagementreport in few pages presenting findings and priorities, accompanied by real demos to show management existing security holes. A demo is worth much more than a verbosereport.
4.6
Threat Analysis: Military Strategy Revisited
Militarytheory,especiallydefence-relatedepisodes,isacentralsourceofknowledge forITsecurity.23Wehavedelvedintoavulnerabilityanalysisoftheorganisationin Section4.5.Withthis,theITsecurityteamareclosertoidentifypotentialsourcesof risk. We suggest complementing this vulnerability analysis with a threat analysis using adapted fragments of a military strategyplanning technique24 to identify the organisation’sadversaries.25 Thefirststeprequiresknowingwhoaretheattackersoftheorganisationandwhat aretheydoing(i.e.anadversaryandthreatanalysis).Ausefultoolwillbethecollection ofpublishedITsecurityincidentscurrentlyhappeningintheworldandspecifically Businessprocessesinproductioncouldbeaffected.Exploitationphaserequirespre-announcement,backoutpossibilitiesand,moreimportant,priortoit,businessownerapproval. 22 SeedefinitioninSection1.1. 23 SeeSections4.2and4.3. 24 Thompson(2005),pp.399and400. 25 SeedefinitionofthreatinSection1.1.
21
4WhattoDo:TheITSecurityRoadmap
76
in the industry where the team is located. The incidents database we proposed to keep inSection1.15isastartingpoint.ItwillhelptheITsecurityteamtogather intelligencetounderstandtheirpotentialadversaries:Thoseentitiesaimingatbecoming threatsthatwilltakeadvantageofavulnerabilitytodamagetheorganisation. Thesecondstepconcentratesonsettingupastrategytoneutraliseadversaries: Wesuggestusingtheteam’sITsecurityknowledgetomakeadversariesfindother targetsmoreattractiveandvulnerablethantheorganisationthattheteamprotect. Onceteamleadershaveastrategy,theyshouldgodownaleveldeeper,totactics, and decide their operational planning, i.e. when and how they need to act, what resourcesarerequiredandwhichcontrolmeasuresneedtobeputinplacetofollow theirstrategy. Theanswertowhattodostartstobeshapedwiththeinward-lookingvulnerability analysisandtheoutward-lookingthreatanalysisintroducedinSections4.5and4.6. The next hurdle to overcome is to know which priority to assign to each of the candidateactivities.
4.7
How to Set Priorities
ThemainobjectiveistoprovidebusinessvaluewiththeITsecurityactions.Which actionswillprovidehighervalue?Wheretostartwithalistofactivities?Abasic pre-requisite,asalreadymentionedinSection1.19,istohavethemissionofthe organisationalwaysinmind.Weproposeasystematicapproachtosetpriorities. Filter 1: InChapter1wepresentedaninitialrankingexerciseapplyingthePareto principle(the80–20rule26).Weadvisedtofocusonactivitiesmitigatingriskswith ahigh(Fig.4.1): – Impactfortheorganisation(iftheymaterialise). – Probabilitytomaterialise. – Profittoriskratiofortheattacker. ThisexerciseprovidestheITsecurityteamwithafirstlistoftargets.However,any activitytheycouldsetinmotionrequiresresourcesandtheycanonlyusealimited amountofthem.Theproposalistoaddtheresourcingdimensiontotheirprioritisationexercisewiththehelpofanadditionalfilter: Filter 2: Locatingthelistoftargetscomingoutfromfilter1withasimilarpriority inathree-dimensionalgrid.Thedimensionstoconsiderare: – Resourcesrequired(peopleandequipment,internalandexternal). – Complexityofimplementation(numberofplayersinvolvedandactivitiesrequired). – Deteriorationofuserexperience. SeeSection1.17.
26
4.7HowtoSetPriorities
77
Priority setting - Filter 1
Probability to materialise
High
Priority 1 High
Priority 2
Priority 3
t ofi
Pr
to
r isk
o
of
ati
r
ke
ac
tt ra
r
Priority 3
Priority 2
Impact for the organisation
High
Fig. 4.1 Prioritysetting.Firststep
Thefirstplacesintheprioritylistwillbeactivitiesscoringverylowatleastintwo outthethreedimensions.Thelastdimensionpresentsaspecialtrait:Theportfolioof activitiesneedstokeeponscoringlowinuserexperiencedeteriorationifwework in organisations whose culture includes a high degree of user friendliness on IT systems,evenattheexpenseofalesssecureenvironment(Fig.4.2). Filter 3: Thereisathirdfilter,especiallyintimeswhenheadcountandbudgetare inquestion:Visibility.Fromthoseactivitiescomingoutfromfilter2withasimilar priority,weproposetoselectthosethatspreadeither: – Apositiveimagefortheorganisationamongcustomers,or – ApositiveimageforITsecuritythroughouttheorganisation(moreonthistopic inChapter7). They are effective marketing measures raising brand or security awareness. For example, all customers and users will welcome that they can access different servicesseamlesslyusingauniquecredential(basictypeofsinglesign-on). Filter 4: Thereareotherprioritisationfilterstoconsider:Dependingontheindustry inwhichtheteamworks,theorganisationwillprobablyhavetocomplywithlegaland regulatory requirements. Some of them will require the implementation of specific securitymeasures.27Thiswillhavepriorityoverothersecurityactions.Itiscleverto takethechancetoimplementregulatorycompliancetoimplementvalue-addingand effectivesecuritycontrolsandnotonlytopursueasuccessfulauditresult.
Forexample,HIPAAisaUSActthataddressesthesecurityofhealthdataandPCIDSSsets securitystandardsforthepaymentcardindustry.
