05.08.2013 Views

Creating a Culture of Security

Creating a Culture of Security

Creating a Culture of Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Creating</strong> a<br />

<strong>Culture</strong> <strong>of</strong> <strong>Security</strong>


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> <strong>of</strong> SeCurity<br />

ISACA ®<br />

With 95,000 constituents in 160 countries, ISACA (www.isaca.org) is a leading global provider<br />

<strong>of</strong> knowledge, certifications, community, advocacy and education on information systems (IS)<br />

assurance and security, enterprise governance and management <strong>of</strong> IT, and IT-related risk and<br />

compliance. Founded in 1969, the nonpr<strong>of</strong>it, independent ISACA hosts international conferences,<br />

publishes the ISACA ® Journal, and develops international IS auditing and control standards,<br />

which help its constituents ensure trust in, and value from, information systems. It also advances<br />

and attests IT skills and knowledge through the globally respected Certified Information Systems<br />

Auditor ® (CISA ® ), Certified Information <strong>Security</strong> Manager ® (CISM ® ), Certified in the Governance<br />

<strong>of</strong> Enterprise IT ® (CGEIT ® ) and Certified in Risk and Information Systems Control TM (CRISC TM )<br />

designations. ISACA continually updates COBIT ® , which helps IT pr<strong>of</strong>essionals and enterprise<br />

leaders fulfill their IT governance and management responsibilities, particularly in the areas <strong>of</strong><br />

assurance, security, risk and control, and deliver value to the business.<br />

Disclaimer<br />

ISACA has designed and created <strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> <strong>Security</strong> (the “Work”) primarily as an<br />

educational resource for security pr<strong>of</strong>essionals. ISACA makes no claim that use <strong>of</strong> any <strong>of</strong> the<br />

Work will assure a successful outcome. The Work should not be considered inclusive <strong>of</strong> any<br />

proper information, procedures and tests or exclusive <strong>of</strong> other information, procedures and tests<br />

that are reasonably directed to obtaining the same results. In determining the propriety <strong>of</strong> any<br />

specific information, procedure or test, security pr<strong>of</strong>essionals should apply their own pr<strong>of</strong>essional<br />

judgment to the specific circumstances presented by the particular systems or information<br />

technology environment.<br />

Reservation <strong>of</strong> Rights<br />

© 2011 ISACA. All rights reserved. No part <strong>of</strong> this publication may be used, copied, reproduced,<br />

modified, distributed, displayed, stored in a retrieval system or transmitted in any form by any<br />

means (electronic, mechanical, photocopying, recording or otherwise) without the prior written<br />

authorization <strong>of</strong> ISACA. Reproduction and use <strong>of</strong> all or portions <strong>of</strong> this publication are permitted<br />

solely for academic, internal and noncommercial use and for consulting/advisory engagements and<br />

must include full attribution <strong>of</strong> the material’s source. No other right or permission is granted with<br />

respect to this work.<br />

ISACA<br />

3701 Algonquin Road, Suite 1010<br />

Rolling Meadows, IL 60008 USA<br />

Phone: +1.847.253.1545<br />

Fax: +1.847.253.1443<br />

E-mail: info@isaca.org<br />

Web site: www.isaca.org<br />

ISBN 978-1-60420-183-3<br />

<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> <strong>Security</strong><br />

CRISC is a trademark/service mark <strong>of</strong> ISACA. The mark has been applied for or registered in<br />

countries throughout the world.<br />

2<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


ISACA wishes to recognize:<br />

ACknowledgmentS<br />

aCknowledgementS<br />

Development Team<br />

Steven J. Ross, CISA, CBCP, CISSP, Risk Masters, Inc., USA, Author<br />

Jo Stewart-Rattray, CISA, CISM, CGEIT, CSEPS, RSM Bird Cameron, Australia, Chair<br />

Christos Dimitriadis, Ph.D., CISA, CISM, INTRALOT S.A., Greece<br />

Wendy Goucher, Idrach Ltd., UK<br />

Norman Kromberg, CISA, CGEIT, Alliance Data, USA<br />

Finn Olav Sveen, Ph.D., Gjøvik University College, Norway<br />

Vernon Poole, CISM, CGEIT, Sapphire, UK<br />

Rinki Sethi, CISA, eBay, USA<br />

Expert Reviewers<br />

Sanjay Bahl, CISM, Micros<strong>of</strong>t Corp. (India) Pvt. Ltd., India<br />

Garry Barnes, CISA, CISM, CGEIT, Commonwealth Bank <strong>of</strong> Australia, Australia<br />

Krag Brotby, CISM, CGEIT, NextStepInfoSec, USA<br />

Meenu Gupta, CISA, CISM, CBP, CIPP, CISSP, Mittal Technologies, USA<br />

Mark Lobel, CISA, CISM, CISSP, PricewaterhouseCoopers LLP, USA<br />

Naiden Nedelchev, CISM, CGEIT, Mobiltel EAD, Bulgaria<br />

Ramesan Ramani, CISM, CGEIT, Paramount Computer Systems, UAE<br />

Christophe Veltsos, Ph.D., CISA, CIPP, CISSP, GCFA, Minnesota State University, Mankato, USA<br />

ISACA Board <strong>of</strong> Directors<br />

Emil D’Angelo, CISA, CISM, Bank <strong>of</strong> Tokyo-Mitsubishi UFJ Ltd., USA, International President<br />

Christos K. Dimitriadis, Ph.D., CISA, CISM, INTRALOT S.A., Greece, Vice President<br />

Ria Lucas, CISA, CGEIT, Telstra Corp. Ltd., Australia, Vice President<br />

Hitoshi Ota, CISA, CISM, CGEIT, CIA, Mizuho Corporate Bank Ltd., Japan, Vice President<br />

Jose Angel Pena Ibarra, CGEIT, Alintec S.A., Mexico, Vice President<br />

Robert E. Stroud, CGEIT, CA Technologies, USA, Vice President<br />

Kenneth L. Vander Wal, CISA, CPA, Ernst & Young LLP (retired), USA, Vice President<br />

Rolf M. von Roessing, CISA, CISM, CGEIT, Forfa AG, Germany, Vice President<br />

Lynn C. Lawton, CISA, FBCS CITP, FCA, FIIA, KPMG Ltd., Russian Federation,<br />

Past International President<br />

Everett C. Johnson Jr., CPA, Deloitte & Touche LLP (retired), USA, Past International President<br />

Gregory T. Grocholski, CISA, The Dow Chemical Co., USA, Director<br />

Tony Hayes, CGEIT, AFCHSE, CHE, FACS, FCPA, FIIA, Queensland Government,<br />

Australia, Director<br />

Howard Nicholson, CISA, CGEIT, CRISC, City <strong>of</strong> Salisbury, Australia, Director<br />

Jeff Spivey, CPP, PSP, <strong>Security</strong> Risk Management, USA, ITGI Trustee<br />

Guidance and Practices Committee<br />

Kenneth L. Vander Wal, CISA, CPA, Ernst & Young LLP (retired), USA, Chair<br />

Kamal N. Dave, CISA, CISM, CGEIT, Hewlett-Packard, USA<br />

Urs Fischer, CISA, CRISC, CIA, CPA (Swiss), Switzerland<br />

Ramses Gallego, CISM, CGEIT, CISSP, Entel IT Consulting, Spain<br />

Phillip J. Lageschulte, CGEIT, CPA, KPMG LLP, USA<br />

Ravi Muthukrishnan, CISA, CISM, FCA, ISCA, Capco IT Service India Pvt. Ltd., India<br />

Anthony P. Noble, CISA, CCP, Viacom Inc., USA<br />

Salomon Rico, CISA, CISM, CGEIT, Deloitte, Mexico<br />

Frank Van Der Zwaag, CISA, Westpac New Zealand, New Zealand<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .<br />

3


4<br />

<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

ACknowledgmentS (cont.)<br />

ISACA and IT Governance Institute ® (ITGI ® ) Affiliates and Sponsors<br />

American Institute <strong>of</strong> Certified Public Accountants<br />

ASIS International<br />

The Center for Internet <strong>Security</strong><br />

Commonwealth Association for Corporate Governance Inc.<br />

FIDA Inform<br />

Information <strong>Security</strong> Forum<br />

Information Systems <strong>Security</strong> Association<br />

Institut de la Gouvernance des Systèmes d’Information<br />

Institute <strong>of</strong> Management Accountants Inc.<br />

ISACA chapters<br />

ITGI Japan<br />

Norwich University<br />

Solvay Brussels School <strong>of</strong> Economics and Management<br />

University <strong>of</strong> Antwerp Management School<br />

ASI System Integration<br />

Hewlett-Packard<br />

IBM<br />

SOAProjects Inc.<br />

Symantec Corp.<br />

TruArx Inc.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


ContentS<br />

table <strong>of</strong> ContentS<br />

Preface .............................................................................................................................. 9<br />

Endnotes ...................................................................................................................... 9<br />

1.0 Introduction ............................................................................................................ 11<br />

1.1 Hard and S<strong>of</strong>t <strong>Security</strong> ...................................................................................... 13<br />

1.2 Whose <strong>Culture</strong> Is It? ............................................................................................ 15<br />

Endnotes .................................................................................................................... 15<br />

2.0 A <strong>Culture</strong> <strong>of</strong> <strong>Security</strong> in Context ........................................................................ 17<br />

2.1 Doing vs. Believing ........................................................................................... 17<br />

2.1.1 Ambiguity and Inconsistency.................................................................. 18<br />

2.2 <strong>Culture</strong> in Context ............................................................................................. 18<br />

2.2.1 Societal <strong>Culture</strong> and <strong>Security</strong> ................................................................ 20<br />

2.2.2 Organizational <strong>Culture</strong> and <strong>Security</strong> ...................................................... 21<br />

2.2.3 Personal <strong>Culture</strong> and <strong>Security</strong> ................................................................. 22<br />

2.3 <strong>Security</strong> in the Context <strong>of</strong> <strong>Culture</strong> ................................................................... 24<br />

2.3.1 <strong>Security</strong> as the Basis <strong>of</strong> Trust ................................................................. 26<br />

2.3.2 <strong>Security</strong> in the Prevention <strong>of</strong> Fraud and Misuse <strong>of</strong><br />

Information Resources ..............................................................................28<br />

2.3.3 <strong>Security</strong> and Risk Mitigation .................................................................. 29<br />

2.3.4 <strong>Security</strong> as a Strategic Driver ................................................................. 32<br />

2.3.5 <strong>Security</strong> in Systemic Terms .................................................................... 34<br />

Endnotes .................................................................................................................... 35<br />

3.0 The Benefits <strong>of</strong> a <strong>Culture</strong> <strong>of</strong> <strong>Security</strong>................................................................. 39<br />

3.1 The Benefits <strong>of</strong> Trust ........................................................................................ 40<br />

3.1.1 Internal Trust ............................................................................................ 42<br />

3.1.2 External Trust ........................................................................................... 43<br />

3.2 The Benefits <strong>of</strong> Consistency ............................................................................. 45<br />

3.2.1 Valuing Information ................................................................................ 46<br />

3.2.2 Exception Processes ................................................................................. 47<br />

3.2.3 Risk Management .................................................................................... 47<br />

3.2.4 Predictability ............................................................................................. 48<br />

3.2.5 Standardization ......................................................................................... 49<br />

3.3 Improved Ability to Manage Risk ................................................................... 50<br />

3.4 Improved Return on <strong>Security</strong> Investment ....................................................... 51<br />

3.5 Compliance With Laws and Regulations ........................................................ 53<br />

3.6 Shareholder/Citizen Value ................................................................................ 54<br />

Endnotes .................................................................................................................... 55<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 5


6<br />

<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

4.0 Inhibitors to a <strong>Culture</strong> <strong>of</strong> <strong>Security</strong> ..................................................................... 57<br />

4.1 Societal <strong>Culture</strong> ................................................................................................. 58<br />

4.2 Lack <strong>of</strong> Organizational Imperatives................................................................. 59<br />

4.3 Unclear Requirements ....................................................................................... 60<br />

4.4 Insufficiency <strong>of</strong> Awareness Alone ................................................................... 61<br />

4.4.1 Comprehension <strong>of</strong> Risk ........................................................................... 62<br />

4.4.2 The Personal Experience <strong>of</strong> <strong>Security</strong> ..................................................... 62<br />

4.5 Systemic Shortcomings ..................................................................................... 64<br />

4.5.1 Inability to Detect Variances From Policy and <strong>Culture</strong> ....................... 66<br />

4.5.2 Inability to Monitor and Enforce Compliance With the <strong>Culture</strong> ......... 67<br />

4.6 Lack <strong>of</strong> Rewards ................................................................................................ 68<br />

4.6.1 <strong>Security</strong> Pr<strong>of</strong>essionals .............................................................................. 69<br />

4.6.2 Lack <strong>of</strong> Metrics ........................................................................................ 69<br />

4.6.3 Failure to Measure Risk .......................................................................... 70<br />

4.6.4 Lack <strong>of</strong> Incidents ...................................................................................... 71<br />

4.6.5 No Financial Connection ......................................................................... 71<br />

4.7 What Is in It for Me? ......................................................................................... 72<br />

4.7.1 Budget ....................................................................................................... 72<br />

4.7.2 Influence ................................................................................................... 73<br />

4.7.3 Management Attention ............................................................................ 73<br />

4.7.4 Personal Regard........................................................................................ 73<br />

Endnotes .................................................................................................................... 74<br />

5.0 <strong>Creating</strong> an Intentional <strong>Culture</strong> <strong>of</strong> <strong>Security</strong> ..................................................... 75<br />

5.1 Changing Perceptions <strong>of</strong> <strong>Security</strong> .................................................................... 76<br />

5.1.1 Branding <strong>Security</strong> .................................................................................... 77<br />

5.1.2 Educating About <strong>Security</strong> ....................................................................... 80<br />

5.2 The People Who Make the <strong>Culture</strong> ................................................................. 81<br />

5.2.1 Intentionality ............................................................................................. 82<br />

5.2.2 Finding the Champion ............................................................................. 83<br />

5.2.3 Objects <strong>of</strong> a <strong>Security</strong> <strong>Culture</strong> .................................................................. 84<br />

5.3 Attributes <strong>of</strong> a <strong>Security</strong> <strong>Culture</strong> ....................................................................... 85<br />

5.3.1 <strong>Security</strong> Champions ................................................................................. 85<br />

5.3.2 Budget for <strong>Security</strong> .................................................................................. 86<br />

5.3.3 Broad Accountability ............................................................................... 87<br />

5.3.4 Awareness and Education ....................................................................... 88<br />

5.3.5 Policies, Standards and Guidelines......................................................... 88<br />

5.3.6 Go/No-go Decisions ................................................................................ 89<br />

5.3.7 Rewards ..................................................................................................... 90<br />

5.3.8 Rigorous Response to Breaches .............................................................. 90<br />

5.3.9 Satisfied Customers ................................................................................. 91<br />

Endnotes .................................................................................................................... 92<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


table <strong>of</strong> ContentS<br />

6.0 Positive Reinforcement ......................................................................................... 93<br />

6.1 Alignment <strong>of</strong> Information <strong>Security</strong> and Business Objectives ....................... 94<br />

6.1.1 <strong>Security</strong> as an Obstacle ............................................................................ 94<br />

6.1.2 Strategic Necessity ................................................................................... 95<br />

6.1.3 Risk Management .................................................................................... 96<br />

6.1.4 <strong>Security</strong> Procedures Embedded in Daily Operations ............................ 98<br />

6.1.5 Management Reward Structure............................................................... 99<br />

6.2 Balance ............................................................................................................. 100<br />

6.2.1 The Burden on <strong>Security</strong> Pr<strong>of</strong>essionals ................................................ 100<br />

6.2.2 The Burden on the Enterprise ............................................................... 102<br />

6.3 Convergence <strong>of</strong> <strong>Security</strong> Roles ...................................................................... 103<br />

6.4 Automated Cultural Tools .............................................................................. 104<br />

6.4.1 An Architecture for a <strong>Security</strong> <strong>Culture</strong> ................................................ 106<br />

6.5 Stakeholder Feedback ..................................................................................... 109<br />

Endnotes .................................................................................................................. 110<br />

7.0 Negative Reinforcement ...................................................................................... 113<br />

7.1 Perverse Incentives .......................................................................................... 114<br />

7.2 Vigilance .......................................................................................................... 115<br />

7.2.1 What to Watch ........................................................................................ 115<br />

7.2.2 Who Should Watch ................................................................................ 117<br />

7.3 Automated Detection ....................................................................................... 118<br />

7.4 Alerts, Alarms and Triggers ........................................................................... 119<br />

7.4.1 Alerts ....................................................................................................... 119<br />

7.4.2 Alarms ..................................................................................................... 121<br />

7.4.3 Triggers .................................................................................................. 122<br />

7.5 When All Else Fails ........................................................................................ 123<br />

7.5.1 Penalties .................................................................................................. 125<br />

7.5.2 Defiance .................................................................................................. 126<br />

7.5.3 Career Impact ......................................................................................... 126<br />

Endnotes .................................................................................................................. 127<br />

8.0 How Good Is Good Enough? ............................................................................. 129<br />

8.1 Getting There ................................................................................................... 131<br />

8.1.1 Establish the Need for Change ............................................................. 132<br />

8.1.2 Communicate the Desired Vision ......................................................... 133<br />

8.1.3 Achieve Initial Objectives ..................................................................... 133<br />

8.1.4 Strike a Balance...................................................................................... 134<br />

8.1.5 Institutionalize the Intentional <strong>Security</strong> <strong>Culture</strong> ................................. 134<br />

8.1.6 Sustain the Intentional <strong>Security</strong> <strong>Culture</strong> .............................................. 134<br />

8.2 Conclusion ........................................................................................................ 135<br />

Endnotes .................................................................................................................. 136<br />

ISACA Pr<strong>of</strong>essional Guidance Publications ......................................................... 137<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 7


8<br />

<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

Page intentionally left blank<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


PRefACe<br />

PrefaCe<br />

In October 2010, ISACA published The Business Model for Information <strong>Security</strong><br />

(BMIS). The model takes a business oriented approach to managing information<br />

security, building on the foundational concepts developed by the association. It<br />

utilizes systems thinking to clarify complex relationships within the enterprise and,<br />

thus, to more effectively manage security. 1<br />

One <strong>of</strong> the findings <strong>of</strong> the BMIS study was that an intentional culture <strong>of</strong> security 2<br />

was the primary objective for the model, as applied to information security. 3 The<br />

intentionality <strong>of</strong> security must be emphasized. Implicit in the use <strong>of</strong> “intentional”<br />

is that enterprises—companies in the private sector, agencies in the public<br />

sector—do not, for the most part, have an effective culture <strong>of</strong> security, one<br />

that supports the protection <strong>of</strong> information while also supporting the broader<br />

aims <strong>of</strong> the enterprise. They must take active, directed steps to improve it. All<br />

enterprises have a culture <strong>of</strong> security. In most cases, it lacks intentionality and is<br />

inconsistent to the extent that it exists at all; in others, it is robust and guides the<br />

daily activities <strong>of</strong> employees and others who come in contact with the enterprise.<br />

Most important, those enterprises with a stronger culture <strong>of</strong> security may not have<br />

created it purposefully; the existence <strong>of</strong> meaningful security is so clearly aligned<br />

with the mission <strong>of</strong> the business that management did not need to apply intentional<br />

measures. Understanding whether the culture was created in a purposeful manner or<br />

by “accident” is critical to sustaining the culture in the long run.<br />

This volume is dedicated to all those who recognize the importance <strong>of</strong> security<br />

and who strive to achieve it. They may feel that their enterprises have given lip<br />

service to security, but do not actually have the firmness and resolution <strong>of</strong> purpose<br />

to receive the full value <strong>of</strong> the investments made in security. The people they work<br />

with say the right things, <strong>of</strong>ten do the right things and even pay for the right things,<br />

but the information with which they carry out their responsibilities is not really<br />

secure. They want to achieve a meaningful, intentional security culture. It is the<br />

purpose <strong>of</strong> this volume to suggest the way to do it.<br />

Endnotes<br />

1 ISACA, The Business Model for Information <strong>Security</strong> (BMIS), USA, 2010<br />

2 Throughout this volume, it is assumed, but not stated, that “security” refers to the<br />

security <strong>of</strong> information resources. If a differentiation is required, it is specified,<br />

e.g., physical, personnel or operations security.<br />

3 ISACA, An Introduction to the Business Model for Information <strong>Security</strong>, 2009, p. 12<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 9


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

10<br />

Page intentionally left blank<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


1.0 IntRoduCtIon<br />

My management just does not “get” information security!<br />

1.0 introduCtion<br />

Our information security department keeps getting more tools, but as a<br />

senior executive, I do not think we are any more secure.<br />

<strong>Security</strong> policy is one thing. Reality is another.<br />

Sure, I support security, but if there is going to be a company to secure,<br />

departments like mine need to make money.<br />

I am so overwhelmed with all the passwords I have to remember; I just<br />

write them down and leave them next to my computer.<br />

I know that I am not supposed to have access to this information, but<br />

I was granted authorization in my old position and just kept it when I<br />

was transferred.<br />

Management has authorized acquisition <strong>of</strong> monitoring tools, but they<br />

did not give me any budget for people to do the monitoring.<br />

All the information security people do is say “no.” They should learn<br />

the way this business really works.<br />

All <strong>of</strong> these comments, and many more like them, are heard in enterprise after<br />

enterprise around the world. Often enough, all <strong>of</strong> these statements may be heard<br />

in the same enterprise, although they do seem mutually contradictory. How can<br />

it be that senior management funds an information security function; provides it<br />

with the latest, most effective tools; and backs those tools with a definitive security<br />

policy, but still does not feel that the enterprise’s information is secure? In fact,<br />

there is sufficient evidence that it is not secure. Somewhere within the workings<br />

<strong>of</strong> the company or government agency, something that should be happening is not<br />

happening. Someone—or many people—is not effectively supporting security.<br />

The missing element is a culture <strong>of</strong> security, defined in BMIS as a pattern <strong>of</strong><br />

behaviors, beliefs, assumptions, attitudes and ways <strong>of</strong> doing things. It is emergent<br />

and learned, and it creates a sense <strong>of</strong> comfort. <strong>Culture</strong> evolves as a type <strong>of</strong> shared<br />

history as a group goes through a set <strong>of</strong> common experiences. Those similar<br />

experiences cause certain responses, which become a set <strong>of</strong> expected and shared<br />

behaviors. These behaviors become unwritten rules that, in turn, become norms<br />

that are shared by all people who have that common history. It is important to<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 11


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

understand the culture <strong>of</strong> the enterprise because it pr<strong>of</strong>oundly influences what<br />

information is considered, how it is interpreted and what will be done with it. 1<br />

Note the importance <strong>of</strong> the terms used in the definition from BMIS:<br />

• Pattern—Not just intermittent, but continuous<br />

• Behaviors—The way people act and not what they say they intend to do<br />

• Beliefs—The core principles that people bring to the world <strong>of</strong> business<br />

• Assumptions—The personal and societal expectations about information and its<br />

protection that binds belief and behaviors<br />

• Attitudes—The perspectives on security that are ingrained in people based on<br />

previous experience<br />

• Ways <strong>of</strong> doing things—The security procedures embedded in day-to-day<br />

operations<br />

A culture arises whenever two or more people are engaged in a common endeavor.<br />

In a business setting, there is a pattern <strong>of</strong> behaviors, beliefs, assumptions, attitudes<br />

and ways <strong>of</strong> doing things that constitute a corporate culture. To the extent that<br />

information is a part <strong>of</strong> that business, there is a component that is a security<br />

culture. It may be weak, ineffective, disorganized, contradictory, unrecognized and<br />

haphazard, but it exists. A security culture exists in every enterprise. It is preferable<br />

that a culture <strong>of</strong> security be strong, effective, well-organized, consistent and<br />

supportive <strong>of</strong> the intentions <strong>of</strong> those in an enterprise who recognize that security is<br />

a strategic attribute and contributes to the overall health <strong>of</strong> the enterprise. That is,<br />

supposedly, the intention <strong>of</strong> management.<br />

Even in enterprises in which there are many <strong>of</strong> the components <strong>of</strong> security—staff,<br />

s<strong>of</strong>tware, hardware, procedures, policies and standards—without a culture to bind<br />

them to the overall corporate culture, the best that can be hoped for is mechanistic<br />

compliance with the routine requirements <strong>of</strong> protecting information. It will be<br />

the minimum security that the enterprise can tolerate—meaning it is something<br />

that must be endured or accepted grudgingly. It will not be the degree <strong>of</strong> security<br />

appropriate to that enterprise, in the context <strong>of</strong> the way it does business in its<br />

industry or with its customers or where it is located in the world. <strong>Security</strong> without<br />

culture is insufficient security.<br />

Achievement <strong>of</strong> that level <strong>of</strong> security will not happen by itself—self-generated<br />

and unsystematically. It requires people <strong>of</strong> good intent to take both positive and<br />

punitive measures to strengthen a security culture to a desired level, the level<br />

that management intends it to be or should be in the opinion <strong>of</strong> organizational<br />

leadership. For that reason, this volume is focused on the development <strong>of</strong> an<br />

intentional security culture. Yes, a culture <strong>of</strong> security always exists, but an<br />

intentionally strong, effective and resilient security culture requires work, both to<br />

build and maintain it.<br />

12<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


1.0 introduCtion<br />

An enterprise that recognizes that it does not operate with an effective culture <strong>of</strong><br />

security, but that wishes to create one, must establish a systemic viewpoint across<br />

the enterprise with regard to the protection <strong>of</strong> information. It must reconcile all the<br />

contradictory impulses within the enterprise that inhibit the growth <strong>of</strong> security. A<br />

culture cannot be effected quickly, as may the mechanics <strong>of</strong> security. There is no<br />

appliance to install or s<strong>of</strong>tware to implement. It involves the creation <strong>of</strong> a mindset<br />

among the people who make up the enterprise and among those with whom it<br />

comes in contact—vendors, customers, other stakeholders and the society at large.<br />

That mindset, the outlook and attitudes that drive behavior, is the substance <strong>of</strong> a<br />

culture, one that must be implanted, nurtured and accepted gradually. It cannot be<br />

imposed from above, although organizational leadership can lead the way.<br />

Once established, an intentional culture <strong>of</strong> security tends to be forgotten—not the<br />

culture itself, but the intentionality <strong>of</strong> it. At that point, certain behaviors are intrinsic<br />

to the enterprise’s way <strong>of</strong> doing business. For example, in the private sector, there<br />

is no need for an intentional culture <strong>of</strong> sales; sales teams sell products because that<br />

is what they do. It is simply recognized that, without sales, there is no business,<br />

and people act accordingly. An exaggerated sales culture can be disadvantageous to<br />

customer service, pr<strong>of</strong>it or security. In extreme cases, a sales culture can overwhelm<br />

ethics and legality. In the same way, a culture <strong>of</strong> security that is too heavy could<br />

be an impediment to growth or mission achievement. A heavy security culture<br />

could be a business disabler if not properly aligned with the organizational mission<br />

and business functions. It must fit comfortably within the overall culture <strong>of</strong> the<br />

enterprise and become so habitual that it is barely noticed.<br />

1.1 Hard and S<strong>of</strong>t <strong>Security</strong><br />

It is a fallacy to consider the technology and mechanics <strong>of</strong> security as being hard,<br />

while considering those aspects that deal with human factors such as planning,<br />

management, motivation and reward as the s<strong>of</strong>t side <strong>of</strong> security. The word “hard”<br />

has several connotations: impenetrability, difficulty, firmness, factuality, realism<br />

and strictness. In all these senses, it is the development <strong>of</strong> a culture <strong>of</strong> security that<br />

is hard:<br />

• To be impenetrable, a culture <strong>of</strong> security must adapt to changing environments<br />

and contexts as businesses expand or contract, personnel come and go,<br />

management organizes and reorganizes, and technologies foster and inhibit<br />

innovation. No technology is impenetrable, precisely because all technologies are<br />

implemented by people. The effectiveness <strong>of</strong> any implementation is based on the<br />

thoroughness and consistency <strong>of</strong> those who carry it out—in other words, by the<br />

culture in which they do so.<br />

• For those without it, technical skill can be hard to come by, but it can be taught<br />

and it can be learned. A culture must arise and be lived. The latter is far more<br />

difficult than the former.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 13


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

• Technology may seem firm and unbending: A s<strong>of</strong>tware package will always do<br />

as it is told and a piece <strong>of</strong> equipment will always work the same way—until they<br />

do not. S<strong>of</strong>tware and hardware are engineered artifacts, all <strong>of</strong> which have defects.<br />

Of course, a culture may be defective as well, but it is much more likely to bend<br />

and adapt than to break.<br />

• Similarly, technology is not always factual. Just because a machine produces a<br />

result does not mean that it is the right result. A sound culture must be based on<br />

facts: the way people actually work, the value <strong>of</strong> the information with which they<br />

work and their contradictory impulses that must be accommodated.<br />

• It is odd to think <strong>of</strong> facts as hard and opinions and emotions as s<strong>of</strong>t when the<br />

reality is that many, if not most, people act on the stimuli <strong>of</strong> their emotions and<br />

opinions and not <strong>of</strong> the harsh reality before them. A culture <strong>of</strong> security can be<br />

used to mold opinions across an enterprise much more realistically to the risks <strong>of</strong><br />

their business and the environment in which they perform.<br />

• A culture <strong>of</strong> security is precisely as strict as a given enterprise wants it to be.<br />

There are some types <strong>of</strong> enterprises, such as national intelligence agencies or<br />

banks, in which security is strictly observed. This did not occur haphazardly, but<br />

was a natural consequence <strong>of</strong> business drivers that include pr<strong>of</strong>it and customer<br />

service, to be sure, but also managed risk, achievement <strong>of</strong> organizational mission<br />

and ethics.<br />

There are other meanings <strong>of</strong> security for which a culture must be established to<br />

counter. <strong>Security</strong> should not be oppressive, unrelenting, resentful or troublesome.<br />

<strong>Security</strong> must not be allowed to be considered adverse to mission achievement;<br />

where that is so, there is clear evidence that security is a weak part <strong>of</strong> the overall<br />

corporate culture. It has allowed security to be seen as prohibition rather than<br />

enablement. Among the rationales for a culture <strong>of</strong> security is the alignment <strong>of</strong><br />

security with the business as a whole. The negativity <strong>of</strong>ten associated with<br />

security—locks, barricades, punishment, etc.—undermine its effectiveness. A<br />

culture <strong>of</strong> security is necessary to overcome obstacles <strong>of</strong> those sorts.<br />

A culture <strong>of</strong> security may be seen as s<strong>of</strong>t because it is less tangible, but fuzziness<br />

should not be confused with inaccuracy. <strong>Culture</strong> deals with perceptions, estimations,<br />

preponderances and directions and not with the orderly array <strong>of</strong> numbers that is<br />

found, for example, in accounting or finance. However, perceptions and directions<br />

are <strong>of</strong>ten the indicators <strong>of</strong> reality, more so than the seemingly hard numbers that on<br />

closer inspection—or revelation—may be seen as a smokescreen designed to obscure<br />

reality. A culture determines what an enterprise actually does about security (or any<br />

other objective, for that matter) and not what it says that it intends to do.<br />

14<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


1.2 Whose <strong>Culture</strong> Is It?<br />

1.0 introduCtion<br />

A culture <strong>of</strong> security does not belong to an information security department any<br />

more than an ethical culture belongs to a legal department. A culture is generalized<br />

across an enterprise—among executive management and a board <strong>of</strong> directors;<br />

management and staff; revenue producers and their back <strong>of</strong>fice; and salespeople,<br />

computer operators, cleaning staff, etc. It is the organizational zeitgeist, the spirit <strong>of</strong><br />

the times in which an enterprise operates. It is capable <strong>of</strong> change, and it is affected<br />

by the composition <strong>of</strong> the enterprise itself.<br />

Certain functions—such as information security, internal audit, risk management<br />

and corporate security, to name a few—may well have a more leading role in<br />

crafting the culture. These functions exist and are rewarded for being aware <strong>of</strong> the<br />

need for security and generally being favorable to stronger controls. There is a<br />

trap in perceiving these functions as the owners <strong>of</strong> a culture <strong>of</strong> security, as though<br />

excusing other personnel from having to pay attention to it. To the extent that some<br />

are more committed to security than others, a balance must be achieved. However,<br />

all who would wish to be part <strong>of</strong> an enterprise must adapt to its culture and no one<br />

can afford to stand apart and still thrive. A culture <strong>of</strong> security is and must be a<br />

joint endeavor.<br />

Endnotes<br />

1 Ibid., p. 16<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 15


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

16<br />

Page intentionally left blank<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


2.0 a <strong>Culture</strong> <strong>of</strong> SeCurity in Context<br />

2.0 A CultuRe <strong>of</strong> SeCuRIty In Context<br />

A culture <strong>of</strong> security is a pattern <strong>of</strong> behaviors, beliefs, assumptions, attitudes and<br />

ways <strong>of</strong> doing things that promotes security. As enterprises operate across nations,<br />

they observe that there are multiple levels <strong>of</strong> culture—national culture, industry<br />

culture, organizational culture, functional and departmental culture, pr<strong>of</strong>essional<br />

culture, and cliques and factions culture. What, then, is secure behavior? What does<br />

it mean to believe in security? What assumptions and attitudes lead to security,<br />

and which need to be suppressed if security is to be achieved? Is there a single,<br />

ordained way <strong>of</strong> doing things that promotes security, with all others undermining<br />

security to some greater or lesser degree?<br />

The answer to these and many more questions that are raised in this volume is<br />

context. A culture <strong>of</strong> security fits within a much broader context <strong>of</strong> how a society<br />

interacts; how an enterprise works; and the moral, ethical, political and economic<br />

belief systems <strong>of</strong> the individual who is a part <strong>of</strong> that culture. No one set <strong>of</strong> behaviors<br />

can be extracted from its context and shown to be secure, or insecure, for that<br />

matter. Even more bedeviling, certain patterns <strong>of</strong> behavior may be secure in routine<br />

circumstances, but become less so in times <strong>of</strong> crisis. For example, a help desk may<br />

usually respond to callers on a first-come, first-served basis, but needs to react<br />

aggressively without respect to the order <strong>of</strong> calls when a network is under attack.<br />

2.1 Doing vs. Believing<br />

Does a person have to believe in security to act securely? What, in fact, does it<br />

mean to believe in security? <strong>Security</strong> is not a religion, so where does belief enter the<br />

discussion? It may be fair to ask for two lists, one <strong>of</strong> secure practices and another <strong>of</strong><br />

dangerous ones. If everyone followed the first and eschewed the second, would that<br />

not create security? Indeed, there is a place for those lists: They are called policy,<br />

standards, guidelines and procedures, which relate the way an enterprise is to go<br />

about its mission. Rules have exceptions, and the people who follow them are not<br />

robots. Judgment; comprehension; and, yes, beliefs enter into the way things actually<br />

work, as opposed to how they are supposed to work.<br />

It is insufficient simply to do what is required because those crafting the requirements<br />

are unable to foresee all <strong>of</strong> the situations in which they are to be applied and there<br />

are exceptions to the rules best left to those who apply them. There needs to be an<br />

understanding on the part <strong>of</strong> those acting on the policies as to why they were written,<br />

for whom they were intended and what the intent <strong>of</strong> the writers was at the time they<br />

were written. It is to be expected that those who issue the policies would be more<br />

conscious <strong>of</strong> and diligent in adhering to the policies than those who receive them.<br />

For the few to achieve their objectives through the efforts <strong>of</strong> many, they need to<br />

convey the rationale behind the policies to their constituencies. In short, they must<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 17


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

communicate a systematic viewpoint that drives the policies and that, in turn, is so<br />

conditioned by the way the policy writers have internalized the need for security that<br />

it may accurately be described as a pattern <strong>of</strong> beliefs.<br />

2.1.1 Ambiguity and Inconsistency<br />

A simple, prescriptive model for developing a secure enterprise also breaks down<br />

in the face <strong>of</strong> the many ambiguities and inconsistencies inherent in the word<br />

“security.” Everyone wants to be secure, but not always at the cost <strong>of</strong> comfort,<br />

flexibility, efficiency or timeliness. <strong>Security</strong> is a desired state, but not at any<br />

price. It does not come risk-free. In fact, true security implies the acceptance <strong>of</strong><br />

a reasonable level <strong>of</strong> risk, which only raises the importance <strong>of</strong> who determines<br />

the reasonability <strong>of</strong> any set <strong>of</strong> decisions or actions. No set <strong>of</strong> policies, standards,<br />

guidelines or procedures can foresee all the circumstances in which they are to be<br />

interpreted. At that point, it is the interpreter who is making the rules, and if that<br />

person is not grounded in a culture <strong>of</strong> security, the likelihood <strong>of</strong> acting in the proper<br />

manner is problematic.<br />

Moreover, there are inherent internal contradictions in the definition <strong>of</strong> “security”<br />

that defy easy interpretation. For example, access control and privacy are two<br />

aspects <strong>of</strong> security. Access control demands that the attributes and actions <strong>of</strong><br />

each user be known, while privacy demands that these be obscured. 1 The balance<br />

between these conflicting imperatives is an essential part <strong>of</strong> a security culture.<br />

Frustrating as it may be, there will always be ambiguity in any culture, including<br />

one <strong>of</strong> security. It must deal with the contradictions, shortcomings and just plain<br />

silliness that are a part <strong>of</strong> the human condition. In attempting to overcome this<br />

ambiguity, many turn to automation. If security is needed, at least in part, to control<br />

technology, what better tool than technology to achieve the objective? Sadly, this is<br />

circular reasoning; philosophers and mathematicians have shown that no system can<br />

be validated within itself. 2 In other words, technology will always reach a point at<br />

which it cannot secure itself.<br />

Thus, a culture <strong>of</strong> security does not guarantee an absence <strong>of</strong> breaches nor freedom<br />

from error. It is not the cause <strong>of</strong> security, but rather a necessary context in which<br />

security can be fostered and accepted. It is foundational to the achievement <strong>of</strong><br />

security without any preceding understanding <strong>of</strong> what security is or demands. The<br />

culture does not create security, but true security cannot be created in the absence<br />

<strong>of</strong> a supportive culture.<br />

2.2 <strong>Culture</strong> in Context<br />

Enterprises are organic. That is, all enterprises, beyond the most rudimentary, are<br />

a systematic coordination <strong>of</strong> many discrete and interacting parts. For example, in a<br />

commercial business, there are those who create a product, those who sell it, those<br />

18<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


2.0 a <strong>Culture</strong> <strong>of</strong> SeCurity in Context<br />

who record and administer the money made, those who control the process, and<br />

those who manage the enterprise as a whole. Each is driven by its own dynamics;<br />

all are working together toward a common goal—or at least should be doing so.<br />

The values, assumptions and attitudes that underlie those goals are referred to as the<br />

“corporate culture” that forms a unifying whole for the enterprise and provides the<br />

context within which events are viewed and understood.<br />

Unfortunately, each part <strong>of</strong> an enterprise sometimes becomes so captivated by its<br />

own imperatives, direction, rewards and penalties that the enterprise’s common,<br />

unitary culture becomes submerged beneath the siloed cultures <strong>of</strong> departments,<br />

locations, functions or pr<strong>of</strong>essions. In some cases, the competing cultures create<br />

tensions that pull on each individual within the enterprise. Some functions may<br />

have a sales culture in which anything done to make a sale is rewarded. Others may<br />

be pr<strong>of</strong>it-oriented, with drivers to both high-margin sales and reduced costs. Still<br />

others may participate in a culture <strong>of</strong> customer service, ethics or growth. Some may<br />

live in a culture <strong>of</strong> security.<br />

All <strong>of</strong> these cultures have a place in any enterprise; they need not be contradictory<br />

to one another. They need to be balanced. Selling is good, but not at all costs.<br />

