Skip to main content

The "risk management" backlash - my perspective

Just like fashion or what TV shows are interesting it seems technology and security also have fads, trends, things that are in, and things are are out.

Ten years or so ago risk management was very new, untested, and frankly most organizations didn't do it, didn't want to be bothered by it, etc. They just wanted to get on the Internet and make some big gobs of money. If there was a security team (or individual) they were likely a system administrator who was identified as being "the security guy" as well. Not a full time responsibility and 80-90% technical (virus fire fighting, firewall rule management, maybe some high level policies).

With a more compliance driven world the rise of professionals who took security to the next level arose. Those individuals started maybe as auditors, system admins, or other IT roles - but then they were asked to work with Audit to map out the open audit issues and plan for "managing" the risks or managing the residual audit findings. This was one of the first steps toward Risk Management. In many organizations the concept was that any exceptions to the security policies must have a documented risk acceptance and have a plan to address the issue(s) (and have executive sign off as part to ultimately accept the risk).

As more and more complex compliance requirements continued to evolve, many organizations then looked to the risk management team to help to translate these requirements from legislation, laws, rules, or other external drivers and create tangible controls that then could be measured and implemented.

Along about this time organizations started focusing more and more on the process of establishing controls and measuring them that some organizations started to take the technical security role for granted. It is great to have a list of 1500 controls in your environment, but if you don't have a team of technical security professionals that are responsible for implementing and maintaining those controls you will have created a self fulfilling prophecy of non-compliance for your organization.

A couple years back I saw the start of a backlash against anything that hinted of risk management - to the point that many "security" bloggers and commentators blamed "risk management" for all of the intrusions and exploits. Needless to say this is a bit off the mark.

Here is an example of an article that slams Risk Management
https://www.infosecisland.com/blogview/14329-Security-Stupid-Is-As-Stupid-Does.html

Security is not risk management, and Risk Management is not security.
Both aspects are required to maintain a good governance of an environment. Anyone who's worked with my has heard me refer to them as a Yin-Yang relationship. Security is the technical control implementation group, they contribute to the creation and implementation of standards, they are the ones that you call in when you have an event that you need researched and are key in incident handling. The technical security team is who you look toward if you have a new technology and you need to have a technical assessment done.

Risk Management helps to establish the policies and standards, and makes sure that they align with the business goals. They interface with the business to represent security during the life cycle of a project and act as trusted advisers to the project team, helping them to make sure that the project, solution, or changes, all match company policy and best practice. The Risk Management team also will document any residual items that can not comply with policy/standards and work with the technical security team to determine the right type of mitigating controls to keep the environment secure as the system becomes compliant.

These two groups both need to work within the goals of the business and help to enable business to happen securely.

Comments

Popular posts from this blog

Requirements for Information Security

If you want to get into Information Security you HAVE to be a/have this skill... Why this is total BS. Almost daily I see someone posting on twitter, trying to be helpful to folks who are looking to get into InfoSec. Often I see "If you want to be in Information Security (Cyber Security) then you HAVE to be a programmer" or "If you want to be successful you have to be a hacker/have a criminal record/have abused systems without permission" etc. While having technical capabilities (such as programming) and having the ability to compromise a system shows a specific skillset neither are required. When talking to people who are interested in Information Security I often refer to it as a cake, there are tons of slices, many flavors, many pieces and parts you can sample, choose to focus on, will be expected to know something about, etc. Incident Response and Forensics (my current focus) is not the only part of Information Security, and certainly not the only part tha

Busting the myth of the malicious insider

The Myth of the Insider Threat Too often after the announcement of a new breach, the first reaction from the victim company and the media is "another malicious insider attack".  Case in point, I was catching up on news from various sources and came across the following: http://www.idgconnect.com/abstract/19647/lessons-sage-leak " “We believe there has been some unauthorised access using an internal login to the data of a small number of our UK customers so we are working closely with the authorities to investigate the situation,” the Newcastle, England-headquartered firm said in a statement." Of course an internal login was used to access the data, as part of the attack lifecycle, during your reconnaissance phase you identify accounts to target for possible compromise, based on the access/role of the individual.   Phishing attacks or other simply attacks are often successful in gathering login credentials for individual users, which can then of
Weekly recap and why you should be concerned about "attackers" even if you have "nothing to hide" Why you should be aware of, defend against, and prevent attackers... even at home: I often hear from future victims "well I don't have anything to hide/anything of value/why would they target me!?" It's really not about you, usually the attackers aren't looking for your data (if they get it, or have easy access to it, they may try to profit from it, but the people doing the compromising aren't usually the same folks that monetize). What the attackers want are compromised systems they can use to do what they want at scale. So if they can compromise 50 systems, they can send 50X the amount of SPAM... 100 systems, 100X, etc. Some operations get paid based on the number of emails they can send per day. Of course the email will likely not just be SPAM, but may also be malicious (ransomware, etc.). http://thehackernews.com/2017/09/linux-ma