27
78
4WhattoDo:TheITSecurityRoadmap Priority setting - Filter 2 High
Priority 1 High
Priority 2 ie
Resources required
er
Priority 3
D
er
us
o
ati
ior
r ete
f no
p ex
e nc
Priority 3
Priority 2
Complexity of implementation
High
Fig. 4.2 Prioritysetting.Secondstep
Positive image for the org in customers
Priority setting - Filters 3 & 4 High
Priority 1
Priority 2
Priority 3
al eg L / t en em g na ma
m fro ts s e qu Priority 3 t re n ge Ur
e nc lia p m co High
Priority 2
Positive image for IT security in the organisation
High
Fig. 4.3 Prioritysetting.Thirdandfourthsteps
Thelastprioritisationfiltertomentionissimplebutworth-remembering:Urgent requestscomingfrommanagement(moreonthisonChapter8).Hierarchiesstill existinorganisations.Weneedtoaccommodatemanagementrequestswithinthe team’sprioritiestoguaranteetheteam’scontinuity.Thesmartmoveistochannel the implementation of those requests through already planned activities to avoid anyfeelingofimprovisation(Fig.4.3). Asafinalnote,werecommenddevotingmaximum10%ofITsecurityresources toinnovativeorvisionarysecurityprojectsthatdonotcomeoutasprioritiesusing therankingmethodproposedinthissection.
4.8SecurityServices
79
Provision of Security Services 4.8
Security Services
Previouslyinthischapter,wehaveproposedthattheITsecurityteamshouldnot become an ‘IT fire brigade’, we have described the principles to base activities upon,whattheorganisationneedsinsecuritytermsandhowtoprioritisealistof security activities. The following sections focus on the actual deliveries that the organisationrequires. TheITsecurityteamhavetodeliverservices.ITsecurityisaserviceprovider,a supportareawithintheorganisation.Asecurityserviceconsistsofthreeelements: – A deliverable,anyproduct,beitauserinterface,atoken,anidentity,aguideline, apolicy,ahardeningscript,anassessment,asetofrequirements,areport,etc. Theproductcanbedeliveredonceorfollowingafrequency.Itissomethingthe teamhavebuilt,customised,configuredorelaboratedforoneoftheircustomers, e.g.abusinessarea,auser,aprojectteam. – A processtokeepthedeliverablecurrent,acollectionofstepsthattheorganisation needstofollow,startingfromthemomenttheyreceivethefirstdeliverable.Depending onthetypeofproductdelivered,aprocesscanconsistoffewsimplestepsorofa seriesofpreciseactionsrequiringsynchronisationamongdifferentgroups. – Away to measure and improve the provided service. Following the managementmantra“whatcannotbemeasured,cannotbemanaged”,theteamneedto provideamechanism,preferablyautomated,tomeasuretheeffectivenessofthe serviceand,ifpossible,toconstantlyimproveit(Image4.4).
– Image 4.4 Whatcannotbemeasured,cannotbemanaged
80
4WhattoDo:TheITSecurityRoadmap
Twoexamplesofsecurityservicesare: – Securitypolicies:Oncetheteamdeliveritandmanagementapprovesit,theteam shouldperiodicallyrevisitandupdatethepolicyandassessthecomplianceof thetargetsystemswiththepolicy. – Securitytests:Whenasecuritytestreporthighlightsvulnerabilitiesinabusiness systemandtheITsecurityteamproposethecorrespondingmitigatingmeasures, theITsystemsdepartmentshouldagreewiththebusinessareahowandwhen thesystemishardenedandpatched.
4.9
How to Build the To-Do List
Theactivitiestoperformneedtobeunderstandableandaddvalue.Theorganisation andtheteamneedtounderstandwhytheydoit.Tointroducetheto-dolist,weuse thesecuritycategoriesproposedinSection4.528:
4.9.1
Networks
EveryorganisationhasITnetworks,someofthemareprobablyconnectedtothe Internet. The IT security team need to know those networks, the IP addressing schema that they use, the protocols and the flows that traverse through. More importantly,theITsecurityteamneedtoparticipateinthedailyoperationalnetwork supportprocess,normallyledbythenetworkteam.Theteamneedtoknowwhen theirnetworkcolleaguescreatenewsegmentsorwhentheychangeIPaddressesor addnewroutersintothenetwork,inordertoprovidesecurityvalue. TheITsecurityteamneedtoanalysenetworktrafficingressingandegressingthe organisation’snetworks,especiallyinthosecorporatenetworksconnectedtopublic networks.Theyneedtodiscoverstandardnetworktrafficpatternsandbereadyto reactalmostreal-timewhentheyfindstrangetrafficthroughthenetworks: – Intrusiondetectionsystemshelpdetectingmaligntrafficpatterns. – Firewall,router,proxyandwebserverlogsprovideusefuldataonwhatflows throughthenetworks. Wepropose,asaquick-winexercise,theanalysisofwebtrafficoriginatedinusers’ browsers29goingtotheInternet.Forexample,thoserequeststoIPaddressesthat arenotusingdomainnamesareworthadeeperstudy.Maybetheybelongtoapiece ofmalwaretryingtoconnecttoacommandandcontrolcentre.
OncetheteamhavetheanswerstothequestionssuggestedinSection4.5. Asthereispersonaldataprotectionlegislationtheteamhavetoabideby,theyneedtoseeklegal advicebeforeperformingactionsinvolvinguserdata. 28
29
4.9HowtoBuildtheTo-DoList
81
Weusethemetaphorofthehumanbodytosummariseeveryaspectoftheto-do list:Networksinanorganisationareitsbloodvessels.TheITsecurityteamneedto analysethebloodgoingthroughthosevessels,thebitsandbytesflowingthrough thenetworkstoidentifyharmfulelements.