Customer service is good, but not to the exclusion <strong>of</strong> pr<strong>of</strong>it. Growth is good, but<br />

not if existing customers are dissatisfied and take their business elsewhere. Recent<br />

news has shown that when a company allows one aspect <strong>of</strong> its culture to become so<br />

dominant that others are crowded out, bad results follow. Unbalanced companies<br />

face devastated morale among employees; poor financial results; mass exodus <strong>of</strong><br />

staff; and, ultimately, the extinction <strong>of</strong> a company.<br />

The culture <strong>of</strong> security is the focus <strong>of</strong> this volume not because it should be<br />

dominant, but because it appears that, in many enterprises, it is unnecessarily<br />

overlooked. Many enterprises today have a function that oversees security. In<br />

fact, they have many such functions, each one focused on the security <strong>of</strong> physical<br />

assets; personnel; operational processes; personal information; data; or, indeed,<br />

information in all its forms. Collectively, they may foster a culture <strong>of</strong> security, but<br />

without active, deliberate, intentional management support, that culture can be so<br />

fractionalized that it is ineffective in the broader enterprise. These functions may<br />

not even recognize that their competing perspectives on security are undermining<br />

the very culture <strong>of</strong> which they would want to be a part. This, in turn, makes it<br />

difficult for those supportive <strong>of</strong> security to balance it with competing cultures.<br />

There are some enterprises in which security, in one form or another, is <strong>of</strong><br />

paramount concern and in which a culture <strong>of</strong> security is dominant. Among these<br />

are national intelligence agencies; the military; and, in a different manner, prisons<br />

and gold repositories. For most other enterprises, it would be distortive if security<br />

were the dominant culture. The intent within BMIS is not for security to dominate,<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 19


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

but for it to be integrated into a unifying whole within the corporate culture. An<br />

intentional culture <strong>of</strong> security does not create values, but heightens them among the<br />

tensions that act on each individual who lives within it.<br />

2.2.1 Societal <strong>Culture</strong> and <strong>Security</strong><br />

It is questionable whether any culture—or, for that matter, any concept <strong>of</strong><br />

security—is applicable to all enterprises in all corners <strong>of</strong> the world, without<br />

consideration <strong>of</strong> national and regional differences. 3 Are the perceptions and the<br />

realities <strong>of</strong> security the same in urban, industrialized societies and those in rural,<br />

agricultural ones? Are they the same in countries thoroughly embedded in global<br />

commercial processes and those with struggling, self-sufficient economies or for<br />

those at war and those enjoying the blessings <strong>of</strong> peace? It is not that there are<br />

national attributes that would affect security in any nation. Characterizing people<br />

from certain places as unethical, sly or lazy is reprehensible, but clearly, there are<br />

differences <strong>of</strong> custom, law, communications, politics and history that make the<br />

realization <strong>of</strong> a Platonic ideal 4 <strong>of</strong> information security unachievable.<br />

There are international standards for security. Most notably, the 27000 series from the<br />

International Organization for Standardization (ISO) 5 is the DNA, style guide, metric<br />

system and scoreboard <strong>of</strong> security 6 and is generally accepted to be definitive about its<br />

management. Even in this case, there is a caveat to universality: “within the context<br />

<strong>of</strong> the organization’s overall business risks.” 7 What, then, <strong>of</strong> the context <strong>of</strong> societal<br />

norms and expectations that differ from nation to nation and region to region? For<br />

example, the primary control statement for Data protection and privacy <strong>of</strong> personal<br />

information is “Data protection and privacy shall be ensured as required in relevant<br />

legislation, regulations, and, if applicable, contractual clauses.” 8 Thus, explicitly,<br />

there is no universal meaning for privacy—and, by extension, for confidentiality and<br />

the rest <strong>of</strong> security—but rather reliance on necessarily local laws, regulations and<br />

contracts. The comparison is very clear, for example, across the Atlantic. In the US,<br />

privacy is limited to industry verticals, primarily financial services 9 and health care. 10<br />

In most <strong>of</strong> Europe, privacy is a clearly stated fundamental right across society. 11<br />

Multinational companies and those enterprises that do business internationally<br />

cannot presume that dictates for the security <strong>of</strong> information resources will be<br />

perceived or interpreted in the same way in all locations in which they have<br />

interests. The burden is on the management <strong>of</strong> those enterprises to create their<br />

own cultures <strong>of</strong> security, while respecting the differences <strong>of</strong> milieu in which<br />

they will operate. A Londoner (UK) and a New Yorker (USA) may work for<br />

the same company and adhere to the same corporate goals, but when confronted<br />

with a matter that affects or is affected by considerations <strong>of</strong> security, they very<br />

well may not understand the same words the same way. How much higher would<br />

these societal barriers be in countries that do not share the same language, history<br />

20<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


2.0 a <strong>Culture</strong> <strong>of</strong> SeCurity in Context<br />

and heritage? A culture <strong>of</strong> security cannot be imposed; it must be created on the<br />

substrate <strong>of</strong> the culture <strong>of</strong> the societies within which it is. Given differences in law,<br />

regulation and national outlook, it is possible that there may be several subcultures<br />

<strong>of</strong> security within one enterprise.<br />

2.2.2 Organizational <strong>Culture</strong> and <strong>Security</strong><br />

Just as culture differs across geographic locations, so a culture <strong>of</strong> security is<br />

pr<strong>of</strong>oundly affected by the industry or industries in which an enterprise operates.<br />

Within industries, there are differences in corporate (and <strong>of</strong>ten divisional) cultures.<br />

In a positive sense, differentiating security along organizational lines is a strength<br />

<strong>of</strong> a security culture. It indicates a balance that reflects the differing needs <strong>of</strong> each<br />

enterprise’s business. A stronger organizational security culture arises when there<br />

is a common security purpose tied to shared beliefs, values and assumptions. For<br />

example, all pharmaceutical companies have concern for the security <strong>of</strong> their<br />

formulas and their clinical research data. Some <strong>of</strong> this is driven by the commercial<br />

need to protect the companies’ intellectual property and, to a different degree,<br />

by the ethical consideration <strong>of</strong> the health and privacy <strong>of</strong> test subjects. Most<br />

drug manufacturers are less focused on security than are, for example, mining<br />

companies, in which the major focus <strong>of</strong> security is on the safety <strong>of</strong> personnel, not<br />

information. How much less powerful is a culture <strong>of</strong> security for a manufacturer <strong>of</strong><br />

commodity products?<br />

Every enterprise has a culture <strong>of</strong> security. The security needs <strong>of</strong> commodity<br />

manufacturing pale beside those <strong>of</strong> developing a cancer therapy, and those <strong>of</strong> large<br />

corporations are greater than those <strong>of</strong> a start-up business. In both cases, though,<br />

there is a culture at work. It may be more robust and accepted in one enterprise<br />

than another, without regard to size or the nature <strong>of</strong> the work. An effective security<br />

culture is simply adapted to the circumstances in which an enterprise finds itself.<br />

In no case is the security culture totally absent; no business accepts an open-door<br />

policy toward its information resources. However, some may not protect the door<br />

very well or even perceive that the door needs to be locked.<br />

This is, again, the concept <strong>of</strong> a culture <strong>of</strong> security in context. If there are no<br />

universals in security, who is to say that one culture is superior to another, or is it<br />

true that there are no universals at all? At some elemental level, there are things<br />

that must be achieved or there is no security: access to resources restricted to<br />

authorized people, breaches detected and repaired, data backed up, and people<br />

held accountable for their actions with regard to information. The thoroughness<br />

with which these are accomplished rests, in part, within an enterprise’s culture <strong>of</strong><br />

security, but not entirely so. Even the best intentioned and motivated employees<br />

may make mistakes, and these, on occasion, have disastrous security consequences.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 21


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

An organizational culture sets the limits <strong>of</strong> acceptable behavior within that entity.<br />

It may be said that policy, not culture, is the driving force for establishing those<br />

boundaries, but conceptually and legally, what an enterprise does is its policy,<br />

not what its management claims that the company does. Policy is a reflection <strong>of</strong><br />

aspirational goals; in the case <strong>of</strong> security, it describes security as management<br />

wants security to be. The way with which people actually work and protect<br />

information (i.e., the culture <strong>of</strong> security) is reality, and absent any explicit moves<br />

by management to provide disincentives (i.e., punishment) for policy breaches, the<br />

culture <strong>of</strong> security is, in actuality, policy as well.<br />

In some industries, there are regulatory requirements for security that, in a broad<br />

manner, set the context <strong>of</strong> a culture <strong>of</strong> security. That does not mean that all banks,<br />

insurers, brokerages or hospitals have internalized security in the same way or to the<br />

same extent. To much the same degree as unregulated companies, the extent and impact<br />

<strong>of</strong> a culture <strong>of</strong> security is dependent on management’s perception <strong>of</strong> the risk to the<br />

enterprise’s information resources and its willingness (or ability) to fund initiatives that<br />

would strengthen either the culture or specific security measures—or both.<br />

It is possible to achieve a level <strong>of</strong> security appropriate for a given enterprise without<br />

explicit measures to create a culture <strong>of</strong> security because that culture is already there.<br />

In many enterprises, such as in financial institutions, intelligence services and the<br />

military, security is so embedded in management’s perception <strong>of</strong> business risk that<br />

the intentionality <strong>of</strong> the culture is self-evident. It has provided the context in which<br />

an enterprise makes decisions and allocates budgets. The same cannot be said in<br />

reverse. The level <strong>of</strong> security cannot exceed the degree to which an enterprise<br />

embeds security into its culture. In that case, rules will be broken and unenforced,<br />

tools will not be applied, and management will not take action against those who<br />

undermine security.<br />

2.2.3 Personal <strong>Culture</strong> and <strong>Security</strong><br />

Ultimately, all enterprises are made up <strong>of</strong> people. Many, but not by any means<br />

all, <strong>of</strong> the people are employees. Perhaps there was a time when a company or<br />

government agency was solely comprised <strong>of</strong> those on the payroll, but if so, that<br />

time is past. Too many enterprises use contractors, outsourcers, service providers<br />

and temporary staff to accept that only personnel are the people who constitute its<br />

human resources. When discussing the security <strong>of</strong> information, there is a tendency<br />

to think in terms <strong>of</strong> the number <strong>of</strong> servers, terabytes <strong>of</strong> data or breadth <strong>of</strong> the<br />

network. All <strong>of</strong> those are under the control <strong>of</strong> people, and it is people who are the<br />

carriers <strong>of</strong> the “behaviors, beliefs, assumptions, attitudes and ways <strong>of</strong> doing things”<br />

that are the corporate culture.<br />

People are not tabulae rasae (blank slates). As they enter an enterprise and become<br />

a part <strong>of</strong> its culture, they bring their own set <strong>of</strong> cultural expectations derived from<br />

22<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


2.0 a <strong>Culture</strong> <strong>of</strong> SeCurity in Context<br />

their parents, siblings, schools and houses <strong>of</strong> worship, friends and relations, and<br />

companies for which they worked previously. It is fair to say that some are affected<br />

with a deep respect for security and that others are not. The reason for this is a<br />

subject for sociologists, psychologists and anthropologists; for most others, it is<br />

sufficient to accept and recognize differences <strong>of</strong> outlook and to find the ways to<br />

incorporate them all under the cultural tent.<br />

People can and do change their cultural perceptions, even if they do not realize it<br />

or even realize that they have cultural perceptions. The accepted norms <strong>of</strong> behavior<br />

are transmitted by many means, and not all <strong>of</strong> them are intentional. Rules <strong>of</strong><br />

confidentiality, for instance, may be documented, but a disapproving glance when<br />

a customer’s name is mentioned can communicate more effectively than an entire<br />

volume <strong>of</strong> policies. It is less clear how a weak culture affects a person whose mores<br />

are more supportive <strong>of</strong> security than those <strong>of</strong> the enterprise. Does someone who is<br />

inclined to respect access rights become unconcerned simply because others do not<br />

share that outlook?<br />

If culture cannot be imposed organizationally, neither can it be achieved by<br />

dictating to individuals against their beliefs. Fortunately, it is the rare soul who is<br />

outright opposed to security. Most <strong>of</strong> the principles <strong>of</strong> security are derived from<br />

precepts that are shared across religions and belief systems around the world: Do<br />

unto others as you would have them do unto you; above all, do no harm; mind<br />

your own business; and do not run with scissors. Deep down, everyone (perhaps<br />

excluding the pathologically dishonest) brings these principles to the business. If<br />

they are not always adhered to in the workplace, as they are not always followed in<br />

the world at large, it is because they come into contention with other core concepts:<br />

Get your work done, a penny saved is a penny earned, or let nothing stand in your<br />

way. Somehow, these latter values seem less virtuous, but virtue, too, is a mindset,<br />

an artifact <strong>of</strong> a culture.<br />

If no one is opposed to security, it is equally true that there are many who are not<br />

vocal in its support. A culture <strong>of</strong> security needs its evangelists and champions, those<br />

who are eager to speak up and set examples for others. True, there are always going<br />

to be those whose moral outlook is clouded by pride, avarice and sloth, to say nothing<br />

<strong>of</strong> stupidity. However, if people are rational actors, they will do the right thing—or at<br />

least the most utilitarian thing—most <strong>of</strong> the time. People hold their beliefs privately,<br />

whether they concern religion, morals or politics. When individuals encounter what<br />

they see (or think they see) as a majority holding different viewpoints, they descend<br />

into a “spiral <strong>of</strong> silence,” becoming less and less likely to speak up for their beliefs<br />

and, thus, reinforcing their minority status and giving credence to the majority. This<br />

is how culture is formed. 12 Only those willing to break out <strong>of</strong> the spiral are able<br />

to change culture; only those committed to secure behavior are able to drive the<br />

transformation toward a culture <strong>of</strong> security.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 23


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

2.3 <strong>Security</strong> in the Context <strong>of</strong> <strong>Culture</strong><br />

The meaning <strong>of</strong> a “culture <strong>of</strong> security” is not intuitively obvious. Perhaps “culture”<br />

is a hazy concept, but surely “security,” here understood to be “information<br />

security,” is a hard and fast, well-understood term, or perhaps, in the so-called<br />

“information age,” the terms “information” and “security” are so widely used<br />

that a consensus has arisen regarding the connotations <strong>of</strong> these words, separately<br />

and together. In fact, there is lively discussion in both technical and management<br />

circles about the meanings <strong>of</strong> the words and about their application in diverse<br />

environments, such as the military, civilian government agencies and private<br />

companies, and in everyday usage by ordinary citizens. It is clear that the terms do<br />

not mean the same things in all contexts.<br />

For example, the international standards on information security define “security”<br />

and “information” very broadly. 13 Evidently, the very resource to be secured is<br />

thought to be so well understood as not to need a more thorough definition, and<br />

yet, the dictionary <strong>of</strong>fers shadings <strong>of</strong> meaning. “Information” is facts; in this sense,<br />

information is made up <strong>of</strong> things that are known. It is also whatever is conveyed<br />

by a particular sequence <strong>of</strong> symbols, impulses, etc. 14 Thus, information is made<br />

up <strong>of</strong> words, bits and bytes. Information is also the communication <strong>of</strong> knowledge,<br />

which incorporates documents, conversations and networks. Additionally, it is the<br />

sequence <strong>of</strong> bits that produce specific effects, in other words, the programs that<br />

manipulate data. 15 So, information can be both signifier and signified, subject and<br />

object, and data and the people who and machines that manipulate them.<br />

Information may be represented in “digital form (e.g., data files stored on electronic<br />

or optical media), material form (e.g., on paper) and “unrepresented” in the form <strong>of</strong><br />

employee knowledge. Information may be transmitted by various means including:<br />

courier, electronic or verbal communication. “Whatever form information takes,<br />

or the means by which the information is transmitted, it always needs appropriate<br />

protection” (emphasis added). 16 The quote makes a broad statement that all<br />

information always needs protection, albeit at an appropriate level. <strong>Security</strong>, in<br />

the context <strong>of</strong> culture, cannot be so dogmatic. It is fair to question, first, whether<br />

all information requires protection and, second, how appropriateness is to be<br />

determined. In practice, security is whatever level <strong>of</strong> protection the culture will<br />

allow with cognizance <strong>of</strong> differences in approach dependent on the risk related to<br />

different forms, representations, communications, storage and disposal <strong>of</strong> varying<br />

sorts <strong>of</strong> information.<br />

<strong>Security</strong> may be (and <strong>of</strong>ten is) defined solely as confidentiality, integrity and<br />

availability (CIA). Without diminishing these characteristics, security may also be<br />

understood to include privacy (different than confidentiality), authenticity, accuracy,<br />

completeness, recoverability (different than availability) and currency. Yet, this is<br />

24<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


2.0 a <strong>Culture</strong> <strong>of</strong> SeCurity in Context<br />

not the view <strong>of</strong> security in the popular imagination. When (or if) the public at large<br />

thinks <strong>of</strong> security, it is in terms <strong>of</strong> preventing computer hacking and viruses. From<br />

War Games in 1983 to The Taking <strong>of</strong> Pelham 123 in 2009, it is always the bad guys<br />

hacking the system who are stopped, always at the last moment, by the student;<br />

simple, but honest worker; or old codger relying on the tried–and-true methods.<br />

These popular entertainments are not important in themselves, but they mightily<br />

affect the perception <strong>of</strong> those who make up the populations <strong>of</strong> enterprises. The less<br />

these people understand the reality <strong>of</strong> either computers or security, the higher the<br />

barrier to achieving a culture <strong>of</strong> security. In short, the culture <strong>of</strong> security is affected<br />

by the overall culture.<br />

Prevention <strong>of</strong> malicious attacks and malware are indeed a part, but only a part, <strong>of</strong><br />

security, and much, but not all, information is stored and manipulated on computer<br />

systems. For the purposes <strong>of</strong> creating a culture <strong>of</strong> security, information must be<br />

addressed in all its forms and secured against all its risks, in context. Inherent in<br />

such a culture is the recognition <strong>of</strong> value in the information. It is value that is the<br />

limiting factor for the appropriate level <strong>of</strong> protection. The cost <strong>of</strong> security cannot<br />

exceed the value <strong>of</strong> the information to be protected; do not build a $20 fence for a<br />

$10 horse.<br />

However, it is precisely the looseness <strong>of</strong> the definition <strong>of</strong> information that makes it so<br />

difficult to assign value to it. A database may be evaluated as the cost <strong>of</strong> recreating<br />

the data contained within it, which is the general means <strong>of</strong> valuation for insurance<br />

purposes. However, that does not account for the value inherent in the use <strong>of</strong> the<br />

information nor the costs incurred if the data are not secure. Does information lose<br />

value as it is transformed from electronic bits to printed records, and what is the value<br />

<strong>of</strong> a conversation or an image?<br />

There may be good operational reasons, or even organizational benefits, for treating<br />

some data as <strong>of</strong> a higher value than is apparent. For example, sometimes the<br />

economies <strong>of</strong> scale, especially from a medium-size business that deals with data<br />

with a range <strong>of</strong> security classifications, can be found best by treating the security<br />

<strong>of</strong> all <strong>of</strong> it in the same way—either all high or all low, but without any particular<br />

thought given to the matter.<br />

These questions <strong>of</strong> valuation do not need to be answered with precision, and<br />

culture is too blunt <strong>of</strong> a tool to be precise. However, a culture can encapsulate<br />

what “everybody” knows. One’s values do impact one’s conception <strong>of</strong> value.<br />

Unless and until information is understood to have value that can be eroded by<br />

disclosure, unauthorized change, destruction or error, a culture <strong>of</strong> security cannot<br />

arise, nor, for that matter, can security be applied to information consistent with the<br />

repercussions <strong>of</strong> inadequate security. Unprotected information will not suddenly<br />

lose confidentiality, integrity, availability or the other attributes <strong>of</strong> security until<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 25


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

and unless it is confronted with an unintentional or malicious threat. Even unlikely<br />

breaches have a definable probability. Probability is the number <strong>of</strong> events over<br />

time and recognizes that the time <strong>of</strong> attack may be well in the future … or today.<br />

Allowing probability into the determination <strong>of</strong> the appropriate level <strong>of</strong> security<br />

distorts the decision. In most cases, it should not factor into the level <strong>of</strong> security<br />

unless extremely unlikely (such as a comet strike) if there is no practical approach<br />

to addressing a risk or the cost is too high. It is invalid to reduce security because<br />

a negative event is unlikely; the value <strong>of</strong> a resource and <strong>of</strong> the cost <strong>of</strong> harm to that<br />

resource have to be the decisive factors.<br />

Thus, the value <strong>of</strong> information is driven by its use, not by threats that may afflict<br />

it. The same information encapsulated in bits on magnetic storage may require<br />

more security than that same information printed on a piece <strong>of</strong> paper because<br />

the electronic form is used in more processes than the written. Contrarily, the<br />

printed report may be more valuable if it is used for strategic decisions, not routine<br />

transactions. It is the people who are using the information, holding it in custody<br />

or acting as its owner who must make the decisions about its value and, thus, its<br />

security, and those people both make up and are affected by a culture <strong>of</strong> security.<br />

2.3.1 <strong>Security</strong> as the Basis <strong>of</strong> Trust<br />

ISACA’s motto is “Trust in, and value from, information systems.” It is not<br />

coincidental that the terms “trust,” “value” and “information” appear in the same<br />

phrase. The value <strong>of</strong> information can only be established and retained if the<br />

information is trusted, and trust is established by security and control. The broad<br />

topic <strong>of</strong> a system <strong>of</strong> internal control is beyond the scope <strong>of</strong> this volume, but security<br />

is at its heart.<br />

Trust is necessary in a functional workplace, but for the most part, it is something<br />

that develops slowly. Its necessity is best illustrated by an environment in which<br />

trust is absent: a prison. In a prison, no one trusts anyone, so there are locked<br />

cells within locked cell blocks within locked subsections within locked prison<br />

doors. There are armed guards and rigorously enforced procedures to restrict freedom<br />

<strong>of</strong> movement. No business could work effectively in that manner. The<br />

heavy-handedness <strong>of</strong> prison security must be transformed to a structure in which trust<br />

is rewarded. <strong>Security</strong> is the catalyst <strong>of</strong> reliability. It evolves over time from repeated<br />

displays <strong>of</strong> consistency between words (e.g., policies, standards, management<br />

pronouncements) and behavior (e.g., access privileges, rewards, punishments). It<br />

also comes about when all the participants in an enterprise who share resources,<br />

such as information, have an accurate perception <strong>of</strong> one another’s interests. One<br />

hopes that all those interests align to the benefit <strong>of</strong> the enterprise as a whole. 17<br />

26<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


2.0 a <strong>Culture</strong> <strong>of</strong> SeCurity in Context<br />

US President Ronald Reagan was noted for saying, “Trust, but verify.” Trust alone<br />

is insufficient; it must be accompanied by controls, among which is verification,<br />

the underpinning <strong>of</strong> security. A security system should provide the means to verify<br />

the authenticity <strong>of</strong> information so that all parties using it can assume that it has<br />

not been modified, destroyed or disclosed except by those with the authorization<br />

to do so. It removes the burden <strong>of</strong> validating each item <strong>of</strong> information by placing<br />

reliance—that is to say, trust—on the security system that protects it. That reliance is<br />

not necessary only because dishonest people may try to steal, manipulate or destroy<br />

information. No matter what processes are established, what values are instilled,<br />

or how open and transparent management practices are, people will make mistakes<br />

and do things that are not right. 18 <strong>Security</strong> is just as necessary to protect information<br />

against people who are well intentioned, but overzealous, lazy, sloppy or just plain<br />

stupid as from those who are dishonest.<br />

There is more to trust and security than the exchange <strong>of</strong> information within an<br />

enterprise. Enterprises and government agencies need security to establish trust with<br />

their customers and citizens. Good security is perceived by many enterprises as a<br />

prerequisite for doing business. They must ensure service availability, protection<br />

<strong>of</strong> customer information and the secure operation <strong>of</strong> systems that manage customer<br />

information. Without the basic ingredient <strong>of</strong> trust, founded on security, customers<br />

would simply turn to competitors. Those enterprises that provide goods and<br />

services on the World Wide Web have perhaps the purest vision <strong>of</strong> the relationship<br />

between trust and security. If the information on a site or the processes by which it<br />

got there is not trusted, the enterprise will probably lose more than a sale—it will<br />

lose a customer. Where trust is strategic, as in these online companies (or in any<br />

business), security becomes a strategic necessity as well.<br />

<strong>Security</strong> may be seen as a competitive advantage if the enterprise has a high degree<br />

<strong>of</strong> trust in its information systems. It would drive customer acquisition and retention<br />

and the preservation <strong>of</strong> the value in a brand. However, enterprises are, in the main,<br />

loath to trumpet their security because they do not want to publicize their protective<br />

measures, they do not want their reputations to be hostage to criminals or they have<br />

not been able to sufficiently verify the integrity <strong>of</strong> their security systems to publicly<br />

base customer trust on them.<br />

Among the elements leading to trust between enterprises and their customers<br />

is effective management communication <strong>of</strong> security goals and objectives.<br />

Management must make customers aware that, within its enterprise, there are<br />

incentives for awareness and reporting <strong>of</strong> security incidents, a broad understanding<br />

that identification <strong>of</strong> security problems will be dealt with openly and without<br />

retribution, and personal recognition for those who act supportively <strong>of</strong> security.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 27


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

Trust is not an absolute; it changes and grows (or diminishes) over time.<br />

Unfortunately, trust can be destroyed far more quickly than it can be established<br />

or repaired. As enterprises themselves grow and change, the basis for trust must<br />

be restated and proven anew. Every security incident that attracts public notice<br />

undermines trust, but if management is shown to be nimble, sensitive, compassionate,<br />

honest and courageous, it can <strong>of</strong>ten manage to overcome the negative impact caused<br />

by a seemingly random event. 19 Of course, the requirement <strong>of</strong> honesty calls for<br />

immediate acceptance <strong>of</strong> a security-related problem and its rapid repair.<br />

There is another facet <strong>of</strong> trust based on security that is between enterprises that<br />

do business jointly. Each is a separate entity with its own proprietary information<br />

and information systems. In some cases, they are even competitors (so-called<br />

“coopetition”). They need to share some information for their joint ventures, but<br />

more important, they need to protect most information from their partners. They<br />

cannot do business together without trust, and they can only base that trust on<br />

security and, to a great extent, on mutual respect for ethical behavior. Of course,<br />

ethics is a part <strong>of</strong> security as well.<br />

Trust is a shared cultural experience. To the extent that enterprises are able to create<br />

a culture <strong>of</strong> security, they will be able to enjoy the benefits <strong>of</strong> trust with their staff<br />

and customers and with other enterprises. Those benefits mostly accrue in the form<br />

<strong>of</strong> smooth working relationships, respect and a certain naiveté that allows managers<br />

to proceed with their business without constantly having to check and recheck the<br />

validity <strong>of</strong> the information with which they work. These “s<strong>of</strong>t” benefits manifest<br />

themselves, over time, in reduced costs and increased pr<strong>of</strong>its.<br />

2.3.2 <strong>Security</strong> in the Prevention <strong>of</strong> Fraud and Misuse <strong>of</strong> Information Resources<br />

In the earliest times that information security was applied to business computer<br />

systems (approximately the 1970s), the focus was on the prevention <strong>of</strong> fraud.<br />

Business computing was exclusively performed on large (for that day), centralized<br />

mainframe computers with little or no online activity. The Internet was unknown.<br />

The role <strong>of</strong> information systems was primarily for recording and reporting<br />

transactions that had taken place externally from the systems, but not for the active<br />

execution <strong>of</strong> transactions themselves. The ledger books and paper forms were fast<br />

disappearing into electronic files, and entire systems <strong>of</strong> internal control based on<br />

the movement <strong>of</strong> paper no longer had any validity. Computers were the province<br />

<strong>of</strong> a small coterie <strong>of</strong> specialists who seemed divorced from the business as a whole.<br />

Many managers realized that, if records could be manipulated, it was possible<br />

for people (in almost all cases insiders) to take money and cover their tracks.<br />

Most security, such as it was, was performed within applications. After-the-fact<br />

assessment and rather rudimentary control <strong>of</strong> computer use were the substance <strong>of</strong><br />

the customary practice <strong>of</strong> data security.<br />

28<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


2.0 a <strong>Culture</strong> <strong>of</strong> SeCurity in Context<br />

The focus was subsequently enlarged to the prevention <strong>of</strong> misuse <strong>of</strong> data resources,<br />

which includes fraud, but also includes a variety <strong>of</strong> other concerns such as the<br />

disclosure <strong>of</strong> secret information (a major concern <strong>of</strong> governments), unauthorized<br />

manipulation <strong>of</strong> data (more <strong>of</strong> a commercial concern) 20 and destruction <strong>of</strong><br />

computing capacity. As noted, confidentiality, integrity and availability (CIA)<br />

has become, for many, the basic definition <strong>of</strong> security itself. The purpose <strong>of</strong><br />

such elemental features <strong>of</strong> security as encryption and access control was to<br />

prevent unauthorized and, therefore, potentially malign use <strong>of</strong> information. 21 Both<br />

encryption and access controls were the development <strong>of</strong> methods <strong>of</strong> information<br />

protection that had preexisted computer systems. As such, when computers began<br />

to emerge in the business world, these concepts were not unknown and, therefore,<br />

were more readily accepted.<br />

Fraud prevention is still an element <strong>of</strong> security, at least in environments in which<br />

information has intrinsic monetary value. More broadly, security will always be the<br />

bulwark against misuse <strong>of</strong> information, but today, it is widely recognized that the<br />

importance <strong>of</strong> security lies in the preservation <strong>of</strong> the value <strong>of</strong> information and the<br />

utility <strong>of</strong> information as a strategic asset. Nonetheless, for many people, the purpose<br />

<strong>of</strong> security is only to stop bad things from happening or at least to meet regulatory<br />

requirements. Thus, security is seen by some as essentially negative and reactive.<br />

This perspective, seeing security as a policeman or enforcer rather than as a positive<br />

force for enablement <strong>of</strong> organizational initiatives, has been one <strong>of</strong> the major<br />

inhibiting factors against creating a culture <strong>of</strong> security.<br />

Fraud and misuse <strong>of</strong> information are indicators <strong>of</strong> the shortcomings <strong>of</strong> security. It<br />

is very difficult to establish a positive image <strong>of</strong> security when the best that can be<br />

said is that there have been no failures (recently). A culture <strong>of</strong> security must rest on<br />

an understanding <strong>of</strong> the contributions that security makes to an enterprise’s strategic<br />

objectives. If the only interaction people have with police is when a crime occurs or<br />

when they are caught speeding, they will have little appreciation for the necessity <strong>of</strong><br />

the rule <strong>of</strong> law for an ordered and prosperous society. Similarly, if the only encounter<br />

people have with information security within their enterprises and society at large<br />

comes when a rule is broken, they will view security as an impediment rather than a<br />

support to their daily activities.<br />

<strong>Security</strong> will always have fraud and misuse as parts <strong>of</strong> its domain. Until and unless<br />

that domain is seen as having greater application and value, a culture <strong>of</strong> security<br />

will be difficult to create.<br />

2.3.3 <strong>Security</strong> and Risk Mitigation<br />

The current, more enlightened view <strong>of</strong> security is that it is part <strong>of</strong> the organizational<br />

imperative to manage risk. This is made explicit in ISO 27001, in which it is stated<br />

that the general requirements for an information security management system call<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 29


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

for the establishment, implementation, operation, monitoring, review, maintenance<br />

and improvement <strong>of</strong> security “within the context <strong>of</strong> the enterprise’s overall<br />

business activities and the risks it faces.” 22 Moreover, in 2008, ISO published ISO<br />

27005, Information technology—<strong>Security</strong> techniques—Information security risk<br />

management, which highlights that:<br />

30<br />

A systematic approach to information security risk management is<br />

necessary to identify organizational needs regarding information<br />

security requirements and to create an effective information security<br />

management system (ISMS). 23<br />

What are the risks that security is able to manage, and for that matter, what is<br />

“risk”? While one definition <strong>of</strong> “risk” is that it is the “potential that a given threat<br />

will exploit vulnerabilities <strong>of</strong> an asset or group <strong>of</strong> assets and thereby cause harm to<br />

the organization,” 24 others define it as the “uncertainty <strong>of</strong> harm to an asset or group<br />

<strong>of</strong> assets.” 25 The common element is that there is an asset that is subject to harm.<br />

Implicitly, the asset must have value or it would not be an asset. Thus, the harm in<br />

question is the loss <strong>of</strong> value. The risk is <strong>of</strong>ten stated in terms <strong>of</strong> the causes <strong>of</strong> the<br />

harm, but this only states threats, not risks. There are indeed threats to information<br />

such as disclosure, manipulation and destruction. The risks arise from the business<br />

<strong>of</strong> which that information is a part.<br />

Confidentiality Risks<br />

It is true that computerization has changed the nature <strong>of</strong> information. Information is<br />

hidden from view, and it is in a form that is unintelligible to human beings without<br />

the aid <strong>of</strong> technical devices. To that extent, it is a great deal easier to prevent the<br />

dissemination <strong>of</strong> information to unauthorized recipients. At the same time, it is so<br />

compact that vast amounts <strong>of</strong> information can be stored in very small spaces. It is<br />

easily copied and transmitted, and the copies are very difficult to control. When<br />

information was primarily in printed or written form and stored in bulky containers,<br />

it was relatively easy for someone to gain access to a small amount <strong>of</strong> information<br />

and, for example, photograph or steal a few sheets <strong>of</strong> paper. Now, access is<br />

invisible and entire files can be falsely obtained. Hence, the scale <strong>of</strong> unauthorized<br />

disclosure has been enlarged exponentially.<br />

In some cases, the results for an enterprise whose information was disclosed or<br />

stolen have been quite onerous. For example, a US pharmaceutical manufacturer<br />

sent an e-mail to all participants in an online service for users <strong>of</strong> certain drugs,<br />

inadvertently disclosing all the names <strong>of</strong> the people using the service. As a result,<br />

regulatory authorities forced the company to incur the costs for establishing and<br />

maintaining a security program for the protection <strong>of</strong> its collected personally<br />

identifiable information (PII). The company was further required to perform an<br />

annual third-party audit <strong>of</strong> its program and have external oversight <strong>of</strong> the relevant<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


2.0 a <strong>Culture</strong> <strong>of</strong> SeCurity in Context<br />

record keeping. 26 In another case, a US-based retailer was hacked and the credit<br />

card information <strong>of</strong> more than 45.7 million individuals was stolen. As a result, the<br />

retailer paid credit card companies tens <strong>of</strong> millions <strong>of</strong> dollars to cover the cost <strong>of</strong><br />

the fraud and faced extensive expense to improve its security systems. 27<br />

Availability Risks<br />

The same factors that make it easier to steal information also raise the risk <strong>of</strong><br />

destruction <strong>of</strong> information. In electronic form, information does not need to<br />

be destroyed to be made unavailable. The fact that electronic equipment and<br />

information systems are required to read the information means that any failure<br />

<strong>of</strong> those devices or systems renders information as useless as if it were physically<br />

destroyed. For enterprises dependent on information to function (perhaps a<br />

majority <strong>of</strong> businesses in the world today), the absence <strong>of</strong> current information is<br />

tantamount to a cessation <strong>of</strong> operations. It is no longer possible to go back to the<br />

older, nonautomated way <strong>of</strong> doing things; the information in file cabinets no longer<br />

exists—indeed, neither do the file cabinets.<br />

Hence, plans and preparations for conducting affairs in the absence <strong>of</strong> current<br />

information are a necessary part <strong>of</strong> security. It is a broader question as to whether<br />

interruptions to business caused by factors other than information unavailability are<br />

equally a part <strong>of</strong> information security. The important point is that an enterprise’s<br />

tolerance for information loss must be gauged and preparations put in place either<br />

to recover the data in a predetermined length <strong>of</strong> time or to replicate the data at<br />

regular (perhaps instantaneous) intervals so that they will never be lost at all.<br />

Integrity Risks<br />

One <strong>of</strong> the more significant risks inherent in information is that decisions may be<br />

made on the basis <strong>of</strong> erroneous information. There are numerous causes and effects.<br />

If someone changes information so that actions will be taken to that person’s<br />

benefit, it is termed fraud. If the same thing happens because <strong>of</strong> inadvertent or<br />

foolish mistakes, then it is error, but in either case, the value <strong>of</strong> the information in<br />

question has been diminished. That is the harm; that is the risk.<br />

Data do not need to be manipulated to be false or erroneous. Information may be<br />

out <strong>of</strong> date, even if only by seconds. Information may come from the wrong source<br />

and be inauthentic. Information may be incomplete. It may be inaccurate. It may<br />

even be meaningless. In every case, the information in question is supposed to have<br />

a certain value that it does not have. The value comes not from the information<br />

itself, but from the lost utility <strong>of</strong> that information.<br />

Risks to Information Not in Electronic Form<br />

There is a tendency to think <strong>of</strong> all information as electronic, in part, because such<br />

information is so internalized in society. People in many places are paid with<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 31


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

electronic information, buy products and services with electronic information,<br />

communicate, and are entertained electronically. However, there is still cash in<br />

society, more widely used in some places than others. People still talk with one<br />

another. They still write things down and print reports. While the nature <strong>of</strong> the risk<br />

differs depending on the medium—a conversation cannot be stolen or destroyed,<br />

but it can be overheard or based on false assumptions—the effect is the same. The<br />

information in question loses value if it is haphazardly communicated, erroneously<br />

stated or simply misplaced.<br />

It is important to remember that risk is unpredictable. To a certain degree, with a<br />

given amount <strong>of</strong> information and a given number <strong>of</strong> people who have access to<br />

it, it may be possible to extrapolate how much <strong>of</strong> it will be misused or lost. It is<br />

equatable to the concept <strong>of</strong> “shrinkage” in warehousing and retail. The risk is that<br />

the consequential harm caused by misuse or loss cannot be stated with the same<br />

precision. There are no computers powerful enough or algorithms subtle enough to<br />

untangle all the files, records, fields, users, applications and uses <strong>of</strong> information to<br />

know, in advance, what the harm will be or how much value will be lost.<br />

The risk management decisions that must be made can be reduced to assuming the<br />

worst case, the most likely case or differential cases based on the perceived value <strong>of</strong><br />

the information. Assuming the worse case leads to the application <strong>of</strong> the highest level<br />

<strong>of</strong> security to all information, which is extremely secure, but difficult to cost justify.<br />

Either <strong>of</strong> the other two approaches opens the door to an unpredictable level <strong>of</strong> harm,<br />

the very definition <strong>of</strong> risk. Information thought to be <strong>of</strong> low value may be extremely<br />

important in the wrong hands or when combined with other, seemingly unimportant<br />

information. The event thought to be unlikely may just happen. <strong>Security</strong> “within the<br />

context <strong>of</strong> the enterprise’s overall business activities” is the answer to risk, but the<br />

context also establishes the fact that some harm will occur. Intolerance for harm that<br />

is greater than expected is a foundation <strong>of</strong> a culture <strong>of</strong> security.<br />

2.3.4 <strong>Security</strong> as a Strategic Driver<br />

The way in which security is perceived is a determinant <strong>of</strong> the effectiveness<br />

<strong>of</strong> security within an enterprise. In some cases, security is seen as a roadblock<br />

to valuable, or at least convenient, activities by personnel. In such instances,<br />

a culture arises that is characterized by efforts to bypass security or to wink at<br />

circumvention. (Again, there is always a culture <strong>of</strong> security, but sometimes, it is not<br />

a good one.) More commonly, security is seen as a necessary tactical supplement<br />

to the primary activities <strong>of</strong> an enterprise. A company that makes widgets sees all<br />

<strong>of</strong> the processes involved in widget manufacturing, delivery and sales as its core<br />

mission, and everything else is understood to be secondary and supportive to the<br />

primary functions <strong>of</strong> the company. In this case, security is not ignored; it is simply<br />

downplayed. The result is a culture in which security is set at the minimum level<br />

consistent with prudence.<br />

32<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


2.0 a <strong>Culture</strong> <strong>of</strong> SeCurity in Context<br />

It is important to realize that the creation <strong>of</strong> a culture <strong>of</strong> security does not imply<br />

that security must be a primary concern for an enterprise. Rather, the objective <strong>of</strong><br />

a culture <strong>of</strong> security is to ensure that security is set at an appropriate level in the<br />

context <strong>of</strong> an enterprise’s overall operations. In some cases, the minimum level<br />

may be both prudent and appropriate. It is certainly appropriate if organizational<br />

management, in possession <strong>of</strong> all the relevant facts, makes a conscious decision that<br />

no more than the minimum is required. However, for many industries and for the<br />

information-intensive activities <strong>of</strong> all, the minimum is insufficient.<br />

Levels <strong>of</strong> <strong>Security</strong><br />

Figure 1 illustrates varying levels <strong>of</strong> security that may be encountered in an enterprise.<br />

