Discover Performance

HP Software's community for IT leaders // March 2012
Subscribe

Separating security risk from security fear

Everything feels urgent where enterprise security is involved. HP security expert Rafal Los discusses a technique to bring logic to the highly charged issue of protecting your IT systems.

Owning the responsibility for making key security-related decisions in today’s agile business can be a thankless job. Balancing the good of the business against the perils of additional risks can create a charged environment, with decisions made on gut instinct rather than objective analysis. Information security tends to be an emotion-driven discipline, in which mistakes of the past are often repeated. Because hacking and data breaches can wreak havoc, and the threats to our enterprises are constantly growing, we tend to let emotions lead.

Our lead article this issue advises us to keep cooler heads.  But when we see red marks on dashboards and reports, the emotional response is to do whatever is necessary to get rid of those red marks—now. Only after careful, objective analysis can we determine that sometimes a defect seen as critical by Information Security is neither business-critical nor in need of immediate resources and remediation. Take the typical CIO’s response a number of years ago when the first backup tape was lost … how many hours of productivity and millions of dollars were lost due to the “drop everything else” emotional response?

It’s difficult to divorce yourself from the highly charged conversations in the media and in your social networks and peer circles. When the corporate livelihood hangs in the balance, information security professionals and leaders need an analytical tool to ensure that their decisions are sound and practical. Fortunately, I’ve got one that’s been battle-tested and is ready for use.

Staring down failure
During my 15 years in the information security discipline and corporate IT, I’ve often used FMEA (Failure Mode and Effects Analysis) to assess the security risks of various efforts. An underutilized yet powerful tool in any executive’s toolbox, the FMEA can be a simple spreadsheet that doesn’t take long to master but pays dividends quickly.

The FMEA’s output identifies the biggest actual risks (failures) and thus helps to determine the most appropriate course of action regarding a product, project or operational task. Forcing the decision maker to weigh all possible failure scenarios leaves little room for emotion or subjective thinking—exactly how we want it when making mission-critical security decisions.

An FMEA-based analysis of a patch requirement will objectively determine, say, whether the risk of an unpatched system potentially open to hackers is greater than a patched system open to self-imposed failure modes; either way the decision is made with a cool head and objective analytics.

Doing the math
The FMEA analyzes potential failure by factoring three key components: likelihood of occurrence, potential severity, and ease of detecting that the failure/breach has occurred. The result is a risk priority number (RPN). There is no magic formula in an FMEA—Occurrence times Severity times Detection equals the RPN, an objective, emotionally divorced way to understand the risk priorities for a particular undertaking. The key, of course, is the numbers used, so that’s where the hard work comes in.

Enterprises must create an acceptable guideline for determining the severity, occurrence and detection numbers via collaboration between risk management and information security. Once that’s done, each project can simply be run through an assessment that calculates the risk of various options, and lets security leaders set priorities accordingly. (You might assign a value of 10 to high likelihood or severity, and 1 to low chance/impact.)

Let’s use patching as an example and run a quick, basic and incomplete FMEA on the impulse to implement a security patch immediately rather than follow the standard patching cycle. Is it overreaction or prudence to patch immediately? Here, assume we’re talking about a public-facing web application server performing company-critical e-commerce activities that needs a security patch:

If the numbers were to be trusted, particularly in the likelihood of detection column, then the wise choice would be to patch the system—but barely. In this example, the deciding factors were the difficulty of detecting stolen data and the sheer severity of the fallout of stolen customer data. An analysis of a less critical vulnerability might find that the risks of downtime outweigh the risks of sticking to the update schedule.

The occurrence input can be particularly tricky. It weighs how often this type of failure happens in other similar products or processes—internally or otherwise. This input needs to be tailored to your enterprise. When undertaking completely new products or processes, failure occurrences are unknown, so we can safely use similar occurrences across similar industries, platforms, etc.

The standard is to adapt the values and language below to your specific need:

10-9: very high (virtually inevitable)
8-7: high (failure likely, many known cases)
6-4: moderate (somewhat likely, some known cases)
3-2: low (few known cases)
1: unlikely (no known cases)

The logical choice
The FMEA is a fantastic and underrated tool for making critical analytical decisions when it relates to security and risk. As the needs of businesses become more complex, IT security must have the right tools to help the enterprise be more agile and responsive and to perform better overall—the FMEA is a tremendously valuable asset for that purpose.

Chief Security Evangelist Rafal Los is one of HP’s most prolific security experts. Join him in his SecBiz LinkedIn group, follow him @Wh1t3Rabbit, and read his blog, Following the White Rabbit.


x

IT leader assessment

This tool evaluates the correlation between IT attributes and business success and, based on how your answers compare with average scores, will advise you where to invest in IT.

It is based on data HP collected from 650 global companies about a range of IT characteristics (server capacities, approach to information management, security, BYOD, etc.) and how they correlate to revenue gain. This assessment will compare your answers to the average scores in that study.

There are 12 questions that will require an estimated 10 minutes of your time. You'll receive a summary of your rating upon completion.



Let's get started
x

Please select an answer.
x

Analysis:

Your answer:
Your score:
Average score:
Revenue leaders' score:


x

Please select an answer.


x

Results

Your score:
Average score:
Revenue leaders' score:


Get detailed results:

Subscribe

Popular tags

Events

Big Data changes everything

HP CEO Meg Whitman discusses how connected intelligence will drive IT operations, application development, IT security, marketing, compliance—and the bottom line. Register now.


Discover Performance Weekly

HP Software’s Paul Muller hosts a weekly video digging into the hottest IT issues. Check out the latest episode.


The mobile enterprise without compromise

Fast-growing mobility can drive difficult IT choices. Learn how to engage users, partners, and customers with your solutions.


HP Vertica Big Data Conference 2014

Network with your peers and our experts and partners to learn how to maximize your Big Data analytics outcomes.


Enterprise 20/20

Introduction to Enterprise 20/20

What will a successful enterprise look like in the future?

CIO 20/20

Challenges and opportunities for the CIO of the future.

Employee 20/20

What the workforce of 2020 can expect from IT, and what IT can expect from the workforce.

Data Center 20/20

The innovation and revenue engine of the enterprise.

Dev Center 20/20

How will we organize development centers for the apps that will power our enterprises?

Marketing 20/20

Welcome to a new reality of split-second decisions and marketing by the numbers.

IT Operations 20/20

How can you achieve the data center of the future?

Security 20/20

Preparing today for tomorrow’s threats.

Mobility 20/20

Looking toward the era when everyone — and everything — is connected.

Read more

HP Software related

Most read articles

Discover Performance

Archive

Tweets @ HPITperformance