4.9.2
Data
Businessdataconstituteanimportantelementoftheorganisation’s“crownjewels”,30 ifnotthemainone.Theteamneedtounderstanddataaccesspatterns.Avalidway todoitistomonitordatatrafficcomingtoandfromdatabaseswheredatareside.This way,theycantellwhetherabnormalquantitiesofdataleavetheorganisation’sdata repositories. Businessdataaresimilartothememoriescollectedinourbrain:Wetrytokeep them safe in our neuronal connections so that we can access our experience and knowledge.Sofar,wearetheonlyoneswithaccesstothem.However,dataaccess isnotsorestricted.Intheorganisation,theITsecurityteamneedtoknow: – – – – –
Entities,usersandapplications,whichhaveaccesstodata. Typeofaccesstheyenjoy:read-onlyorreadandwrite. Durationandreasonfortheaccess. Processinplacetoreconciledataaccess. Datalifetimefeatures(creation,modification,deletionandcriticalitychanges).
4.9.3
Systems
MostITservicesusetheclient-serverparadigm:Aclientrequestssomethingtoa serverandtheserveranswersback.Wecandrawtwosimpleconclusionsfromthis question–answerapproach: – Serversdonotstartanycommunication.Theyjustanswerbackwhenasked. – Clientsstartcommunicationswiththeirqueries.Theydonotwaitforrequests. Weproposetomonitortrafficflowsanddevoteattentiontoscenariosthatdeviatefromthisparadigm,i.e.clientsactingasserversandserversactinglikeclients. Apre-requisiteforthisproposalistodistinguishnetwork-wisebetweenserversand clients.Awaytoachievethisistolocatethemindifferentnetworksegmentsand preferablytoconnectthosesegmentsviaOSIlayer-4orhigherfirewalls31 to filter communications.OncetheteamknowwhichIPaddressesactasserversandwhich
SeeSection4.2. ExamplesofOSILayer4protocolsareTCPandUDP.
30 31
82
4WhattoDo:TheITSecurityRoadmap
onesdoitlikeclients,theycanuseopen-sourcenetworkscannerssuchasnmap32,33 toperformandevenautomatereal-timemonitoring. Continuingwiththeresemblancetothehumanbody,theteamneedtoconstantly checkthatarteriescarrybloodfromthehearttoallpartsofthebodyandveinsdo theopposite.
4.9.4
Applications
Mostbusinessapplicationsarecurrentlybasedonwebtechnologies.Alsomostof themareconnectedtootherapplications.Theteamneedtounderstandtheirarchitecture,howtheyexchangedataandhowusersaccessthem.Teammembersshould provideacontinuoustestingserviceforcriticalapplications.Theywillinitiatethe testing with manually crafted actions. We propose to explore the possibility to scriptmostofthoseactionssothattheycansetapermanenttestingservice.This way,applicationsecuritycomplementsnetworkandsystemsecurity. Secure application development requires to “think security” right from the inception phase. At the design and building phase, development groups should followsecureguidelinesliketheOWASP34developmentguide.35 OWASPcanalsoprovideapplicationdevelopmentteamswithacodereview36guide andsecuritypentesterswithatestingguide.37Ajointeffortbydevelopersandsecurity teammemberscontributestocreatingapplicationswithlesssecuritybreaches. The sameway doctors advise patients to follow preventive measures to avoid unnecessarysurgery,theITsecurityteamneedtoconvincedevelopmentteamsto produce secure code from the start. And equally, the same way doctors monitor vitalsignsinapatient,theyneedtouseapplicationtestingscriptstoregularlycheck thestatusoftheircriticalapplications.
4.9.5
Identities
Theteamhavetofollowthelifetimeofeveryidentity.Theyneedtocreateitonly withthenecessaryaccessrightsandalwaysfollowthereallifeeventshappeningto ServerswouldhaveopenUDPandTCPportslisteningandclientswouldbeinitiatingtheTCP handshakeintheircommunicationsandwouldhavenoportwaitingforconnections. 33 SeeSection2.4. 34 The OWASP development guide can be downloaded from http://www.owasp.org/index.php/ Category:OWASP_Guide_Project.Lastaccessed20-09-2009. 35 SeeSection4.4. 36 Available at http://www.owasp.org/index.php/Category:OWASP_Code_Review_Project. Last accessed20-09-2009. 37 Availableathttp://www.owasp.org/index.php/Category:OWASP_Testing_Project.Lastaccessed 20-09-2009. 32
4.10ITSecuritySpecialities:TeamsWithintheTeam
83
theuserofthatidentity:Forexample,iftheuserleaves,ateammemberdisables theidentity,iftheuserchangesjobs,ateammembertakesawaypreviousaccess rightsandgrantsnewonesorprovidesbusinessuserswiththenecessarytoolsfor themtodoitandfortheteamtokeepanaudittrackofit. Whatismoreimportant,theteamneedtocollaboratewiththecolleaguesinthe HR department and probably also in the physical security department to set into motioneasyprocessesthatwillguaranteethattheITsecurityteamareinformedof any event affecting identities (sabbatical breaks, parental leaves, newcomers, change of positions, etc.). Regular user identity reconciliation exercises are an exampleoftheinter-departmentalcollaborationwepropose. Asitisadvisablethatourmedicalrecord(medicalidentity)isupdatedandavailabletorelevantdoctors,ourITidentityneedstobekeptupdatedsothatitprovides usexclusivelywiththenecessaryaccesstoperformourbusinessduties.