Low Minimum High Extreme<br />

Figure 1—Examples <strong>of</strong> Enterprise <strong>Security</strong> Levels<br />

People Process Technology Organization<br />

Deep background<br />

checks are<br />

conducted for<br />

all personnel.<br />

<strong>Security</strong> checks<br />

are conducted for<br />

all personnel.<br />

<strong>Security</strong> checks<br />

are conducted for<br />

critical personnel.<br />

There is no<br />

personnel checking<br />

or security<br />

oversight.<br />

The security<br />

policy is central to<br />

the organizational<br />

mission.<br />

<strong>Security</strong> policies<br />

and standards<br />

are enforced.<br />

<strong>Security</strong> policies<br />

exist, but are<br />

not enforced.<br />

No security<br />

policies or<br />

procedures exist.<br />

There is advanced<br />

screening and tight<br />

supervision <strong>of</strong><br />

information use.<br />

Passwords, virus<br />

protection,<br />

firewalls, data<br />

leakage prevention,<br />

intrusion detection,<br />

identity<br />

management, etc.,<br />

are utilized.<br />

Passwords,<br />

virus protection<br />

and firewalls are<br />

utilized.<br />

There is minimal<br />

or no security<br />

technology.<br />

<strong>Security</strong> is a<br />

senior<br />

management<br />

role.<br />

<strong>Security</strong> is a<br />

part <strong>of</strong> many<br />

functions.<br />

A security<br />

function exists.<br />

No security<br />

function exists.<br />

It is important to understand that figure 1 is illustrative and not necessarily definitive<br />

<strong>of</strong> the levels <strong>of</strong> security that may be found in all enterprises. The terms “low,”<br />

“minimum,” “appropriate” and “extreme” are meaningful only in the context <strong>of</strong> a<br />

specific enterprise. For example, what is considered extreme for a manufacturer may<br />

be barely the minimum requirements for an intelligence agency.<br />

An enterprise should be conscious <strong>of</strong> its own strategic requirements, and then, the<br />

appropriate level <strong>of</strong> security should be incorporated in them. To the degree that<br />

the confidentiality, integrity and trustworthiness <strong>of</strong> information are necessities<br />

for the success <strong>of</strong> an enterprise, the enterprise will find that security is a strategic<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 33


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

requirement. This is particularly evident for enterprises that trade in information,<br />

such as an aforementioned intelligence agency, but also for news sources, online<br />

vendors and movie studios. What is video piracy, after all, but theft <strong>of</strong> information?<br />

If the information purveyed by such an enterprise is not felt to be correct, authentic<br />

or complete, that enterprise will soon not be in business. Thus, secure information<br />

can be more than the basis for an enterprise’s reliability, but also <strong>of</strong> the quality <strong>of</strong><br />

its goods and services.<br />

To be sure, some enterprises have lower security requirements than others. One<br />

whose products are material goods needs to focus on production and sale, but even<br />

within these enterprises, there are functions that require secure information. If<br />

financial information is not secure, there may be compliance violations. If formulas<br />

are not kept secret, competitive advantage may be lost. If orders are changed or<br />

manipulated, pr<strong>of</strong>its may be undermined. If senior management does not receive<br />

accurate information, initiatives may be stunted. Thought <strong>of</strong> in these terms, security<br />

may be considered as much <strong>of</strong> a strategic driver for a manufacturer as for an<br />

online service.<br />

<strong>Security</strong> may be one <strong>of</strong> many strategic drivers, but only rarely the primary one.<br />

The achievement <strong>of</strong> the others may be enabled by the effective implementation <strong>of</strong><br />

security. It allows management and staff to focus on the business without constant<br />

concern for the possibility <strong>of</strong> negative events and security incidents. Such a state<br />

must come from intentional acts by management, but once established, security can<br />

be transparent and implicit.<br />

2.3.5 <strong>Security</strong> in Systemic Terms<br />

BMIS emphasizes that security must be established systemically. The system <strong>of</strong><br />

security must be viewed holistically, as a complete, functioning unit in which one<br />

part <strong>of</strong> the system enables understanding <strong>of</strong> other parts <strong>of</strong> the system.<br />

34<br />

“Systems thinking” is now a widely recognized term that refers to the<br />

examination <strong>of</strong> how systems interact, how complex systems work and<br />

why “the whole is more than the sum <strong>of</strong> its parts.” 28<br />

In practical terms, this implies a balance within security in parallel with the balance<br />

<strong>of</strong> security among other strategic drivers. An enterprise cannot feel secure simply<br />

because it enforces so-called “hard” passwords, has a security policy manual or<br />

filters viruses. All the pieces <strong>of</strong> an information security management system need<br />

to be addressed—if not equally, at least to the extent that no link is so weak as to<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


2.0 a <strong>Culture</strong> <strong>of</strong> SeCurity in Context<br />

invalidate the integrity <strong>of</strong> the chain, i.e., the security program. This requires not<br />

only that security be a system, but that the approach to security be thought<br />

<strong>of</strong> systemically:<br />

[I]t is important to note that the Business Model for Information<br />

<strong>Security</strong>, which is based on systems theory, should be treated as part<br />

<strong>of</strong> the strategic plan for the information security program, not as a<br />

quick-fix solution for a broken program. Systems thinking should be<br />

seen as a long-term exercise that will ultimately aid the enterprise in<br />

achieving business goals. In fact, it may help to think <strong>of</strong> it as a key<br />

to organizational maturity. The maturity <strong>of</strong> the information security<br />

program is <strong>of</strong>ten related to the maturity <strong>of</strong> the enterprise, which is<br />

linked to the degree systemic thinking is used in the enterprise. Systemic<br />

thinking paves the way for systemic processes. 29<br />

As noted, enterprises are organic wholes that are the amalgamation <strong>of</strong> interacting<br />

systems and are, thus, supersystems in themselves. It would be erroneous and<br />

fruitless to think <strong>of</strong> security in isolation from other aspects <strong>of</strong> an enterprise’s<br />

systems, just as it would be fallacious to think <strong>of</strong> each individual characteristic <strong>of</strong><br />

security without reference to the others. In the absence <strong>of</strong> a holistic understanding<br />

<strong>of</strong> security, enterprises see either the absence or duplication <strong>of</strong> security efforts, the<br />

emergence <strong>of</strong> silos <strong>of</strong> responsibility for security, and difficulty in restraining costs.<br />

It leads to deviations from accepted practice and, ultimately, to breaches <strong>of</strong> security.<br />

For example, some enterprises invest disproportionally in incident response and not<br />

enough in policy or prevention. Thus, they invite the very penetrations they would<br />

presumably prefer not to encounter.<br />

In many cases, breaches <strong>of</strong> security occur not when management perceived<br />

weakness, but when it thought, erroneously in the event, that security was<br />

sufficient or when management was aware <strong>of</strong> weakness, but prioritized in such<br />

a way that it “bet” the wrong way. The inability to see security systemically<br />

introduces the possibility, perhaps the likelihood, that one or another aspect <strong>of</strong><br />

security will be downplayed because reliance will be placed on others. The concept<br />

<strong>of</strong> compensating controls in security would pertain to only parts <strong>of</strong> security<br />

requirements. <strong>Security</strong> measures are either effective or not. Recognizing the need<br />

for a totality <strong>of</strong> security is a prerequisite for the creation <strong>of</strong> a culture <strong>of</strong> security.<br />

Indeed, this systemic viewpoint is one <strong>of</strong> the characteristics <strong>of</strong> such a culture.<br />

Endnotes<br />

1 “The <strong>Security</strong>—Privacy Paradox: Issues, Misconceptions, and Strategies; A Joint<br />

Report by The Information and Privacy Commissioner/Ontario and Deloitte &<br />

Touche,” Canada, August 2003, p. 7<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 35


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

2 This is an evocation <strong>of</strong> Goedel’s Second Incompleteness Theorem, which has<br />

been summarized as “in any consistent axiomatizable theory (“axiomatizable”<br />

means the axioms can be computably generated), which can encode sequences<br />

<strong>of</strong> numbers (and, thus, the syntactic notions <strong>of</strong> “formula,” “sentence” and<br />

“pro<strong>of</strong> ”), the consistency <strong>of</strong> the system is not provable in the system,”<br />

www.math.hawaii.edu/~dale/godel/godel.html#SecondIncompleteness. See also<br />

H<strong>of</strong>stader, Douglas F.; Escher Godel; Bach: An Eternal Golden Braid, Basic<br />

Books, USA, 1979<br />

3 Much in this section is derived from Ross, Steven; “Information <strong>Security</strong> Matters:<br />

Boston, Berlin, Baghdad and Bora Bora,” ISACA Journal, vol. 4, USA, 2010.<br />

4 The Greek philosopher Plato described a dual reality, that <strong>of</strong> the material world and<br />

the transcendent realm <strong>of</strong> forms. Thus, for the purposes <strong>of</strong> information security,<br />

there is security as we find it in the world we perceive and an ultimate, universal<br />

expression <strong>of</strong> security. This duality has been argued through the centuries. The<br />

philosophic issue is whether a universally applicable concept <strong>of</strong> information<br />

security can be separated from the world as we experience it.<br />

5 International Organization for Standardization (ISO), ISO/International<br />

Electrotechnical Commission (IEC) 27000:2009 through (currently)<br />

ISO/IEC 27005:2008, Switzerland<br />

6 Ross, Steven; “IS <strong>Security</strong> Matters: Frameworkers <strong>of</strong> the World, Unite,”<br />

Information Systems Control Journal, vol. 6, USA, 2004<br />

7 ISO, ISO/IEC 27001, Switzerland, p. 1<br />

8 ISO, ISO/IEC 27002:2005 Information technology—<strong>Security</strong> techniques—<br />

Information security management systems—Requirements, Switzerland, p. 102<br />

9 US Financial Services Modernization Act <strong>of</strong> 1999, better known as the<br />

Gramm-Leach-Bliley Act (GLBA)<br />

10 US Health Insurance Portability and Accountability Act (HIPAA) <strong>of</strong> 1996<br />

11 Directive 95/46/EC <strong>of</strong> the European Parliament and <strong>of</strong> the Council, 1995, better<br />

known as the European Privacy Directive<br />

12 Watts, Duncan J.; Six Degrees: The Science <strong>of</strong> a Connected Age, Norton, USA,<br />

2003, p. 213<br />

13 See ISO/IEC 27000:2009, in which “information asset” is defined as “knowledge or<br />

data that has value to the organization.”<br />

14 Ibid.<br />

15 Merriam-Webster Online, www.merriam-webster.com/dictionary/information<br />

16 ISO, ISO/IEC 27000:2009, Switzerland, p. 7<br />

17 Thompson, L.; R. Hastie; Judgement Tasks and Biases in Negotiation, 1990.<br />

Sheppard, B.H.; M.H. Bazerman; R.J. Lewicki (eds), Research in Negotiation in<br />

Oganisations. See also Goucher, Wendy; “The Reality <strong>of</strong> Trust,” Computer Fraud<br />

& <strong>Security</strong>, vol. 2009, issue 3, The Netherlands, March 2009, p. 14-15.<br />

18 IBM Corp., “<strong>Culture</strong> <strong>of</strong> Trust,” Corporate Trust and Compliance,<br />

www.ibm.com/ibm/responsibility/trust.shtml, 2008<br />

36<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


2.0 a <strong>Culture</strong> <strong>of</strong> SeCurity in Context<br />

19 Knight, Rory; Deborah Pretty; “Protecting Value in the Face <strong>of</strong> Mass Fatality<br />

Events,” Oxford Metrica, Oxford, UK, 2005. This document is a bit <strong>of</strong>f-topic,<br />

but a mass-fatality event is the ultimate security crisis and Knight and Pretty’s<br />

observations have broader applicability.<br />

20 In the US, the Department <strong>of</strong> Defense published a series <strong>of</strong> papers with covers<br />

<strong>of</strong> various colors that became known, subsequently, as the Rainbow Series. The<br />

first, Trusted Computer <strong>Security</strong> Evaluation Criteria (CSC-STD-001-83, 1983)<br />

placed the emphasis <strong>of</strong> security squarely on confidentiality. In 1989, David Clark<br />

<strong>of</strong> Ernst & Whinney (now Ernst & Young) and David Wilson <strong>of</strong> the Massachusetts<br />

Institute <strong>of</strong> Technology (US) published “A Comparison <strong>of</strong> Commercial and<br />

Military Computer <strong>Security</strong> Policies” (http://groups.csail.mit.edu/ana/Publications/<br />

PubPDFs/A%20Comparison%20<strong>of</strong>%20Commercial%20and%20Military%20<br />

Computer%20<strong>Security</strong>%20Policies.pdf), subsequently known as the Clark-Wilson<br />

Model, which placed the emphasis in the commercial sphere <strong>of</strong> data integrity.<br />

21 Ross, Steven J.; “IS <strong>Security</strong> Matters?,” ISACA Journal, vol. 2, USA, 2010, p. 4<br />

22 ISO, ISO/IEC 27001:2005, op.cit., p. 3<br />

23 ISO, ISO/IEC 27005, op.cit., p. 3. There is considerable debate about the<br />

importance or even the relevance <strong>of</strong> the ISO 27000 standards. It is even more<br />

debatable whether what ISO describes as an Information <strong>Security</strong> Management<br />

System (ISMS) is equivalent to a culture <strong>of</strong> information security. Nonetheless, the<br />

standards do represent a framework and a lexicon for security that are accepted<br />

internationally and must be respected if not always observed.<br />

24 Ibid., p. 1<br />

25 Ross, Steven J.; “Four Little Words,” ISACA Journal, vol. 1, 2009. See also Taleb,<br />

Nassim Nicholas; The Black Swan, Random House, USA, 2007, p. xvii-xviv, passim.<br />

26 Eisenhauer, Margaret P.; The Privacy Case Book: A Global Survey <strong>of</strong> Privacy<br />

and <strong>Security</strong> Enforcement Actions with Recommendations for Reducing Risks,<br />

PrivacyStudio.com, www.privacystudio.com/Links%20posted%20to%20web/<br />

Casebook%20Ch%202.pdf, p. 28-30<br />

27 Abelson, Jenn; “Hackers Stole 45.7 million Credit Card Numbers from TJX,”<br />

New York Times, USA, 29 March 2007, and “Swiped, Stolen and Sold,”<br />

New York Times (online edition), USA, 6 August 2008,<br />

http://topics.blogs.nytimes.com/2008/08/06/swiped-stolen-and-sold/<br />

28 ISACA, An Introduction to BMIS, op. cit., p. 10<br />

29 Ibid., p. 11<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 37


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

38<br />

Page intentionally left blank<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


3.0 the benefitS <strong>of</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

3.0 the BenefItS <strong>of</strong> A CultuRe <strong>of</strong> SeCuRIty<br />

One <strong>of</strong> the differentiating factors <strong>of</strong> BMIS “is the importance it places on<br />

organizational culture. <strong>Creating</strong> an intentional security culture is a primary<br />

objective for the model, as applied to information security” (emphasis added). 1 The<br />

intentionality <strong>of</strong> the culture reflects the notion that cultures are not self-generating.<br />

They require active steps by people in positions <strong>of</strong> influence, if not authority, to adapt<br />

certain norms <strong>of</strong> behavior and to encourage others to do so as well. The people in<br />

question may well be the senior executives <strong>of</strong> an enterprise (the so-called “tone at<br />

the top”), but they may also be further down in the hierarchy if they are committed<br />

enough to champion the cause <strong>of</strong> the values that culture supports. For that reason,<br />

they are <strong>of</strong>ten called “champions,” a word with a pleasant dual connotation.<br />

If a culture <strong>of</strong> security does not, by itself, create greater security, then why should<br />

anyone champion it? The answer is that a culture is a necessary precondition in<br />

which to establish an appropriate level <strong>of</strong> security. By analogy, good soil and<br />

climate, the terroir, do not make great wine, but without a fine terroir, the best<br />

grape clones, skilled winemakers and the latest equipment will, at best, result in<br />

mediocre wine. In the same way, without a culture <strong>of</strong> security, the most advanced<br />

techniques, dedicated security pr<strong>of</strong>essionals and the finest technology will lead<br />

to a middling level <strong>of</strong> security, at best. Some security practices may exist,<br />

perhaps supported by technology, but “weaknesses that result from inappropriate<br />

governance, inadequate management, a dysfunctional culture or unready staff<br />

cannot be fixed with technology.” 2<br />

Thus, a culture <strong>of</strong> security is not an end in itself, but a pathway to achieve and<br />

maintain other objectives. In one sense, the primary objective is assurance that<br />

information will not be misused. This assumes that there is consensus on the<br />

appropriate use <strong>of</strong> information, with everything else being misuse. This sort <strong>of</strong><br />

consensus is hard to come by and is the reason why the implementation <strong>of</strong> security<br />

can be contentious. A culture <strong>of</strong> security will not eliminate discord, but it will<br />

establish a basis on which accord can be reached.<br />

There can be security in the absence <strong>of</strong> a robust culture supporting it. It may even<br />

be appropriate to the needs <strong>of</strong> the enterprise and a rational understanding <strong>of</strong> the<br />

information in question, if only by happenstance. However, security without culture<br />

cannot be sustained over time. All <strong>of</strong> the other organizational dynamics will distort<br />

security to the point that it is unrecognizable. Tough economic times will lead to<br />

crippling budget cuts. Competitive pressures will dissipate access controls and<br />

separation <strong>of</strong> duties. Otherwise benign motivations to serve customers will become<br />

the pretext to lower barriers, and as the enterprise morphs and changes, security<br />

will fall to the wayside. In the same manner, a security culture itself needs to be<br />

sustained over time. <strong>Creating</strong> it is one thing, strengthening it another, and keeping<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 39


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

it going and growing is definitely a third. <strong>Culture</strong>s, too, morph as the people who<br />

constitute them come and go. There need to be self-sustaining elements to a culture<br />

or the same security battles will be fought over and over again.<br />

The greatest benefit <strong>of</strong> a culture <strong>of</strong> security is the effect it has on other dynamic<br />

interconnections within an enterprise. It leads to greater internal and external trust,<br />

consistency <strong>of</strong> results, easier compliance with laws and regulations and greater<br />

value in the enterprise as whole. In short, a secure enterprise—one that is as secure<br />

as it needs to be—is a better enterprise. The pay<strong>of</strong>f comes from all the areas<br />

in an enterprise where reliability, open communication and cooperation among<br />

individuals and departments work smoothly together to achieve overall goals.<br />

All that is required is a common commitment to values and behaviors that enable<br />

mutual trust. (See section 6.1.)<br />

As is <strong>of</strong>ten the case, the presence <strong>of</strong> an intentional security culture is harder to discern<br />

than is its absence. The most common indicators <strong>of</strong> a weak culture <strong>of</strong> security are an<br />

information security function (if one exists) that is underfunded, demoralized and<br />

so far down the chain <strong>of</strong> command that it is unlikely to have any influence on<br />

organizational decision making. At the same time, it is common for security<br />

pr<strong>of</strong>essionals, in their zeal to protect everything as much as possible, to feel that<br />

they never have a large enough budget, are never fully appreciated and are always<br />

overruled on important business decisions. The fact that an information security<br />

function exists does not, in itself, indicate a robust, effective security culture.<br />

It is said that if something cannot be measured, it cannot be managed. So, if a<br />

culture <strong>of</strong> security is difficult even to discern, it is extremely difficult to manage.<br />

However, it is also not clear that a culture needs managing or whether it can be<br />

managed at all. It is the collective perception among many people, best driven by its<br />

champions. A culture has no direct metrics. Its benefits are best perceived through<br />

the accomplishment <strong>of</strong> other objectives. In the case <strong>of</strong> security, these would be an<br />

enterprisewide consensus that the risks to information are well understood, that<br />

information resources are adequately protected, that security enables rather than<br />

inhibits the attainment <strong>of</strong> business objectives and that the investment in security is<br />

well spent. Note that these are fuzzy and indirect metrics, but they are metrics<br />

nonetheless. Systems <strong>of</strong> belief are real even though they cannot be seen. When groups<br />

<strong>of</strong> people within an enterprise behave in a consistent and constructive manner, it is<br />

certain that there is a culture at work. When they accept and promote an appropriate<br />

level <strong>of</strong> protection for information resources, there is a culture <strong>of</strong> security.<br />

3.1 The Benefits <strong>of</strong> Trust<br />

<strong>Security</strong> is the basis for trust, as stated previously. At the same time, there is the<br />

sign <strong>of</strong>ten encountered in American diners: “In God we trust. All others pay cash.”<br />

40<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


3.0 the benefitS <strong>of</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

If one <strong>of</strong> the benefits <strong>of</strong> a culture <strong>of</strong> security is trust, then what is so beneficial<br />

about trust? Put another way, if trust is beneficial, what is it about a culture <strong>of</strong><br />

security that creates it?<br />

First, in a business context, trust, is an ingrained assuredness that a person/thing<br />

is what he/she/it purports to be. In many cases, the initial encounter a person has<br />

with an enterprise is an exchange <strong>of</strong> information: a résumé, a letter <strong>of</strong> introduction,<br />

a phone call, etc. One <strong>of</strong> the tenets <strong>of</strong> security is that a person’s bona fides are to<br />

be validated. The level and thoroughness <strong>of</strong> verification depends on the business<br />

requirements <strong>of</strong> the position, the classification <strong>of</strong> the information to be accessed and<br />

the perceived risks. 3 Once this is done, those working with a new employee have<br />

an expectation that the person is capable <strong>of</strong> performing the assigned tasks, but this<br />

is not security. What is relevant is that, based on prior experience, coworkers can<br />

expect the new hire to use information honestly and as authorized. This expectation<br />

persists throughout and beyond the early period <strong>of</strong> employment, growing over time<br />

as experience buttresses initial anticipation.<br />

Absent security, there is little or no way to know whether a person has manipulated,<br />

disclosed or destroyed information without authorization to do so. Thus, security<br />

fosters trust by providing assurance that information is being used as allowed or<br />

else that misuse would be noted. <strong>Security</strong> does not engender trust <strong>of</strong> others. It<br />

only allows each person to have confidence in the information being used. The<br />

degree <strong>of</strong> trust should not be overstated; one <strong>of</strong> the parties may use the information<br />

to undermine a colleague, spread rumors or make silly mistakes. However, the<br />

information that is used to do so can be trusted.<br />

There is a chain <strong>of</strong> causation here: A culture fosters security, which, in turn, leads<br />

to trust. In turn, trust leads to reliable expectations in the decisions and actions<br />

made on the basis <strong>of</strong> the information in question. Ultimately, reliability is a benefit<br />

that a culture <strong>of</strong> security provides. This is true in the workplace, but also in the<br />

home. Spouses must trust the word <strong>of</strong> spouses and children that <strong>of</strong> parents. Readers<br />

must trust their press or the advantages <strong>of</strong> an informed citizenry are lost. Citizens<br />

must be able to trust the information provided to them by their governments or<br />

there is chaos, despotism or both. There is an appropriate, wonderful feedback loop:<br />

Where security fosters trust, it also increases the strength <strong>of</strong> the culture. Forced<br />

security, as in a prison, may protect resources, but it will not create trust.<br />

Perhaps the benefits <strong>of</strong> trust as engendered by a culture <strong>of</strong> security are best<br />

understood by its opposite. Where there is no culture <strong>of</strong> security, information will,<br />

over time, be shown to be less than reliable. Poor decisions will be made on the<br />

basis <strong>of</strong> incorrect, incomplete or fallacious information. These decisions will lead<br />

to loss <strong>of</strong> money; reputation; market share; confidence; credit; and, if taken to<br />

extremes, the viability <strong>of</strong> an enterprise. All others pay cash, indeed.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 41


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

3.1.1 Internal Trust<br />

Trust is the lubricant that makes enterprises run smoothly. In a large, widely<br />

dispersed enterprise, a culture <strong>of</strong> security is essential for individuals, who may<br />

not know or see one another, to pass information between each other and act on<br />

it in the expectation that it has not been manipulated. In enterprises <strong>of</strong> this sort,<br />

security must be assumed or nothing can be accomplished. This is an effective<br />

security culture only to the extent that this assumption is based on reality.<br />

Information systems exist to manage the content and flow <strong>of</strong> information among<br />

people within departments that are part <strong>of</strong> the divisions that make up the enterprise<br />

as a whole. Events will conspire to reveal failures <strong>of</strong> security that, in time, will<br />

manifest themselves in a lack <strong>of</strong> trust in the information systems and, ultimately,<br />

the information itself. Where people do not trust information, they create parallel<br />

systems that they do trust—hence, the card file in the desk drawer and the<br />

spreadsheet on the hard drive and, hence, the breakdown <strong>of</strong> any semblance <strong>of</strong><br />

managed processes within the enterprise.<br />

How, then, does trust manifest itself in a supportive culture? It shows up in speed.<br />

Where the recipient or user <strong>of</strong> information trusts it, there is no need for repetitive<br />

checking and verification. Thus, transactions move through a system quickly and<br />

decisions can be made rapidly (or even be automated based on a reliable set <strong>of</strong><br />

rules). In physics, motion is a function <strong>of</strong> velocity and time. The forward motion<br />

<strong>of</strong> an enterprise is a recurring function <strong>of</strong> speed and time—in other words, <strong>of</strong><br />

organizational nimbleness.<br />

Nimbleness is the ability to adapt speedily and easily to changing conditions and<br />

continue to perform at a high level. It is characterized by, among other things, quick<br />

and effective decision making, a marked degree <strong>of</strong> autonomy among the employees<br />

and managers, high-performing teams, and an ability to work through ambiguity<br />

quickly and correctly. 4 All <strong>of</strong> these are enabled by trusted information or, viewed<br />

the other way round, are impossible without trusted information.<br />

There are varying levels <strong>of</strong> trust within an enterprise. Departments may share<br />

information freely without a need for independent validation until certain decision<br />

points are reached. For example, all the information needed to construct a purchase<br />

order (PO) can be gained from a variety <strong>of</strong> sources, such as a vendor database,<br />

contracts and procurement policies. However, at the point that a PO is to be issued,<br />

it is prudent to have someone, usually the department head who will have to pay for<br />

it, review and validate all the information.<br />

In another sense <strong>of</strong> varying levels <strong>of</strong> trust, the confidence that can be applied to<br />

information in normal conditions is sharply different than that needed in periods <strong>of</strong><br />

change, disruption or chaos. As information moves through an enterprise, there are<br />

systems—information systems—that preserve its integrity as it moves from process<br />

42<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


3.0 the benefitS <strong>of</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

to process. Thus, an order becomes an inventory selection that becomes a sale that<br />

becomes a delivery that becomes a payment. The information must stay unchanged,<br />

except through authorized modification procedures, throughout the journey.<br />

However, in challenging times, there is a need to recognize and react to the<br />

possibility <strong>of</strong> less reliable information. For example, if there is evidence <strong>of</strong> an<br />

active penetration attempt, information might have been changed. A disaster in a<br />

datacenter can wipe out enormous amounts <strong>of</strong> information in a very short amount<br />

<strong>of</strong> time. It is at points such as these that the quality <strong>of</strong> trust takes on new meaning.<br />

Can security technology be trusted to identify penetration attempts and to isolate<br />

possibly affected records and databases? Can disaster recovery plans be executed<br />

in such a way that the recovered information is current and accurate, at least within<br />

preestablished parameters for currency and accuracy? The answer is yes, if:<br />

• <strong>Security</strong> has been tested under circumstances similar to that <strong>of</strong> the event<br />

in question.<br />

• Mechanisms are in place while executing security and recovery measures to<br />

validate the resulting information.<br />

• Leadership exhibits confidence in security as it uses the information in question.<br />

These attributes may be stated in terms <strong>of</strong> organizational variables such as context,<br />

supportiveness and leadership. These can only be established on the basis <strong>of</strong><br />

practices and behaviors put in place long before a crisis. They are the product <strong>of</strong><br />

deliberate effort and unremitting hard labor. Leadership, in context, is a hallmark<br />

<strong>of</strong> a culture; leadership’s trust in information in a crisis is a hallmark <strong>of</strong> a culture<br />

<strong>of</strong> security. There is a need for balance among the variables. Maximizing any one<br />

component <strong>of</strong> a system pressures the whole. Strong leadership is essential, but<br />

disregarding context and culture can lead to over-reliance on leaders in routine<br />

times 5 that disappears in crises.<br />

3.1.2 External Trust<br />

The need for trusted information does not stop at an enterprise’s front door. Trust<br />

is essential among business partners, contractors, vendors and customers. The<br />

concept <strong>of</strong> security’s being erected at the perimeter <strong>of</strong> an enterprise’s information<br />

systems has long been outmoded. 6 Thus, the internal-external distinction has, to a<br />

large extent, become blurred, but it is meaningful nonetheless. There is a basis for<br />

trusting those who work together for a common purpose, with jointly held values<br />

and attitudes about the security <strong>of</strong> information resources (i.e., a culture <strong>of</strong> security)<br />

and those who may share some <strong>of</strong> the same incentives, but whose motivations<br />

ultimately diverge.<br />

While customers and suppliers have a mutuality <strong>of</strong> interest, there is an inherent<br />

adversarial relationship with regard to information. In many enterprises, there<br />

are entire departments checking invoices against POs to make sure that there<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 43


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

are no overcharges. However, an excessive bill is not indicative <strong>of</strong> a problem<br />

with security. The good faith in an enterprise’s security is most tested where one<br />

enterprise holds information regarding another (or <strong>of</strong> individuals). The issue is most<br />

starkly presented where the privacy <strong>of</strong> PII is concerned, but it is just as valid where<br />

the relationship is a business-to-business one. For example, a company would not<br />

want its buying patterns revealed lest its business strategy be made public as well,<br />

which necessitates that purchasing information must be kept secure, and sellers do<br />

not want to have any tampering with customer orders. Thus, the trust necessary<br />

to enlarge business relationships rests on good products and services, to be sure,<br />

but also on contracts, nondisclosure agreements and a general understanding that<br />

information will be secured diligently by both parties.<br />

The Banking Example<br />

To an extent, a culture <strong>of</strong> security also accommodates reduced levels <strong>of</strong> security if<br />

the reduction is attuned to risk and value. A classic example is a bank’s approach<br />

to verifying customer identity with regard to checks. By custom as well as law, a<br />

signature is sufficient authorization to make a payment based on a draft against an<br />

account. At one time, banks would match customers’ signatures on checks against<br />

those on cards filed at the time an account was opened. Over time, banks realized<br />

that the vast majority <strong>of</strong> checks were not counterfeit or forged, so they stopped the<br />

practice <strong>of</strong> verification. The cost <strong>of</strong> risk acceptance was shown to be far less than<br />

the cost <strong>of</strong> increased security. Thus, the banking culture, always attuned to security,<br />

adapted to a more appropriate level <strong>of</strong> integrity checking.<br />

The exceptions in check payment are as instructive as the reduced level <strong>of</strong><br />

checking. In some countries, banks still verify each signature. In section 2.2.1,<br />

Societal <strong>Culture</strong> and <strong>Security</strong>, it was shown that different societies have varying<br />

levels <strong>of</strong> expectation <strong>of</strong> trust and honesty, based on economics, language, history<br />

and heritage. Thus, in some nations, the level <strong>of</strong> confidence in the authenticity <strong>of</strong><br />

checks and customer signatures does not permit the same practices as in banks<br />

where validation is not required. (It also limits the number <strong>of</strong> potential customers.)<br />

Prudence wins out over cost reduction.<br />

Moreover, even banks that do not routinely verify signatures do so when the value<br />

<strong>of</strong> a check passes a certain threshold. Viewed systemically, the level <strong>of</strong> security<br />

required increases in a direct relationship with the value <strong>of</strong> the information. The<br />

heritage <strong>of</strong> banking is such that trust <strong>of</strong> customers is only slowly gained; a long<br />

history <strong>of</strong> timely payments and large deposits has been the basis <strong>of</strong> lending in the<br />

past. With the vast expansion <strong>of</strong> banking activity following World War II, it was<br />

necessary for financial institutions to broaden their “know your customer” policies<br />

and introduce automation <strong>of</strong> the information in banking transactions, notably<br />

including checks. Interestingly, in 1998, “know your customer” rules were proposed<br />

44<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


3.0 the benefitS <strong>of</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

as addenda to bank regulations in the US, but they were withdrawn because <strong>of</strong><br />

privacy concerns—yet another example <strong>of</strong> level setting within the broader culture<br />

<strong>of</strong> security affecting businesses.<br />

Trust Defined or Earned<br />

As noted previously, a very low level <strong>of</strong> trust was assumed between enterprises<br />

and their customers in the past. This proved to be a brake on business growth, and<br />

information systems were introduced to speed and standardize the processes <strong>of</strong><br />

managing customer information. In parallel (or, in fact, slightly lagging), security<br />

systems arose to protect the information. The reliance within an enterprise on its<br />

security systems allowed business expansion to deal with customers the enterprise<br />

did not know and may never have met. The current state <strong>of</strong> electronic commerce<br />

(e-commerce), in which customers are geographically dispersed and anonymous, is<br />

the logical extension <strong>of</strong> that trend. 7 Where once trust needed to be earned over time,<br />

it is now more routine to assume that a customer can be trusted until demonstrated<br />

otherwise. The movement from “know before trusting” to “trust, but verify” is a<br />

significant cultural shift across many societies, abetted by cultures <strong>of</strong> security being<br />

established in enterprise after enterprise.<br />

As information, especially in electronic form, becomes increasingly pervasive in<br />

all aspects <strong>of</strong> culture, both the scale and inherent value <strong>of</strong> such information drives<br />

a need for a more pronounced culture <strong>of</strong> security. The culture must take into<br />

account many contending internal and external forces, but in the context <strong>of</strong> current<br />

business conditions, the result must include at least a reasonable level <strong>of</strong> trust.<br />

Setting the bar <strong>of</strong> reasonableness requires an understanding <strong>of</strong> the relevant risks, the<br />

effectiveness <strong>of</strong> security measures and management’s tolerance for losses. In other<br />

words, reasonability is a part <strong>of</strong> a culture <strong>of</strong> security and a culture <strong>of</strong> security is<br />

established in the context <strong>of</strong> reasonability. This may be viewed as circular logic or,<br />

preferably, as a virtuous cycle that refines a culture over time.<br />

3.2 The Benefits <strong>of</strong> Consistency<br />

<strong>Security</strong> should be boring. House keys are boring. Smoke detectors are boring.<br />

When security is working, it is unobtrusive, functional and pervasive. <strong>Security</strong> is<br />

noticeable only when it is not there when needed. It becomes quite exciting when<br />

there is a security breach: People scramble to find every copy <strong>of</strong> a report; computer<br />

emergency response teams (CERTs) mobilize to restore systems and networks;<br />

datacenter staff travel to distant recovery sites; etc. Good security is virtually<br />

invisible. Poor security is very evident indeed.<br />

The essence <strong>of</strong> boredom is repetitiveness and continuity. The same key unlocks<br />

the same door every time. A smoke detector sits in place, with a small light always<br />

glowing. When information is secure, only authorized people have access to<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 45


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

it—always. It is always encrypted in storage, always kept in locked file cabinets,<br />

never spoken <strong>of</strong> in public places and never left behind after a meeting. <strong>Security</strong><br />

is continually, constantly in place; working as expected; and clearly understood,<br />

controlled, monitored and observed.<br />

At least, that is the goal.<br />

<strong>Security</strong> is derived from a combination <strong>of</strong> policy, technical and procedural<br />

measures. Consistent security is a result <strong>of</strong> a culture that applies the same measures<br />

in the same way all the time to all assets <strong>of</strong> similar value. Implicitly, the culture<br />

must also support clear, well-communicated methods for determining the value <strong>of</strong><br />

information and for allowing exceptions to security processes on a controlled<br />

basis. In this way, security can be well understood by all those who encounter<br />

information. Moreover, organizational management can have a rational basis for<br />

relying on the security measures in place and for recognizing the extent to which<br />

security cannot be depended.<br />

3.2.1 Valuing Information<br />

Not all information is <strong>of</strong> equal value, nor is a given item <strong>of</strong> information <strong>of</strong> the<br />

same value all the time. For example, some information is <strong>of</strong> little or no value at<br />

all to an enterprise (e.g., the bowling league scores). Other information may have<br />

great short-term value, such as the price <strong>of</strong> a commodity or a stock, that diminishes<br />

rapidly as it is made public. Some is transactional, with minor individual worth, but<br />

great value in the aggregate. Some is strategic, with substantial impact if it were to<br />

be lost, disclosed or manipulated. The test is to determine the:<br />

46<br />

Potential impact on an enterprise should certain events occur which<br />

jeopardize the information and information systems needed by the<br />

enterprise to accomplish its assigned mission, protect its assets,<br />

fulfill its legal responsibilities, maintain its day-to-day functions,<br />

and protect individuals. 8<br />

The potential impact <strong>of</strong> a lack <strong>of</strong> security is determined through a risk assessment<br />

process, based on the classification or categorization <strong>of</strong> the information in question.<br />

The means <strong>of</strong> classifying information, i.e., setting its value, are a part <strong>of</strong> a culture <strong>of</strong><br />

security. There is considerable debate as to the gradations <strong>of</strong> value, the metrics for<br />

classification, the frequency and rigor with which information should be categorized,<br />

who should perform the classification, etc. In terms <strong>of</strong> a culture <strong>of</strong> security, the<br />

determination <strong>of</strong> these matters is unimportant as long as information is valued the<br />

same way at all times by all those involved. This consistency reduces the chances <strong>of</strong><br />

introducing a security gap if the same information is felt to have different value by<br />

different analysts. If consistently applied, it provides a realistic basis for management<br />

to gauge the investment necessary for the appropriate level <strong>of</strong> security.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


3.0 the benefitS <strong>of</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

3.2.2 Exception Processes<br />

<strong>Security</strong> can be undermined if it is too rigid. Standards may be set to govern a broad<br />

range <strong>of</strong> uses <strong>of</strong> information, specifying what is and is not permissible for certain<br />

categories and uses. It is impossible to foresee all conditions in which every sort<br />

<strong>of</strong> information will be used. Inevitably, there are circumstances in which a valid<br />

business case can be made for less (or more) security. If the rules are seen to be blind<br />

to the context in which information is to be used, people will find a way around the<br />

prescribed security measures. In such a case, the culture is typified not by what the<br />

enterprise may expect it to be, but by the craftiness <strong>of</strong> those who would circumvent it.<br />

The culture <strong>of</strong> a successful enterprise must recognize that there are exceptions to<br />

every rule. If there is a standard procedure for adjudicating differences between<br />

those responsible for security and those with a legitimate business need to deviate<br />

from prescribed measure, that enterprise’s culture <strong>of</strong> security is typified by<br />

flexibility and reasonableness. It may seem paradoxical, but consistent application<br />

<strong>of</strong> exception processes actually creates a more effective culture <strong>of</strong> security than one<br />

that is authoritarian and unbending.<br />

Of course, it is possible to have too many exceptions, thereby invalidating the rules.<br />

In such a case, the security culture becomes one typified by a “whatever you can<br />

get away with” outlook. This is one instance in which there are metrics for security.<br />

If a given enterprise’s security is based on all exceptions and no application <strong>of</strong><br />

standards, then the exception is the rule.<br />

3.2.3 Risk Management<br />

One <strong>of</strong> the logical outcomes <strong>of</strong> an exception process is the decision to determine<br />

that a risk is not credible and, thus, to accept it. Some security specialists find it<br />

difficult to acknowledge that, at some point, it is more prudent not to secure an<br />

asset than to do so. That may be because the asset in question is not considered<br />

sufficiently valuable or because the cost <strong>of</strong> protecting it is seen as being too<br />

high. <strong>Security</strong> pr<strong>of</strong>essionals can enter into this decision, but their bias in favor<br />

<strong>of</strong> protection, perhaps at all costs, renders them unable to be the final arbiter.<br />

Sometimes, enterprises can justifiably accept a risk <strong>of</strong> misuse <strong>of</strong> some information.<br />

Again, the determinant in terms <strong>of</strong> a culture <strong>of</strong> security is consistency. It is<br />

unacceptable to simply take a risk without an agreed-on process to make and<br />

validate risk acceptance decisions. There are three aspects, or domains, <strong>of</strong> risk as<br />

the term applies to information: governance, evaluation and response. A<br />

standardized governance <strong>of</strong> risk (i.e., <strong>of</strong> deciding whether to mitigate, transfer<br />

or accept risks) is a distinct part <strong>of</strong> a culture <strong>of</strong> security. If a culture allows any<br />

manager to blindly evaluate and accept the risk <strong>of</strong> information misuse, then it is one<br />

