360 likes | 484 Views
Money$ec Evolved. Wherein not everything has a tidy baseball analogy. Jared Pfost Chief Executive Officer Third Defense. Brian Keefer Security Architect Leading SaaS Security Company. Recap. Last year we applied baseball “SABRmetrics” to InfoSec We spent some time in the real world
E N D
Money$ec Evolved • Wherein not everything has a tidy baseball analogy Jared Pfost Chief Executive Officer Third Defense Brian Keefer Security Architect Leading SaaS Security Company
Recap • Last year we applied baseball “SABRmetrics” to InfoSec • We spent some time in the real world • Oh yeah, some guy named Brad was in a movie
In case you missed it How Analytics Changed Baseball
Oakland A’s • Teams bid for players in Free Agent market • Start of 2002 A’s had payroll ~$40M* • NY Yankees payroll ~$126M* • So poor teams have no shot at winning, right? *From “Moneyball”
1999-2001 *Estimate from baseball-reference.com
Billy Beane • GM Billy Beane defied convention • i.e. he didn’t follow “best practices” • made data-drive decisions • Hired Paul DePodesta
Traditional baseball • Talent is evaluated by scouts • Scouts are usually washed-up players • i.e. “Industry veterans” or “experts” • Value statements are largely subjective
Next-gen Baseball • Started in 1977 • Bill James wanted to see what influenced game outcome • Realized stats created in 1859 didn’t properly attribute events
Key lessons • Don’t make emotional decisions • At least recognize your bias • Collect the “right” data • Look for correlations • Set reasonable criteria for success • Don’t overspend
Problem statement • Every organization is competing with attackers • Most don’t have Fortune 50 budget • How can you be effective?
Conventional “wisdom” • “Everyone knows” that you need • Firewall • Anti-virus • Change passwords frequently • Prohibit social networking • Etc.
Do they work? • Port 80 goes through the firewall • Anti-virus misses custom malware • Stolen passwords used quickly • Social networking key to marketing and employee satisfaction
Clearly this is not working • Do we actually want a new strategy? • What does winning look like? • How do we get started?
Are You Ready To Win? Motivating Event
What Does Winning Look Like? • Winning is not losing... • No unacceptable risks realized • Cheap as possible
So, about that... • Started collecting info • Realized it was far from complete • Historical incident rates were meaningless • Minimal ability to measure what helps Money$ec 1.0 • 12 metrics
Evolution Money$ec2.0 • Measure what’s easy • Set Targets • Justify More • Optimize Cost vs. Target
Start With “Easy” • Incidents • # of High, Moderate, Annoying • Application • # of Post-production application bugs • Passwords • % passwords easily guessed • Scanned Vulnerabilities • # Patch & config vulns not mitigated per Severity Service Level
Real Metrics Have Outcomes • Stats are trendy, Metrics have Winners|Losers • Measure actual performance against target • Benefits • Drives “acceptable risk” conversation with Management • Simplifies reporting e.g. are we above|below?
Back To “Easy” • Scanned Vulnerabilities • # Patch & config vulns not mitigated per Severity Service Level • Sev 1 Server Vulns Mitigated within 30 days • Sev 2 within 60 days
Access Management % Employee termination within policy % Role/Access verification Network % critical systems monitored Moving to % of full packet capture Vendors % assessed per policy # overdue findings Employee # of duplicate incidents Change Management # emergency or unplanned changes % of changes with a regression Expand Measurement Every Metric Must Have A Target
Server Patching 100 92 Percent 84 75 67 Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Jan Feb Optimize Cost - Target • Is target too high? Proposed Target
10 9 8 Post Worm 7 6 DoS Post Malware Post 5 4 3 2 1 1 2 3 4 5 6 7 8 9 10 Cost - Benefit - Accountability Evidence: Incidents, response performance, attack attempts Current Target Proposed Target Or http://code.google.com/p/openpert/
Improve IR • Move IR out of IT? • Infections are incidents • Data is needed to evaluate controls • Knowing root-cause guides future controls and Targets
Find Leading Indicators Integrate Metrics Into Root Cause Analysis
Parting Thought • People implicitly decide not to measure. • Money$ec says explicitly decide when you don’t.
Security Reformation? http://lifecypha.wordpress.com/ http://www.liquidmatrix.org/blog/2012/02/21/we-are-losing/
Time to Share • Data you find useful to collect? • Spotted any correlations? • Proved any controls too expensive? • What communities do you participate in?
Thanks! Brian Keefer b: http://rants.effu.se e: chort@effu.se t: @chort0 Jared Pfost b: http://thirddefense.wordpress.com e: jared@thirddefense.com t: @JaredPfost
RACI in action R – Responsible A – Accountable C – Contribute I - Informed (There can be only one “A”)
Device Patch & Config Monitoring