4.10
IT Security Specialities: Teams Within the Team
What are the different fields on which an IT security team will embark? We put forwardaclusterofspecialisationfieldsthatneedtobecoveredbytheskillspresent intheteam.Theseareapplicableregardlessoftheteamsizeandtheyareinline withtheprofilesproposedinSections2.3and2.4. Insmallteams,thesameindividualisprobablythecontactpointformorethan onetopic.However,inmiddle-sizedteams,composedofmorethaneightpeople, itisadvisabletobreakoutthebigteamintomini-teams,eachofthemworkingon risk management but specialised on specific IT security fields. This piece of advicefollowsthefactthathumanbeingsprefertobeingroupsoffivetoeight members.38 Weusecolourstonametheclusterelementsproposed.39Alltheseteamsrequire documentedandeasy-to-followprocedures40andtheyneedtocommunicateamong each other:
4.10.1
The Red Team: Security Testing and Incident Response
Anumberofsecuritymembersdevotetheireffortsandpassiontoperformfrequent securitytestingactivitiesandrespondtoITsecurityincidentswhenevertheyhappen:
SeeSection3.7. Inanattempttoachievesomenamestickiness.ConceptcoinedbyGladwell(2000),pp.19–25. 40 SeeSection3.11. 38 39
84
4WhattoDo:TheITSecurityRoadmap
Theyarethesecuritytestersandtheincidenthandlers.Therearethreepre-requisites for the red teamregardingsecuritytesting: – Writtenbusinessownerapprovaltocarryouttests. – Anapprovedmethodology41andcorrespondingtestingscriptsandchecklists. – Arealisticresourceandtimeplantoperformpenetrationtestsinapplicationsin production.42 Andtworequirementswithregardtoincidentresponse: – Provenchecklistsdetailingthenecessarystepstorespondtothetypicalsecurity incidentsthathappeninanorganisation,likeaforensicanalysisofaworkstation, analysisofafakewebsitethatisusingtheorganisation’sbrand,dataretrieval fromaprintingserverandfromanemailserver,etc. – Regulardrillstoexerciseincidentmanagementandresponsecapabilities.
4.10.2
The Blue Team: Identity and Access Management
Thisteamcaresforrunningandchanginguseridentitymanagementintheorganisation.Theydesign,manageandprovideidentitiesandauditdataaccesswithinthe organisation.Identityreconciliationisoneoftheirservices.Useraccessadministrator andwebdeveloperswithexperienceonuserrepositoriesaremembersofthisteam. Thebusinessdataowneristheplayerwiththehighestinteresttoimplement theminimumdataaccessrightsrequiredbythebusiness.Theyknowwhoshould haveaccesstothedataandwhy.Theyalsoknowforhowlong.Onthecontrary, useraccessadministratorsintheteamdonothavethatbusiness-relatedinformation inmind.Therefore,weproposetofollowadecentraliseduseraccessrightgranting modelwithastrongcentralisedauditandsupervisionfunction. The blue team create user identities and compose the required business roles. Subsequently, a group of selected business area users, provided with easy-to-use tools,43 assign those roles to the requester upon their management approval. The tasktoauditallgrantedaccessrightsremainswiththeblue team(Image4.5). Abusinessroleisacollectionofaccessrightsboundeithertoafunctioninthe organisation(functionalrole,e.g.Alicecreatesamonthlysalesreport)ortoaposition in the organisation (organisational role, e.g. Alice works in the accounting department). 41 AnexampleofmethodologyforwebapplicationsistheOWASP_Testing_Guide.Availableat http://www.owasp.org/index.php/Category:OWASP_Testing_Project.Lastaccessed20-09-2009. 42 Securitytestscanaffectbusinessprocesses.Theyneedtobeorganisedandpreparedtominimise thateffect. 43 This is why we recommend that this team has some web development and user repository knowledge(e.g.knowledgeonActiveDirectoryandLDAP).Thiswaytheycancustomisethese decentralisedaccessrightmanagementtools.
4.10ITSecuritySpecialities:TeamsWithintheTeam
85
Image 4.5 Businessusersneedtherighttools
4.10.3
The Green Team: Security Device Administration and Monitoring
Theyadminister,monitorandsupportsecuritydevicessuchasfirewalls,authentication servers, VPN terminators, certificate authorities, intrusion detection and prevention systemsandanyotherdeviceinstalledintheorganisationnetworksorsystemsthatis related to IT security requirements. Security device administrators and monitoring operatorsaremembersofthegreen team. Networks teams have traditionally taken care of firewall administration. Firewalls are security network devices. There is no clear cut between network andsecurityresponsibilities,thesamehappensbetweenITsystemadministration andsecurity(moreonthistopicinChapter9).Inthosescenarioswhereharmony reignsamongdifferentITteams,wepromotejointadministrationtasks,e.g.network colleaguescanproposechangestocommitinthefirewallandsecuritycolleagues canassessthem,implementthemandregularlyaudittherulebase. However,inhostileenvironments,wherethenetworkteamwasprobablycreated intheorganisationearlierthanthe“recentlycreatedsecurityteam”,thesetopicscan leadtoendlessdiscussions.Werecommendabandoningthefight,lettingthenetwork teamrunthefirewallwhiletheITsecurityteamcandevotetheirenergytoaudit regularly the rule base and monitor the firewall logs on a daily basis. There are manyothersecurityactivitiesinwhichthesecurityteamcanexcel. Thesecondcentraltaskforthegreen teamismonitoringandreactingtodefined securityalerts.ThelogsandalertsthatsecuritydevicesandmanyotherITcomponents
86
4WhattoDo:TheITSecurityRoadmap
canproduceconstitutethebestwaytohaveanunderstandingonwhatishappening real-timethroughthevesselsoftheorganisation.Alertscanhaveabusiness,applicationorinfrastructure-relatedmeaning. The green team requires close interaction with the red team.Asecurityalert coming out from a monitored system can unveil the occurrence of a security incidentthatthered teamneedtohandle.