<strong>of</strong> permissiveness—not <strong>of</strong> protection and certainly not <strong>of</strong> prudence. Moreover, once<br />

a determination has been made concerning the appropriate response, an enterprise<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 47


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

with a viable security culture is more likely to see the necessary actions followed<br />

through. The benefit <strong>of</strong> consistency in risk management is that all participants can<br />

respect the decisions made, even if they disagree with them. 9<br />

Risk management is not a democratic process. Some stakeholders weigh in more<br />

heavily than others in making risk-related decisions. However, if the methods are<br />

consistent and the information on which the decisions are made is trustworthy, then<br />

the integrity <strong>of</strong> a culture <strong>of</strong> security is preserved.<br />

3.2.4 Predictability<br />

One <strong>of</strong> the byproducts <strong>of</strong> consistency is a reasonable expectation that the same<br />

process, tool or procedure will render the same results, time after time. This may<br />

be particularly important for security purposes. If security is operative today,<br />

all involved have a right to anticipate that it will work the same way tomorrow,<br />

i.e., that permissible access will be allowed, with all others denied. Information<br />

systems need to be built in the expectation <strong>of</strong> a certain level <strong>of</strong> overall security<br />

so that developers can accurately gauge on what their systems can rely outside<br />

an application and what they must build into it. Without predictability, each new<br />

application development would require revisiting security from the top.<br />

An advantage <strong>of</strong> a predictable security culture is that it is measurable, albeit<br />

indirectly. A computer program can be tested to ensure that it works as specified.<br />

Except for the simplest programs, it is not possible to test all possible logical<br />

permutations to prove that a program is correct. Likewise, information security<br />

cannot be proven to work all <strong>of</strong> the time, that is, predictably, 10 but to the degree<br />

that security does operate as expected, it is an indicator <strong>of</strong> the vitality <strong>of</strong> a culture.<br />

<strong>Security</strong> incidents may be indicators <strong>of</strong> weakness in a culture <strong>of</strong> security. However,<br />

if an enterprise responds promptly and effectively to an incident and, in particular,<br />

uses it to strengthen protection, it may also be indicative that a culture <strong>of</strong> security<br />

exists and is functioning well.<br />

There is another aspect <strong>of</strong> predictability that bears on a culture <strong>of</strong> security: the<br />

ability <strong>of</strong> an enterprise to foresee the risks it will face and to implement measures<br />

proactively to deter them. In numerous instances in recent years, from terrorist<br />

attacks to financial failures to hurricanes, there is a reaction by those who should<br />

have known better that “no one could have anticipated this.” Often, there was<br />

willful ignorance <strong>of</strong> the potential for harm and preventive or responsive measures<br />

could have been put in place. Foresight is an essential cultural artifact <strong>of</strong> a<br />

predictable culture attuned to risks and their reduction.<br />

48<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


3.0 the benefitS <strong>of</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

3.2.5 Standardization<br />

If consistency requires security to do the same things time and again, then it ought<br />

to do them the same way. To that end, enterprises settle on standard operating<br />

procedures (SOPs); standard tools; and, well, standards. An important benefit <strong>of</strong><br />

standardization is that doing anything in a standardized manner leads not only<br />

to effectiveness, but also efficiency. People within an enterprise do not have to<br />

reinvent methods and practices, but can simply apply those that have worked in the<br />

past to future endeavors. (There is a risk that should not be overlooked, <strong>of</strong> standards<br />

becoming hidebound and restricting progress.)<br />

There are two types <strong>of</strong> standards that contribute to a culture <strong>of</strong> security. Some are<br />

internal to an enterprise, and others are generalized across an industry (e.g., the PCI<br />

Data <strong>Security</strong> Standards [PCI DSS]), a nation (e.g., those <strong>of</strong> the American National<br />

Standards Institute [ANSI] or British Standards Institute [BSI]) or the globe (e.g.,<br />

the ISO standards referred to previously). The benefit <strong>of</strong> external standards is that<br />

they lend themselves to certification, as is the case with ISO 27001 11 for security<br />

generally or British Standard (BS) 25999 12 for business continuity management<br />

(BCM). Certification itself has two benefits: It promotes a culture <strong>of</strong> security<br />

and builds internal support for it. Within an enterprise, who would want to be the<br />

cause <strong>of</strong> it losing its certification? Moreover, certification inspires trust among<br />

business partners. If unable to look deeply into one another’s security practices,<br />

they can place reliance on an independent third-party’s assurance that, at minimum,<br />

a publicly described standard <strong>of</strong> security has been attained. Certification is a<br />

benchmark <strong>of</strong> trustworthiness that may be a part <strong>of</strong> the glue that holds an extended<br />

enterprise together. By the same token, certification is not an unbounded assurance<br />

<strong>of</strong> security or recoverability. Any individual or enterprise wishing to place reliance<br />

on an associated business’s certificate must understand exactly what is certified. 13<br />

Internal organizational standards are the codification <strong>of</strong> an intentional culture <strong>of</strong><br />

security. It is important to remember that standards are prescriptive and aspirational.<br />

They state what management in a given enterprise believes security should be (as<br />

opposed to external standards, which capture generally accepted best practices).<br />

Yet another metric <strong>of</strong> a culture <strong>of</strong> security is the comparison <strong>of</strong> internal and<br />

external standards to see how close management’s intentions are to best practices.<br />

The adherence <strong>of</strong> an enterprise to its own standards is then subject to audit. The<br />

links—strong, weak or broken—among actual practice, management’s expectations<br />

and globally stated norms are accurate indicators <strong>of</strong> how entrenched a culture <strong>of</strong><br />

security is within an enterprise.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 49


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

3.3 Improved Ability to Manage Risk<br />

There is risk in every enterprise. Some <strong>of</strong> it is evident and is addressed through a<br />

risk management process. In some enterprises, risk management is robust and<br />

deals thoroughly with all aspects <strong>of</strong> strategic, compliance, financial and operational<br />

risk. 14 There is a widespread understanding that risk management requires a central<br />

coordinator or champion. Within certain industries, the position <strong>of</strong> the chief risk<br />

<strong>of</strong>ficer (CRO) fulfills this role. The CRO is given the task <strong>of</strong> coordinating and<br />

overseeing the enterprise’s risk at an enterprise level and reports to a high level<br />

<strong>of</strong> management. 15<br />

In other enterprises, the risk management function is little more than buying<br />

insurance. It is true that risk transfer is one acceptable response to risk; nonetheless,<br />

where risk management is thought <strong>of</strong> as purely insurance, it fails in its overall<br />

responsibility to the enterprise also to mitigate, control or formally accept risk.<br />

Risk management and security are—or should be—partners in mitigating and<br />

controlling risk within an enterprise. This is very apparent in information-intensive<br />

businesses whose stock in trade is not tangible goods, but data. These would<br />

include financial services 16 and many enterprises that sell information, such as<br />

photographs or music, over the Internet. It is unclear whether a culture <strong>of</strong> security<br />

leads to formal recognition <strong>of</strong> the importance <strong>of</strong> risk management or vice versa.<br />

It really is not important. What is clear is that a culture <strong>of</strong> security creates an<br />

environment that is receptive to understanding and dealing with risk in all forms,<br />

not least those related to information.<br />

Some <strong>of</strong> these risks are stated in standards and textbooks. Focusing on those risks<br />

results in standard, textbook responses. Risk management has the greatest benefit<br />

in dealing with evident, but unexpected, possibilities, so-called “black swans.”<br />

Both the term and the concept were popularized by Nasim Nicholas Taleb, 17 and<br />

these sorts <strong>of</strong> risks are very much in the consciousness <strong>of</strong> many risk managers<br />

today. Black swans are credible risks that are so far out <strong>of</strong> common experience<br />

that they are not given the credence they deserve. Recently, the new term “white<br />

swans” has arisen and means, in general, the ability to see and respond to risks<br />

that are before everyone’s eyes and to take action against them with a view beyond<br />

short-term financial interests. The economy <strong>of</strong> an enterprise whose business is<br />

based on a sound understanding <strong>of</strong> the value <strong>of</strong> its resources will be significantly<br />

healthier than the economy <strong>of</strong> an enterprise whose business lacks a strong,<br />

value-based approach. 18 A value-based approach to risk is more than a white swan;<br />

in the context <strong>of</strong> information, it is a distinct part <strong>of</strong> a culture <strong>of</strong> security.<br />

A culture <strong>of</strong> security does not, in itself, result in lower risk, although it should<br />

contribute to lowering it. Where such a culture exists, personnel will be more<br />

50<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


3.0 the benefitS <strong>of</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

attuned to risk, better able to see the risks in the way that information is managed<br />

and more likely to use information securely because they comprehend the risks to<br />

themselves and to the enterprise if they do not.<br />

3.4 Improved Return on <strong>Security</strong> Investment<br />

Perhaps one <strong>of</strong> the reasons that a culture <strong>of</strong> security is thought <strong>of</strong> as the “s<strong>of</strong>t” side<br />

<strong>of</strong> security is that there is nothing to go out and buy. A pattern <strong>of</strong> behaviors, beliefs,<br />

assumptions, attitudes and ways <strong>of</strong> doing things does not show up in a box, but that<br />

does not mean that such a culture is free. It costs money to instill attitudes, change<br />

behaviors and operating procedures, and instill a sense within an enterprise that<br />

security adds value to an enterprise that supports it.<br />

Of course, the s<strong>of</strong>tware and hardware needed to implement much <strong>of</strong> security,<br />

especially over electronic information, do come in a box and also cost money.<br />

There are many questions confronting management in many enterprises regarding<br />

how much security is required, what the ratio is between the money spent and the<br />

security obtained, what the long-term total cost <strong>of</strong> security is, and how the return on<br />

investment (ROI) can be measured and justified. The answers to these questions are<br />

generally encompassed in the term “return on security investment” (ROSI). ISACA<br />

has long understood the importance <strong>of</strong> ROSI:<br />

Clearly defining ROSI is critical for enterprises to attain business<br />

objectives. To obtain a reasonably accurate estimation <strong>of</strong> ROSI,<br />

the enterprise needs to determine its security requirements and the<br />

most appropriate measure <strong>of</strong> ROSI, and establish metrics to collect<br />

information to measure ROSI. Business operations today recognise the<br />

significance <strong>of</strong> security measures as well as the risks and consequences<br />

involved in ignoring the impact <strong>of</strong> security to business operations.<br />

Decision makers are required to quantify, review and modify security<br />

metrics periodically to ensure effectiveness <strong>of</strong> the security measure. 19<br />

This subject is too dense and too well explored to be expanded on further here. The<br />

relevant matter is whether a culture <strong>of</strong> security affects ROSI and whether the impact<br />

is positive or negative. On the surface, it would seem that an enterprise with a more<br />

pronounced culture <strong>of</strong> security would invest more in security than one without such<br />

a culture. It would buy more security products, hire more security pr<strong>of</strong>essionals,<br />

and have more complex procedures for implementing and maintaining security.<br />

However, that only looks at one side <strong>of</strong> the ledger. It does not factor in the expected<br />

returns from the expenditures, the net present value <strong>of</strong> information resources<br />

over time, annual loss expectations or the cost <strong>of</strong> recovery if security is breached.<br />

Indeed, there are many ways <strong>of</strong> calculating ROSI, each with inherent biases in<br />

favor <strong>of</strong> maximizing security or minimizing the effect <strong>of</strong> breaches. 20 These are<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 51


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

not necessarily the opposite sides <strong>of</strong> the same coin, inasmuch as the reputational,<br />

social, moral and pr<strong>of</strong>essional value <strong>of</strong> security cannot always be stated in purely<br />

monetary terms. There is no way to balance the recognized cost <strong>of</strong> prevention with<br />

the unrecognizable savings from events that do not happen because the preventive<br />

measures are in place.<br />

Implicitly, then, an enterprise with a culture <strong>of</strong> security places a value on the frauds<br />

that do not occur, the audit reports that do not need responses, the remediation and<br />

recovery costs that do not have to be incurred, or the disaster that did not disrupt<br />

business operations. The question is whether the ROSI attributable to a culture<br />

<strong>of</strong> security is an article <strong>of</strong> faith or whether it can be demonstrated. There are<br />

calculations intended to optimize the investment in security, 21 but it remains to be<br />

seen whether they can be tied to a cultural impetus.<br />

One <strong>of</strong> the difficulties in linking ROSI and culture is that there are many<br />

investments in security that are nondiscretionary. They are mandated by laws<br />

and regulations, so even the most risk-tolerant, security-averse management must<br />

implement some level <strong>of</strong> security. For example, privacy is required across the board<br />

in some areas <strong>of</strong> the world and is specified by law in certain industries in other<br />

nations. Additionally, there is a level <strong>of</strong> prudence that leads to expenditures that no<br />

sensible manager would dispute. For example, who today would operate without<br />

virus filters or firewalls?<br />

The intersection <strong>of</strong> a culture <strong>of</strong> security and the investment in protection is in how<br />

much and how well the security will be applied. For instance, a law may call for a<br />

chief security <strong>of</strong>ficer (CSO), but it does not say how much the person ought to be<br />

paid, how large a staff there must be or with which s<strong>of</strong>tware tools the function must<br />

be equipped. There is an implied rule <strong>of</strong> reason, 22 a context that is an essential part<br />

<strong>of</strong> a culture. It is not so much that a culture <strong>of</strong> security increases or decreases ROSI,<br />

but that it contributes to reaching the appropriate balance.<br />

The ROSI benefit <strong>of</strong> a culture <strong>of</strong> security is that it creates an environment in<br />

which an enterprise can determine the right mix <strong>of</strong> investments: security products,<br />

insurance and acceptance <strong>of</strong> the costs <strong>of</strong> security-related incidents. With explicit<br />

and consistently applied processes for evaluating risk, enterprises are more likely<br />

to fund the most effective means <strong>of</strong> securing their information. If pure operating<br />

expenses were the only determinant <strong>of</strong> ROSI, then enterprises should implement<br />

only the minimum amount <strong>of</strong> security and obtain insurance to recoup the cost <strong>of</strong><br />

the inevitable incidents. As stated, this does not take into account the many impacts<br />

on an enterprise that are not measured monetarily or, at least, the cases in which<br />

financial impact is felt only over time and indirectly by diminished reputation and<br />

lost market share. It must also be remembered that incidents still occur, no matter<br />

how great the expenditure on security.<br />

52<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


3.0 the benefitS <strong>of</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

A culture <strong>of</strong> security comes into play in the middle ground between required security<br />

and clearly excessive spending. These categories are not clearly defined, but fuzzy sets<br />

<strong>of</strong> values lend themselves to conveying a large amount <strong>of</strong> information with a very few<br />

words. They make it possible for people to manage uncertainty as characterized by<br />

structures that lack sharp, well-defined boundaries. To that extent, a culture <strong>of</strong> security<br />

is rightly “s<strong>of</strong>t” in the sense <strong>of</strong> a s<strong>of</strong>t focus, one that provides a fuzzy, nondiscrete,<br />

poorly defined view <strong>of</strong> the requirements for security. It is better to be approximately<br />

right than to be wrong with mathematical precision. Numbers, after all, are as subject to<br />

(mis)interpretation as are behaviors. Those looking for “hard” facts and figures would<br />

do well to look elsewhere than into the culture <strong>of</strong> an enterprise, but they would fail to<br />

take advantage <strong>of</strong> real forces that guide, steer and push enterprises to the right decisions.<br />

3.5 Compliance With Laws and Regulations<br />

It is fair to say that regulations encapsulate good practice—various measures<br />

that enterprises should be implementing anyway. To the degree that this is so, a<br />

supportive culture makes compliance easier, if not easy. No one can say that a<br />

culture <strong>of</strong> security enables compliance with a particular law or regulation. Rather, a<br />

culture <strong>of</strong> security makes an enterprise more amenable to complying with laws and<br />

regulations generally and makes compliance a routine part <strong>of</strong> operations. A defining<br />

characteristic <strong>of</strong> a security culture may be that an enterprise always seeks to be in<br />

compliance with the laws and regulations <strong>of</strong> the area in which it operates. Doing<br />

otherwise could possibly endanger its survival, as has happened to several failed<br />

companies in recent years.<br />

There are three competing views <strong>of</strong> regulation. Regulation is:<br />

• An unnecessary intrusion into management’s discretion in running its business<br />

• A necessary contributor to an orderly society. Some countries exercise regulation<br />

lightly while others are more authoritarian and dictatorial.<br />

• The basis for competitive advantage 23<br />

Whichever the view, enterprises comply unless they deliberately court penalties<br />

with disobedience. Some do so grudgingly, to the least extent possible, while<br />

others embrace the framework that regulations imply. It is not necessary to say<br />

that enterprises with strong security cultures are compliant to recognize that those<br />

without such a culture are more likely to find regulations burdensome.<br />

Those seeking to build a culture <strong>of</strong> security can use laws and regulations to their<br />

advantage. Where security is legally mandated, external rules can be used to force<br />

internal action. However, imposing a culture in the name <strong>of</strong> compliance may<br />

change behaviors, but it also hardens negative attitudes about security. Moreover,<br />

those enterprises that operate globally must meet so many regulations that all<br />

investments in security may seem arduous.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 53


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

A more beneficial approach is to use required security as a baseline for<br />

discretionary measures. The security measures needed to comply with regulations<br />

have a price. Those may prove sufficient to meet the security needs <strong>of</strong> an enterprise,<br />

with or without regulatory pressure. If additional security is felt to be necessary,<br />

given the risks an enterprise faces, the cost for additional measures is easier to<br />

justify. (If the cost <strong>of</strong> compliance is x, then, for just a relatively marginal amount,<br />

even better security can be achieved.) However, using regulation as a basis for a<br />

security program is merely a diversion from the basic requirement to observe legal<br />

and regulatory requirements.<br />

The benefit <strong>of</strong> a culture <strong>of</strong> security is that it fosters proactivity, which enables an<br />

enterprise to position itself in front <strong>of</strong> externalities and base its security pr<strong>of</strong>ile<br />

on its own needs rather than those imposed by laws and regulations. In the long<br />

run, there are savings to be achieved by anticipating problems rather than reacting<br />

to them when they arrive. In many, if not most, cases, the steps taken to meet<br />

perceived organizational security needs may be sufficient to satisfy regulatory<br />

bodies as well, and when they are not, the cost <strong>of</strong> compliance may be subsumed<br />

into that <strong>of</strong> security itself. The price will be paid regardless, but where there is<br />

a culture <strong>of</strong> security, the price may be seen not as an additional burden on the<br />

enterprise, but as a part <strong>of</strong> the investment in overall organizational growth.<br />

3.6 Shareholder/Citizen Value<br />

The greatest benefit <strong>of</strong> a culture <strong>of</strong> security is that those enterprises that have<br />

one are simply better enterprises than those that do not. Private companies with a<br />

culture <strong>of</strong> security create greater value for their shareholders. Government agencies<br />

deliver greater value to their citizens. Real value is derived from pr<strong>of</strong>its and mission<br />

accomplishment in the short term. The ability to continue to create value is based in<br />

an enterprise’s culture.<br />

It is perhaps easier to see that a culture <strong>of</strong> service pleases customers, a culture <strong>of</strong><br />

growth pleases investors and a culture <strong>of</strong> productivity pleases employees. However,<br />

who derives pleasure from security? As long as security is viewed as a negative,<br />

restrictive factor within an enterprise, it is hard to see who gains benefit from it.<br />

<strong>Security</strong> pr<strong>of</strong>essionals are <strong>of</strong>ten heard to say that security is an enabler, 24 not an<br />

inhibitor. This means that secure information is a baseline requirement for any<br />

enterprise to prosper. If the information that flows through an enterprise cannot be<br />

trusted, then that enterprise will be unable to compete effectively.<br />

As noted previously, this is all the more the case for those enterprises whose<br />

business is the provision <strong>of</strong> information. For these businesses, service, growth and<br />

productivity—to say nothing <strong>of</strong> pr<strong>of</strong>itability—are directly linked to the quality<br />

<strong>of</strong> the information provided, and security is an attribute <strong>of</strong> quality. A culture<br />

54<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


3.0 the benefitS <strong>of</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

<strong>of</strong> security allows all stakeholders, from the lowest-paid employee to the chief<br />

executive <strong>of</strong>ficer (CEO) to the investors, to see the alignment <strong>of</strong> business and<br />

security objectives.<br />

Even in enterprises whose products are tangible goods, there is valuable information<br />

behind the products. Recipes, formulas, production processes, research, etc., are all<br />

information that leads to the items such companies sell. They cannot take or satisfy<br />

an order, find a product in a warehouse, or track delivery and payment without<br />

information. Again, the quality <strong>of</strong> the information is a major contributing factor in<br />

the success <strong>of</strong> the products.<br />

A culture <strong>of</strong> security in concert with other aspects <strong>of</strong> a corporate culture is the<br />

foundation <strong>of</strong> organizational continuity. To the extent that an enterprise experiences<br />

the shocks <strong>of</strong> catastrophic events, its disaster recovery planning is certainly the<br />

basis for ongoing success. A culture that values information and supports the<br />

measures to preserve it and use it correctly is also more likely to be a continuing<br />

institution than one that does not. A culture <strong>of</strong> security permits management to see<br />

the benefits <strong>of</strong> security and not just the costs. More important, it leads an enterprise<br />

to the appropriate level <strong>of</strong> security given the context <strong>of</strong> its business.<br />

The words “context,” “appropriate,” “alignment” and “value” recur frequently in a<br />

discussion <strong>of</strong> any culture. Where a culture is, is a question <strong>of</strong> security. Sadly, there<br />

is an obstacle <strong>of</strong> ingrained negativity to be overcome in establishing what should<br />

be a natural extension <strong>of</strong> any enterprise’s foundational principals: Do not betray<br />

confidences, always live with integrity, prepare for the worst while expecting the<br />

best, etc. In other words, integrity, confidentiality and availability are not addenda<br />

to a corporate culture. They are always there.<br />

Endnotes<br />

1 Ibid., p. 12<br />

2 Ibid., p. 8<br />

3 ISO, ISO/IEC 27002, op.cit. p. 23<br />

4 Powers, Burke; “Strategic Nimbleness as a Business <strong>Culture</strong>,” 2 August 2005,<br />

http://strategicchange.blogspot.com/2005/08/strategic-nimbleness-as-business.html<br />

5 Connor, Darryl R.; How to Create the Nimble Organization, John Wiley & Sons,<br />

USA, 1998, p. 68-69. Note that Connor is referring to a culture <strong>of</strong> nimbleness, not<br />

security. The point here is that one cannot exist without the other.<br />

6 Ross, Steven J.; “The Vanished Perimeter,” Information Systems Control Journal,<br />

vol. 5, USA, 2003. See also van Wyk, Kenneth; “How to Protect a Vanishing<br />

Perimeter,” e<strong>Security</strong> Planet, 4 April 2005, www.esecurityplanet.com/views/<br />

article.php/3494991/How-to-Protect-a-Vanishing-Perimeter.htm.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 55


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

7 ISACA, e-Commerce <strong>Security</strong>: A Global Status Report, USA, 2000, p. 59-62, passim.<br />

8 US National Institute for Standards and Technology (NIST), Standards for<br />

<strong>Security</strong> Categorization <strong>of</strong> Federal Information and Information Systems,<br />

(FIPS 199), USA, February 2004<br />

9 ISACA, The Risk IT Framework, USA, 2009, passim.<br />

10 The unprovability <strong>of</strong> programs is a concept associated with Edgar Dijkstra and is<br />

also known as formal verification. There have been a number <strong>of</strong> academic studies <strong>of</strong><br />

formal verification as applied to security. For example, see Taha, Ahmed H.; “Formal<br />

Verification <strong>of</strong> IEEE 802.16 <strong>Security</strong> Sublayer Using Scyther Tool,” Concordia<br />

University, USA, 2009, http://hvg.ece.concordia.ca/Publications/Confrences/<br />

N2S09.pdf. See also University <strong>of</strong> Birmingham, USA, www.cs.bham.ac.uk/research/<br />

groupings/formal_verification_and_security/, and Research Center for Information<br />

<strong>Security</strong> (Japan), www.rcis.aist.go.jp/project/s<strong>of</strong>tverification-en.html.<br />

11 Op. cit, ISO, ISO/IEC 27001<br />

12 British Standards Institute (BSI), “Business Continuity Management—Part 2:<br />

Specification,” UK, 2007<br />

13 Ross, Steven J.; “Certification and the Disappearing Perimeter,” Information<br />

Systems Control Journal, vol. 6, USA, 2008<br />

14 Institute <strong>of</strong> Risk Management, et al., “A Risk Management Standard,” UK, 2002, p. 2<br />

15 Conference Board <strong>of</strong> Canada, et al., “A Composite Sketch <strong>of</strong> a Chief Risk Officer,”<br />

Canada, 2001, p. 1<br />

16 Ibid., p. 2. In this report, 45 percent <strong>of</strong> the respondents were in financial services.<br />

Therefore, notably, 55 percent were in other industries.<br />

17 Taleb, op. cit.<br />

18 Featherby, James; “The White Swan Formula,” London Institute for<br />

Contemporary Christianity, UK, 2009, p. 6<br />

19 ISACA, “IT Audit and Assurance Guideline G4, Return on <strong>Security</strong> Investment<br />

(ROSI),” USA, 2010, p. 2<br />

20 Ibid., p. 4-6, passim<br />

21 Ibid., p. 6-7<br />

22 Ross, Steven J.; “ROSI Scenarios,” Information Systems Control Journal, vol. 3,<br />

USA, 2002<br />

23 Sethuraman, Sekar; “Turning a <strong>Security</strong> Compliance Program Into a Competitive<br />

Business Advantage,” Information Systems Control Journal, vol. 5, USA, 2007<br />

24 Just two <strong>of</strong> many applicable references are: Bardin, Jeff; “<strong>Security</strong> as an<br />

Enabler,” 2007, http://blogs.csoonline.com/security_as_an_enabler, and<br />

Thompson, David (chief information <strong>of</strong>ficer [CIO] <strong>of</strong> Symantec); “<strong>Security</strong> as an<br />

Enabler” (podcast), http://blogs.csoonline.com/security_as_an_enabler.<br />

56<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


4.0 inhibitorS to a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

4.0 InhIBItoRS to A CultuRe <strong>of</strong> SeCuRIty<br />

If a culture <strong>of</strong> security is as beneficial as described in the previous chapter, why do<br />

enterprises not have the culture they need relative to the context <strong>of</strong> their operations?<br />

The answer lies at the heart <strong>of</strong> security, which is intended to prevent negative<br />

events from occurring. Does that make security itself an inhibitor <strong>of</strong> other gainful<br />

activities within an enterprise or their enabler? The fact that there is discussion at<br />

all <strong>of</strong> creating a culture <strong>of</strong> security is indicative that there is a widespread view <strong>of</strong><br />

security in the former light and a belief that steps can—and should—be taken to<br />

move the viewpoint toward the latter.<br />

In some societies, little children are taught that the police <strong>of</strong>ficer is their friend. 1<br />

Why is that message even necessary? Is it globally true? The message perhaps<br />

unintentionally transmitted is that there is a reason to consider the police <strong>of</strong>ficer not<br />

to be a friend. At best, the police <strong>of</strong>ficer is a crime fighter—at worst, someone who<br />

is menacing to average citizens. If the imagery <strong>of</strong> policing is dominant in portraying<br />

security <strong>of</strong> any sort, no less information security, it brings out the thought processes<br />

imparted directly and indirectly from a very young age. The police <strong>of</strong>ficer is your<br />

friend … and so is the information security <strong>of</strong>ficer.<br />

The negativity toward security manifests itself in a number <strong>of</strong> ways. Rarely is<br />

anyone opposed to security; who could favor insecurity? The antithetical viewpoints<br />

arise over the extent, cost, reach, enforcement and application <strong>of</strong> security. There is<br />

a legitimate point <strong>of</strong> view that security should be no more than the minimum<br />

consistent with due diligence, that anything more creates an imposition on an<br />

enterprise. This may be true enough, but it invites discussion and dissension on<br />

what is the minimum; what is prudent; and, not the least <strong>of</strong> which, who is going to<br />

pay for it.<br />

To overcome the inhibitors to a culture <strong>of</strong> security, they must be understood and,<br />

if they cannot be eradicated, at least neutralized. It is insufficient to simply insist<br />

on security as a directive imposed from above. That approach may or may not<br />

lead to security, but it certainly dampens any enthusiasm for a culture <strong>of</strong> security.<br />

Successful creation <strong>of</strong> such a culture depends on all or at least most stakeholders<br />

accepting and promoting security as something <strong>of</strong> benefit to themselves. It<br />

necessitates creating an image <strong>of</strong> security to compete with the police <strong>of</strong>ficer, locked<br />

safe, chains, etc. <strong>Security</strong> must be seen as an essential contributor to business and<br />

not a necessary, but unwelcome, burden for an enterprise to carry.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 57


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

4.1 Societal <strong>Culture</strong><br />

As noted in section 2.2.1, a culture <strong>of</strong> security is conditional to the culture within<br />

the enterprise and even more so by the cultural assumptions <strong>of</strong> the broader<br />

society within which an enterprise exists. The term “secure” may evoke different<br />

images around the world, including the assurance that comes from believing that<br />

no harm will come to individuals, homes, families and populations. With only a<br />

little thought given to the matter, it is clear that those assumptions are not always<br />

supported: Bad things do happen, all the time and in the least expected ways.<br />

Where there is a long history <strong>of</strong> peace, prosperity and comfort, the expectation <strong>of</strong><br />

security, while unfounded, is, in actuality, supported by experience. Lives are led<br />

securely because negative events <strong>of</strong> a serious magnitude happen rarely enough that<br />

sanity allows people to live in blithesome ignorance <strong>of</strong> the threats around them.<br />

The security <strong>of</strong> information within an enterprise is similarly conditioned by the<br />

sense that its information is not under attack. Information resources are used<br />

routinely by many people without incident. Much <strong>of</strong> the information would<br />

seemingly be <strong>of</strong> little interest to anyone outside the enterprise. Sadly, many people<br />

have had brushes with insecurity. Their personal computers acquired a virus, they<br />

left a report on the bus, their networks were brought down by denial <strong>of</strong> service<br />

(DoS) attacks, documents were taken from their desks, etc. At that point, their<br />

happy illusions <strong>of</strong> security were shattered and they became aware <strong>of</strong> the need for<br />

more exacting measures to protect their information. The seeds <strong>of</strong> a culture <strong>of</strong><br />

security may have been planted, but once the particular event was past, it was easy<br />

to slip back into comfortable complacency.<br />

Complacent forgetfulness leaves an opening for thought patterns that are perhaps<br />

the most destructive to a culture <strong>of</strong> security, one that is, to a degree, prevalent<br />

in many societies: Information wants to be free. 2 People in many societies have<br />

become used to having the greatest compendium <strong>of</strong> information ever assembled<br />

available to them only a few keystrokes away. That expectation may be extended<br />

in their mind to all information on the Internet and everywhere. Of course, all<br />

societies keep a great deal <strong>of</strong> information secret and inaccessible. In dictatorial<br />

nations, much political and economic content is censored and constrained. Even<br />

in more liberal countries, information needed for national security is kept closely<br />

guarded. If every country has the government it deserves, 3 then those governments<br />

impose security on the information they do not want their people and enemies to see.<br />

If the government’s or the corporation’s leadership is understood to be repressive,<br />

there is a powerful incentive to bypass any protection and controls that seem to get<br />

in the way <strong>of</strong> whatever people want to do with the information they seek.<br />

58<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


4.0 inhibitorS to a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

Where security is seen as the instrument <strong>of</strong> repression, there will indeed be a culture<br />

<strong>of</strong> security, but that culture will be seen as a malignant one. <strong>Security</strong> in a society that<br />

values freedom is not the enemy, but where the institutions <strong>of</strong> society are perceived<br />

as existing for the purpose <strong>of</strong> limiting freedom, it is very difficult to build the trust<br />

that a culture <strong>of</strong> security is supposed to nurture. The values <strong>of</strong> a society may propel<br />

or inhibit the development <strong>of</strong> a culture <strong>of</strong> security as a positive contributor to an<br />

enterprise’s success. Where security is viewed with suspicion in everyday life, it may<br />

well be contrary to self-interest to assume that security is beneficial.<br />

4.2 Lack <strong>of</strong> Organizational Imperatives<br />

Just as the values <strong>of</strong> a society affect its culture <strong>of</strong> security, so do the values <strong>of</strong> an<br />

enterprise influence its perspective on security. Commercial companies succeed<br />

in the marketplace based on one or several strategies, such as better products,<br />

lower price, greater customer service or higher fashionableness. Organizational<br />

imperatives follow from these strategies: Make it better, cut costs, be more nimble<br />

or get ahead <strong>of</strong> the curve. There have been numerous cases reported in recent years<br />

in which “make it safer” has been an imperative, <strong>of</strong>ten after a product has been<br />

shown to be unsafe.<br />

When an enterprise’s product is information, security is understood to be a<br />

strategic attribute <strong>of</strong> success, but it is difficult to obtain a consensus on the<br />

relative importance <strong>of</strong> various aspects <strong>of</strong> security. Is it more important to<br />

protect information resources from misuse or unavailability, from disclosure or<br />

manipulation, or from privacy breaches or regulatory criticism? It is insufficient to<br />

say “all the above” because security budgets are not infinite nor can all threats be<br />

treated as equally credible.<br />

For companies whose primary products are tangible and personally delivered<br />

services, not information itself, the arguments for security become more tenuous.<br />

Every investment in the security <strong>of</strong> information is one not made in new production<br />

facilities, training or personnel. Even if information is intrinsic to making money,<br />

it is <strong>of</strong>ten difficult to see how securing information is connected to the money<br />

that is made. Where that connection is unclear, there is unlikely to be any clear<br />

organizational priority for the security <strong>of</strong> information. In part, the purpose <strong>of</strong> a<br />

culture <strong>of</strong> security is to make the identification <strong>of</strong> security with success more<br />

evident. With perfect circular reasoning, there can be no culture <strong>of</strong> security where<br />

security’s relationship with organizational success cannot be readily demonstrated<br />

and understood, while the demonstrability and understanding <strong>of</strong> the link depends on<br />

there being a culture <strong>of</strong> security.<br />

Cutting through this dilemma necessitates clear imperatives for security. In<br />

regulated industries, those obligations are externally imposed, although regulated<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 59


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

companies may differ on how far their requirements must take them. In all<br />

enterprises—regulated or not, public or private, or pr<strong>of</strong>it-making or charitable—<br />

there must be an executive commitment that necessitates the protection <strong>of</strong><br />

information by everyone if there is to be a culture <strong>of</strong> security.<br />

It is easy to demonstrate the dedication to security in a negative sense. If someone<br />

misuses information, there are penalties that may result in termination or<br />

prosecution. However, it is harder to show in a positive fashion that acting securely,<br />

much less believing in security, is personally beneficial to the individual. It is hard<br />

to connect secure behavior to raises and promotions. Acting securely is a basic<br />

assumption <strong>of</strong> employment, or so it may be believed. It is no more necessary to<br />

emphasize keeping information secure than it is to prohibit breaking the furniture,<br />

but it is evident when furniture is broken. There are metrics for sales, pr<strong>of</strong>itability<br />

and service that are not available for security.<br />

Therefore, the need for security is left unspoken in many instances. Silence is not<br />

motivational. A culture would make explicit what is <strong>of</strong>ten assumed, but in the<br />

absence <strong>of</strong> a vocal, compelling imperative for security from the top, it is difficult to<br />

mobilize the enthusiasm and support <strong>of</strong> people throughout an enterprise. A culture<br />

<strong>of</strong> security cannot grow in quiet darkness.<br />

4.3 Unclear Requirements<br />

Even if the overall imperative for security were distinctly understood within an<br />

enterprise, the specific requirements to fulfill the implied obligations are <strong>of</strong>ten<br />

unclear, at least to those who must articulate them, to say nothing <strong>of</strong> those who must<br />

carry them out. In part, this is because the only clear “owner” <strong>of</strong> security is the head<br />

<strong>of</strong> the information security department, <strong>of</strong>ten called the chief information security<br />

<strong>of</strong>ficer (CISO). This individual may be responsible for the security <strong>of</strong> all information<br />

in whatever form it may be, but in practice, the CISO focuses on information only in<br />

electronic form. In most instances, the CISO reports within the business group <strong>of</strong> the<br />

chief information <strong>of</strong>ficer (CIO) and is <strong>of</strong>ten oriented toward protective mechanisms<br />

such as firewalls and virus filters, identity management s<strong>of</strong>tware, encryption, and<br />

access control. These are unquestionably important tools for data security, but<br />

paradoxically, they may stand in the way <strong>of</strong> a culture <strong>of</strong> security.<br />

The role <strong>of</strong> the CISO and all the measures put in place by the CISO to protect<br />

information on computer systems and networks create the impression, in some<br />

quarters, that security is the domain <strong>of</strong> the CISO and that no others need concern<br />

themselves about it. The focus on the CISO security role is so intense that others<br />

have no clarity about their participation and contributions to it. The users <strong>of</strong><br />

information look to the CISO to protect their information, as do executives,<br />

operators, clerks, staff personnel, salespeople and the janitor. <strong>Security</strong> becomes<br />

60<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


4.0 inhibitorS to a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

invisible because someone else, i.e., the CISO, is taking care <strong>of</strong> it. In the immortal<br />

words <strong>of</strong> Douglas Adams, the way to make something disappear is to declare it to<br />

be someone else’s problem (SEP). “An SEP is something we can’t see, or don’t see,<br />

or our brain doesn’t let us see, because we think that it’s somebody else’s problem. ...<br />

The brain just edits it out, it’s like a blind spot.” 4 This, specifically, is a major<br />

inhibitor to a culture <strong>of</strong> security.<br />

Rarely will an executive make clear what is required <strong>of</strong> all parties within an<br />

enterprise to protect its information. At best, there may be a broad goal, <strong>of</strong>ten stated<br />

as “security is everyone’s job.” If it is everyone’s job, it is no one’s in particular.<br />

Worse, “everyone” has no tasks assigned, no product to deliver and no metrics to<br />

achieve. General business users <strong>of</strong> information may comprehend their roles and<br />

keep their passwords secret, desks clean and lips shut, but most people simply<br />

trust their fellow workers to use information responsibly. As previously stated, a<br />

culture <strong>of</strong> security fosters trust, but trust, in the absence <strong>of</strong> a culture that would<br />

produce adequate security, is simply blind faith. Faith has its place in the world, but<br />

information security is not that place.<br />

In an ideal culture <strong>of</strong> security, all personnel in an enterprise would understand the<br />

value <strong>of</strong> the information they use and make their contribution to security to the<br />

fullest extent required. Alas, such perfection is beyond mere mortals, but it is an<br />

approachable, if not attainable, goal. This is an important point: A culture <strong>of</strong> security<br />

is unlikely to produce perfection. Nothing can do that. However, a thorough culture<br />

can make security as good as it can be—and, one hopes, as good as it should be.<br />

4.4 Insufficiency <strong>of</strong> Awareness Alone<br />

Much <strong>of</strong> the literature regarding a culture <strong>of</strong> security spotlights awareness as a<br />

vital component <strong>of</strong> the culture. It is undoubtedly true that ignorance <strong>of</strong> security<br />

will impede a security culture, but being conscious <strong>of</strong> security, by itself, is hardly<br />

sufficient to propel such a culture. In fact, security awareness is actually more<br />

nuanced. The term is generally used to mean an understanding <strong>of</strong> the:<br />

• Fact that risk exists<br />

• Threats that contribute to that risk<br />

• Available countermeasures<br />

• Individual’s role in exercising those countermeasures<br />

Finally, and perhaps most important for the development <strong>of</strong> a culture, security<br />

awareness implies a political argument: that security is actually a good thing for<br />

the individual, an enterprise and society as a whole. For those already attuned to<br />

security, it may be difficult not to see the validity <strong>of</strong> all these points. The challenge<br />

in developing a culture <strong>of</strong> security is to communicate all <strong>of</strong> the concepts raised here<br />

to people who actually do not comprehend any or all <strong>of</strong> them.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 61


