Skip to main content

The "risk management" backlash - my perspective

Just like fashion or what TV shows are interesting it seems technology and security also have fads, trends, things that are in, and things are are out.

Ten years or so ago risk management was very new, untested, and frankly most organizations didn't do it, didn't want to be bothered by it, etc. They just wanted to get on the Internet and make some big gobs of money. If there was a security team (or individual) they were likely a system administrator who was identified as being "the security guy" as well. Not a full time responsibility and 80-90% technical (virus fire fighting, firewall rule management, maybe some high level policies).

With a more compliance driven world the rise of professionals who took security to the next level arose. Those individuals started maybe as auditors, system admins, or other IT roles - but then they were asked to work with Audit to map out the open audit issues and plan for "managing" the risks or managing the residual audit findings. This was one of the first steps toward Risk Management. In many organizations the concept was that any exceptions to the security policies must have a documented risk acceptance and have a plan to address the issue(s) (and have executive sign off as part to ultimately accept the risk).

As more and more complex compliance requirements continued to evolve, many organizations then looked to the risk management team to help to translate these requirements from legislation, laws, rules, or other external drivers and create tangible controls that then could be measured and implemented.

Along about this time organizations started focusing more and more on the process of establishing controls and measuring them that some organizations started to take the technical security role for granted. It is great to have a list of 1500 controls in your environment, but if you don't have a team of technical security professionals that are responsible for implementing and maintaining those controls you will have created a self fulfilling prophecy of non-compliance for your organization.

A couple years back I saw the start of a backlash against anything that hinted of risk management - to the point that many "security" bloggers and commentators blamed "risk management" for all of the intrusions and exploits. Needless to say this is a bit off the mark.

Here is an example of an article that slams Risk Management
https://www.infosecisland.com/blogview/14329-Security-Stupid-Is-As-Stupid-Does.html

Security is not risk management, and Risk Management is not security.
Both aspects are required to maintain a good governance of an environment. Anyone who's worked with my has heard me refer to them as a Yin-Yang relationship. Security is the technical control implementation group, they contribute to the creation and implementation of standards, they are the ones that you call in when you have an event that you need researched and are key in incident handling. The technical security team is who you look toward if you have a new technology and you need to have a technical assessment done.

Risk Management helps to establish the policies and standards, and makes sure that they align with the business goals. They interface with the business to represent security during the life cycle of a project and act as trusted advisers to the project team, helping them to make sure that the project, solution, or changes, all match company policy and best practice. The Risk Management team also will document any residual items that can not comply with policy/standards and work with the technical security team to determine the right type of mitigating controls to keep the environment secure as the system becomes compliant.

These two groups both need to work within the goals of the business and help to enable business to happen securely.

Comments

Popular posts from this blog

Requirements for Information Security

If you want to get into Information Security you HAVE to be a/have this skill... Why this is total BS. Almost daily I see someone posting on twitter, trying to be helpful to folks who are looking to get into InfoSec. Often I see "If you want to be in Information Security (Cyber Security) then you HAVE to be a programmer" or "If you want to be successful you have to be a hacker/have a criminal record/have abused systems without permission" etc. While having technical capabilities (such as programming) and having the ability to compromise a system shows a specific skillset neither are required. When talking to people who are interested in Information Security I often refer to it as a cake, there are tons of slices, many flavors, many pieces and parts you can sample, choose to focus on, will be expected to know something about, etc. Incident Response and Forensics (my current focus) is not the only part of Information Security, and certainly not the only part tha...

Privacy considerations for home users

In light of the recent new stories regarding the recently signed legislation allowing ISP's to be able to sell your data http://www.vox.com/new-money/2017/3/29/15107110/republican-isp-data-privacy Here are a couple ideas and tips about privacy in general. Don't panic - a lot of the info was already being gathered, this isn't that large of a change regarding scope, it's more of a change to who can profit or sell it (which is a shift for sure). Remember a lot of the services you use today already gather your browser, activity, and search info (google, bing, yahoo, facebook, etc.). ISP's haven't implemented this yet, expect to see new terms of service in an upcoming bill, or an email sent to you, etc. If you would like to take some steps to try to preserve your privacy, here are some ideas and examples: VPN (Virtual Private Network) - this in essence creates an encrypted tunnel between two points on the Internet. One point being your system...

Busting the myth of the malicious insider

The Myth of the Insider Threat Too often after the announcement of a new breach, the first reaction from the victim company and the media is "another malicious insider attack".  Case in point, I was catching up on news from various sources and came across the following: http://www.idgconnect.com/abstract/19647/lessons-sage-leak " “We believe there has been some unauthorised access using an internal login to the data of a small number of our UK customers so we are working closely with the authorities to investigate the situation,” the Newcastle, England-headquartered firm said in a statement." Of course an internal login was used to access the data, as part of the attack lifecycle, during your reconnaissance phase you identify accounts to target for possible compromise, based on the access/role of the individual.   Phishing attacks or other simply attacks are often successful in gathering login credentials for individual users, which can then of...