4.10.4
The Yellow Team: Security Governance, Compliance and User Awareness
Theyprovidesecuritygovernanceservicestotheorganisationinthetypicalform ofguidelines,policies,recommendations,configurationandhardeningscripts,etc and they check their compliance. They also lead security awareness initiatives amongbusinessareasandcustomers.Theteamconsistsofsecuritypolicywriters, securitytestersandcommunicators. Systemsecuritypoliciesneedtobecomemuchmorethananicelyformatted paperthatfewpeopleintheorganisationreadandmostITsystemsdonotcomply with. Policy compliance requires the production of accompanying hardening configurationguides.TheydescribehowtosecurelyconfigureITsystemspresent intheorganisation(forexample,operatingsystems,databases,webserversand routers). Together with these hardening guidelines, the yellow team need to provide scripts,usuallyprovidedbysecuritytesters,thatwillcheckcompliancesothat ITsystemadministrationgroupscanmeasurepotentialgapsbetweenthewayreal systemsareconfiguredandthesecuritypolicy.Thisisatypicalkeyperformance indicatorfortheITorganisation.
4.10.5
The White Team: Changing Security
The white teamprovideITsecurityconsultancyservicestotheorganisation,mostly toITprojectteamsandtheyalso“changesecurity”,i.e.theyaddvaluebyincorporating “security commodities” to the organisation, mostly following a quick-win approach.Someexamplesofthese“securitycommodities”areservicessuchasfull harddiskencryption,securemobiledevicesornetworkaccesscontrol. Theactualimplementationofthewhite teamvariesamongorganisations: – Sometimestheyareavirtualteam,consistingofapercentageoftimefrommost oftheITsecurityteammembers. – Someothertimes,somemembersoftheothermini-teams,likethe redandthe yellowteams,movetothewhite teamforalimitedperiodoftimetoprovidea specific“securitycommodity”totheorganisation.
4.11ActivitiesThatanITSecurityTeamShouldAvoid
87
Table 4.1 Allocationofproilesinthemini-teamswithintheITsecurityteam ITsecurityprofilesandteamallocation Natureofactivities MiniteamwithinITsecurity Technical Securitytester Red team(and possibly yellow and white team)44 Incidenthandler Red team Securitydeviceadministrator Green team Useridentityandaccessadministrator Blue team Securitymonitoringoperator Green team Governance Securitypolicywriter Yellow team Securitycommunicator White and yellow team Generic roles Securitycoordinator ITsecurityteam Securityteamfacilitator ITsecurityteam Securitytrainee Allmini-teams
Dependingonthetasksthewhite teamisentrustedwith,theteamleaderwill staffitwiththerequiredtechnical,non-technicalandgenericroles,possiblealso complementedbyITsystemexpertsandanalysts. Table4.1linkstheITsecurityprofilesproposedinSection2.3withthecolour teamswehaveproposed.
4.11
Activities That an IT Security Team Should Avoid
WehaveextensivelydiscussedthetasksoftheITsecurityteam.Wefinalisethis chapter reminding what the team should not do. Currently, some departments in organisationsattempttoloadtheITsecurityteamwithactivitiesthatarefaraway fromtheirmandate.45Theseadditionaltasksexertextrapressuretoteammembers intheirdailywork.Teammembersandleadersrequirebigdosesofassertiveness tokindlyturntheseofferingsdown.Someexamplesare: Assessing web content:CarelessInternetbrowsingisasourceofmalwareinfection,disruptingbusinessprocessesintheorganisation.Everyday,morecompanies takethewhite-listapproach,i.e.userscanonlybrowsesitesordownloadcontent fromthosesitesthathavebeenlabelledastrustedbytheITsecurityteam. AssessingthetechnicalITsoundnessofanInternetsitefallsundertheITsecurityteam’smandate.However,evaluatingthecontentofthesiteandwhetherthe staffmembershouldbeallowedornottobrowsethosepageswhileworkingisan HR-relatedtask.
44 Testerscanprovidevalueintechnicalcomplianceactivities(yellowteam)andchangeactivities (whiteteam). 45 ProvidingITsecurityvalue.
88
4WhattoDo:TheITSecurityRoadmap
Warning final users: The yellow team46draftsandelaboratesfinalusersecurity policies but it is the organisation’s top management who eventually approve and make them mandatory. Certainly the IT security team need to provide HR with informationonwhoisbreachingpoliciesbutthetasktowarnusersnotfollowing thosepoliciesisalsoanHR-relatedtask. Forexample,ITsecurityteamsnormallyareinchargeofconfiguringantivirus and anti-malware software present in the organisation and of issuing the correspondingfinalusersecuritypolicy.ITsecuritycanprovideHRofficialswithinformationonwhoconnectsinfectedUSBflashdrivestothecorporatenetworkand providesecurityawarenessbriefingstotheentireorganisation,orevencustomised sessionstothoseusers,tomakethemseethatitisariskybehaviour.Ifadditional measuresarerequired,thenitisuptotheHRdepartmenttotakeaction. Change management:ItiscriticalforITsecuritythattheorganisationfollows strictchangemanagementprocesseswhennewITimplementationsgolive.Inyoung organisations,wherechangemanagementisstillanimmatureprocess,ITsecurityis oneoftheonlyvoicesinITpreachingforfurthertestingandadditionalsecurity measuresbeforeasystemgoesintoproduction. TheITsecurityteamneedtobeinvolvedinthechangemanagementprocess, evaluatingtheriskposedbyproposedchanges. However,ITsecurityrepresentativesshouldnotleadtheprocessoractasachangemanager.Itcertainlyaddsvalue totheorganisationbutchangemanagementisnotonlyITsecurityrelated. ThischapterhaspresentedtheactivitiesthattheITsecurityteamneedtoaccomplish todelivervaluetotheorganisationtowhichtheyprovidetheirexpertise(Image4.6).