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

4.4.1 Comprehension <strong>of</strong> Risk<br />

Most people who live in cities are aware that they face certain urban risks, and so,<br />

at a minimum, they lock their doors. They believe that if they were to leave their<br />

doors open, someone may steal their possessions (or worse). A door lock may not be<br />

sufficient to stop a determined thief, but it is a prudent security measure. Therefore,<br />

locking their doors becomes a routine part <strong>of</strong> going out and coming in. These people<br />

know that keeping their possessions is good for them and have internalized at least<br />

this simple measure <strong>of</strong> security.<br />

There are places in the world where people do not lock their doors—they may not<br />

even have locks—and only in exceptional circumstances do they feel unsafe. Outside<br />

<strong>of</strong> the exceptions, they are right. They are not unaware <strong>of</strong> security; they feel secure<br />

in the context <strong>of</strong> their own environments. Heightening their awareness <strong>of</strong> potential<br />

threats—far away—would do little or nothing to alter their beliefs or behaviors.<br />

Many enterprises feel like small villages to those who work there—where everyone<br />

knows everyone; desks are left unlocked with papers strewn atop them; and no one<br />

looks at other people’s computer screens, much less impersonate others by using<br />

their passwords. Management encourages a sense <strong>of</strong> common purpose, togetherness<br />

and trust. The cafeteria, company basketball team and holiday party all conspire to<br />

make business feel like high school. It is not that people are unaware <strong>of</strong> threats to<br />

the security <strong>of</strong> information; it is just that they cannot internalize a belief that they<br />

themselves are at risk. A culture <strong>of</strong> security will not arise by raising their security<br />

awareness. Their everyday experience will tell them that the person trying to do so<br />

is a mad “Cassandra” (even if Cassandra was right). 5<br />

<strong>Security</strong> awareness does have a place within a culture <strong>of</strong> security, but reliance<br />

on awareness to create such a culture is misplaced. It may be that an appropriate<br />

security culture can be maintained by a good awareness program, but to change<br />

a culture, all existing cultural measures must be reengineered. 6 Thus, reliance on<br />

security alone to create a culture <strong>of</strong> security results in inhibiting the very culture<br />

desired. To return to the village where people do not lock their doors, the likeliest<br />

reaction to a threat that affects the community would be to seize pitchforks and<br />

torches and hunt the monster down. Once that particular threat is taken care <strong>of</strong>, the<br />

villagers can return to their peaceful, trusting lives.<br />

4.4.2 The Personal Experience <strong>of</strong> <strong>Security</strong><br />

In the context <strong>of</strong> information security, there have been repeated waves <strong>of</strong> just the<br />

sort <strong>of</strong> reaction as exhibited by the previously mentioned villagers. Computer<br />

viruses were seen as a deadly threat to information systems. Then, antivirus filters<br />

were made available and people trusted these to protect them. Hackers were going<br />

to bring enterprises to their knees, but intrusion detection systems and firewalls<br />

reduced the sense <strong>of</strong> menace and again trust reigned. Over and over, awareness <strong>of</strong> a<br />

62<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


4.0 inhibitorS to a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

particular hazard overwhelmed the general understanding that information resources<br />

are perpetually at risk. Awareness <strong>of</strong> a threat may initiate action against it, but does<br />

not, by itself, change the culture.<br />

On the other hand, where there is a culture <strong>of</strong> security, appropriate action will<br />

generally be taken against the most relevant risks, not just specific threats at a<br />

particular moment. That is because the people who are the vessels for the culture<br />

take risk seriously and internalize it into a system <strong>of</strong> behavior, not just a reaction to<br />

individual perceived threats. There is no conscious decision on the city-dweller’s<br />

part as to whether to lock the door. It is an ingrained action because the possibility<br />

<strong>of</strong> harm is (or so it seems) self-evident. The countryside is not crime-free nor is<br />

every building in every city under siege, but the rural and urban cultures form<br />

attitudes and behaviors that, over time, prove themselves. People who live in rural<br />

areas are <strong>of</strong>ten shocked when crime occurs; urban folk may live without crimes<br />

affecting their own lives for years. Neither unexpected crime nor unanticipated<br />

safety change attitudes and cultures, at least not in the short term.<br />

There may be misuse <strong>of</strong> information resources occurring all around, but it is<br />

invisible. No one takes information <strong>of</strong>f a desktop, discloses private data or hacks a<br />

web site in front <strong>of</strong> an audience. One <strong>of</strong> the great dilemmas <strong>of</strong> information security<br />

is that, unlike tangible possessions, information can be stolen and not be gone. Only<br />

when information that should have been kept confidential or private is known to<br />

have been disclosed are people aware that it has been misused. Data may have been<br />

leaking for months, but the victim recognizes the loss all at once. An internalized<br />

understanding <strong>of</strong> the ongoing risk may lead to a change <strong>of</strong> culture; short-term<br />

awareness <strong>of</strong> an event perceived as a singularity will not.<br />

Even where a threat is well documented and apparent to all—such as with computer<br />

viruses—awareness, by itself, does not lead to routine action. Antivirus filters<br />

must be continually enhanced to recognize and erase new variants, but experience<br />

has shown that people do not regularly download updates by themselves. They<br />

know that they should back up their files in case a virus does strike, but that, too,<br />

occurs only irregularly. They are not acculturated to the risk, even if they are aware<br />

<strong>of</strong> it. Thus, modern antivirus filters update themselves automatically, and many<br />

enterprises choose to employ systems to back up hard drives whenever users log on<br />

to their central networks, without the intervention <strong>of</strong> the information owner or user.<br />

The inhibition that awareness places on the creation <strong>of</strong> a culture is <strong>of</strong>ten caused<br />

by the way in which the need for security is communicated. If the insecurity <strong>of</strong><br />

information is seen as harming the enterprise, then it would seem sensible that<br />

members <strong>of</strong> the enterprise should take responsibility for it. However, when security<br />

becomes the domain <strong>of</strong> the IT function and the CISO (SEP), others feel absolved<br />

<strong>of</strong> responsibility. <strong>Security</strong> is not seen as something that should be addressed by<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 63


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

the individuals because they are not the ones who will suffer the harm, or so<br />

individuals can come to believe. In fact, each staff member faces the possibility<br />

<strong>of</strong> considerable personal damage, ranging from the disdain <strong>of</strong> colleagues through<br />

career limitation to loss <strong>of</strong> employment (or worse). The punishment would be<br />

justified, it may be thought, if the misuse <strong>of</strong> information were intentional, but errors<br />

and omissions—“I lost my laptop” or “I left the disk on the plane”—while scary,<br />

are not seen as necessitating the same drastic responses. A culture <strong>of</strong> security has<br />

been created when people say “I need to protect the information I have” instead <strong>of</strong><br />

“IT needs to protect the information I use.”<br />

To get to that point, people must see the personal benefit <strong>of</strong> security, that security<br />

has a personal payback. Unfortunately, many people’s experience with security,<br />

in the broader sense, may lead them to believe that security is not good for them.<br />

If people’s only interaction with security is having someone on the CISO’s staff<br />

tell them that they cannot do something they want to do, they start to see security<br />

as a problem for them to overcome. If the process for gaining access privileges is<br />

cumbersome and bureaucratic, they will look for ways to circumvent the system.<br />

In short, if the interactions people have with the CISO and the information security<br />

function is, in general, a negative one, then it is doubtful that they will accept an<br />

awareness program from that same source. They will not participate in a culture<br />

that imposes the burden for security on themselves rather than on the security staff<br />

that is paid to build security.<br />

It is important to reemphasize that all the foregoing does not mean that there is no<br />

place for awareness <strong>of</strong> security in a culture <strong>of</strong> security; in fact, it is an attribute <strong>of</strong><br />

such a culture. However, mere awareness is not the same as a culture, and reliance<br />

on it alone will simply stand in the way <strong>of</strong> creating one. It is necessary to bridge the<br />

gap between perception <strong>of</strong> the problem <strong>of</strong> security and acceptance that the problem<br />

is a personal one that requires personal action and involvement in the solutions.<br />

4.5 Systemic Shortcomings<br />

One <strong>of</strong> the great inhibitors to a culture <strong>of</strong> security is the nature <strong>of</strong> information<br />

systems themselves. In the broadest sense, such a system is the means and methods<br />

for acquiring and using information. In actual practice, for many people, it is the<br />

combination <strong>of</strong> computer hardware, storage and communications that are used<br />

to gather, process, store, disseminate and share information. Emphasis should be<br />

placed on the sharing <strong>of</strong> information. The great advantage <strong>of</strong> information kept on<br />

electronic systems is precisely that it can be obtained and stored one time, but used<br />

many times by many people. Systems <strong>of</strong> physical assets do not work the same way;<br />

if one person uses a tangible object, then another cannot do so at the same time.<br />

Thus, if one wishes to retain sole usage <strong>of</strong> an asset, it must be protected for private<br />

64<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


4.0 inhibitorS to a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

use. In information systems, security consists <strong>of</strong> safely allowing, not preventing,<br />

many people and processes to use the same asset simultaneously. The paradigms <strong>of</strong><br />

security are completely reversed.<br />

Of course, the security <strong>of</strong> the information comes from preventing those unauthorized<br />

to see it or change it from doing so. However, a system is incapable <strong>of</strong> distinguishing<br />

who is authorized to see and use what items <strong>of</strong> information. A system is established<br />

as a means <strong>of</strong> carrying out specific operations according to specified rules. A<br />

system does not have the capacity to know the value <strong>of</strong> the information or the<br />

authority <strong>of</strong> a would-be user to access it. The system only “knows” that there is<br />

data within it that can be transformed into other data in different forms by means <strong>of</strong><br />

prescribed processes. To people, the data may be transformed into information; the<br />

transformative processes are transactions and programs. A system may be the means<br />

<strong>of</strong> imposing security over the information by equating users with identifiers and the<br />

ability to use information with access control lists.<br />

It is people, though, who create the lists, and the lists are (or should be) consistent<br />

with rules as to how the system works. A system is a mindless, mechanical<br />

vehicle to store and transport information until and unless people are involved.<br />

People are a part <strong>of</strong> information systems, whether they recognize and accept this<br />

fact or not. To the extent that people conceive <strong>of</strong> themselves as distinct from an<br />

information system, they will not be able to see themselves as a part <strong>of</strong> securing it.<br />

In short, there must be an equation among users, usages and resources used for an<br />

information system to have coherence.<br />

Unfortunately, enterprises do not foster such comprehensive systems. Instead,<br />

enterprises are divided in many ways: by their functions (divisions and departments),<br />

financial relationships (pr<strong>of</strong>it and cost centers), hierarchy (management and staff)<br />

and relationship with technology (technicians and users). These separations creep<br />

into the very essence <strong>of</strong> information systems and into the definitions <strong>of</strong> “information<br />

ownership,” “access privileges” and “information security.”<br />

The semiotics <strong>of</strong> identity take on a generally unexpected reality. Public and private<br />

sector institutions implement identity management as a way to bridge the gaps<br />

among the users and the resources used. It is a way <strong>of</strong> controlling the interests <strong>of</strong><br />

the enterprise above those <strong>of</strong> the individual who may be trusted most <strong>of</strong> the time,<br />

but not always, to use the information as intended. The seemingly dispassionate<br />

granting or denying access to an information resource underscores the authority <strong>of</strong><br />

someone—who?—to make the decision. Where identity management is thus<br />

pursued within a security matrix <strong>of</strong> controlled process and property, essentially, it is<br />

even identical to access control. 7 The control remains with the enterprises, and the<br />

individual remains detached from the system. A culture <strong>of</strong> security cannot grow out<br />

<strong>of</strong> such detachment.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 65


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

4.5.1 Inability to Detect Variances From Policy and <strong>Culture</strong><br />

The enterprise asserting its ability to control access does so through the means <strong>of</strong><br />

policy. As stated in section 2.2.2, the rules may be formally documented, but the<br />

actual behavior <strong>of</strong> an enterprise is its real policy. Once again, there is a gap that<br />

is filled one way or another. The narrower the gap between the desired and actual<br />

states <strong>of</strong> security-related policy, the likelier it is that a culture <strong>of</strong> security may arise.<br />

Conversely, “do as I say, not as I do” is, in fact, a policy, but it is a destructive one<br />

that leads to a culture <strong>of</strong> cynicism and disdain for security rules. There is always a<br />

culture <strong>of</strong> security, but not always a good one.<br />

The prescriptions <strong>of</strong> policy are easily seen. They are printed in manuals, displayed<br />

on login screens and reinforced by management briefings. The gap between aspired<br />

security and reality is less easily observed. Those who bypass the rules (that is,<br />

those who violate stated policy) are, in fact, expressing their disaffection with the<br />

authority <strong>of</strong> an enterprise to serve their interests. It does not seem to matter<br />

whether the disparity <strong>of</strong> interests is factually supported; the tension occurs from<br />

complexity, i.e., a lack <strong>of</strong> transparency. In defiance, some individuals “solve”<br />

this by taking control <strong>of</strong> their personal identifier(s) and the identification <strong>of</strong><br />

what they “own” themselves. However much an enterprise wishes to state its<br />

ownership <strong>of</strong> information and the importance <strong>of</strong> securing it, it is nonetheless stating<br />

a relationship: The enterprise not only owns the information, but owns those<br />

who would use it. The one-sidedness <strong>of</strong> rule making, i.e., an enterprise’s formal<br />

domination <strong>of</strong> the relationship with correspondingly biased rules for identification<br />

and access, undermines a healthy culture <strong>of</strong> security. 8<br />

In these circumstances, people would be foolhardy to make their enterprises aware<br />

<strong>of</strong> the rules they are bypassing. Everyday behavior becomes so routine that it is<br />

increasingly difficult to detect that policy is not being observed. In theory, the<br />

disparity between policy and reality should be detectable by third parties such as<br />

auditors and security pr<strong>of</strong>essionals. However, there are no totally independent<br />

observers; the mere fact that they are called on to examine the security <strong>of</strong> an<br />

information system makes them a part <strong>of</strong> the system. In a social application <strong>of</strong> the<br />

Heisenberg Uncertainty Principal, 9 the act <strong>of</strong> observation changes whatever it is that<br />

is being observed. This is not to fault auditors, but to recognize the nature <strong>of</strong> the<br />

system itself.<br />

If an enterprise’s culture is forgiving <strong>of</strong> policy violations, very bad results can<br />

occur. Every business scandal is a reflection that formal posturing has separated<br />

from reality. If the policy violations that pass unnoticed relate to security, then it is<br />

highly likely that security incidents will occur over time. Everyone will point to the<br />

policy and express shock that such a thing could have occurred, but it should have<br />

been predictable.<br />

66<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


4.0 inhibitorS to a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

The failure to detect policy variances is insidious to a culture <strong>of</strong> security. It allows<br />

misappropriation <strong>of</strong> resources to become the norm within an enterprise. The<br />

resources may be inappropriately, but benignly, used for a time, but experience has<br />

shown that, inevitably, someone with more nefarious purposes will slip into the gap<br />

and do something harmful. This is also part <strong>of</strong> a culture; one <strong>of</strong> the objectives <strong>of</strong> a<br />

culture <strong>of</strong> security is to bring practice into alignment with proclamations.<br />

4.5.2 Inability to Monitor and Enforce Compliance With the <strong>Culture</strong><br />

There is a more subtle variant on the problems <strong>of</strong> detecting failure to comply with<br />

policy. There are rules <strong>of</strong> behavior in a culture that are rarely, if ever, written down<br />

and are <strong>of</strong>ten not even recognized as being there. In a way, they are the same as<br />

the culture <strong>of</strong> a social club. Members <strong>of</strong> a club are supposed to be cordial with one<br />

another, respect one another’s property, not eavesdrop on private conversations and<br />

dress well. In other words, the club culture is one <strong>of</strong> well-dressed mutual respect (if<br />

not trust). Information learned at the club is intended to stay at the club. Members<br />

should not take business advantage <strong>of</strong> information and relationships gained there.<br />

Rarely are these rules documented, but they are real nonetheless, or at least real<br />

in theory. In many cases, some members do not get along with others, use one<br />

another’s golf balls and join the club only to further business relationships.<br />

The club culture is, to a degree, self-enforcing. Even though the culture is not always<br />

observed, there is tolerance for unacceptable behavior if it is discrete. Those who are<br />

blatant in breaking the unspoken code can be frozen out <strong>of</strong> social circles or asked to<br />

leave the club. Business enterprises are similar in that if people truly do not fit into a<br />

culture, they may be fired or more likely encouraged to quit beforehand.<br />

Where the culture in question is one <strong>of</strong> security, it is very clear that people can<br />

suffer penalties for flagrant disregard if a security incident causing harm to an<br />

enterprise can be traced to them. Is that really a culture <strong>of</strong> security, though? Surely,<br />

actively harmful activities lead to explicit sanctions. Can the same be said for<br />

giving insufficient consideration to security when the emphasis is placed on sales,<br />

pr<strong>of</strong>it or growth instead?<br />

An inhibitor to a culture <strong>of</strong> security is the lack <strong>of</strong> effective means to enforce<br />

compliance with it, short <strong>of</strong> the drastic measures applied after a breach. It is nearly<br />

impossible to tell if a person is committed to security, especially if that person<br />

avows the importance <strong>of</strong> it. Being security-conscious is a habit <strong>of</strong> mind, and it is<br />

very difficult to determine what is in another person’s mind. The subtle penalties for<br />

violating the culture <strong>of</strong> a club do not apply. Whispered conversations and averted<br />

glances are unlikely results from falling short <strong>of</strong> a culture <strong>of</strong> security. There are no<br />

metrics for the amount <strong>of</strong> attention that should be given to security, especially in<br />

comparison with other drivers. It is possible to show that someone is practicing<br />

insecure behavior, but nearly impossible to prove the reverse.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 67


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

Thus, in the absence <strong>of</strong> truly blatant failings, a culture <strong>of</strong> security is unenforceable.<br />

It is obvious when sales, pr<strong>of</strong>it or growth have not been achieved, but not if security<br />

is weak, unless there is a breach. It is a great deal more difficult to demonstrate<br />

that a culture <strong>of</strong> security is in place and functioning well because it is so difficult to<br />

show the reverse.<br />

A culture cannot be enforced in the same way that a policy is enforced. <strong>Culture</strong> is<br />

not a law, but a shared way <strong>of</strong> behaving based on assumptions, expectations,<br />

attitudes and beliefs. Therefore, it must be self-enforcing. If one does not behave as<br />

expected, it will be clear that that person is not part <strong>of</strong> the group. The individual’s<br />

thinking and behavior will be seen as different from what is expected by the group.<br />

Enforcement <strong>of</strong> a security culture is dependent on how important that aspect <strong>of</strong> the<br />

culture is. If a culture says to do what has to be done to close deals and also says to<br />

follow security rules, sales may win out because it is perceived to be more strongly<br />

valued within the culture. All elements <strong>of</strong> culture are not weighed the same.<br />

The value <strong>of</strong> powerful champions for security (other than the security pr<strong>of</strong>essionals)<br />

is that they provide the background for enforcement <strong>of</strong> a culture. There need not<br />

be a valid, intellectualized rationale for heightened security if one can say, “Do it<br />

because the boss wants it this way.” However, the personal perspective <strong>of</strong> a senior<br />

manager is a weak method for enforcing a culture, especially if the champion does<br />

not have the support <strong>of</strong> peers or leaves an enterprise.<br />

4.6 Lack <strong>of</strong> Rewards<br />

One <strong>of</strong> the aspects <strong>of</strong> a culture <strong>of</strong> security is informed risk acceptance. On the other<br />

hand, uninformed risk acceptance—in actuality, intentional ignorance <strong>of</strong> risk—can be<br />

used to justify any security shortcoming in advance <strong>of</strong> a loss. Worse for the culture,<br />

it is impossible to prove that risk was imprudently accepted when a security breach<br />

occurs. Thus, those who favor a strong security posture must justify investments in<br />

countermeasures by demonstrating risk avoidance. Those who blindly and<br />

thoughtlessly accept risk rarely have to justify their decision—after all, they have<br />

accepted not only, risk but accountability—and they do not incur any costs. Their<br />

bottom lines look better (until an incident occurs, which may be years later). The<br />

security-conscious take all the personal risk up front. A culture <strong>of</strong> security is difficult<br />

to build when people perceive that they can lose, but cannot win.<br />

It is clear that those who bring in more sales or greater pr<strong>of</strong>it can be rewarded in<br />

higher pay and bonuses, but what accolades and benefits come to the person whose<br />

actions prevent an otherwise undetected security flaw from turning into a breach? It<br />

can be shown that certain heroic efforts repelled an explicit attack, but not that regular<br />

vigilance prevented that attack from occurring in the first place. 10<br />

68<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


4.0 inhibitorS to a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

The rewards <strong>of</strong> security for an enterprise can be more readily demonstrated in<br />

reduced operating costs, elimination <strong>of</strong> redundant risk management activities and<br />

resources freed up for more strategic initiatives, 11 but what rewards come to the<br />

individual who lives within a culture <strong>of</strong> security and whose attitudes, beliefs and<br />

working methods are supportive <strong>of</strong> security? Perhaps more than any other factor,<br />

the lack <strong>of</strong> a rewards structure for behaving securely inhibits the growth <strong>of</strong> a culture<br />

<strong>of</strong> security.<br />

There are a number <strong>of</strong> related reasons why it is so difficult to compensate people<br />

for security. Each <strong>of</strong> them would be a significant impediment to building a culture<br />

<strong>of</strong> security. Together, they constitute a barrier that must be overcome for such a<br />

culture to flourish.<br />

4.6.1 <strong>Security</strong> Pr<strong>of</strong>essionals<br />

It is not quite true that no one is rewarded for security. As previously noted in<br />

section 4.3, many enterprises have CISOs and their staff who are dedicated to<br />

security. Others have areas that perform some specific security functions such as<br />

personnel screening, facilities management, compliance or investigations. They are<br />

paid for doing their jobs and receive bonuses and promotions for doing them well.<br />

(It should be noted that these pr<strong>of</strong>essionals also have difficulty in demonstrating<br />

the value <strong>of</strong> their contributions to their enterprises, but these problems are common<br />

to all staff functions.) It is indicative that a certain level <strong>of</strong> functional security does<br />

exist in these enterprises that such departments have been staffed and are relatively<br />

protected. <strong>Security</strong> activities are rarely eliminated, but they may be curtailed in<br />

adverse economic times. It is also significant that dedicated security pr<strong>of</strong>essionals<br />

are rarely promoted to the ranks <strong>of</strong> executive management; advancement in security<br />

is not limitless.<br />

To the degree that security pr<strong>of</strong>essionals receive the credit for an enterprise’s<br />

overall security posture, there is less incentive available for others who are focused<br />

on operations, sales, production, distribution, etc., to act in a secure manner. To be<br />

sure, there are penalties for insecure behavior, but the best that most personnel can<br />

expect is that they break even with security.<br />

4.6.2 Lack <strong>of</strong> Metrics<br />

In large measure, the lack <strong>of</strong> obvious metrics for security deters a rewards structure.<br />

“If it cannot be measured, it cannot be managed,” so without a solid way to<br />

measure a culture <strong>of</strong> security, it is difficult to manage one into existence. This is<br />

actually a second-order problem: It is difficult enough to measure the effectiveness<br />

<strong>of</strong> security measures themselves and even more so to evaluate the underlying<br />

culture. However, that does not mean that cultures cannot be measured.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 69


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

Determining the key indicators <strong>of</strong> success, what to measure, how to measure it<br />

and when certain levels <strong>of</strong> progress will be noted is a crucial part changing any<br />

organizational culture, not least a culture <strong>of</strong> security. The inhibiting factor is<br />

the neglect <strong>of</strong> hard measures <strong>of</strong> achievement and progress, which require the<br />

identification <strong>of</strong> indicators <strong>of</strong> success in culture change and interim progress<br />

indicators. “A data gathering system needs to be designed as does a time frame for<br />

assessing the results. What gets measured gets attention, so the key initiatives and<br />

outcomes must have metrics and measuring processes associated with them.” 12<br />

One solid example <strong>of</strong> a means <strong>of</strong> measuring a culture is the Organizational <strong>Culture</strong><br />

Assessment Instrument (OCAI). 13 It <strong>of</strong>fers a useful framework and a common<br />

vocabulary that can be used as a starting point for discussions about organizational<br />

cultures. For example, the OCAI examines attitudes concerning strategic emphases,<br />

criteria for success and the “organizational glue.” 14 These are not well adapted as<br />

metrics for a security culture, but provide evidence that such an instrument could be<br />

developed.<br />

4.6.3 Failure to Measure Risk<br />

The difficulty in applying metrics to the risks an enterprise faces is another aspect<br />

<strong>of</strong> the measurement issue that inhibits a culture <strong>of</strong> security. It is intuitive that<br />

security decreases risk, but it is far less clear by how much or what the actual level<br />

<strong>of</strong> risk was in the beginning. Again, those who would advocate for security are left<br />

without the tools to justify investments in security. It is fair to say that a culture <strong>of</strong><br />

security is measured by for what an enterprise is willing to pay and that without<br />

metrics for the impact <strong>of</strong> investment on risk (ROSI), it is difficult to propel the<br />

culture forward.<br />

70<br />

Unfortunately, the most common approaches to measuring continuity<br />

risk are vague, subjective and difficult to use for guiding management<br />

in budgeting for controls and countermeasures. Almost all are based on<br />

the classic but simplistic formula:<br />

Risk = Impact x Probability<br />

… [which] is meaningful for those disruptions for which likelihood and<br />

effects are known, or at least are predictable. As Taleb demonstrates,<br />

it is specifically the rare, unforeseeable incidents that cause the<br />

most damage. 15<br />

In effect, the most widely accepted method for measuring risk multiplies the<br />

unknown (probability) times the unknowable (impact). Why multiplication and<br />

not, say, exponentiation? Why omit other factors, such as credibility, resources,<br />

scale, duration, mean time to repair or mean time to recurrence? In short, current<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


4.0 inhibitorS to a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

techniques for risk measurement strain credulity, which, in turn, undermines a<br />

culture <strong>of</strong> security built on reduction <strong>of</strong> risk. Those who would support such a<br />

culture have no demonstrable way <strong>of</strong> being rewarded for doing so, either.<br />

4.6.4 Lack <strong>of</strong> Incidents<br />

The one widely accepted indicator <strong>of</strong> a successful culture <strong>of</strong> security, or at least<br />

<strong>of</strong> security controls, is a lack <strong>of</strong> incidents. This negative metric is ultimately<br />

self-defeating because it lays the burden <strong>of</strong> pro<strong>of</strong> on the miscreants <strong>of</strong> the world.<br />

There are too many people in the world—hackers, crackers, virus writers, fraudsters<br />

and script kiddies—who are trying to undermine the security <strong>of</strong> any enterprise<br />

that lowers its barriers sufficiently to let the bad guys in. With modern tools and<br />

perpetual vigilance, many, but not all, attacks can be successfully repelled.<br />

If, over a period <strong>of</strong> time, there are no penetrations <strong>of</strong> an enterprise’s security<br />

barriers, then its security pr<strong>of</strong>essionals must have been doing a good job, or so it<br />

would seem. However, if one attempt gets through, does that mean that they were<br />

not doing a good job? A lack <strong>of</strong> incidents does not equate with the presence <strong>of</strong><br />

security, so it is a very poor way to justify security and a weak foundation on which<br />

to base a culture.<br />

If an enterprise accepts some degree <strong>of</strong> risk, then it is implicitly accepting that<br />

the risk in question will in time be actualized. This may be combined with the<br />

understanding that no security is foolpro<strong>of</strong> and that there is a point <strong>of</strong> diminishing<br />

returns in investing in security. As a result, depending on being rewarded for a lack<br />

<strong>of</strong> incidents is a very poor wager indeed. What constitutes success: 1,000 repelled<br />

attacks before one get through, or is it 10,000 or a million?<br />

4.6.5 No Financial Connection<br />

The converse <strong>of</strong> the number and associated cost <strong>of</strong> incidents that will occur is the<br />

number and demonstrated savings <strong>of</strong> those that do not. It would be quite a trick to<br />

show how much money an enterprise did not spend last year because <strong>of</strong> things that<br />

did not occur. Salespeople can be compensated for their contributions to the bottom<br />

line, but there is no basis for paying anyone for being secure. The lack <strong>of</strong> financial<br />

incentive is a distinct inhibitor to creating a culture <strong>of</strong> security, even more so when<br />

people seek positive rewards for negative achievements.<br />

This is the metrics issue in another guise, but it does raise a specific dilemma.<br />

<strong>Security</strong> can be justified not only on pure cost avoidance, but on the basis <strong>of</strong><br />

prudence and due diligence. However, prudence and diligence are baseline<br />

objectives, the bare minimum <strong>of</strong> security. A culture <strong>of</strong> security is, in great measure,<br />

an unwillingness to settle for just the minimum, but, instead, the appropriate level<br />

<strong>of</strong> security. The baseline may not need justification, but everything beyond it does.<br />

Marketing personnel can conduct studies to show that an increase in price will not<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 71


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

significantly reduce sales and, therefore, that the increase will go to the bottom line.<br />

The champions <strong>of</strong> security cannot demonstrate that an investment <strong>of</strong> x will bring y<br />

security, much less that spending 2x will bring 3y security.<br />

4.7 What Is in It for Me?<br />

The foregoing section dealt with the rewards to the individuals who may support<br />

a culture <strong>of</strong> security, with the focus on monetary compensation. There are other<br />

sorts <strong>of</strong> rewards that an enterprise can bestow that are important to the creation<br />

<strong>of</strong> a security culture. These do not directly involve money that goes to the<br />

individual, but rather organizational advancement in the form <strong>of</strong> budget, influence,<br />

management attention and the regard <strong>of</strong> one’s fellow staff members. Some people<br />

are motivated solely by their remuneration, but others also find incentive in these<br />

other sorts <strong>of</strong> rewards. When someone asks <strong>of</strong> a champion <strong>of</strong> security, “What is in<br />

it for me?” (WIFM), that individual asks a core cultural question that may entail<br />

seeking monetary compensation, but may also may be much more.<br />

4.7.1 Budget<br />

In many enterprises, security is an unfunded mandate. It is simply assumed that all<br />

personnel will conduct themselves and their business activities in a secure manner.<br />

Where the work performed or the resources used are considered sensitive or at risk,<br />

the workplace may be specially protected (as in a datacenter or a vault). Managers<br />

may have <strong>of</strong>fices and file cabinets so that they can conduct their activities literally<br />

behind closed doors. However, many people who come in routine contact with<br />

information resources work in open areas or cubicles or do not work in a business<br />

environment at all.<br />

There is a cost for the tools and techniques to allow them all to work securely, such<br />

as virtual private networks (VPNs), remote access devices, encrypted hard drives,<br />

privacy screens and content filters. Generally, these tools are purchased centrally<br />

and distributed to all relevant personnel. The costs are <strong>of</strong>ten charged back. Even if<br />

they are absorbed as a corporate expense, line management has little involvement in<br />

the selection <strong>of</strong> products or their applicability to each manager’s business function.<br />

If one size does not fit all, managers must either use the tools selected for them or<br />

find budget to obtain better tools.<br />

It is not unusual for a manager to ask WIFM when budget for security must be<br />

balanced with money for salaries, business equipment or travel. The manager’s<br />

department must bear the additional cost without seeing the direct benefit to the<br />

department’s function.<br />

72<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


4.0 inhibitorS to a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

4.7.2 Influence<br />

The most important characteristic <strong>of</strong> cultural champions is their ability to influence<br />

the decisions <strong>of</strong> their enterprises. Implicitly, the cause that they advocate for is one<br />

that they believe is not appropriately valued. They put their political capital behind<br />

something—in this case, security—to achieve an objective that they consider worth<br />

backing. They do so in an environment in which many people may be championing<br />

many causes, such as new products, higher pay, environmental protection or social<br />

consciousness, all <strong>of</strong> which have merit.<br />

Potential champions <strong>of</strong> security may well ask WIFM if the effort to build a culture<br />

<strong>of</strong> security entails a cost that would reduce their influence on other matters. There<br />

is a payback in prestige both within and outside enterprises for those who promote<br />

good causes, which can expand a person’s influence. The proponents <strong>of</strong> security<br />

rarely get hearty congratulations for a security breach that does not occur. No<br />

matter how important security may be, it requires an investment in personal clout.<br />

4.7.3 Management Attention<br />

It is <strong>of</strong>ten said that security is a thankless task. That means that those who consider<br />

security highly rarely hear their managers say “thank you” for it. To an extent not<br />

frequently mentioned, gratitude from one’s peers and superiors is a major motivator<br />

in the workplace. In many instances, secure behavior and attitudes are looked on as<br />

evidence that a person does not “get it.” If an enterprise sees itself as a go-go,<br />

make-the-sale culture, the person who counsels restraint and protectiveness is likely to<br />

appear out <strong>of</strong> step and may receive attention from management, but not <strong>of</strong> the positive<br />

sort. That person has reason to ask WIFM and not be vocal in support <strong>of</strong> security.<br />

It takes a degree <strong>of</strong> political courage to try to alter the flow <strong>of</strong> an enterprise’s<br />

culture, if not to stem the tide altogether. It is easy to wait for someone in a more<br />

senior position to be the champion for security, but it is more challenging to be the<br />

champion oneself.<br />

4.7.4 Personal Regard<br />

A person’s self-esteem is drawn from many psychological sources, one <strong>of</strong> which<br />

is the respect <strong>of</strong> others. The regard <strong>of</strong> others surely flows to the people who are<br />

good at their job, but may also stem from personality, helpfulness or even minor<br />

achievements like hitting the winning home run in the company s<strong>of</strong>tball game.<br />

Those who adopt a culture <strong>of</strong> security are rarely congratulated by their peers for<br />

doing so. There may be an inner glow that one gets from doing the right thing, but<br />

that may be all.<br />

Worse, they may see the accolades bestowed on someone who achieved a short-term<br />

goal by circumventing security. At that moment, WIFM is a very human attitude.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 73


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

Endnotes<br />

1 http://politedissent.com/images/jul08/policeman.html<br />

2 Attributed originally to Stewart Brand. See Clark, Roger; “Information<br />

Wants to Be Free…,” 24 February 2000, www.rogerclarke.com/II/IWtbF.html.<br />

The complete quote attributed to Brand is more nuanced: “On the one hand<br />

information wants to be expensive, because it’s so valuable. The right information<br />

in the right place just changes your life. On the other hand, information wants to<br />

be free, because the cost <strong>of</strong> getting it out is getting lower and lower all the time.<br />

So you have these two fighting against each other.” Recognizing the value <strong>of</strong><br />

information and using “free” as “without cost” rather than as “liberated” is quite<br />

different from the context in which the expression is usually used.<br />

3 Joseph Marie de Maistre (French diplomat, writer, philosopher and politician,<br />

1753-1821)<br />

4 Adams, Douglas; Life, the Universe and Everything, UK, 1982, p. 29<br />

5 A prophet in Greek mythology who was cursed so that her prophecies, though<br />

true, were never to be believed<br />

6 Schlienger, Thomas; Stephanie Teufel; “Information <strong>Security</strong> <strong>Culture</strong>—<br />

From Analysis to Change,” International Institute <strong>of</strong> Management in<br />

Telecommunications, University <strong>of</strong> Fribourg, Germany, 2003<br />

7 Wiesse, Pieter; “Semiotics <strong>of</strong> Identity Management,” Sprouts Working Papers on<br />

Information Systems, http://sprouts.aisnet.org/81/1/2006-02.pdf. , 2006, p. 4<br />

8 Ibid., p. 33<br />

9 The uncertainty principle in quantum mechanics, formulated by Heisenberg, that<br />

the accurate measurement <strong>of</strong> one <strong>of</strong> two related, observable quantities, as position<br />

and momentum or energy and time, produce uncertainties in the measurement <strong>of</strong><br />

the other, such that the product <strong>of</strong> the uncertainties <strong>of</strong> both quantities is equal or<br />

greater than h/2∏, where h equals Planck’s constant.<br />

10 See Taleb, op. cit., p. xxii – xxiv<br />

11 Peacock, Marissa; “GRC Roll-up: The Mistakes and Rewards <strong>of</strong> IT <strong>Security</strong><br />

Compliance,” CMS Wire, 10 February 2010, www.cmswire.com/cms/enterprisecms/grc-rollup-the-mistakes-and-rewards-<strong>of</strong>-it-security-compliance-006652.php<br />

12 Cameron, Kim; “A Process for Changing Organizational <strong>Culture</strong>,”<br />

University <strong>of</strong> Michigan, USA, 2004, p. 9<br />

13 www.hpcnet.org/cgi-bin/global/a_bus_card.cgi?SiteID=410037#x<br />

14 Ibid.<br />

15 Ross, Steven; “Effective Techniques for Risk Measurement,” SearchCompliance.<br />

com, 22 July 2009, http://searchcompliance.techtarget.com/tip/0,289483,sid195_<br />

gci1362498_mem1,00.html<br />

74<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


5.0 <strong>Creating</strong> an intentional <strong>Culture</strong> <strong>of</strong> SeCurity<br />

5.0 CReAtIng An IntentIonAl<br />

CultuRe <strong>of</strong> SeCuRIty<br />

In a very real sense, a culture cannot be created; it just is. Although it cannot be<br />

created, it can be intentionally shaped and directed. This existentialist statement<br />

summons Sartre’s observation that “existence precedes essence.” 1 Wherever people<br />

gather in a common enterprise, there is a culture. Two people working together<br />

toward a mutual objective necessarily have a culture between them <strong>of</strong> cooperation,<br />

if not trust. They may cooperate poorly, indicating that their small culture is not a<br />

good one, but the bond between them exists as a function <strong>of</strong> them “pulling on the<br />

same rope,” so to speak. Their cooperative enterprise creates a “pattern <strong>of</strong><br />

behaviors, beliefs, assumptions, attitudes and ways <strong>of</strong> doing things” at least for the<br />

interaction between the two <strong>of</strong> them.<br />

Of course, a large enterprise that comprises many people in some sort <strong>of</strong> hierarchy<br />

has a much more complex, nuanced culture than one between two individuals.<br />

They do not create the culture in which they operate; it exists as a function <strong>of</strong> them<br />

coming together with a shared (or overlapping) purpose. The existence <strong>of</strong> a culture<br />

precedes a determination <strong>of</strong> whether it is strong or weak, beneficial or malign, or<br />

good or bad. Therefore, a culture <strong>of</strong> security exists. The objective <strong>of</strong> those who<br />

support it is not to create it, but to strengthen it within the broader confines <strong>of</strong> an<br />

enterprise’s corporate culture.<br />

Developing a strong culture is not a project. There is no distinct beginning, middle or<br />

end. Indeed it is a never-ending process as various cultures clank and collide within<br />

an enterprise. Nonetheless, there are discrete activities that can be carried out by those<br />

who would enhance the security culture within their enterprises. The first is a<br />

clear-eyed assessment <strong>of</strong> the current state <strong>of</strong> a security culture in parallel with gaining<br />

an understanding <strong>of</strong> the intentions <strong>of</strong> management with regard to security. On this<br />

basis, the gaps between expectation and reality can be observed, analyzed and<br />

repaired. Of course, the reality may not lie in the words <strong>of</strong> management, but in their<br />

actions when faced with security-related decisions. “<strong>Security</strong> is a strategic necessity<br />

for the enterprise …” is an important statement, but less important than the “… but”<br />

that follows it. By understanding where an enterprise’s leadership is willing to cut<br />

back on security, one will find the path to improving a security culture.<br />

It must be emphasized constantly that the decision not to make a resource—<br />

information in this case—more secure is not <strong>of</strong> itself an indication <strong>of</strong> a weak<br />

culture. The objective <strong>of</strong> a culture is not to maximize security, but to optimize it;<br />

there are valid reasons to draw the line at a certain level <strong>of</strong> security, in keeping with<br />

an enterprise’s needs, the sensitivity <strong>of</strong> its information and the size <strong>of</strong> its budget.<br />

There are reasons to question where that line is drawn, and moving it upward is a<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 75