Image 4.6 ChangemanagementisakeystoneinIT ProvidingITsecurityaddedvalue.SeemandateinSection1.19.
46
4.11ActivitiesThatanITSecurityTeamShouldAvoid
Chapter 4: Learning points • Theteamneedstoavoidthe“firebrigade”mode. • Theyneedtofollowthedefenceindepthand“crownjewel”principles. • Militarytheoryandcodedevelopmentprovideadditionalprinciples. • Thefirststepisanalysingthevulnerabilitiesoftheorganisation. • Thesecondstepisanalysingthethreatsandtheadversaries. • Theteamwillprioritiseaccordingtoimpact,probabilityandprofittorisk ratio(PRR). • Theteamwillprovidesecurityservices:Aproductandaprocess. • TheITsecurityteamconsistsofdifferentmini-teams. • TheteamshouldavoidbecominganHRarmoranITchangemanager.
Link to MBA Management Models We have selected four MBA-related models that could help us when analysingourorganisationandsettingastrategyfortheITsecurityteam: VMOST Vision,mission,objectives(long-termgoals): – Whattheorganisationistryingtodo. Strategy(long-termplans)andtactics(short-termplans): – Howtheorganisationistryingtodoit. Porter’s generic strategies (1980) Tooltoselectastrategicdirection:Differentiation,costleadershiporfocus. Porter’s 5 forces (1985) Usefultoanalysetheattractiveofanindustry: – Competitors,suppliers,buyers,substitutesandentrants Ansoff matrix (1987) Growthstrategiesaccordingtoproductandmarketstates: – – – –
Currentmarketandproduct:Marketpenetration. Currentmarketandnewproducts:Productdevelopment. Newmarketandcurrentproduct:Marketdevelopment. Newmarketandnewproduct:Diversification.
Seereference:HardingandLong(1998).
89
Chapter 5
How to Do It: Organise the Work in “Baby Steps”
Chapter 5: What will the reader learn? This chapter answers the following questions: • • • • • • • • • • • •
Whatthreatenstheteam’sperformanceandwhatcanleadersdo? Whatisa“SMALLbabystep”andhowcanleadersassignit? Whoisresponsibleforthe“babysteps”? Howmuchtimeoftheteam’sworkingdaydoleadersplan? Whatshouldteammembersconsiderwhenplanning? WhoaretheITsecurityteam’smainstakeholders? Howshouldtheteamcommunicatewiththemandreportprogress? Howdoteammemberstrackactivities? Whatshouldtheteamdowithexternallydrivendeadlines? Whathappenswithsmalltasks? HowshouldtheITsecurityteamdealwithred-tape? Howshouldtheteamcommunicatetheirplansandachievements?
Wehaveintroducedinthefirstthreechaptersthebasicconceptsofriskmanagement(Chapter1),theprofilesoftheITsecurityteam(Chapter2)andthecontract betweenthesecurityteamandtheindividual(Chapter3).Chapter4hasprovided detailsontheactivitiestoperformandthewaytheycanbejustified,prioritised anddistributedwithintheteam.Chapter5providesleadsonhowtoperformIT securityactivitiesandonhowtoorganiseactionssothattheITsecurityteamcan fulfiltheirmandate.
A.PartidaandD.Andina,IT Security Management: IT Securiteers-Setting up an IT Security Function,LectureNotesinElectricalEngineering61, DOI10.1007/978-90-481-8882-6_5,©SpringerScience+BusinessMediaB.V.2010
91
92
5HowtoDoIt:OrganisetheWorkin“BabySteps”
Shaping the Daily Reality 5.1
Threats to the Performance of the Team
TheITsecurityteamneedtosatisfythreeobjectives: – Todeliveraddedvaluetotheorganisation. – Tobuildanenvironmentwhereteammemberscandevelopprofessionallyand personally. – Toenjoythedaysworkingfortheorganisation. ThevulnerabilityandthreatanalysisontheITsecurityteamthatweproposedin Chapter 4 helps to better understand the team’s capacity and attitude and to organisetheirwork. ThemotivationandinternalbalanceassessmenttoolswepresentedinSection3.3 facilitatethesearchoftheteam’svulnerabilities.Theteamleaderwoulddiscover thestateoftheirteammembersandhowtheycanlookaftertheteam. Thethreatanalysisrequiresfocusingonthoseexternalactorsthatcouldplaya detrimentalroleontheperformanceoftheteam.Theycanuseupallteam’senergy andthisenergyispreciousandlimited.Teammemberswillidentifythreethreatening energyconsumers: – Servicerequests. – Organisationalconfusion(politics). – Timethieves.
5.1.1
Service Requests
An excessive number of service requests can become the main threat to the performanceoftheteam.Thesamewaywecandamageamuscleoraligamentif weoverstretchedthem,apermanentover-utilisationoftheteam’sworkingcapacity candisrupt,orevenliterally,breakateam. Wecanonlyworkoverthecapacitylimitforaverylimitedperiodoftime.There canbeanurgentandimportantmattereverynowandthen,butneitherateamnoran individualcanworkunderstress1onapermanentbasis.Neurosciencehasdemonstratedthatthesizeofthehippocampus,amajorhumanbraincomponentessential forthememory,decreasesandcanevensufferatrophyinindividualsunderconstant stress.2Astressedbrainstopsbeingcreativeandinnovative.
AdditionalinputonstressinChapter6. EduardPunsetinterviewsProfessorGaryMarcus,psychologistatNewYorkUniversity.http:// www.smartplanet.es/redesblog/?p=460.Lastaccessed20-09-2009. 1
2
5.1ThreatstothePerformanceoftheTeam
93
Clearsignsofoverstretchedteamsarehighernumbersthanusualin: – Sickleavesofteammembers. – Collisionsamongteammembersandbetweenthemandothercolleagues. – Mistakesduetolackofattentionormotivation.
5.1.2
Organisational Confusion (Politics)
Anybigenoughandorganisedsetofhumanbeingsdisplayawholerangeofhuman behaviourswithregardtopower.3Thisisalsothecasefororganisations.Individuals workingforthemtendtopursuedifferentobjectives.Iforganisationleadersdonot devote required care and attention to align those objectives, soon they enter into whatwereferas“organisationalconfusion”. When the organisation is confused, the energy required to justify IT security actionsissimilartotherealenergyrequiredtoactuallyperformthoseactions.This scenarioconstitutesathreattotheexistenceoftheITsecurityteamandcertainly totheircapacitytoliveuptotheirmandate.4
5.1.3
Time Thieves
We consider “time thieves” all those daily communication elements around the team’sworkthattakefromteammembersmoreenergythanthevaluetheyobtain fromthem.Wefindtwotypesof“timethieves”relatedtoinformationexchange: 5.1.3.1
IT Based Communication Tools
ITprovidesnowadaystoolstoaccomplishmoretasksinlesstimebutalsotowaste time miserably. Team members have to use email, instant messages, blog posts, socialnetworks,“tweets,5”etc.wiselyand,whenpossible,avoidthattheybecome theirmaindailyactivity. 5.1.3.2
Meetings
Organisationsaremadeofindividuals.Asindividuals,wecommunicateamongus tosolveproblemsandmoveforward.Facetofacecommunicationismuchricher Machiavellipublishedin1532“ThePrince”.Atreatyonhowtomostsuccessfullyobtainand maintainpower. 4 ToprovideITsecurityexpertise,seeSection1.19. 5 A“tweet”isapostingontweeter,amicro-bloggingservice. 3
94
5HowtoDoIt:OrganisetheWorkin“BabySteps”
andcomprehensivethananyothermeans.6However,equallytowhatweshowed with emails, the threat that meetings, workshops, conferences, etc. become the maindailydutyexists,leavingverylittleroomforrealITsecuritywork. AstheultimategoaloftheteamleaderistocreateandmaintainanITsecurity teamwithalong-termvision,theyneedtokeeptheirfocusandapplymitigating measurestoavoidthesethreatsaffectingtotheirteam.Weproposeto: – Manage the inflow of service requests. Leaders should be transparent on the allocationofteamresourcesandonthemanagementofservicerequestqueues. If there is no possibility to control the service demand, they should manage customerexpectationsbyprovidingrealisticservicedeliverydates.Theyneed to agree on their prioritisation criteria7withtheircustomers. – FocusavailableenergyondeliveringITsecurityservicesandletthequalitythat theteamprovidebethemainmarketing(andlobbying)toolintheorganisation. – Followaschedule8tocheckITcommunicationtoolssuchasemailandavoid endlessdiscussions.9 – Limitthelengthandnumberofmeetings.Themeetingorganisershouldprepare an agenda beforehand and distribute follow up points among meeting participantsafterwards. Withthesemeasures,theITsecurityteamwillbeclosertocreatearealitywhere theycanreallyperformandprovidebusinessvalue(Image5.1).
5.2
Plan in “SMALL Baby Steps”
Once we have shaped reality with the measures proposed in Section 5.1, we are ready to organise the work for all mini-teams within the team presented in Section 4.10. We introduce the use of an easy-to-handle planning unit: A “baby step”.Itisasmalltaskthatteammemberscancomprehend,manage,plan,budget and,mostimportantly,finalise.
5.2.1
Every Trip Starts with a First Step
ThisChineseproverbsummarisesourproposaltoplanouractivities.TheITsecurity teamleaderneedstobreakdownactivitiesinto“babysteps”andelaborateaplanto implementthem.
SeeSection3.6. SeeSection4.7. 8 UnlesstheITsecurityteamaremonitoringdevicesrealtime. 9 SeeSection3.13. 6 7
5.2Planin“SMALLBabySteps”
95
Image 5.1 Theteamneedtoenjoytherealitytheycreate
This dissociating activity requires knowledge, experience and reflection. The teamleaderandseniorteammemberswillorganiseandsuperviseit.Subsequently, theywillallocateconcrete“babysteps”tojuniorteammembers. These“babysteps”needtobe“SMART”.10Wewouldcustomisetheacronym andchangeitinto“SMALL”,i.e.specific,measurable,achievable,lightand(time-) limitedtoobtain“SMALLbabysteps”. EveryITsecuritytaskhasacertaindegreeofcomplexitybut,whenwebreakit downinto“SMALLbabysteps”,thiscomplexityismanageable:A“babystep”is aspecific,achievableactivitythatwillbeevaluatedanditwilltakeonlysomehours ordays. Therearemanyvalidwaystodecomposeanactivityinto“babysteps”.Theteam leader should allow for some controversy and brainstorming time when shaping “babysteps”.Lateralthinkers,11teammemberswithalternativewaystoseereality, willcomeupwithdifferentideasthatcouldpotentiallybeeasiertoimplement.The bestbrainintheteamistheteam’sbrain. Oncethe“babysteps”aredefined,wedonotrecommendre-visitingtheirexistenceuntiltheyarefinalised.ITsecurityteamscannotaffordchangingtheguiding
Thisisaprojectmanagementacronymforspecific,measurable,achievable,relevantandtimely objectives. 11 LateralthinkingisatermcoinedbyEdwardDeBonoinabookpublishedin1970withthesame title.ISBN0-14-021978-1. 10
96
5HowtoDoIt:OrganisetheWorkin“BabySteps”
Image 5.2 Theteambasetheirplanon“babysteps”
direction on a daily basis. However, a brief “lessons learned” session after the conclusionoftheentireactivityisavaluablewaytoverifywhetherthedefined stepsweresuccessfulandadequatefortheteam(Image5.2).