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

probable result—perhaps the benefit—<strong>of</strong> a culture <strong>of</strong> security. It is acceptable to<br />

tie an enterprise’s security to its leadership’s appetite for risk, but not when that<br />

appetite ventures into voraciousness.<br />

The question remains as to how, once the deficiencies <strong>of</strong> a culture are known, to change<br />

it in a positive direction. This not so much a matter <strong>of</strong> piling on more safeguards as <strong>of</strong><br />

changing minds, outlooks, attitudes and beliefs. Influencing decision making is one<br />

thing; altering the framework <strong>of</strong> the decisions is quite another. The creation, if that is the<br />

word, <strong>of</strong> a culture <strong>of</strong> security is to accomplish the latter.<br />

5.1 Changing Perceptions <strong>of</strong> <strong>Security</strong><br />

The first and perhaps most important step in strengthening a culture <strong>of</strong> security is to<br />

erase the negativism <strong>of</strong>ten associated with the subject. <strong>Security</strong> is <strong>of</strong>ten thought <strong>of</strong>,<br />

at best, as the prevention <strong>of</strong> the occurrence <strong>of</strong> bad things such as fraud, disclosure<br />

<strong>of</strong> private information or viruses. The imagery is <strong>of</strong> a police <strong>of</strong>ficer, a guard or a<br />

locked door. Unfortunately, in many societies police <strong>of</strong>ficers, guards and locked<br />

doors are emblems <strong>of</strong> repression and not very likely to inspire support for a culture<br />

enshrining these images. Even in freer societies, the only contact most people<br />

have with the police is when a crime occurs or when they are pulled over for<br />

speeding. Guards and locked doors may keep valuable things safe, but they also are<br />

impediments to free access. Most people do not enjoy being told what they cannot<br />

do, even if they know they should not do some things.<br />

To a degree, the proponents <strong>of</strong> security have brought this negativism on<br />

themselves. 2 When challenged as to the value <strong>of</strong> security, all too <strong>of</strong>ten, the specter<br />

<strong>of</strong> evil hackers and determined fraudsters is brought out to frighten the questioner<br />

into submission. The problem, <strong>of</strong> course, is that, after a while, scare tactics lose<br />

effect. The incidence <strong>of</strong> security threats is not as prevalent as some security<br />

pr<strong>of</strong>essionals would like others to believe. In some part, the invocation <strong>of</strong> terrible<br />

outcomes is a way <strong>of</strong> justifying a security person’s job. To a greater extent, the<br />

possibility <strong>of</strong> security breaches becomes so real to some that it overcomes their<br />

improbability. It is true that some very bad things could happen to information if<br />

it were even briefly interrupted; that is why firewalls and virus filters are always<br />

on. However, most people only rarely, or never, experience a security breach and<br />

the endless repetition <strong>of</strong> what could happen, what did happen or what happened to<br />

someone else wears thin.<br />

Success in creating a security culture begins with altering the perception that<br />

security is about negative events and, instead, associating it with the benefits to<br />

people <strong>of</strong> moving freely, having access to everything they should have and knowing<br />

(or having the ability to know) all that they would have a right to know. <strong>Security</strong> is<br />

a positive attribute to those living without it. <strong>Security</strong> <strong>of</strong> information is also quite<br />

76<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


5.0 <strong>Creating</strong> an intentional <strong>Culture</strong> <strong>of</strong> SeCurity<br />

positive for its owners; they care about who sees it and what is done with it. The<br />

boundary between positive and negative is the decisions on who should and should<br />

not do what. In information terms, those decisions are termed “access control,”<br />

living by the rules <strong>of</strong> what information one can see or use.<br />

Part <strong>of</strong> the difficulty with the perception <strong>of</strong> security, <strong>of</strong> living by the rules, is that the<br />

rule breaker is <strong>of</strong>ten romanticized as a rebel, a pirate or even as an outlaw. These may<br />

seem like dashing figures on the silver screen, but people are not nearly so impressed<br />

by rebels, pirates and outlaws when they actually encounter them. The challenge is<br />

to marshal the positive reality <strong>of</strong> security in support <strong>of</strong> a culture that values it. When<br />

security is framed as trust, consistency, reliability, predictability and productivity, it<br />

becomes easier to enlist others in a culture-strengthening exercise.<br />

5.1.1 Branding <strong>Security</strong><br />

In many ways, altering the perception <strong>of</strong> security is a public relations campaign<br />

and nothing is so valuable in such a campaign as a brand. It is a way <strong>of</strong> creating<br />

an identity and establishing expectations as to the value <strong>of</strong> a product or service.<br />

Brands and the way that they are portrayed have become so routine in 21 st century<br />

existence that they are hardly noticed. Their invisibility adds to their power; if<br />

they are not consciously seen, it means that the message has become embedded<br />

in people’s minds. Merely to mention a brand summons images: Coca-Cola ® ,<br />

Mercedes-Benz, Apple ® , Sony ® , Micros<strong>of</strong>t ® , Rolls-Royce, Louis Vuitton and<br />

many other companies have been successful in creating names that are instantly<br />

recognizable and trademarks that are a part <strong>of</strong> the popular culture not only in their<br />

own lands, but around the world. They have meaning, and they make a promise to<br />

the buyers <strong>of</strong> the products these companies make. Woe to the company that fails to<br />

honor those promises.<br />

As stated, security has established a very negative brand, which is not effective in<br />

developing a positive identity for security. However, here have been successful<br />

efforts to rebrand security as a friendly if ever-vigilant force for good. In the US,<br />

the National Crime Prevention Council has adopted a hound dog dressed up like a<br />

detective as their logo. His name is McGruff the Crime Dog ® , famous for his advice<br />

on how to stop crime before it happens and for his great sense <strong>of</strong> humor, as his<br />

web site 3 proclaims. The marketing <strong>of</strong> crime prevention is intentionally made<br />

people-friendly to take the harshness away from this form <strong>of</strong> security.<br />

The McGruff public education campaign is an example <strong>of</strong> what can be<br />

accomplished with positive branding. It involves more than a cuddly logo. The<br />

choice <strong>of</strong> words, the explicit and implicit promises made, and the value proposition<br />

all contribute to security’s brand. So, in strengthening a culture <strong>of</strong> security, it is<br />

advisable to take the steps involved in a branding campaign.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 77


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

Determine the Message to Be Conveyed<br />

It is critical that the message be well defined at the outset. The precise nature <strong>of</strong> the<br />

message differs from industry to industry and enterprise to enterprise. Some general<br />

guidelines can be applied universally—security:<br />

• Adds value<br />

• Enables activities<br />

• Benefits both the enterprise and the individual<br />

• Will help when things go wrong, but will not interfere when everyone is doing<br />

what they are supposed to do<br />

• Is fair to all<br />

What should be avoided is any communication <strong>of</strong> the consequences <strong>of</strong> not<br />

having security. That has been tried for years and has so dulled the senses <strong>of</strong><br />

those who have heard it that it is no longer useful, but, in fact, is deleterious to a<br />

security culture.<br />

Understand the Audience and Tailor Messages to Each Market Segment<br />

There are different ways to communicate with senior management than with staff<br />

or customers. It is important to differentiate to whom a brand must have meaning<br />

and how that meaning is to be conveyed. For example, security should be portrayed<br />

as supportive <strong>of</strong> organizational strategic goals for one group and as an aid to<br />

getting work done effectively to another. In general, the guidelines shown in<br />

figure 2 are applicable.<br />

Audience<br />

Figure 2—Message Format by Audience<br />

<strong>Security</strong> Message Format<br />

Senior management Brief, to-the-point, strategic, graphic supported by some explanation<br />

IT staff Thorough, tactical, showing benefits to a project or application<br />

End users Graphic, personal, needing little explanation<br />

New hires Welcoming, explanatory, sufficiently verbal to be clear<br />

Create an Image for the Message<br />

The image <strong>of</strong> security should portray a concept and definitely should not be<br />

associated with the mission <strong>of</strong> a department or function, which would put distance<br />

between that department and all others who may participate in a culture <strong>of</strong> security.<br />

It should also express the meaning, value and sentiment <strong>of</strong> a message <strong>of</strong> assistance<br />

and benefit. Again, there is no single image that is right for all circumstances, but<br />

figure 3 provides some examples <strong>of</strong> positive and negative images.<br />

78<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


5.0 <strong>Creating</strong> an intentional <strong>Culture</strong> <strong>of</strong> SeCurity<br />

Figure 3—<strong>Security</strong> Message Images<br />

Positive Images to Consider Negative Images to Avoid<br />

Keys, especially house or car keys Locks, safes<br />

Hound dog, collie Bulldog, German shepherd<br />

School crossing guard Police <strong>of</strong>ficer<br />

Emergency worker Soldier<br />

Shield Weapons<br />

Clear, sunny weather Clouds, storms<br />

Construction Destruction<br />

Money gained Money lost<br />

Flowers, fruit Creeping ivy, vegetables<br />

Establish a Vocabulary for the Message<br />

The terminology <strong>of</strong> security should be closely observed. When speaking <strong>of</strong> security,<br />

it is far preferable to accentuate the positive aspects, minimizing if not eliminating<br />

the negative. Certain terms should be avoided because they create a set <strong>of</strong><br />

assumptions that cannot always be satisfied. If security cannot be all-encompassing,<br />

then it is foolish to promise, ensure or guarantee anything. Figure 4 details terms to<br />

be used and avoided.<br />

Figure 4—<strong>Security</strong> Message Terms<br />

Terms to Use Terms to Avoid<br />

Enable Forbid<br />

Protect, protection Prohibit, prohibition<br />

Allow, grant Deny, revoke, disallow<br />

Value, value added Cost, costly<br />

Access, accessible Prevent, prevention<br />

Benefit Risk<br />

Effective, efficient Permitted<br />

Entitled Authorized<br />

Capability, capable Limitation, limited<br />

Advisory Warning<br />

Open Risky, dangerous<br />

Vigilance Monitoring<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 79


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

Invoke the Brand Repeatedly<br />

Once the message has been crafted and the terminology refined, it should be<br />

reinforced as regularly as possible, until it enters the corporate culture. It can be<br />

distributed on correspondence, screen savers, posters, e-mails and conversation.<br />

<strong>Security</strong> should be omnipresent, protective, safe and friendly.<br />

5.1.2 Educating About <strong>Security</strong><br />

There is more to changing perceptions about security than creating a positive brand.<br />

Personnel, particularly in management positions, need to understand security, not<br />

just feel secure. Awareness programs have their place, but as stated in section 4.4,<br />

they are insufficient by themselves. Many security awareness programs begin by<br />

emphasizing threats and risks and then show how effective security can overcome<br />

them. As stated previously, starting with the negative and moving toward the<br />

positive works at the outset, but then becomes dulled over time. As an example <strong>of</strong><br />

emphasizing the negative, one well-known company has published guidance and a<br />

tool kit for developing a security awareness program. Early in a sample presentation<br />

<strong>of</strong>fered, there is a slide that highlights crime statistics, thus starting <strong>of</strong>f on the<br />

wrong foot.<br />

People need to be educated about security and their role in it, which is a great deal<br />

more than being aware. However, education does not come simply in a classroom.<br />

In fact, classroom training is useful for transferring skills, but not attitudes. People<br />

may be educated in meetings, especially one-on-one, face-to-face meetings. It is<br />

clearly infeasible to have personal meetings with every employee <strong>of</strong> a large<br />

enterprise; what is necessary is to have such educational sessions with those who<br />

show evidence <strong>of</strong> being potential champions and those whose positions should<br />

require them to champion security.<br />

One reason to educate people about security, rather than simply make them aware<br />

<strong>of</strong> it, is that security awareness programs are unprovable. It cannot be shown<br />

that awareness reduces the incidence <strong>of</strong> security breaches or lowers the cost <strong>of</strong><br />

countermeasures. So, when the inevitable attack does occur, some may feel that<br />

the promise <strong>of</strong> security was not kept, which undermines security’s brand. It may be<br />

expected that, after people have been educated (with regular reinforcement), they<br />

should know about security, what its objectives and tools are, and what should be<br />

their own responsibilities.<br />

Those who would improve an enterprise’s culture <strong>of</strong> security should choose a<br />

limited number <strong>of</strong> people to educate and then do so wisely and with many<br />

overlapping techniques, including holding formal sessions; talking informally;<br />

sending news items, articles and informal correspondence; and generally working<br />

with them to improve the security culture. The latter technique is particularly<br />

important. It has been shown that adults learn differently from children. Adults<br />

80<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


5.0 <strong>Creating</strong> an intentional <strong>Culture</strong> <strong>of</strong> SeCurity<br />

must be motivated. In an organizational setting, they must be comfortable that the<br />

learning experience will be a positive one for them. Thus, it is important to teach<br />

the would-be champions about security because they are already felt to be well<br />

dispposed to it. They must see the information they receive about security to have<br />

value to them in their personal and pr<strong>of</strong>essional lives and feel that they have control<br />

over the learning experience—that it was their idea to seek out training rather<br />

than having it imposed on them. In sum, they must see value in the education. 4 If<br />

security is portrayed positively, showing the value in the subject, it is easier to teach<br />

people about their roles.<br />

5.2 The People Who Make the <strong>Culture</strong><br />

The people in an enterprise make the culture, and hence, there is a need for strong<br />

human resource practices and management. Enterprises should be able to attract<br />

and train the right people, develop them, engage them and help them perform,<br />

inspire them, and ensure that they are committed. As stated in the beginning <strong>of</strong><br />

this volume, a culture, in general, has been defined to include shared attitudes<br />

and beliefs and a way <strong>of</strong> doing things that is common within an enterprise. In<br />

particular, a culture <strong>of</strong> security is shown in BMIS to be transformational, a shift<br />

from functional security (what people do) to intentional security (how people think<br />

and behave). The transformation has four primary areas <strong>of</strong> application: technology,<br />

process, people and enterprise. In one case study, the movement toward an<br />

intentional security culture was shown in figure 5.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 81


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

82<br />

Figure 5—Shifting From a Functional to an Intentional <strong>Security</strong> <strong>Culture</strong> 5<br />

From Functional To Intentional<br />

• Level <strong>of</strong> security provided by the technology<br />

unclear<br />

• <strong>Security</strong>-related technology seen as disruptive<br />

and cumbersome to use<br />

• <strong>Security</strong> brought in when there is a suspected<br />

breach<br />

• <strong>Security</strong> maintaining expert knowledge<br />

• <strong>Security</strong> seen as an entity that enforces<br />

compliance<br />

• <strong>Security</strong> seen as a functional expert<br />

• Limited visibility or awareness <strong>of</strong> security<br />

issues<br />

• <strong>Security</strong> structure focusing on technical<br />

expertise<br />

Technology<br />

Process<br />

• Technology used based on an assessment <strong>of</strong><br />

the risk<br />

• New security technology seen as a means to<br />

enhance the sales process<br />

• <strong>Security</strong> involvement in the earliest planning<br />

phases <strong>of</strong> campaigns<br />

• <strong>Security</strong> sharing its knowledge and expertise,<br />

developing broader security awareness across<br />

the enterprise<br />

People<br />

• <strong>Security</strong> seen as a partner that creates<br />

awareness and commitment<br />

• <strong>Security</strong> seen as a partner that transfers<br />

security knowledge and expertise to its sales<br />

customers<br />

Organization<br />

• Regular updates about potential risk<br />

• <strong>Security</strong> structure supporting customer<br />

processes<br />

5.2.1 Intentionality<br />

The defining factor in the transformation is that it is intentional. The term raises<br />

the question whether the holder <strong>of</strong> the intent is the subject or the object. In the<br />

first connotation, the intent is on the part <strong>of</strong> those who would create or strengthen<br />

a security culture. In the other, it implies that the result will be to turn individuals<br />

into the participants in the culture. The distinction may seem to be unimportant and<br />

unnecessary in that both are required not only to create a culture <strong>of</strong> security, but to<br />

see it take root. However, it does point the way as to who should champion an<br />

intentional security culture and who should be involved in the transformation to it.<br />

The problem with the first sense <strong>of</strong> intentionality is that it implies an actor,<br />

someone who has an intention and acts on it. The act and the consequences are<br />

closely tied. Something occurs because someone made it so. However, what<br />

someone intends to do may not always work out as planned; a program to make<br />

security more comprehensive may become so structured and bureaucratic that it<br />

frustrates the original objective. On the other hand, it is impossible for the result <strong>of</strong><br />

an action to be intentional without the initial cause being intentional as well. Pulled<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


5.0 <strong>Creating</strong> an intentional <strong>Culture</strong> <strong>of</strong> SeCurity<br />

together, as was first seen by the British philosopher Jeremy Bentham, 6 the intent<br />

must be to produce something utilitarian—in this case, an enterprise that is and<br />

behaves securely in a self-sustaining manner.<br />

5.2.2 Finding the Champion<br />

Someone must be intent on security if a security culture is to be strengthened, if<br />

not created from whole cloth. In a typical enterprise, who shall the champion be?<br />

There are a number <strong>of</strong> candidates including auditors, risk managers and security<br />

pr<strong>of</strong>essionals. Each has strengths and limitations as the prime mover for a culture<br />

<strong>of</strong> security:<br />

• Auditors (usually internal auditors, but not necessarily so) have a mandate to assess<br />

a system <strong>of</strong> internal control. Managed access to resources, protection <strong>of</strong> information,<br />

accountability and continuity are certainly features <strong>of</strong> internal control, so auditors<br />

usually issue opinions urging improvements in security. However concerned they<br />

may be, auditors are bound by independence from being active participants in the<br />

development and operation <strong>of</strong> controls, but is a security culture, in itself, a control?<br />

Put another way, is a culture something that can be audited? No matter how<br />

supportive <strong>of</strong> a security culture, auditors are in ambiguous positions.<br />

• Risk managers are attuned to the potential harm that a lack <strong>of</strong> security may<br />

cause their enterprises. Some are primarily insurance buyers and seek only to<br />

transfer risk, but more advanced risk managers look for a complete package <strong>of</strong><br />

risk transfer, acceptance and control. The controls in question for them, as for<br />

auditors, include security. In fact, security may rank higher for risk managers than<br />

auditors because risk managers focus on the sorts <strong>of</strong> high-impact, low-frequency<br />

events that are typified by disasters or breaches <strong>of</strong> security.<br />

In some enterprises, risk managers are among the foremost champions <strong>of</strong> a<br />

security culture. However, some risk managers have difficulty seeing how<br />

investments in appropriate security (as opposed to a minimum level) can reduce<br />

the long-term cost to an enterprise. They think primarily <strong>of</strong> insurance premiums<br />

and the cost that an enterprise incurs whether there is a security breach or not.<br />

It seems self-evident that security breaches can cause significant financial<br />

harm, but it is not proven that the cost <strong>of</strong> an incident is greater than years <strong>of</strong><br />

premiums without compensating claims. Again, contemporary risk managers see<br />

the issue more broadly to include reputational harm and customer or employee<br />

dissatisfaction, which they consider just as important as pure financial losses.<br />

• <strong>Security</strong> pr<strong>of</strong>essionals, especially CISOs, seem like the natural champions for a<br />

culture <strong>of</strong> security. However, as discussed in section 4.3, the very effectiveness<br />

<strong>of</strong> an information security department may be an inhibitor to the desired culture.<br />

Moreover, the natural inclination <strong>of</strong> pr<strong>of</strong>essionals to focus on the subject <strong>of</strong> their<br />

discipline renders them somewhat partial in the eyes <strong>of</strong> those who may participate<br />

in a culture <strong>of</strong> security. Surely, security pr<strong>of</strong>essionals have a role to play, but it<br />

is more likely to be in effecting changes in security processes to fit an emerging<br />

security culture than leading the effort to strengthen one.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 83


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

Thus, while these three candidates may have supporting roles in developing a<br />

culture, they need others at a senior level to be the focal point. There is no one<br />

position that is able to claim the mantle <strong>of</strong> security champion apart from those<br />

mentioned previously. Much depends on the personality, seniority, political skill<br />

and pr<strong>of</strong>essional concern among those in the executive suite. Depending on the<br />

enterprise, the champion may be the chief operating <strong>of</strong>ficer (COO), chief financial<br />

<strong>of</strong>ficer (CFO), CIO, general counsel, or even the head <strong>of</strong> human resources (HR). Of<br />

course, if several <strong>of</strong> these are already vying to drive their enterprise into a culture <strong>of</strong><br />

security, then much progress has been made already.<br />

5.2.3 Objects <strong>of</strong> a <strong>Security</strong> <strong>Culture</strong><br />

As stated in BMIS, security is <strong>of</strong>ten seen as functional. Who then needs to see<br />

it as an intentional aspect <strong>of</strong> a corporate culture? As stated previously, those<br />

who are already involved in security and control have the intent, but evidently<br />

not the ability, to cause a transformative shift <strong>of</strong> attitudes and behavior or else<br />

the shift would have already taken place. At the same time, they do not need<br />

to be convinced, either. The emphasis may be on senior management, middle<br />

management or on all those staff members who routinely come in contact with<br />

sensitive and critical information:<br />

• Senior management may seem the obvious group whose attitudes toward security<br />

call for change. They are the ones who set the tone at the top because they are the<br />

top. It is the rare senior executive who would deny the need for security, but these<br />

people also drive their enterprises toward sales, growth and pr<strong>of</strong>its. The objective<br />

is to get enough mind share for security in the executive suite so that security has<br />

a chance to hold its own against other imperatives.<br />

Many executives only have time for security matters when there is a regularly<br />

scheduled update or if there is a serious security breach. They are well attuned to<br />

the need for security <strong>of</strong> the information in their own hands; by the time it gets to<br />

their level, it is either so concentrated or so sensitive that the need for security is<br />

self-evident. There is very little for them to do as a group, apart from having one<br />

<strong>of</strong> their members champion security. As individuals, they need only think about<br />

security a little more, consider how it affects them and what they could do more<br />

securely. They do not need to be persuaded that security is a positive value to<br />

their enterprises; they need to be convinced to convince others.<br />

• Middle management is <strong>of</strong>ten the greatest stumbling block to a security culture.<br />

Again, it is not because middle managers are opposed to it, but because they are<br />

the ones who must formulate budgets and meet senior management’s demands.<br />

They hear clearly, “Sell more, grow bigger and make more pr<strong>of</strong>its.” “Be secure”<br />

<strong>of</strong>ten gets drowned out. Moreover, it is they who transmit their understanding<br />

<strong>of</strong> what their management wants to their own staffs. If they feel the heat for<br />

objectives other than security, they transfer it downward.<br />

84<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


5.0 <strong>Creating</strong> an intentional <strong>Culture</strong> <strong>of</strong> SeCurity<br />

Do middle managers encourage their people to circumvent security? Probably not,<br />

as blatant contradiction <strong>of</strong> policy would be insubordinate, but generally, they have<br />

very little incentive to discourage circumvention, either. The tone may be set at<br />

the top, but the music is played by those much further down the organizational<br />

ladder, with middle managers conducting.<br />

• Staff-level personnel must be the primary recipients <strong>of</strong> an intentional culture, if<br />

only because there are so many <strong>of</strong> them. They are the ones who distribute the<br />

mail, generate the reports, enter the orders, file the personnel records and carry<br />

around vast amounts <strong>of</strong> information on their laptops. They touch information,<br />

as a group, more than anyone. CISOs may build security, auditors may enforce<br />

it and managers may expound it, but the staff needs to live it. The attitudes and<br />

behaviors <strong>of</strong> the staff are the content <strong>of</strong> a security culture. If they do not buy in,<br />

there is no sale.<br />

Looking at the hierarchy in this manner, it becomes evident that, even if senior<br />

managers believe in a culture <strong>of</strong> security, the message will not reach the staff if the<br />

middle managers are not similarly supportive. The staff must be led to believe that<br />

management champions are as sincere when they urge security as they are when<br />

they urge sales. If the staff carries the substance <strong>of</strong> a culture, middle managers are<br />

the catalysts who make the substance react.<br />

5.3 Attributes <strong>of</strong> a <strong>Security</strong> <strong>Culture</strong><br />

How can an enterprise determine whether it has a robust, functioning culture<br />

<strong>of</strong> security? In other words, how does it complete this sentence: “The culture<br />

<strong>of</strong> security is strong if…”? It seems self-evident that such a culture exists if<br />

the corporate culture includes respect for security, but this is a circular line <strong>of</strong><br />

reasoning. It is preferable to consider the attributes <strong>of</strong> a security culture and the<br />

means toward obtaining or strengthening one.<br />

5.3.1 <strong>Security</strong> Champions<br />

The need for a champion has been discussed previously, but what do champions<br />

actually do? First and foremost, they speak up, including in the board room with top<br />

executives. When a new initiative is being discussed, the security champion simply<br />

has to ask, “Is the information secure?” and half the battle is won. It is precisely the<br />

act <strong>of</strong> laying security on the table among all the other determinants involved in a<br />

decision—the more strategic the decision, the better—that makes a security culture<br />

spring to life. Of course, no one is likely to say, “We do not need the information to<br />

be secure.” Attitudes, assumptions and beliefs begin to move by putting security on<br />

an equal footing with other considerations, and as they move, they also nudge along<br />

behavior and ways <strong>of</strong> doing things.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 85


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

As stated, asking the question is half the battle, which leaves another half to be<br />

won. It is quite important that the same question be asked repeatedly, initiative<br />

after initiative, project after project, until it no longer needs to be asked. Everyone<br />

involved will think about security without being asked. In this way, a culture <strong>of</strong><br />

security goes from being intentional to being unintentional—so natural that it is no<br />

longer thought about, but just done. It is even better if more than just the original<br />

champion asks the question. That would indicate that the culture <strong>of</strong> security is<br />

catching on at the highest levels.<br />

Of course, asking the question is insufficient; it must also be answered. If the<br />

consensus response is, “No, the information is not secure, but we do not care and<br />

are going to do what we want anyway,” then the security culture dies before it<br />

begins. Fortunately, few would be so foolhardy as to take that position, publicly<br />

or privately. If, however, the reply is, “How secure does it have to be?,” then the<br />

champion must be resolute. <strong>Security</strong> must be good enough to meet the enterprise’s<br />

needs, explicitly tying security to overall organizational objectives. Finally, if<br />

the initiative in question is reshaped in accord with organizational business<br />

requirements, there is evidence that a security culture is taking root.<br />

All <strong>of</strong> this conversation occurs at the highest levels, but champions must also<br />

communicate it downward. They can invigorate those in their line <strong>of</strong> authority, but<br />

the message must also be conveyed down the chains <strong>of</strong> the champions’ peers, some<br />

<strong>of</strong> whom are not yet involved in a culture <strong>of</strong> security. As noted previously, senior<br />

management proposes, but middle management disposes.<br />

5.3.2 Budget for <strong>Security</strong><br />

Unless security is appropriately funded, there is no security. Where security does<br />

not exist, neither does a meaningful security culture. Simply put, a culture <strong>of</strong><br />

security can be measured by what an enterprise is willing to spend for it. This<br />

does not mean that an enterprise that has a security budget <strong>of</strong> US $1 million has<br />

a security culture twice as strong as one that allocates US $500,000. No two<br />

corporations or government agencies are exactly alike, and so, their financial<br />

investments in security will differ based on their industries and relative sizes. As<br />

was emphasized in section 2.1, a security culture can be viewed realistically only<br />

within the context <strong>of</strong> an enterprise and the risks it faces.<br />

There are more nuanced views <strong>of</strong> the correlation <strong>of</strong> budget and culture. For one<br />

thing, the issue is not so much the money allocated for security, but how well it is<br />

spent. If one enterprise’s security objectives can be met with less funding, then its<br />

culture may, in fact, be superior to another that simply throws money at problems. 7<br />

It is also a matter <strong>of</strong> when the money is spent. When an enterprise first becomes<br />

aware that its security is insufficient, at the onset <strong>of</strong> a demonstrable security<br />

culture, it needs to spend more just to correct prior shortfalls. Since security is not<br />

86<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


5.0 <strong>Creating</strong> an intentional <strong>Culture</strong> <strong>of</strong> SeCurity<br />

achieved overnight, an enterprise may spend more, but, at the time, be less secure.<br />

The culture <strong>of</strong> security is more evident in the trajectory <strong>of</strong> improvement than in the<br />

current state.<br />

There is also the factor <strong>of</strong> how budgets are calculated and aggregated. One way, <strong>of</strong><br />

course, is to measure the money specifically allocated to an information security<br />

function. This is meaningful, but incomplete. If security is pervasive within an<br />

enterprise, there will be a security component to HR, facilities, operations, finance<br />

and many other functions. It is true to say that an indicator <strong>of</strong> the strength <strong>of</strong><br />

a security culture is how widely an enterprise spreads its security investments.<br />

Paradoxically, the stronger the culture, the harder it is to trace the money spent on<br />

it. Measuring the total cost <strong>of</strong> security in an enterprise is a fascinating subject for<br />

future research.<br />

5.3.3 Broad Accountability<br />

Beyond budgets, another attribute <strong>of</strong> a security culture is a broad base <strong>of</strong> participation<br />

in securing an enterprise’s information resources. If “security is everyone’s job,” then<br />

everyone must be accountable for security. In an enterprise where a security culture<br />

has taken hold, roles and responsibilities for security are spelled out and individual<br />

managers are answerable for their part <strong>of</strong> the total protection <strong>of</strong> information. Figure 6<br />

suggests a possible distribution <strong>of</strong> accountability.<br />

Figure 6—Possible Distribution <strong>of</strong> Accountability<br />

Aspect <strong>of</strong> <strong>Security</strong> Accountable Function<br />

Risk assessment Risk management<br />

<strong>Security</strong> policy and standards Information security<br />

Asset management Information security, physical security<br />

Employee screening HR<br />

Physical security or information Physical security, datacenter operations<br />

Network data security Telecommunications<br />

Spoken security Corporate communications, telecommunications<br />

Data retention Datacenter operations, facilities<br />

Monitoring and enforcement Internal audit<br />

Access control Information security<br />

Encryption Information security<br />

Information acquisition, storage and disposal General counsel, privacy, facilities<br />

Incident response Information security, physical security<br />

Recovery and resilience BCM<br />

Compliance Compliance<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 87


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

As shown in figure 6, many functions have a role to play. The overall<br />

organizational culture <strong>of</strong> security is weak when more aspects <strong>of</strong> security are<br />

concentrated in an information security department and when other functions have<br />

less accountability.<br />

5.3.4 Awareness and Education<br />

It is in the context <strong>of</strong> broad accountability that awareness enters into the culture<br />

<strong>of</strong> security. As stated previously in section 4.4, security awareness alone is not<br />

enough. There is a significant difference between making people aware that there<br />

is a need for security and that they have a specific role to play in achieving it. The<br />

former is a half-formed wish. The latter is an attribute <strong>of</strong> a culture <strong>of</strong> security.<br />

Making people aware <strong>of</strong> the parts that they are to play in securing an enterprise’s<br />

information resources and holding them accountable for their roles are essential<br />

for an intentional security culture. There is a positive decision to be made in<br />

assigning responsibility to a particular function. Awareness occurs on multiple<br />

levels. Someone in a position <strong>of</strong> relatively high authority must conclude that a<br />

given function has a set <strong>of</strong> responsibilities. This person may be the aforementioned<br />

champion or someone influenced by the champion. Managers <strong>of</strong> the functions that<br />

receive the mandate must accept that they bear the designated responsibility, and<br />

staff members should also be consulted on their roles. The gap between grudging<br />

and wholehearted acceptance is filled by a security culture. It is the culture that<br />

creates awareness and not the other way around.<br />

Of course, just because someone has a responsibility does not mean that the<br />

individual knows how to fulfill it; therefore, the person must be educated. This may<br />

be achieved in a number <strong>of</strong> ways, including formal training, pr<strong>of</strong>essional literature,<br />

coaching, the use <strong>of</strong> consultants or delegation to specialists in the assigned roles. Most<br />

likely, the educational process will incorporate all <strong>of</strong> these learning alternatives.<br />

5.3.5 Policies, Standards and Guidelines<br />

Staff needs a good understanding <strong>of</strong> the policies, standards and guidelines that the<br />

enterprise has adopted with regard to security. This, <strong>of</strong> course, presupposes that the<br />

policies, standards and guidelines exist; as previously stated, it is the province <strong>of</strong> the<br />

information security function to make sure that they do. Even more so, they must<br />

ensure that the policies, standards and guidelines are comprehensible, actionable and<br />

enforceable. It would help if they were straightforward and simple, also. Standards<br />

need to be intelligible to be followed. If a culture permits information security to<br />

write them, it also requires that the people who receive them understand them.<br />

(While it is difficult for CISOs to be the champions <strong>of</strong> a security culture, that is not<br />

to say that they have no role in its strengthening. As stated previously, the function<br />

88<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


5.0 <strong>Creating</strong> an intentional <strong>Culture</strong> <strong>of</strong> SeCurity<br />

is an instrumental force behind asset management, access control, encryption and<br />

incident response and the development <strong>of</strong> policies, standards and guidelines. The<br />

CISO’s role in the culture is to give substance to security.)<br />

For example, a standard such as “symmetric encryption systems that utilize shared<br />

secret keys for authentication and encryption must change these keys on at least<br />

an annual basis” cannot be issued without explanation and education. What is<br />

a symmetric encryption system? Is there an asymmetric system, and how does<br />

it differ? What is an encryption system? What are shared secret keys (are there<br />

unshared ones?), and why must they be changed?<br />

The standard helps build security; the education in its meaning and use builds a<br />

culture <strong>of</strong> security. The challenge is not whether the information security function<br />

has the ability to draft policies, standards and guidelines, but whether it has the<br />

communications skill to sell them.<br />

5.3.6 Go/No-go Decisions<br />

The crossroads <strong>of</strong> a security culture is whether anyone has the power to stop an<br />

initiative from occurring on the grounds that it is not sufficiently secure. That<br />

person may be the security champion or the CISO. It would be best if it were the<br />

CEO, indicating that a culture <strong>of</strong> security had percolated to the very top <strong>of</strong> an<br />

enterprise. If someone can halt an effort on the basis <strong>of</strong> security, then a security<br />

culture can truly be said to exist.<br />

This is not a power to be used lightly, and as with so much <strong>of</strong> a culture <strong>of</strong> security,<br />

it must be applied in context. It is insufficient for a CISO to state by fiat, “This<br />

shall not pass.” There must be a broadly accepted framework within which that<br />

power may be exercised. Fortunately, that context is provided by the policies,<br />

standards and guidelines that had been agreed on previous to the decision in<br />

question. If a product or project does not live up to them, it should not be allowed.<br />

Policies should be the least malleable; there should be little, if any, cause to go<br />

forward if policies are violated. Standards usually contain waiver mechanisms that<br />

apply to cases in which the business or a technology cannot support a requirement.<br />

Guidelines, by their nature, are most open to interpretation. Thus, the mechanisms<br />

are there for security to be the deciding factor for or against an initiative. Senior<br />

leaders, if well informed, have the right to make decisions contrary to security<br />

interests, but they also inherently accept accountability if overruling security<br />

concerns backfires. Attitudes, not platitudes, are the stuff <strong>of</strong> a security culture,<br />

and those attitudes manifest themselves when tough decisions need to be made.<br />

From a cultural perspective, it is sufficient that security be grounds for not doing<br />

something, with the blessing <strong>of</strong> management.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 89


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

5.3.7 Rewards<br />

If management must take the blame for poor decisions, it must also be rewarded for<br />

good ones. As noted in section 4.6, the absence <strong>of</strong> rewards is an inhibitor <strong>of</strong> a security<br />

culture. It is difficult, as noted, to equate the compensation for sales, growth or pr<strong>of</strong>its<br />

with those <strong>of</strong> security. They cannot be measured on the same scale.<br />

However, with the contemporary attention to risk management 8 in finance,<br />

government, extractive industries and power generation (to name a few affected<br />

industries), it is easier to reward someone for good risk-related decision making.<br />

(It is easier, but still not easy.) The role <strong>of</strong> senior executives is to make decisions,<br />

so if a security culture induces these men and women to consider safety and<br />

prudence as a part <strong>of</strong> their jobs, they should get something for it, in remuneration,<br />

influence and respect.<br />

The challenge is to translate the consideration <strong>of</strong> security downward. Many, if not<br />

most, initiatives in an enterprise start from below and work their way up to senior<br />

management for approval and budget. Those at the top should note where insecure<br />

recommendations come from (and come from regularly)—not so much to punish<br />

the malefactors, but as a basis for comparison with those who do not. If middle<br />

managers see that poor recommendations are rejected, but that security ones are<br />

accepted and funded, the message will be conveyed and the culture strengthened.<br />

5.3.8 Rigorous Response to Breaches<br />

It is important to remember that no matter how good the standards and the backing<br />

to implement them, security-related incidents may still occur. When they do, an<br />

enterprise must be swift and resolute in responding to and learning from them. Any<br />

enterprise will respond when attacked, including the least secure and those with the<br />

weakest security culture. It is not the response that defines the culture, but the vigor<br />

and visibility with which it does so. The importance is not only doing the right<br />

thing, but to be seen doing it.<br />

<strong>Security</strong> breaches come in many forms. If one is the result <strong>of</strong> external forces (e.g.,<br />

hacks or DoS service attacks), it pays to be very public in taking action against them. 9<br />

If nothing else, it would demonstrate to customers and staff alike that a company is<br />

serious about security if it makes strategic or tactical changes to its business model<br />

in the face <strong>of</strong> attacks. Equally important is to be visible in responding to internal<br />

violations <strong>of</strong> security. When these are criminal matters, an enterprise should seek<br />

prosecution. If they are breaches <strong>of</strong> trust or propriety, they should not be swept under<br />

the corporate carpet. If security is seen as a part <strong>of</strong> an enterprise’s business, then it<br />

needs to show that it means business when it comes to security.<br />

90<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


5.0 <strong>Creating</strong> an intentional <strong>Culture</strong> <strong>of</strong> SeCurity<br />

5.3.9 Satisfied Customers<br />

Nothing is as good for business as satisfied customers. Increasingly, enterprises<br />

are demanding security and reliability from their suppliers. Some <strong>of</strong> this is driven<br />

by laws defining business accountability, such as the US Sarbanes-Oxley Act or<br />

Japan’s Financial Instruments and Exchange Law, known as J-SOX. These laws<br />

induce companies to ensure that not only are they secure, but that the companies<br />

with whom they do business are also.<br />

There is little doubt that laws and regulations have helped enterprises improve their<br />

systems <strong>of</strong> internal control and, in turn, their security cultures. However, an equally<br />

important factor has been the interaction <strong>of</strong> companies in what has been termed an<br />

“extended enterprise.” 10 If there is to be an active collaboration among business<br />

partners, each must be satisfied that the other has achieved at least a comparable<br />

level <strong>of</strong> security as its own. Mutual interdependence breeds a joint concern for<br />

security. If any party to a transaction feels that it is exposed, there is little chance <strong>of</strong><br />

success. Thus, each seeks assurance from the other so that together they may reap a<br />

“variety <strong>of</strong> business benefits (e.g., enhanced customer loyalty, increased revenues,<br />

reduced inventory, reduced time to market for new products, more effective<br />

business processes, reduced costs, and/or increased pr<strong>of</strong>its).” 11<br />

Note the reference to customers in the preceding quotation. When entrusted with<br />

people’s (or enterprise’s) information, customers do not demand security, but simply<br />

expect it. It is, or should be, a routine matter that those who hold information need<br />

to protect it. This may be backed up by law and regulation (e.g., the European Data<br />

Protection Directive <strong>of</strong> 1995), but it is a manifestation <strong>of</strong> a culture <strong>of</strong> security among<br />

customers that they ask for security and among vendors that they supply it. After all,<br />

vendors are also somebody’s customers. It is quite clear that customers dissatisfied with<br />

security will bring action (and strengthen a security culture). When there are satisfied<br />

customers, the tie between security and revenues and pr<strong>of</strong>its is more demonstrable, and<br />

thus, it is easier to tie rewards to security.<br />

Each <strong>of</strong> the attributes <strong>of</strong> a culture <strong>of</strong> security, as described previously, seems<br />

simple to implement. They almost seem self-evident. If that is the case, why is<br />

strengthening a security culture an issue at all? Why is a strong culture <strong>of</strong> security<br />

not present in all enterprises? The answer is that, while the individual attributes<br />

may be easy to achieve, one by one, they all must be present for there to be a strong<br />

culture. Enterprises cannot pick and choose. They cannot decide to have policies<br />

without education, champions without budget or satisfied customers without<br />

rewards to those who satisfy them. If it were that easy, every enterprise would have<br />

a culture <strong>of</strong> security (and this volume would be unnecessary). The fact that many<br />

enterprises have not accomplished all <strong>of</strong> the attributes indicates that there is a long<br />

way to go to instill a cultural regard for security across societies. The situation<br />

seems better than it was in many enterprises, but there is still quite a way to go.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 91


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

Endnotes<br />

1 Sartre, Jean-Paul; Existentialism and Human Emotions, Citadel Press, USA,<br />

1957, p. 15<br />

2 For example, the volume 2, 2010 issue <strong>of</strong> the ISACA Journal, dedicated to<br />

security, has on its cover a stylized personal computer looking like a vault door,<br />

with two combination locks and a large vault bolt.<br />

3 www.mcgruff.org<br />

4 Knowles, Malcolm S.; Elwood F. Holton III; Richard A. Swanson; How Adults<br />

Learn, Elsevier, UK, 2005<br />

5 ISACA, An Introduction to BMIS, op. cit., p. 21<br />

6 Bentham, Jeremy; An Introduction to the Principles <strong>of</strong> Morals and Legislation,<br />

UK, 1780, p. 82-83<br />

7 Boesen, Thomas; “New Tools for a Corporate <strong>Culture</strong>,” Balanced Scorecard<br />

Report, Harvard Business School Publishing, USA, November-December 2000<br />

8 Discussions <strong>of</strong> risk management in society at large are too numerous to cite. One<br />

that is indicative <strong>of</strong> the public consciousness <strong>of</strong> risk management may be found in<br />

Brooks, David; “Drilling for Certainty,” New York Times, USA, 28 May 2010<br />

9 For example, Google received much positive publicity about its decision to<br />

change its business plans in the face <strong>of</strong> perceived security attacks. (See “Google,<br />

Inc.,” New York Times, USA, 20 April 2010, http://topics.nytimes.com/top/news/<br />

business/companies/google_inc/index.html?scp=15&sq=Google+security&st=<br />

cse.) Less discussed was the effect <strong>of</strong> the decision on morale within the company.<br />

10 See David, Edward Wilson; Robert E. Spekman; Extended Enterprise: Gaining<br />

Competitive Advantage Through Collaborative Supply Chains, FT Press, UK, 2004<br />

11 Ibid., p. 132-133<br />

92<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


6.0 PoSitive reinforCement<br />

6.0 PoSItIve ReInfoRCement<br />

<strong>Creating</strong> a culture is one thing (if, indeed, it can be done). Strengthening a culture<br />

is something else, and keeping it going and growing is a third. Management<br />

influences behavior, if not attitudes, through measures designed to provide positive<br />

reinforcement for desired conduct and negative reinforcement for that which it<br />

wishes to suppress. Negative reinforcement, unfortunately, is a necessary part <strong>of</strong> a<br />

culture, but one that raises, once again, the image <strong>of</strong> security that is best left out <strong>of</strong><br />

sight until needed. It is addressed in the next section.<br />

The ultimate positive reinforcement, as stated previously, is the rewards that come<br />

to the individual for treating information securely. There is an important distinction<br />

here: Remuneration, advancement and influence come to people for what they<br />

do to protect information resources and there can be no culture <strong>of</strong> security where<br />

security is ignored. However, reinforcing a culture is different. It necessitates<br />

actions to inculcate attitudes and beliefs, an organizational vision <strong>of</strong> how security<br />

fits into its behavior, and a way <strong>of</strong> doing things.<br />

The objective is to fuse the interests <strong>of</strong> the enterprise, the individual and security<br />

into one organic whole. The enterprise may face circumstances in which security<br />

seemingly runs counter to short-term goals, such as speed or flexibility in<br />

responding to customer demands. An executive may think, “Who will know or care<br />

if the rules are bent—not broken, to be sure—just a little?” An individual may see<br />

security as an impediment, slowing things down and generating more bureaucracy.<br />

A security culture reinforces itself by getting all within an enterprise to see that<br />

security makes things better. This is the heartbeat that must be felt throughout an<br />

enterprise: Secure is better.<br />

Why is it better? If “secure is better” is the heartbeat <strong>of</strong> a security culture, then the<br />

reasons it is better are a culture’s lifeblood. Secure is better because an enterprise’s<br />

business depends on it. It is better because customers expect reliability. It is better<br />

because it lives within tolerable risks. It is better because secure resources will not<br />

be misused and will be there when needed. It is better because a secure anything is<br />

better than an insecure anything.<br />

The challenge for management is to build security into the way it thinks about and<br />

runs an enterprise and by reinforcing all the positive attributes <strong>of</strong> a security culture<br />

listed previously. It would be enough to make all personnel behave in a secure<br />

manner, but the real goal <strong>of</strong> a culture is to convince them to think about what<br />

they do for the business in a certain way, placing security, if not first, at least not<br />

last. Thought patterns are best directed by emphasizing organizational goodness,<br />

not the punishments that will be meted out for bad behavior. It calls for a liberal<br />

application <strong>of</strong> honey with a dose <strong>of</strong> vinegar in reserve to spice it up.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 93


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

6.1 Alignment <strong>of</strong> Information <strong>Security</strong> and Business Objectives<br />

Unfortunately, many people do not see that a secure enterprise is a better enterprise.<br />

That is because they see their own business requirements going in one direction and<br />

security’s going in another, if not blocking their business objectives altogether. It is<br />

insufficient to point out the risks these people are taking. They have accommodated<br />

risk in their own minds. Whether they are rationalizing their ambitions or not, they<br />

believe that there is something they want to do, generally to make more money for<br />

a private-sector enterprise or improve service in the public sector, that they would<br />

and could do except for the “silly” demands <strong>of</strong> security. For them, security is an<br />

obstruction to overcome. By the time security becomes a consideration, it is already<br />

too late. The information security function may prevail in stopping an insecure<br />

initiative, but that will only deepen these employees’ suspicion <strong>of</strong> security and the<br />

pr<strong>of</strong>essionals who expound it.<br />

It is curious that security is so <strong>of</strong>ten singled out as an obstructive element within<br />

an enterprise. The accounting department is not considered an obstacle to progress<br />

because it enforces standard ways <strong>of</strong> showing revenue and pr<strong>of</strong>it. The legal<br />

department is not viewed as an impediment because it points out what is prohibited.<br />

Risk management is not seen as a barrier because it says that someone’s project<br />

or product is uninsurable. To be fair, many people do grumble about accounting,<br />

legal or risk management departments, but there is greater recognition that these<br />

functions are imposing restrictions set by external forces such as accounting boards,<br />

legislatures or insurers and not creating difficulties themselves.<br />

6.1.1 <strong>Security</strong> as an Obstacle<br />

Rules and laws are both external and in the past tense. They are limitations that<br />

come from outside an enterprise; no matter how much people may rail against<br />

government or insurance companies, they recognize that the laws must be obeyed<br />

and that insurance policies do not cover everything. However, they also expect<br />

accountants, lawyers and risk managers to help them to accomplish what they want<br />

to do. The American financier J. P. Morgan was reputed to have said, “I don’t want<br />

a lawyer to tell me what I cannot do. I hire him to tell me how to do what I want to<br />

do.” 1 Why, then, do people not feel the same about security pr<strong>of</strong>essionals?<br />

It is largely because security does not deal in hard, documented facts such as laws<br />

or insurance policies. <strong>Security</strong> looks to the future: what may happen, but has not<br />

happened yet. Sometimes, security does deal with incidents, but once these have<br />

been repaired, the next incident still lies in the future. Everyone has to accept<br />

laws, standards and regulations that have already been issued, but people can hold<br />

different opinions 2 about what may happen in the future. Where a CISO may see<br />

only the prospect <strong>of</strong> harm, a salesperson may see pr<strong>of</strong>it and discount the possibility<br />

<strong>of</strong> an incident as so remote as to be dismissible.<br />

94<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


6.0 PoSitive reinforCement<br />

When other staff functions manage alignment <strong>of</strong> a business with things that have<br />

happened in the past, information security must manage the future. In reality, all<br />

management should be oriented toward the future: the sales to be made, bonuses to<br />

be paid and mistakes not to be made. In the same way that lawyers help their clients<br />

to do what they want to do legally, security pr<strong>of</strong>essionals can help their colleagues<br />

to do what they want to do securely. The challenge to these pr<strong>of</strong>essionals and the<br />

secret <strong>of</strong> creating a security culture is to transform themselves from naysayers to<br />

problem-solvers. They can demonstrate their alignment with the overall business by<br />

assisting their colleagues to meet their own business objectives.<br />

In fact, security pr<strong>of</strong>essionals rarely see themselves as negative and do feel<br />

that their role is to help their enterprises. They understand security so well and<br />

so deeply that it puzzles them that others do not. They try to help others avoid<br />

mistakes. <strong>Security</strong> people live within a security culture by predisposition, pr<strong>of</strong>ession<br />

and choice. However, they are cynical about what people in and outside <strong>of</strong> their<br />

enterprises would do if security were not present and, so, put themselves on the<br />

front line in the war against misuse and destruction <strong>of</strong> information. That is heroism.<br />

What is needed for a culture is not heroism, but leadership to bring others along<br />

with them instead <strong>of</strong> fighting the lonely fight.<br />

6.1.2 Strategic Necessity<br />

<strong>Security</strong> pr<strong>of</strong>essionals may engage others by demonstrating that security is a<br />

strategic imperative, the realm <strong>of</strong> senior management decision making. At a<br />

strategic level, a security pr<strong>of</strong>essional must be aware <strong>of</strong> the business <strong>of</strong> the<br />

enterprise. <strong>Security</strong> is stronger at banks, for example, than at manufacturing<br />

companies because, as Willie Sutton 3 said, that is where the money is found. So,<br />

security is acculturated in banks more so than other enterprises.<br />

The CISOs <strong>of</strong> various industries cannot all achieve the same level <strong>of</strong> security; once<br />

again, context enters the discussion. <strong>Security</strong> pr<strong>of</strong>essionals can measure themselves<br />

against others in their own industries. Using conferences, literature and personal<br />

networks, they can learn what others are accomplishing in security and raise the<br />

levels within their own enterprises. (A special challenge comes for those who lead the<br />

pack in their own industries, but do not feel they have done enough. Perhaps they are<br />

reaching for too much.) The interesting question that should be posed and answered is<br />

whether the different appetites for risk, company to company, justify different degrees<br />

<strong>of</strong> security. If so, security pr<strong>of</strong>essionals must adjust their sights accordingly to remain<br />

in alignment with their own enterprise’s goals. Not to do so is to oppose security to<br />

the corporate culture, which is hardly conducive to reinforcing a security culture.<br />

<strong>Security</strong> pr<strong>of</strong>essionals in the private sector need to understand how their enterprises<br />

make money and focus their attention there. Clearly, this entails security for the<br />

systems that take orders, manage inventory and ship products. There are other<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 95


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

types <strong>of</strong> information such as formulas, trade secrets and new product developments<br />

that are money makers also. A culture <strong>of</strong> security most frequently exists around<br />

this latter sort <strong>of</strong> information. People accept that secret recipes and information<br />

about the latest models needs to be secure. They have bought into a culture <strong>of</strong><br />

security, at least that far. That culture can be reinforced by extending it to other<br />

types <strong>of</strong> information.<br />

It is important that security pr<strong>of</strong>essionals help their enterprises to recognize the real<br />

extent <strong>of</strong> the risks they face. Simply put, some are targets for misuse <strong>of</strong> information<br />

more than others. For example, information in the military and intelligence agencies<br />

is more likely to be sought and misused than in civilian agencies. As mentioned, the<br />

information in banks and other financial institutions is constantly under attack because<br />

it has monetary value. A culture <strong>of</strong> security suffuses these types <strong>of</strong> enterprises<br />

because the threats are clear. No one at the US Central Intelligence Agency (CIA);<br />

UK Military Intelligence, Section 5 (MI5); or the Russian military intelligence<br />

agency Glavnoye Razvedyvatel’noye Upravleniye (GRU) thinks for a moment that<br />

security is a nonissue. In enterprises in which threats are not so evident, it may be<br />

hard to see why anyone would misuse information about the seemingly uninteresting<br />

products they make. However, if enterprises make revenue on their products and the<br />

information about them supports pr<strong>of</strong>its, there will be someone who is interested in<br />

stealing, revealing, modifying or destroying that information. The culture must rise to<br />

the level <strong>of</strong> the threat for the safeguards to be appropriate.<br />

Of course, there is a cost side to the risk equation. The best investments in security<br />

are those that cost little and protect a lot. The best contribution <strong>of</strong> a security culture<br />

to overall business objectives is the understanding that the right level <strong>of</strong> security,<br />

in context, is a parallel objective <strong>of</strong> the business. <strong>Security</strong> devices and s<strong>of</strong>tware can<br />

be costly and protect against only a limited range <strong>of</strong> threats. A culture that leads to<br />

understanding those threats costs very little and can be applied against the full array<br />

<strong>of</strong> risks an enterprise faces.<br />

6.1.3 Risk Management<br />

Understanding risks is a necessary, but insufficient, precursor to an appropriate<br />

level <strong>of</strong> security. A security culture is also a requirement so that security is<br />

right-sized against real risks. Not all risks can be eliminated, nor should they be; a<br />

tolerable amount is necessary for business to proceed. Culturally, this is generally<br />

accepted. No enterprise tolerates stupid risks, at least not for long. All pr<strong>of</strong>itable<br />

enterprises make money by taking smart risks. A security culture is not reinforced<br />

by insisting on eliminating all risk, but by eliminating the stupid ones and providing<br />

a fallback position if the tolerated ones turn out not to be so smart after all.<br />

96<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


6.0 PoSitive reinforCement<br />

The essence <strong>of</strong> risk management—as opposed to risk mitigation, reduction or<br />

elimination—is in the grey area between clearly foolish and clearly acceptable<br />

risk. Human nature being what it is, there will always be people who propose to do<br />

something that makes no sense and can only lead to sorrow. Management should be<br />

adept enough to see this and stop them before they move forward. Unfortunately,<br />

it is not so easy to see which risks are so acceptable that it would be foolish not to<br />

take them. If the possibility <strong>of</strong> harm to information is never realized, then the risk<br />

was a smart one—or was it? Was it just a matter <strong>of</strong> luck so that, if the same risk<br />

were taken over and over, it would turn sour eventually?<br />

Bad things that may happen do not always occur. The frequency <strong>of</strong> occurrence<br />

(not the probability) is the measure <strong>of</strong> risk acceptability. Something that goes<br />

wrong once in 10 times is surely unacceptable. Something that goes wrong once in<br />

a million times may be acceptable, except for enterprises that perform millions <strong>of</strong><br />

risk-bearing transactions every year. Even for those who do not face risk as <strong>of</strong>ten, it<br />

must be accepted that the one-in-a-million occurrence could happen today.<br />

There is a virtual cycle between risk management and a security culture: the more<br />

people in an enterprise who appreciate the nature <strong>of</strong> the risks they face, the more<br />

likely they are to incorporate security in their attitudes concerning their business<br />

and the more acculturated they are toward security, the more they will appreciate<br />

the appropriate amount <strong>of</strong> risk they can take. In short, risk management reinforces a<br />

culture <strong>of</strong> security. Nonetheless, in many enterprises, risk management is no stronger<br />

than its security culture, so they both need to be elevated. In fact, it may be axiomatic<br />

that where a security culture is strong, risk management is also strong.<br />

In recent years, so many seemingly “smart” risks have proved to be foolish that<br />

there is greater acceptance <strong>of</strong> risk management in enterprises around the world.<br />

For the most part, the areas <strong>of</strong> risk that have caused the most harm do not concern<br />

information. However, gross miscalculations in such diverse fields as warfare,<br />

finance, petroleum and construction have heightened overall awareness <strong>of</strong> risk,<br />

which can be leveraged for security’s sake. It is notable that the term “information<br />

risk management” (IRM) is gaining currency. Some CISOs style themselves—or<br />

report to—information risk managers. Much <strong>of</strong> the literature on the subject <strong>of</strong> IRM<br />

addresses the same points as have been made about a security culture: alignment<br />

with organizational goals, senior management support, visibility for security and<br />

incentives for secure behavior. One study even states that the risk mindset—much<br />

the same as a culture—must change for “information risk [to be] part <strong>of</strong> every<br />

business discussion.” 4 In these terms, it is easy to see the symbiosis between a<br />

security culture and risk management.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 97


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

6.1.4 <strong>Security</strong> Procedures Embedded in Daily Operations<br />

In its definition <strong>of</strong> a security culture, BMIS strikes a balance between what people<br />

think (beliefs, assumptions and attitudes) and what they do (a pattern <strong>of</strong> behaviors,<br />

ways <strong>of</strong> doing things). An appreciation <strong>of</strong> risk and respect for security are all well and<br />

good, but mean little if people do not act on what they believe. Even more, a culture<br />

<strong>of</strong> security may be considered entrenched in an enterprise if people act securely<br />

without thinking about doing so. People do not awaken and think, “I will be secure<br />

today.” Rather, they follow routine procedures that become so engrained that they do<br />

not even realize that they are following them—or that they are being secure.<br />

For example, in the financial services industry, one group <strong>of</strong> people consists <strong>of</strong><br />

traders and another performs all the posttrade activities to execute the trades. The<br />

functions are incompatible. Were a trader to carry out the posttrade activities, there<br />

would be a significant breakdown in separation <strong>of</strong> duties. No one would cross<br />

that line without realizing that, to do so, a fraud would be committed a fraud. 5<br />

The information that the two groups use is the same, but they use it at different<br />

stages <strong>of</strong> a trading life cycle. <strong>Security</strong> is enforced by an access control system<br />

that permits traders and operations personnel to see and act on the information<br />

only at the required stages. Also, the access control system may be backed up by<br />

an identity management system that recognizes all the people in a group called<br />

“Traders” and another called “Trade Executors.” The point <strong>of</strong> this little treatise<br />

on trade processing is that no one in a financial institution gives a second thought<br />

about whether to carry out activities securely. This is simply the way in which the<br />

job is done. Despite the occasional fraudster who finds a way around the system,<br />

thousands (perhaps millions) <strong>of</strong> people are involved in trading every day, with<br />

attitudes and behaviors enveloped in security without their even thinking about it.<br />

An interesting question is how people become acculturated to following secure<br />

procedures and acting securely when they are new to a function. Does someone say,<br />

“This is how we keep this function secure,” or are people simply instructed on how<br />

to do their jobs, with security already built in? If the latter, then someone at some<br />

time must have considered security in devising those procedures. Was that person (or<br />

people) part <strong>of</strong> a security culture, or were the risks so evident that anyone would have<br />

built security into the procedures?<br />

There have been trading activities going on since the dawn <strong>of</strong> humanity that were<br />

formalized during the Renaissance and passed down to the present day. A notable<br />

turning point occurred when trading systems were automated in the second half <strong>of</strong><br />

the 20 th century. At that time, security had to be built into a series <strong>of</strong> programs and<br />

user operating procedures. Not all security decisions were as simple as the separation<br />

<strong>of</strong> duties described previously. Limits, approvals, reporting, correction, controls<br />

and many other aspects <strong>of</strong> business life have to be encapsulated in programs and<br />

procedures. Even in an activity such as trading in which the need for security is so<br />

98<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


6.0 PoSitive reinforCement<br />

evident, decisions can and have been made that strengthen or weaken overall security.<br />

The manner in which those decisions are made is indicative <strong>of</strong> the strength <strong>of</strong> a<br />

security culture. Including security pr<strong>of</strong>essionals as advisors or even as designers<br />

reinforces a culture <strong>of</strong> security. The same may be said <strong>of</strong> auditors, although they<br />

would rarely design controls they may have to audit, and <strong>of</strong> risk managers, who may<br />

be called upon for their insights into the risks in a business function.<br />

6.1.5 Management Reward Structure<br />

Much has been said in this volume about rewards as a means <strong>of</strong> strengthening<br />

a culture <strong>of</strong> security and <strong>of</strong> the metrics for determining whether rewards are<br />

warranted. There is a vital aspect <strong>of</strong> rewarding people as a means toward solidifying<br />

a security culture: People, especially middle managers, need to know that secure<br />

behavior will be rewarded. That, in turn, means that senior managers must make<br />

their intentions clear. Senior management must encourage the implementation <strong>of</strong><br />

security safeguards with all the budgetary support that it implies and must also<br />

promote the attitudes that constitute a culture <strong>of</strong> security.<br />

In other words, to be rewarded in pay, promotion, respect and clout, managers must<br />

not only do the right things with regard to security, but also be seen to be doing so<br />

willingly, supportively and intentionally. They must be proactive in considering<br />

security as a part <strong>of</strong> their jobs, insisting on secure solutions to day-to-day problems.<br />

They should find themselves in accord with security pr<strong>of</strong>essionals on most matters<br />

and should not be constantly negotiating for less security in each new project and<br />

system. Senior management should be aware <strong>of</strong> the attitudes and approaches taken<br />

by middle managers and reward them accordingly.<br />

If a business manager and a CISO disagree on the extent <strong>of</strong> security needed, should<br />

the CISO always be considered to be correct, and how does a senior manager know<br />

whether a middle manager is being obstructive to security or standing firm for the<br />

appropriate level <strong>of</strong> security? To the first question, it is clear that CISOs are not<br />

always right and that they sometimes are more extreme in their drive for the most<br />

secure operations possible, losing sight <strong>of</strong> the business context in which security<br />

is to be implemented. It is as incumbent on CISOs to learn to think like business<br />

managers as it is on business managers to think like CISOs. That said, most CISOs<br />

are not overly extreme all <strong>of</strong> the time (or else they will not be in their positions for<br />

very long). A particular disagreement between the two means little, especially if the<br />

difference <strong>of</strong> opinion is conducted in a collegial manner, but a pattern <strong>of</strong> conflict<br />

is another matter entirely. Senior managers should be attuned to such behavior and<br />

reward or reprimand accordingly.<br />

One <strong>of</strong> the roles <strong>of</strong> senior managers is the resolution <strong>of</strong> disputes among their<br />

subordinates. They can tell who is involved the most <strong>of</strong>ten and how <strong>of</strong>ten those<br />

people are supported or denied in their arguments over security. (To be sure,<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 99


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

a senior manager may also act outside a security culture, but if the culture is<br />

to be built around security in context, it is senior management that bears the<br />

responsibility <strong>of</strong> establishing that context.) Senior managers do not need to rely<br />

solely on their own judgment in determining who is and is not supportive <strong>of</strong> a<br />

security culture. They know who is criticized in audits on a regular basis, who is<br />

out <strong>of</strong> tune with colleagues and who is running the greatest risks.<br />

Establishing the reward structure for a culture <strong>of</strong> security does not need to take the<br />

form <strong>of</strong> a written set <strong>of</strong> metrics. In fact, to define a culture solely on the basis <strong>of</strong> a list<br />

<strong>of</strong> dos and don’ts would unnecessarily constrain it. A quiet word in the corridor, a<br />

note on an annual review or a supportive e-mail may do quite as well. The important<br />

thing is for everyone to know that someone above is aware <strong>of</strong> the cultural temperature<br />

<strong>of</strong> an enterprise and will take active measures to reward those trying to raise it.<br />

6.2 Balance<br />

Tightrope walkers have many skills and attributes: style, courage, determination,<br />

showmanship and a little bit <strong>of</strong> magic. They definitely have a culture <strong>of</strong> security<br />

that consists <strong>of</strong> balancing poles, nets and years <strong>of</strong> practice. What they have most<br />

<strong>of</strong> all is balance. If building a security culture is not quite so treacherous as<br />

tightrope walking, it calls just as much for balance. It requires some organizational<br />

acrobatics, the ability to change direction and overcome inertia, and a solid central<br />

position that does not shift when conditions do.<br />

6.2.1 The Burden on <strong>Security</strong> Pr<strong>of</strong>essionals<br />

Perhaps the most important part <strong>of</strong> balancing, in cultural terms, is just getting<br />

along well with others. Those who support a security culture must convince others<br />

and transform their thoughts and actions. This is rarely achieved by pounding the<br />

boardroom table. Persuasion is a gentle art that calls for the proponent to demonstrate<br />

(more so than explain) that security is beneficial to others who are not quite so<br />

certain. As much as anything, it requires the supporters <strong>of</strong> a culture <strong>of</strong> security to<br />

have a firm, internal comprehension <strong>of</strong> what makes information secure and why the<br />

information should be secure in the first place. The demonstration <strong>of</strong> the value <strong>of</strong><br />

security must be given in terms to which each recipient will understand and relate.<br />

Balance is needed because some position, action or initiative is so weighted to<br />

one, insecure side that a counterweight needs to be applied. Therefore, it requires<br />

the proponent <strong>of</strong> security to be able to recognize the other person’s goals and<br />

objectives and apply just the right amount <strong>of</strong> countering force. The focus must<br />

be as much on the recognition as the force. Imposing security over the objections<br />

<strong>of</strong> a salesperson, an accountant, an operations manager or an administrator may<br />

build greater security, but may just as easily undermine a culture <strong>of</strong> security. It<br />

is not a question <strong>of</strong> winning or losing, but <strong>of</strong> understanding the greater long-term<br />

100<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


6.0 PoSitive reinforCement<br />

goals <strong>of</strong> an enterprise. <strong>Security</strong> pr<strong>of</strong>essionals, empowered as they are to keep an<br />

enterprise’s information safe from misuse, must, at the same time, visualize how<br />

that information is and can be put to pr<strong>of</strong>itable use.<br />

This ability to see the matters from another person’s viewpoint is a difficult skill to<br />

master. It is the essence <strong>of</strong> organizational balance, especially for those who are entrusted<br />

with the responsibility to keep information safe. In the information security functions <strong>of</strong><br />

many enterprises, there is a history <strong>of</strong> battles won, but mostly lost, and <strong>of</strong> slow progress<br />

to push the front forward to overcome the forces that would sacrifice safety for meager<br />

gains. The use <strong>of</strong> military terms in the previous sentence is intentional, and for those<br />

security pr<strong>of</strong>essionals who think in those terms, it is destructive <strong>of</strong> a security culture.<br />

<strong>Security</strong> <strong>of</strong> business information is not a war, and implementing security is not a matter<br />

<strong>of</strong> wins and losses. Those who think back on the introduction <strong>of</strong> a new application or<br />

technology and are still upset because management did not support a particular security<br />

initiative have to put all that behind them.<br />

Each issue has to stand on its own merits in context and with balance. The imagery<br />

<strong>of</strong> battle is counterproductive precisely because, even if security is not a war, one’s<br />

fellow employees are allies in the fight. <strong>Security</strong> pr<strong>of</strong>essionals need to ask themselves<br />

what would be a “win” for the others in their enterprise who have its welfare at heart<br />

just as much as they do. <strong>Security</strong> can be achieved by forcing a particular safeguard or<br />

restriction to be put in place, but the imposition <strong>of</strong> organizational force undermines a<br />

security culture.<br />

<strong>Security</strong> pr<strong>of</strong>essionals must learn to think like salespeople, accountants, operations<br />

managers or administrators and to understand what drives and compensates them.<br />

They should seek to achieve the objectives <strong>of</strong> both a business unit and a security<br />

department. True organizational balance will be achieved when a CISO can be<br />

promoted to a revenue-generating role and a business unit leader can be promoted<br />

to CISO. In many, perhaps the vast majority, <strong>of</strong> enterprises, this balance is a long<br />

way <strong>of</strong>f in the future.<br />

To some extent, the problem lies with security pr<strong>of</strong>essionals’ lack <strong>of</strong> understanding<br />

(and some would say, <strong>of</strong> interest) in how a business actually works and how a<br />

private enterprise makes money. This is, in most cases, overstated; most security<br />

pr<strong>of</strong>essionals have a very good comprehension <strong>of</strong> the workings <strong>of</strong> their enterprises,<br />

gained through business impact analyses and risk assessments. What many lack is,<br />

in the words <strong>of</strong> the poet, the ability to see themselves as others see them. 6 In too<br />

many enterprises, the information security function is not well liked, even where it<br />

is respected. As explained in section 4.0, security pr<strong>of</strong>essionals are sometimes seen<br />

as organizational cops and not friendly. They still have the obligation to do the right<br />

things for the security <strong>of</strong> an enterprise’s information; they must learn to put things<br />

their way, but nicely.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 101


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

6.2.2 The Burden on the Enterprise<br />

<strong>Security</strong> pr<strong>of</strong>essionals cannot forego their responsibilities for the sake <strong>of</strong> nicety,<br />

though. They are as likely to fall from the tightrope by giving away too much as<br />

giving too little. Throughout every enterprise, people must realize—and many<br />

do—that business has undergone and is still undergoing pr<strong>of</strong>ound change in only a<br />

generation. Information is available in ways never before encountered: in greater<br />

quantities, at less cost, in less time and anywhere in the world. Protecting it is a<br />

tireless job in a battle—here the imagery is appropriate—against unknown, unseen<br />

forces, some <strong>of</strong> whom may appear to be friends.<br />

In short, information truly is at risk and enterprises are at risk <strong>of</strong> not controlling<br />

their precious information. This recognition needs to be engrained in every<br />

company, government agency and charitable institution today. Technology has<br />

altered the balance <strong>of</strong> security everywhere. The sheer amount <strong>of</strong> data is growing at<br />

incredible rates, more than 50 percent year over year. 7 In previous years, data were<br />

measured in megabytes, then gigabytes and then terabytes. Industry analysts now<br />

talk in terms <strong>of</strong> petabytes—that is thousands <strong>of</strong> trillions <strong>of</strong> bytes <strong>of</strong> information.<br />

The information flows quickly as well. It is routine for large enterprises to have<br />

communications lines <strong>of</strong> megabits per second. Even home users <strong>of</strong> the Internet are<br />

seeing speeds <strong>of</strong> many megabits per second.<br />

Information does not just fly, it walks as well. In many enterprises, there is a<br />

growing understanding <strong>of</strong> the vast amount <strong>of</strong> data that move through society on<br />

laptop computers; compact disks-read only memory (CD-ROMs); Universal Serial<br />

Bus (USB) drives; backup tapes; and, yes, paper. In many cases, data do not<br />

leave the protected perimeter <strong>of</strong> an enterprise’s data processing systems through a<br />

security breach, in which someone accesses data without authorization, but, rather,<br />

through transportation <strong>of</strong> data accessed in an authorized manner. This is not a new<br />

concern, but the increased ubiquity and capacity <strong>of</strong> readily transportable media<br />

have magnified the problem. 8 Enterprises must be cognizant <strong>of</strong> the change in the<br />

dynamic <strong>of</strong> securing all that information.<br />

This also raises the urgency for strengthening a culture <strong>of</strong> security. Business leaders<br />

cannot sit idly by, waiting for the CISO in their enterprise—if there is one—to<br />

save the day. Enough has been said already about the need for champions who<br />

are aware <strong>of</strong> the problem <strong>of</strong> securing so much information. The CISO’s task is<br />

to communicate the magnitude <strong>of</strong> the problem and to present solutions that the<br />

business can accommodate, and it is up to the leadership <strong>of</strong> each enterprise to heed<br />

the warning.<br />

In other words, if the balance point for security has changed, so, too, has the center<br />

<strong>of</strong> gravity <strong>of</strong> a security culture. There are issues on which security pr<strong>of</strong>essionals<br />

can bend and others in which any bending will lead to rupture. Although there is<br />

102<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


6.0 PoSitive reinforCement<br />

room for accommodation in some matters, the center must still hold. It is up to<br />

security pr<strong>of</strong>essionals everywhere to identify the breaking point for the information<br />

in their enterprises. A security culture, too, is a fabric that can bend in some<br />

places, but must be stiffened so as not to tear. For example, there is much room for<br />

compromise as to which roles need access to which information to perform at an<br />

optimum level, but there is no space for a breakdown in separation <strong>of</strong> duties. Some<br />

latitude may be given to system administrators to have privileged access to many<br />

servers and operating systems, but the ability to bypass supervision and control with<br />

regard to programs and data is not negotiable. Information owners can deliberate<br />

on how critical their information is to their business and, therefore, how quickly it<br />

needs to be restored after a disruption. They cannot scrimp on cost by foregoing<br />

recoverability altogether. Also, once they have decided on the sensitivity, criticality<br />

and risk <strong>of</strong> their information, they cannot quarrel with the cost <strong>of</strong> the necessary<br />

safeguards and controls to protect it to the level they have determined.<br />

In many enterprises, it is felt that information owners are all in favor <strong>of</strong> security,<br />

recoverability and control—until they hear the price <strong>of</strong> achieving it. If there is to be<br />

a culture <strong>of</strong> security in an enterprise, it must be based on openness and cooperation<br />

in finding the balance between the need and the cost <strong>of</strong> security. <strong>Security</strong><br />

pr<strong>of</strong>essionals generally strive to provide decision makers with accurate and relevant<br />

information <strong>of</strong> risk and costs, and information owners must not adjust their<br />

risk-related decisions based purely on cost. That is not to say that affordability<br />

should be taken out <strong>of</strong> the assessment <strong>of</strong> the appropriate level <strong>of</strong> security; cost is a<br />

factor <strong>of</strong> appropriateness. However, the risk does not change whether the price <strong>of</strong><br />

safety is high. By analogy, many people buy the maximum amount <strong>of</strong> insurance<br />

they can afford and accept the fact that, if the insured event occurs, they may not<br />

be fully recompensed. Enterprises with a serious security culture make the right<br />

choices, not always the ones that provide the highest level <strong>of</strong> security.<br />

6.3 Convergence <strong>of</strong> <strong>Security</strong> Roles<br />

The distinction between security pr<strong>of</strong>essionals and business leaders is, <strong>of</strong> course, a<br />

false one. Those in the information security function are part <strong>of</strong> the business, and<br />

many parts <strong>of</strong> an enterprise participate in security. As BMIS notes:<br />

To maximize [ROI], all security functions (information security,<br />

physical security, etc.) should be aligned with and support each other.<br />

Nonaligned security functions are wasteful and hinder the identification<br />

and mitigation <strong>of</strong> cross-functional risk. 9<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 103


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

However, there are many others who play a part in information security, whether<br />

they have a security title or not. (See section 5.3.) Each participant must be in<br />

close contact with the others to build, in ISO’s terms, an information security<br />

management system—not an information security department. Risk management,<br />

HR, physical security, datacenter operations, corporate communications,<br />

telecommunications, general counsel, internal audit, compliance, privacy and BCM<br />

all have a part to play in securing information. It would be easy to think that all<br />

these different organizational functions taken together would form the nucleus <strong>of</strong> a<br />

security culture.<br />

They would, if they recognized one another for their different roles in security.<br />

Unfortunately, in all too many cases, they do not. A notable example in many<br />

enterprises is the divergence between what should be closely entwined functions:<br />

information security and BCM. Continuity and security are simply two points on<br />

a spectrum <strong>of</strong> risk management. If the risk involved to information is one or more<br />

events or conditions that create losses (financial, surely, but data losses as well), all<br />

sources <strong>of</strong> those events or conditions should be understood as being the same, or at<br />

least closely related. “Business continuity” is generally used for a loss caused by<br />

a physical event (e.g., a disaster), and “information security” is generally used for<br />

a loss caused by a logical event (e.g., a virus). As long as confidentiality, integrity<br />

and availability are used as a definition <strong>of</strong> security, then business continuity must<br />

be included. There is a definite convergence <strong>of</strong> interest between the two. Moreover,<br />

the risk to availability stems from more than the possibility <strong>of</strong> disasters, which<br />

occur rarely, but with enormous impact. Losses are caused by fires and earthquakes,<br />

but they are also caused by downtime <strong>of</strong> any sort. 10<br />

Why do these two functions not work more seamlessly together? Why, for that<br />

matter, are the different components <strong>of</strong> security not more closely aligned? The<br />

problem is politics; the solution is a culture <strong>of</strong> security, which would, as BMIS puts<br />

it, allow “for the convergence <strong>of</strong> security strategies,” 11 operations, supervision and<br />

reporting. The most useful contribution senior management can make to a security<br />

culture, aside from intentionally championing its existence, is to ensure that all<br />

those with converging security responsibilities reinforce one another rather than<br />

needlessly, heedlessly fighting for their own “turf” at the expense <strong>of</strong> one another<br />

and the detriment <strong>of</strong> the security cultures in their enterprises.<br />

6.4 Automated Cultural Tools<br />

There is a place for automation in the establishment <strong>of</strong> a security culture. This<br />

seems surprising because culture seems to ride above technology, not encompass<br />

it. However, in an era with mobile phones, personal digital assistants (PDAs),<br />

laptop computers, e-mail, social networking, instant messaging and e-books, it is<br />

104<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


6.0 PoSitive reinforCement<br />

hard to recognize a contemporary culture that is not heavily influenced by technical<br />

tools, methods and assumptions. Much <strong>of</strong> the business world has come to expect<br />

information to be available instantly, in every degree <strong>of</strong> detail, anywhere and<br />

anytime. The security <strong>of</strong> all that information and the role technology may play<br />

in it should be obvious.<br />

There is a process that enterprises can follow that will allow them to approach<br />

complete absorption <strong>of</strong> security into a corporate culture even if they never<br />

completely get there. It implies that the cultural environment is not static; at<br />

the same time as requirements are issued (or become obsolete), systems are<br />

being introduced, upgraded or discarded. The process calls for vigilance and<br />

responsiveness. When an enterprise needs to respond to an internal or external<br />

stimulus (e.g., a reorganization, an acquisition, or a new law or regulation), it needs<br />

to instigate action regarding security. The first step is to analyze the requirement,<br />

which can rarely be done by security pr<strong>of</strong>essionals alone. It necessitates<br />

involvement by those who own or use the information in question; <strong>of</strong>ten by legal<br />

counsel; and, in some instances, by senior management.<br />

The culture then needs to adapt to fit the requirement to the enterprise. Depending<br />

on what it is, the CISO may lead the way or perhaps someone in an enterprise<br />

closer to the impact <strong>of</strong> the change. Analysis must be performed to determine<br />

whether an enterprise is already doing what is required everywhere and without<br />

exception. At this point, the change is subject to automated tools for project<br />

management, reporting, budgetary impact and role management. None <strong>of</strong> these are<br />

automation <strong>of</strong> the culture as such, but together, they influence what the culture <strong>of</strong><br />

security is and what it is to become.<br />

As simple <strong>of</strong> a requirement as the regulation to “assign a unique name and/or<br />

number for identifying and tracking user identity” 12 can have significant cultural<br />

impact. It implies that every user <strong>of</strong> every system is individually known and<br />

identifiable, that everyone’s activity with regard to information is known, and that<br />

people are accountable for what they do with the information they encounter. This<br />

has huge cultural implications, and honoring the regulatory requirement involves a<br />

certain set <strong>of</strong> assumptions and attitudes about who uses what information for which<br />

functions. The automation that enables this manifestation <strong>of</strong> a security culture is,<br />

in this case, identity management s<strong>of</strong>tware. The technology involved contains a<br />

number <strong>of</strong> elements, as shown figure 7. 13<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 105


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

Business Events/Triggers<br />

106<br />

Authoritative<br />

Source<br />

Employee<br />

Customer<br />

Business<br />

Partner<br />

Figure 7—Identity Management Elements<br />

Identity<br />

Repository User<br />

Attributes<br />

Attributes<br />

Attributes<br />

Enterprise Identity Role Architecture<br />

Protection<br />

Provisioning<br />

Access<br />

Management<br />

The identity repository is, essentially, a directory <strong>of</strong> everyone known to the<br />

enterprise who may have access to information, a cultural artifact if ever there<br />

was one. Provisioning associates people with resources, and access management<br />

enforces those entitlements (and restrictions) at the time <strong>of</strong> access. However, the<br />

most important element, from a cultural perspective, is the authoritative source.<br />

It is metadata, information about information, that states who should have access<br />

to what. A management structure is implicit when it has the authority to make<br />

those determinations and, by extension, to exclude everyone everywhere who is<br />

not included.<br />

The point <strong>of</strong> the previous example is that there are technologies that have cultural<br />

impact on security. In implementing technical tools, enterprises come face to face<br />

with the fact that they need to tailor their cultures, security being not the least<br />

aspect, to work effectively with their technologies. At the same time, technical tools<br />

become instruments for the development <strong>of</strong> a security culture.<br />