5.3
Baby Step Assignment Within the Team
Whichcriteriashouldteamleadersfollowtoassign“SMALLbabysteps”toteam members?Weproposetwo: – Abilitytodoit. – Ifpossible,preferencetodoit,i.e.theteammemberlikestheactivity. Although,intheshortterm,leaderscandeviatefromthesecriteria,inthelongterm andhavingalwaysinmindthecontinuityoftheteam,leadersneedtogiveteam memberstaskstheycandoandtheyliketodo.Onlythenteammemberswillbe motivatedandhavearealpossibilitytoexcelonwhattheydowhiletheyprovide theorganisationwithITsecurityadvice.Thisistheirultimategoal. Therearesomeroutinetasksdislikedbyveteranteammembersthat,however, needtobeaccomplished.12Thesearegoodcandidatesforjuniormembers,provided that they have received enough guidance from the veterans. Nevertheless, the team need to adopt a fair task assignment method once junior members get an
SeeSection4.7foracollectionofpotentialsourcesofactivitiesfortheteam.
12
5.4ResponsibilityTransfer
97
understanding and experience on those tasks. We propose two complementary approachestodealwithnon-attractiveroutinetasks: – Rotationamongteammemberswithsimilarskills(fairdistribution). – Progressive“partialrelease”fromroutinetaskstothoseteammembersimproving theirskillsand,consequently,addingmorevaluetotheteam,butonlyasmuchas overallteamresourcesallowforit. Bothapproachesrequireaclearcommunicationofassignmentcriteriatoallteam members. ITsecuritycannotaffordhavingteammemberswhoarenotcomfortableworking inITsecurity.13Shouldthatbethecase,weadviseteamleaderstoseekawayoutof theteamforthatmemberusinganypossiblemeanstheorganisationcouldoffer:Job mobility,positionswapsorsimplynotrenewingtheirworkingcontract. Therearemanytaskstoaccomplish14andthereishardlyanytimetoreinforce motivation.Althoughsometimesthisisnotapleasantduty,teamleadersneedto lookaftertheteam’scriticalmass15andhelpuneasyteammemberstoevolvesomewhereelse. Weaddtwoactionsforteamleaderstoconsiderontheartoftaskassignment: – They need to provide motivated team members with the necessary tools16 to excelintheirassignment. – Theyshouldoffer(butnotimpose)theirknowledgeandexperience,fromwhich teammemberscouldbenefit.
5.4
Responsibility Transfer
Theassignmentofa“SMALLbabystep”conveysacleartransferofresponsibility. Theselectedteamleaderandseniorteammembersneedtooffersupportandguidance, but theselectedteammemberisresponsibleforthesuccessfulaccomplishmentofthe“babystep”.Theyneedtofeelthemselvesownersofthesuccessor failure that the completion of the step will bring. This is why the team member, responsibleforthetask,needstofeelcomfortablewiththeassignedstepandbeproud oftheirachievements,orawareoftheirfailure,andlearnfrombothaccordingly. Agoodleadermakesoutofthefailuresoftheteamtheirownfailuresandout oftheirsuccessesthesuccessesoftheteam.Everyteammemberneedstofeelthat theirworkmadeadifferenceintheteam.
SeeSection3.5. SeeSections4.8and4.9. 15 SeeSection3.3. 16 Theconceptoftoolweusehereisverybroad:Itrangesfromhardwareorsoftwareequipment totrainingmeasuressuchason-the-jobtraining,accesstospecialisedforaorcollaborationwith expertsonspecifictopics. 13 14
98
5HowtoDoIt:OrganisetheWorkin“BabySteps”
The final note in this section: Team leaders need to inoculate the spirit of “underpromiseandoverdeliver”17toallteammembers.Theteamreputationisonly madeofeachteammember’sreputation.
5.5
How to Plan the Team’s Time
OurproposalfortheITsecurityteamistofollowasetofaddedvaluepriorities.18 However,wehavealsowarnedaboutthefactthatunexpectedtaskswillregularly landontheteamandtheneedtoaccomplishthemswiftlyandeffectively,especially ifthereisaregulatory,legalormanagerialtriggerbehindthem. Therefore, IT security teams cannot abandon completely the “fire brigade” workingmodewesuggestedtoavoidinSection4.1.Theleader’sgoalwillbeto progressivelyreducethetimetheteamdevotetoputoff“urgentandunexpected fires” and, simultaneously, increase the time they use to build their security foundations.19 Consequently, we suggest planning only a certain percentage of time and resourcesavailableintheteam.Thispercentagewillgrowastheorganisationand theITsecurityteammature.Aproposalcouldbe: – – – –
Year1planningtime