6.4.1 An Architecture for a <strong>Security</strong> <strong>Culture</strong><br />

It is possible to use automation to support a security culture through the use <strong>of</strong> tools<br />

that enable management to understand and control the interaction among people,<br />

processes and technology that constitute a corporate culture. 14 The tools (or more<br />

properly, a tool kit) have a logical architecture with three major layers:<br />

• Repository—Serves as the system <strong>of</strong> record<br />

• Business logic—Manages the execution <strong>of</strong> the processes and analytics<br />

• Presentation—Provides the views, dashboards and interfaces to management<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .<br />

Applications and Data


6.0 PoSitive reinforCement<br />

Repository Layer<br />

The repository is more than just a data warehouse <strong>of</strong> laws and regulations. It<br />

consists <strong>of</strong> components that interact in such a way as to provide the raw data that<br />

need to be acted on by the business logic to make a culture comprehensible. Tools<br />

that make up the repository include:<br />

• Databases <strong>of</strong> relevant information about the enterprise, including the management<br />

structure, identity management, infrastructure and applications, location and use<br />

<strong>of</strong> information, and networks<br />

• A compliance requirements database that contains the complete range <strong>of</strong> laws,<br />

regulations, policies, standards, guidelines and directives to which an enterprise<br />

is subject. There must be a normalizing structure to enable users to learn about all<br />

the requirements for access control, identification, recoverability, etc.<br />

• A database <strong>of</strong> cultural documents, closely linked (perhaps the same as) the<br />

compliance requirements database, containing the actual language (translated<br />

as necessary) <strong>of</strong> the policies, standards, guidelines, management dictates, laws,<br />

regulations, etc.<br />

• A policy interface that harmonizes naming standards, control processes, metadata,<br />

technology elements, etc. This interface is needed to apply all the other information<br />

in the repository to a given matter at hand: making all the pieces and parts <strong>of</strong> an<br />

enterprise and its technology fit together in a manner that supports a security culture.<br />

Business Logic Layer<br />

Where the components <strong>of</strong> the repository are data stores, those <strong>of</strong> business logic are,<br />

naturally enough, application programs. These constitute the engine that figures out<br />

what a security culture is and, instance by instance, determines whether it has been<br />

achieved. They include:<br />

• A workflow management tool that organizes the sequence <strong>of</strong> cultural actions.<br />

It directs and escalates the activities that occur from the time a requirement is<br />

recognized until it is either satisfied or a decision is taken not to accede to it. It is<br />

also the mechanism for tracking notifications, alerts and incomplete work items.<br />

• A self-assessment tool that provides an interface that enables management<br />

to input parameters and receive back a report <strong>of</strong> the state <strong>of</strong> the culture. The<br />

tool should be able to evaluate individual aspects <strong>of</strong> a culture (e.g., security<br />

accountability, rewards, budgets) or the strength <strong>of</strong> security within an entire<br />

corporate culture. It has to be driven by a rules-based engine and applied against<br />

all the data in the repository.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 107


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

Presentation Layer<br />

As it may be deduced from what has been said previously, it is no easy task to put<br />

together all these components in a way that can be readily used by people. The data<br />

generated by the business logic have to be interpreted and digested to a level that<br />

makes appropriate actions clear and measures whether those actions have been or<br />

are being taken in a timely fashion. The presentation layer has two components:<br />

• A portal to enable users to navigate through all the data, services and reports<br />

<strong>of</strong>fered by the foregoing components. This portal should also have connections<br />

to related systems such as configuration management, access control and identity<br />

management.<br />

• A dashboard that will enable managers at all levels to monitor the security culture.<br />

It should facilitate ad hoc queries and reporting.<br />

The cultural tool kit described does not stand alone. It needs to fit within the<br />

process, enterprise and governance addressed previously. The set <strong>of</strong> tools that<br />

is needed in one industry is not necessarily the same as those for others.<br />

Manufacturing companies, for example, may be more concerned with personnel<br />

safety than would be banks, which, in turn, may be more focused on uninterrupted<br />

availability <strong>of</strong> IT systems. Just as surely as there is a body <strong>of</strong> law and regulation in<br />

each industry around these issues, there is a broader set <strong>of</strong> attributes (see section<br />

5.3) that should be the lens through which management views its security culture.<br />

As with any set <strong>of</strong> tools, the quality <strong>of</strong> use is more important than the quality <strong>of</strong> the<br />

tools themselves. The uses <strong>of</strong> automated tools are limited only by the imagination<br />

<strong>of</strong> the user, but these can be categorized in such a way as to lead to effective growth<br />

<strong>of</strong> a security culture:<br />

• Managing a culture begins with recognizing that a culture exists. This requires<br />

identification and documentation in the repository <strong>of</strong> all the attributes <strong>of</strong> a security<br />

culture. It also implicitly requires that missing elements be identified and filled<br />

in over time. This requires local personnel to recognize new and altered attributes<br />

and requirements and enter them into the repository. Logging the entry should<br />

initiate a workflow <strong>of</strong> evaluation, prioritization and assignment <strong>of</strong> responsibility.<br />

• A cultural tool kit consists <strong>of</strong> more than programs and databases that labor to fix<br />

things that no one recognizes as broken. When done correctly, the tool kit can<br />

be used to reinforce the assimilation <strong>of</strong> the culture <strong>of</strong> the enterprise through the<br />

details <strong>of</strong> security in system development, configuration management, datacenter<br />

operations, vital records management and other aspects <strong>of</strong> using information.<br />

This programmatic aspect <strong>of</strong> a culture <strong>of</strong> security is a reflection <strong>of</strong> enterprise and<br />

governance as recognized through the evidence it leaves behind.<br />

• Finally, a security culture is not an objective unto itself, but the inclusion <strong>of</strong> attitudes<br />

and behaviors into the full array <strong>of</strong> day-to-day activities that make up a business.<br />

The tool kit makes it possible to scan, monitor, anticipate, respond and learn over<br />

time. It should be obvious that a cultural tool kit can be used to make an enterprise<br />

more in tune with its internal and external obligations, but not all at once.<br />

108<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


6.0 PoSitive reinforCement<br />

This is a generic description <strong>of</strong> s<strong>of</strong>tware that is <strong>of</strong>ten labeled as governance, risk and<br />

compliance (GRC). GRC itself is not a security culture, but it is impossible to have<br />

a functioning culture <strong>of</strong> security if GRC is not managed. As a general statement, the<br />

vendors <strong>of</strong> commercial GRC s<strong>of</strong>tware products do not emphasize the cultural aspects<br />

<strong>of</strong> what they are selling. However, their products cannot be implemented without<br />

considering their cultural implications and an enterprise’s security culture can be<br />

ratcheted up by using such tools.<br />

6.5 Stakeholder Feedback<br />

Former New York (USA) mayor Ed Koch was famous for asking “How am I<br />

doing?” <strong>of</strong> every citizen he encountered. As an elected <strong>of</strong>ficial, responsible to the<br />

people <strong>of</strong> the city, it was appropriate for him to ask such a question. So, too, this<br />

question may be asked <strong>of</strong> those who would support a security culture. Interestingly,<br />

it is not clear who should ask and who should answer. There are cultural and<br />

political ramifications in both the query and the response.<br />

In every enterprise, as previously stated, a security culture exists whether or not<br />

it is an intentional one. However weak or strong it may be, it does not belong to<br />

anyone. The champions may drive it, the CISO may define it and the auditor may<br />

enforce it, but it is not theirs. It “belongs”—if that is the right word—to everyone<br />

in the enterprise who participates in it. Thus, to ask, “How am I doing?” is to<br />

inherently admit that a culture exists, that the questioner feels a part <strong>of</strong> it and that<br />

reinforcement is being sought about what is being done.<br />

The question demands an answer. Internal auditors and, to a lesser extent, security<br />

pr<strong>of</strong>essionals are empowered to answer, but the best that they can do with regard<br />

to culture is observe and comment on patterns <strong>of</strong> behavior. Unless they are mind<br />

readers, they have no ability to determine the beliefs, assumptions and attitudes <strong>of</strong><br />

others. Yet, a state <strong>of</strong> mind can be read through what people say, how they say it, to<br />

whom they say it, under what circumstances they say it, and at what potential cost<br />

in influence and respect it is said. In short, if a person wants an answer to “How am<br />

I doing?” with regard to a security culture, that person should not only act securely,<br />

but speak up about it.<br />

“How am I doing?” is a very different question from “How are we doing?” The latter<br />

is a question that should be asked foremost by boards <strong>of</strong> directors, which have a<br />

fiduciary interest in the security <strong>of</strong> the enterprises they serve. They should, and <strong>of</strong>ten<br />

do, inquire about the state <strong>of</strong> security, but less <strong>of</strong>ten about how security is viewed,<br />

spoken <strong>of</strong> and acculturated. In one industry in one country, the responsibility is<br />

clearly stated: “Information security should be supported throughout the institution,<br />

including the board <strong>of</strong> directors, senior management, information security <strong>of</strong>ficers,<br />

employees, auditors, service providers and contractors.” 15 All <strong>of</strong> these people should<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 109


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

have a firm grasp <strong>of</strong> what the stakeholders are doing with regard to security and<br />

should attempt to impute intent from actions.<br />

Stakeholder feedback should be sought out, but in a culture in which all are<br />

participants, who is not a stakeholder? Reactions should be sought from the<br />

ultimate stakeholders, the customers (or the citizenry, in the case <strong>of</strong> a public sector<br />

enterprise). There is some information that is purely proprietary to an enterprise,<br />

such as strategic plans, financial reports and product evaluations, but a great deal <strong>of</strong><br />

information in every business is actually someone else’s orders, records, personal<br />

data, medical history, literary preferences, travel plans, etc. The people in question<br />

have a very real stake in the security <strong>of</strong> their information and the way in which it is<br />

used by the people in enterprises that have been provided that information. Today,<br />

many enterprises are seeking assurance on security and recoverability from their<br />

vendors, and the nature <strong>of</strong> their questions should, in part, inform their own security<br />

culture and those <strong>of</strong> the respondents. However, senior managers, especially those<br />

who elect to be champions <strong>of</strong> a security culture, should be asking their business<br />

partners, “How are we doing?” <strong>Security</strong> should be a part <strong>of</strong> the question.<br />

Endnotes<br />

1 “Business: Concerning Morgan,” Time Magazine, USA, 21 March 1927,<br />

www.time.com/time/magazine/article/0,9171,730161,00.html<br />

2 The American sociologist and senator Daniel Patrick Moynihan said, “Everyone is<br />

entitled to his own opinion but not his own facts.”<br />

3 Willie “The Actor” Sutton was a small-time American bank robber. He was not<br />

very good at his trade and kept getting caught. When he was asked why he kept<br />

robbing banks, he replied “Because that’s where the money is.” See US Federal<br />

Bureau <strong>of</strong> Investigation, www.fbi.gov/libref/historic/famcases/sutton/sutton.htm.<br />

4 Johnson, M. Eric; Eric Goetz; Shari Lawrence Pfleeger; “<strong>Security</strong> Through<br />

Information Risk Management,” Dartmouth College, USA, http://mba.tuck.<br />

dartmouth.edu/digital/Research/ResearchProjects/JohnsonRiskManagement_<br />

Finald.pdf<br />

5 This was precisely what occurred in the massive fraud that brought down the<br />

Barings banking firm in 1995. (See “Bank <strong>of</strong> England Cites Fraud in Barings<br />

Collapse,” New York Times, USA, 19 July 1995). The same thing is alleged in the<br />

case at Societé Generale in 2008.<br />

6 Burns, Robert; “To a Louse,” Scotland, 1786, the actual line is “Oh would some<br />

power the giftie gie us, to see ourselves as others see us.”<br />

7 “Disk Storage Systems Market Rebounds to Double-Digit Growth Across All<br />

Segments in First Quarter, According to IDC,” Press release, 4 June 2010,<br />

www.idc.com/about/viewpressrelease.jsp?containerId=prUS22368310&sectionId=<br />

null&elementId=null&pageType=SYNOPSIS<br />

8 Ross, Steven; “Data Plumbing,” ISACA Journal, vol. 6, USA, 2009<br />

110<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


6.0 PoSitive reinforCement<br />

9 ISACA, An Introduction to BMIS, op.cit., p. 13<br />

10 Ross, Steven; “Converging Need, Diverging Response,” Information Systems<br />

Control Journal, vol. 2, USA, 2006<br />

11 ISACA, An Introduction to BMIS, op.cit., p. 13<br />

12 Health Insurance Portability and Accountability Act (US), § 164.312(a) (2) (i)<br />

13 Ross, Steven; “Identity Architecture,” Information Systems Control Journal,<br />

vol. 3, USA, 2004<br />

14 Much <strong>of</strong> the material in this section is adapted from Ross, Steven; “Automating<br />

Compliance,” Information Systems Control Journal, vol. 5, USA, 2007.<br />

15 US Federal Financial Information Examination Council (FFIEC), “Information<br />

<strong>Security</strong>,” USA, July 2006, www.ffiec.gov/ffiecinfobase/booklets/information_<br />

security/01_security_process.htm<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 111


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

112<br />

Page intentionally left blank<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


7.0 negative reinforCement<br />

7.0 negAtIve ReInfoRCement<br />

The fact that information seems secure does not necessarily indicate that there<br />

is a functioning culture <strong>of</strong> security, but it is clear that where security is lacking,<br />

the security culture is lax, ineffective and counterproductive. If people within<br />

an enterprise (and outside, for that matter) have access to information that they<br />

have no business using, leave the <strong>of</strong>fice with proprietary data, routinely disclose<br />

personal information and commit other information sins, then the security culture<br />

is a negative, harmful one. It is a clear indication that no one in the enterprise’s<br />

leadership has any intention <strong>of</strong> strengthening the culture, either. In this sort <strong>of</strong><br />

enterprise, a champion must arise to recognize the risks and to take active measures<br />

to reverse course. (See section 5.)<br />

Known shortcomings in security, at the level <strong>of</strong> either specific safeguards or<br />

the program as a whole, must be remediated. If there is evidence <strong>of</strong> intentional<br />

disregard <strong>of</strong> security provisions, management must take action. Where there is<br />

malicious intent (e.g., fraud, sabotage) almost all enterprises will terminate the<br />

individual involved and will (or should) instigate criminal prosecution. This goes<br />

well beyond what may be described as negative reinforcement <strong>of</strong> a security culture;<br />

they are matters <strong>of</strong> prudence and common sense.<br />

From the cultural perspective, there is a need to eliminate attitudes and behaviors<br />

that are harmful to security. It is easier to manage actions than thoughts, and if all<br />

people always acted in a secure manner, no matter what they thought, the issue<br />

<strong>of</strong> the culture would be moot. However, that is not human nature; the thought<br />

instigates the deed. Both need to be addressed, and a security culture must be<br />

advanced by counteracting insecurity in both word and action. At some point,<br />

negative reinforcement involves discipline, but that cannot be the only basis <strong>of</strong><br />

an effective security culture. This simply reinforces the perception <strong>of</strong> security as<br />

a negative force. Rather, just as positive reinforcement consists <strong>of</strong> management<br />

practices to promote desired attitudes and ways <strong>of</strong> doing things, negative<br />

reinforcement entails prevention <strong>of</strong> unwanted behaviors and thinking.<br />

It is significant to remember the distinction between policy and culture. What<br />

management intends an enterprise to do is stated in policy; what it actually does is<br />

its culture. The objective <strong>of</strong> management reinforcement, both positive and negative,<br />

is to bring the two into alignment. All those involved in fostering a culture <strong>of</strong><br />

security, from senior management to the most concerned staff member, should<br />

take part in both accentuating the positive and eliminating the negative. It must be<br />

recognized that positive reinforcement is easier. Most managers would prefer to<br />

commend secure behavior rather than reprimand the opposite, but they know that<br />

both praise and punishment are parts <strong>of</strong> the job.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 113


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

It is important to note that all managers need to be involved, not just a CISO. It is<br />

tempting to use security pr<strong>of</strong>essionals to frighten people into surly submission to<br />

security requirements. In the long run, though, it undermines a security culture, as<br />

noted previously, and no security pr<strong>of</strong>essional should accept that role. Culturally,<br />

it is quite different to say that people should behave securely so as not to run<br />

afoul <strong>of</strong> the information security department as opposed to doing so because it is<br />

management’s expectation—a part <strong>of</strong> their jobs. This is the difference between<br />

functional and intentional security, as described in section 5.2.<br />

7.1 Perverse Incentives<br />

Perverse incentives are “measures that have unintended and undesirable effects which<br />

go against the interest <strong>of</strong> the incentive makers. They become counterproductive in the<br />

end.” 1 It is not unusual to read about, or even experience, this sort <strong>of</strong> conundrum, but<br />

in security, as in many other endeavors, the possibility <strong>of</strong> an action having an equal<br />

and opposite—but very much undesired—reaction is an ever-present possibility.<br />

Humans being human, these things will occur; it is up to those who manage within a<br />

security culture to be sensitive to the occurrence <strong>of</strong> such incentives and to stamp them<br />

out when they occur.<br />

The most common example <strong>of</strong> a perverse security incentive deals with passwords.<br />

In many instances, enterprises attempt to make passwords “tougher” by making<br />

them longer. It is not unusual to see a system-enforced requirement for passwords<br />

to be eight characters long. 2 So-called “hard” passwords also may call for<br />

capitalized letters, special characters and numerals. However, research has shown<br />

that such conglomerations <strong>of</strong> digits, letters and symbols are very difficult to<br />

remember, so people write the passwords down and sometimes post them near their<br />

workspaces so that they will not be locked out and have to call a help desk, which<br />

incurs both lost productivity and a cost for a password reset. 3 The very purpose<br />

<strong>of</strong> passwords, to authenticate user identities, is, thus, completely undermined by<br />

attempts to enhance them.<br />

This has the destructive cultural effect <strong>of</strong> encouraging people to act in a manner that<br />

is clearly beneficial to themselves (i.e., higher productivity), directly at the expense<br />

<strong>of</strong> security. Saying one thing while doing another does create a way <strong>of</strong> doing things,<br />

but that pattern is the exact opposite <strong>of</strong> what the basis for a security culture may be.<br />

Most parents know the “do as I say, not as I do” trap. This makes it especially<br />

important that management at all levels in an enterprise avoids the temptation to<br />

bypass security measures for its own convenience. In many, if not all, enterprises,<br />

there is already a cultural divide between management and staff. Demonstrating that<br />

security is for the “little people” while the leadership can ignore it without penalty<br />

114<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


7.0 negative reinforCement<br />

sends a defeatist message about that enterprise’s culture <strong>of</strong> security. The necessary<br />

negative reinforcement is to hold executives to the highest standards <strong>of</strong> compliance.<br />

In particular, security pr<strong>of</strong>essionals should never bypass security. 4<br />

Bruce Schneier, the noted information security specialist, has addressed the topic <strong>of</strong><br />

perverse incentives:<br />

I regularly see security decisions that … seem to make absolutely no<br />

sense. However, in every case, the decisions actually make perfect sense<br />

once you understand the underlying incentives driving the decision.<br />

All security decisions are trade-<strong>of</strong>fs, but the motivations behind<br />

them are not always obvious: They’re <strong>of</strong>ten subjective, and driven<br />

by external incentives. And <strong>of</strong>ten security trade-<strong>of</strong>fs are made for<br />

nonsecurity reasons. 5<br />

To avoid creating perverse incentives, managers should look at security demands<br />

in a broad context. If, using the previous example, an enterprise wishes to<br />

strengthen its passwords, it should consider the balance between seemingly better<br />

authenticators and the potential for misusing them. When, in practice, passwords<br />

are written down and left visible, the initial objective is proved faulty and should<br />

be revised. In some cases, notably in Italian law, 6 strong passwords <strong>of</strong> eight diverse<br />

characters are an external requirement. Where that is the case, special care must<br />

be taken to recognize the force <strong>of</strong> law, but also to counsel all personnel on the<br />

importance <strong>of</strong> keeping their passwords safe.<br />

7.2 Vigilance<br />

US president and revolutionary patriot Thomas Jefferson said, “The price <strong>of</strong> freedom<br />

is eternal vigilance.” Although an enterprise’s security culture is important, it cannot<br />

be compared with the concept <strong>of</strong> freedom, but vigilance is the price <strong>of</strong> both. Not<br />

only do enterprises need to watch for shortcomings in security itself, but they must<br />

also constantly observe themselves and look for signs <strong>of</strong> reversion in the culture.<br />

As difficult as it is to strengthen a security culture, it is all too easy to backslide and<br />

return to old, bad habits for all the reasons expressed in section 4 and more.<br />

7.2.1 What to Watch<br />

For what should enterprises look, and who should do the looking? At one level,<br />

they must monitor security-related activities such as identification, authentication,<br />

attempted virus attacks, data leakage and the like, but they must also be on the<br />

lookout for any diminution in the culture. There is no such thing as a “perfect”<br />

security culture; conditions change, personnel change, and there are always<br />

strengths and weaknesses. Each weakness has the potential to undermine security as<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 115


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

a whole while, at the same time, being an opportunity for improved management.<br />

Unfortunately, cultural weaknesses are rarely self-correcting. It is impossible<br />

to break out <strong>of</strong> a downward slide without deliberate management attention. An<br />

enterprise with an intentional security culture must constantly manage it. 7<br />

The first things for which to look are those that an enterprise does not have:<br />

a dedicated information security function, security policies and standards,<br />

enforcement mechanisms, automated security safeguards, or tight access controls.<br />

(Of course, if these do not exist, it is difficult to substantiate the claim that an<br />

intentional security culture exists at all.) Assuming that these are present, a leading<br />

indicator <strong>of</strong> cultural weakness is the number <strong>of</strong> disputes concerning security that<br />

must be resolved by senior management. If each new initiative, system or product<br />

causes a confrontation between security pr<strong>of</strong>essionals and business leaders, there is<br />

clearly something amiss.<br />

The matter <strong>of</strong> balance comes into play. CISOs are not always right, but they are<br />

not always wrong, either. If the majority <strong>of</strong> disagreements are settled in favor <strong>of</strong><br />

greater security, it signifies that greater awareness and training are required in<br />

certain business areas. Training should not be seen as negative reinforcement, but<br />

when it is remedial training, it clearly has a negative impact. However, if senior<br />

management regularly overrides security, then perhaps the security pr<strong>of</strong>essionals<br />

have lost sight <strong>of</strong> the overall business objectives, are out <strong>of</strong> step with management’s<br />

directions, or have simply lost balance and underestimated the enterprise’s risk<br />

appetite. Here the negative reinforcement is much more direct; always being<br />

overruled generally leads away from compensation; promotion; influence; and,<br />

ultimately, employment.<br />

A security culture may be weak if there are constant disagreements between<br />

information security and the business. Perversely, there may be a problem if there are<br />

no disagreements, either. If nothing reaches the ears <strong>of</strong> senior management, it is likely<br />

that the information security function is getting along by going along. There is little<br />

value to a guard dog who sleeps through break-ins, and there is little purpose to a<br />

security function that permits every requested deviation from security requirements.<br />

Much more difficult to deal with, but perhaps more insidious, are casual<br />

conversations that downplay the importance <strong>of</strong> security. If people discuss<br />

information concerning a customer, client or patient in a public space, they are not<br />

only violating implicit policy, but they are undermining the enterprise’s security<br />

culture. If they carry home sensitive information on a CD-ROM or thumb drive,<br />

they are not only leaking data, but diminishing the culture <strong>of</strong> security. When<br />

someone shares a password, the security culture suffers. As bad as these sorts<br />

<strong>of</strong> activities are, from a cultural perspective, it is even worse when someone—<br />

especially a manager—approves such behavior.<br />

116<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


7.0 negative reinforCement<br />

This sabotage <strong>of</strong> a security culture can be stopped, but only if managers and<br />

colleagues are vigilant about doing so. It may seem difficult for an enterprise to<br />

stop such attitudes and actions, but in recent years, it has been done with regard to<br />

differences in race, gender and sexual orientation. Through training; admonition;<br />

and, above all else, negative reinforcement, cultures around the world have<br />

changed. If unacceptable behavior and speech have not been eliminated, they have<br />

been reduced. If enterprise cultures have been transformed with regard to long-held<br />

prejudices, changing minds about security should be even easier.<br />

7.2.2 Who Should Watch<br />

Internal auditors can and should be among the first line <strong>of</strong> vigilance with regard<br />

to a culture <strong>of</strong> security. They are, after all, paid and trained observers. Their<br />

focus is generally on the enterprise system <strong>of</strong> internal control. While, in the<br />

accounting literature, culture is not defined as a part <strong>of</strong> that system, BMIS does<br />

tie an intentional security culture to business “objectives, operating and regulatory<br />

environment, potential threats, risk impacts, operational flexibility, and resilience.” 8<br />

It can hardly be argued that regulations, threats, risks and resilience are not a part <strong>of</strong><br />

a system <strong>of</strong> internal controls, so it follows that auditors should be paying attention<br />

to the enterprise security culture.<br />

It would be extremely difficult to conduct an audit <strong>of</strong> a culture, but it is not as<br />

hard to “take the temperature” <strong>of</strong> the culture using the audits <strong>of</strong> an enterprise’s<br />

departments and information systems. Auditors may question the considerations<br />

<strong>of</strong> security in business processes and systems. They may examine the quality<br />

<strong>of</strong> security safeguards. They may even ask the information security department<br />

about its experience with the department or system. Most important, they should<br />

determine the actions management has taken when security-related problems have<br />

been noted. These should not include only major security matters such as frauds;<br />

management already knows about the reaction to those. What is indicative <strong>of</strong> a<br />

security culture is how departmental management reacts to taking data home,<br />

leaving information on desktops and sharing passwords and to the myriad “little”<br />

security breaches. The auditor’s overall impressions, certainly supported by factual<br />

evidence, should be reported to senior management. Many see audit comments as<br />

a form <strong>of</strong> negative reinforcement. If so, negative reinforcement <strong>of</strong> this sort should<br />

help strengthen a security culture.<br />

At a different level, it is up to every manager to be watchful about a culture <strong>of</strong><br />

security. Idle talk <strong>of</strong> theft, fraud or discrimination should not be tolerated, and<br />

hallway conversations that demean management’s insistence on security should not<br />

go unchallenged. Colleagues should have the same attitude. In this case, security<br />

(culture) really is everyone’s job.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 117


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

What should people do if local management is openly unsupportive <strong>of</strong> security, or<br />

worse, if they are asked by management to do something in violation <strong>of</strong> security<br />

policy? It is easy, in the abstract, to say that anyone in that situation should refuse,<br />

report the manager upward and blow the whistle. Negative reinforcement may<br />

come down very quickly; unfortunately, it may come down on the person who says<br />

refuses. That person also has a form <strong>of</strong> reinforcement. Being put in such a situation<br />

is grounds for considering alternate employment.<br />

7.3 Automated Detection<br />

If poor security is indicative <strong>of</strong> a poor security culture, then security failures are<br />

leading indicators. These would not be outright security breaches, but all the little<br />

(and some not so little) deficiencies in security that, if left uncorrected, may result<br />

in a true breach over time. For example, an incorrectly entered password means<br />

nothing by itself, but with a culture defined, in part, as a pattern <strong>of</strong> behavior, then<br />

a pattern <strong>of</strong> incorrectly entered passwords may mean that a culture <strong>of</strong> security has<br />

failed to reach into some part <strong>of</strong> an enterprise. The same may be said <strong>of</strong> standards<br />

violations, unapplied patches, sensitive papers left on desktops and ill-considered<br />

conversations in public places. At the very least, these show that someone was not<br />

paying attention at the awareness sessions. At worst, such patterns may indicate a<br />

deliberate ignorance <strong>of</strong> security requirements.<br />

Automated monitoring tools can be employed to monitor the health <strong>of</strong> a security<br />

culture and to take corrective action where required. Of course, these s<strong>of</strong>tware<br />

products only monitor the use <strong>of</strong> electronic information, but that covers a lot. Access<br />

control and intrusion detection systems, for instance, generally provide reports on<br />

failed access attempts, privileged user access, access attempts outside normal business<br />

hours, attempted rule violations and other indicators <strong>of</strong> security-related activity.<br />

In some cases, these reports and shorter-term alarms signify an attempted external<br />

attack. While important, they are not necessarily relevant to a security culture, but in<br />

other instances, they may show that there are certain organizational units that have a<br />

disproportionally large percentage <strong>of</strong> the identified problems.<br />

In monitoring the reports, it is possible to apply the “systems thinking” approach as<br />

described in BMIS to detect areas in which deficiencies in management oversight,<br />

training, staffing or communications are leading to cultural weakness. At the very<br />

least, concentrations <strong>of</strong> security-related problems should call for further investigation.<br />

If one looks solely at the safety <strong>of</strong> the information involved, monitoring reports can<br />

be misleading; after all, if invalid access attempts failed, then the information in<br />

question is unharmed. However, these may also demonstrate causes and inclinations<br />

that are tied more to weaknesses in a culture than in a set <strong>of</strong> safeguards.<br />

118<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


7.0 negative reinforCement<br />

If the root cause proves to be ineffective training, then the security education<br />

program can be enhanced. If certain individuals are ignoring or bypassing<br />

security, they should be shown the possible repercussions <strong>of</strong> their actions and be<br />

reprimanded. If it is management that is at fault, then deliberate reinforcement<br />

<strong>of</strong> the tenets <strong>of</strong> security should be made. Moreover, managers must be shown<br />

the correlation between the so-called “silly” requirements <strong>of</strong> security and an<br />

enterprise’s overall risk pr<strong>of</strong>ile.<br />

7.4 Alerts, Alarms and Triggers<br />

While automated tools can assist in the vigilance required to maintain an effective<br />

security culture, there is more to it than reviewing computer-generated reports.<br />

Management 9 at all levels must be attuned to the possibilities for weakening the<br />

culture and be prepared to take appropriate action. To do so, managers need to be<br />

aware <strong>of</strong> the indicators <strong>of</strong> backsliding. Some should raise concern, others should<br />

instigate corrective action and still others should be a routine part <strong>of</strong> assuring that a<br />

culture <strong>of</strong> security remains strong.<br />

At a certain level, a security culture is a system (a management system, to be sure)<br />

that processes inputs and maintains itself. (See section 2.2.5.) Thus, the system<br />

itself should contain mechanisms to alert management if there are problems, signal<br />

the need for immediate action and provide maintenance routines. Viewed in this<br />

manner, a culture <strong>of</strong> security may be thought <strong>of</strong> as self-sustaining. This would be<br />

erroneous: A culture may be a system, but it is not a machine. It requires constant<br />

attention from its participants—senior managers, champions, middle management<br />

and staff.<br />

7.4.1 Alerts<br />

Audit comments on a security culture are an effective means to keep management’s<br />

level <strong>of</strong> awareness <strong>of</strong> the culture high, but audits are periodic affairs and occur only<br />

after the fact. There should be indicators produced within a culture that can show<br />

management where trouble spots may be arising and what to do about them before<br />

they become troublesome. One means <strong>of</strong> doing so would be a “dashboard” related<br />

to a security culture. (See section 6.4.1). The concept <strong>of</strong> a dashboard relates to that<br />

<strong>of</strong> key performance indicators (KPIs). These are quantifiable measurements that can<br />

be traced over time to show progress or regression.<br />

When key performance indicators are properly developed and<br />

implemented, they should provide employees specific roles and<br />

responsibilities, clear goals and objectives, and outline how they<br />

contribute to the overall success <strong>of</strong> the company. Key performance<br />

indicators can strengthen the organizational culture [emphasis added]<br />

<strong>of</strong> a business through common goals and shared values. 10<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 119


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

What, then, are those goals and values that can be measured quantitatively?<br />

The simplest is an enumeration <strong>of</strong> the major projects and initiatives occurring in<br />

an enterprise that highlight the involvement <strong>of</strong> the information security function<br />

in them. (In fairness, the information security function may not be the only one<br />

whose participation should be measured. The time and effort <strong>of</strong> functions such<br />

as risk management and internal audit should be tracked as well, but information<br />

security’s functions are the surest to be security-related.) It is not necessary that<br />

there be a quota for security pr<strong>of</strong>essional involvement. The important measurements<br />

are whether that participation occurs at all and whether it is sufficient to provide<br />

more than token input. One does not need a quota to recognize that just a few<br />

hours <strong>of</strong> information security’s time on a multimillion dollar, euro, yen, ruble, etc.,<br />

information system development is insufficient. Also important is the timing <strong>of</strong> that<br />

involvement; as a general rule, it may be said that earlier is better.<br />

In figure 8, management should be able to discern that there is insufficient<br />

contribution by information security in projects 2 and 5, regardless <strong>of</strong> the nature<br />

<strong>of</strong> the projects. In project 2, there seems to be consideration <strong>of</strong> security only at the<br />

end <strong>of</strong> the project, when it would be very difficult to effect changes, if required.<br />

In project 5, there has been no information security participation at all, nor is any<br />

planned. The consideration given to security, as evidenced by the involvement <strong>of</strong><br />

security pr<strong>of</strong>essionals, is clearly greater in the other projects, but out <strong>of</strong> context,<br />

it cannot be discerned whether this is appropriate. If, for example, project 6 is the<br />

establishment <strong>of</strong> an encryption scheme, then information security should be even<br />

more involved than it is. With a dashboard such as this, management can be alerted<br />

to the necessity <strong>of</strong> possible corrective action. The very existence <strong>of</strong> such cultural<br />

reporting is negative reinforcement <strong>of</strong> a security culture.<br />

Other dashboards may show the incidence <strong>of</strong> security-related incidents in production<br />

systems, the number <strong>of</strong> guest accesses to areas with highly sensitive information (e.g.,<br />

patient records, contract files), and revisions to disaster recovery plans following<br />

tests and actual incidents. While any one report may alert management to a potential<br />

problem, as in the previous example, it is the accumulation <strong>of</strong> information over time<br />

that is the most enlightening in terms <strong>of</strong> maintaining a security culture. Analysis <strong>of</strong><br />

these dashboards will show trends and identify potential trouble spots in terms <strong>of</strong><br />

certain departments or types <strong>of</strong> projects or information. (Note: The implication is<br />

that dashboards should be graphic in nature. This is not necessarily true, and in some<br />

cases, information on a culture <strong>of</strong> security may be better conveyed in a table or in<br />

words. However, graphic representations are generally the most powerful.)<br />

120<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


Project 1<br />

Project 2<br />

Project 3<br />

Project 4<br />

Project 5<br />

Project 6<br />

7.0 Negative ReiNfoRcemeNt<br />

Figure 8—Sample Information <strong>Security</strong> Involvement Dashboard<br />

January<br />

June December<br />

Percent <strong>of</strong> Project complete Percent <strong>of</strong> Project incomplete<br />

Information security involvement Planned information security involvement<br />

7.4.2 Alarms<br />

In some cases, action must be taken at once to correct a growing problem. The<br />

clearest case is the existence <strong>of</strong> actual security violations. These should be tracked<br />

and reported to determine whether there is a pattern to the attacks and inappropriate<br />

actions. Combating actual security weakness is the objective <strong>of</strong> an information<br />

security function, but by itself, is not a cultural KPI. A measure <strong>of</strong> a security<br />

culture would be the budget in terms <strong>of</strong> staff time and capital outlay to eliminate<br />

a weakness once it is exposed and the time taken between an alarm and the<br />

corresponding response.<br />

Another sort <strong>of</strong> alarm that is a KPI <strong>of</strong> a security culture is the disputed requirements<br />

for security that are elevated to a senior level (see section 7.2), in which cases,<br />

management must actually make security-related decisions. A dispute in and <strong>of</strong><br />

itself means little, but there are several matters to be aware <strong>of</strong>: how <strong>of</strong>ten these<br />

disputes occur, from where they stem and how difficult it is to resolve them. If<br />

nearly every project results in management intervention, then it is indicative <strong>of</strong><br />

problems, not only with the process for resolution, but in the culture itself. A<br />

different story is told if disagreements arise routinely in certain sectors and not<br />

in others or if disagreements regularly occur with the same type <strong>of</strong> information<br />

(research, financials, personnel records, etc.). These should be alarms for<br />

management to take a closer look at certain policies and people regarding those<br />

sorts <strong>of</strong> information.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 121


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

Disputes should be difficult to resolve. The fact <strong>of</strong> disagreement means that<br />

honorable people have looked at the same facts and come to different conclusions,<br />

necessitating senior-level resolution. If problems are cleared quickly and easily,<br />

it indicates stubborn resistance on one part or another. If it is always the same<br />

person or function exhibiting that obstinacy, it is a clear signal to management that<br />

something must be done, not only to prevent recurrence, but to shore up its culture<br />

<strong>of</strong> security.<br />

7.4.3 Triggers<br />

There are planned and unplanned cultural triggers that necessitate management<br />

action. The former are generally associated with the passage <strong>of</strong> time. For example,<br />

management should consider an assessment <strong>of</strong> an enterprise’s security culture on<br />

a regular basis, perhaps every few years (more or less dependent on the overall<br />

corporate culture and the sensitivity <strong>of</strong> the information involved). This implies that<br />

management is aware <strong>of</strong> a culture <strong>of</strong> security, recognizes its importance and supports<br />

maintaining it at a high level. Where that is not the case, some party (i.e., information<br />

security, the security champion, internal audit) may perform such an assessment<br />

on its own, presenting the results to management and, one would hope, triggering<br />

both further analysis and, ultimately, decisive action. A formal assessment is not a<br />

necessity for creating an intentional culture <strong>of</strong> security (see section 5), but depending<br />

on its findings, it may provide a badly needed “wake-up call.”<br />

It may be more valuable to initiate a security culture assessment on more than a<br />

regularly scheduled basis if it appears that a culture is slipping. There is a<br />

dangerous period between management’s support for a security culture and the time<br />

it becomes ingrained in an enterprise. Performing a study to see how well a culture<br />

<strong>of</strong> security is taking root may trigger corrective action by management if it is not<br />

moving smoothly or rapidly enough.<br />

The most important unplanned trigger is a pattern <strong>of</strong> weakness in a culture <strong>of</strong><br />

security that management sees, but does not understand. Individually, the<br />

weaknesses may be anomalies, but if the same problems keep recurring, always<br />

stem from the same sources or result in unacceptable losses, there is usually some<br />

underlying cause leading to those problems. Further analysis may be required. As<br />

a general term, this is referred to as “root cause analysis.” The cause <strong>of</strong> a cultural<br />

weakness may be a lack <strong>of</strong> training, management oversight, communication, or staff<br />

energy. On the other hand, the cause may be systemic or technological, the end<br />

result <strong>of</strong> what are actually a deep-rooted series <strong>of</strong> problems that come to light only<br />

when an end result is observed.<br />

Not every issue is a momentous problem; many are simply the result <strong>of</strong> one-time<br />

human error. These are easily corrected. The first step is to determine which<br />

anomalies are triggers for root cause analysis. The frequency that constitutes a<br />

122<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


7.0 negative reinforCement<br />

trigger is a determination heavily influenced by industry, geography, risk pr<strong>of</strong>ile<br />

and other factors.<br />

Typically, a root cause analysis will not result in an explanation that “A occurred<br />

because <strong>of</strong> B.” Often, B was caused by C, which was caused by D, etc. For that<br />

matter, it is not always the case that an event has a single cause. Therefore, it is<br />

important to clarify the chain <strong>of</strong> causation leading to a defect. It is always necessary<br />

to validate whether the negative KPIs in question are accurate; it may be that the<br />

problem is in the measurement, not the process itself. The responsible person or<br />

people should be interviewed to gain an understanding <strong>of</strong> the reason for the<br />

cultural shortcoming.<br />

The causes <strong>of</strong> a cultural weakness may not be clear, especially if it requires working<br />

backward from effects to causes. Essentially, this necessitates asking, “If A had not<br />

occurred, would B have happened?” in an iterative fashion. The causal chain should<br />

be examined at each step to see whether the action suspected <strong>of</strong> causing the ultimate<br />

cultural weakness did, in fact, contribute. At the end <strong>of</strong> the root cause analysis<br />

process, it is necessary to reach conclusions as to the underlying causes <strong>of</strong> cultural<br />

weaknesses. While it is important not to allow root cause analysis to become a search<br />

for someone to blame, it is equally important to find and fix existential problems.<br />

Affixing blame is self-defeating; it leads to the conclusion that the problem is caused<br />

by ineffective people rather than dysfunctional processes or technology.<br />

It is important to note that identification <strong>of</strong> a root cause provides the opportunity for<br />

leverage. The resolution <strong>of</strong> a problem at its source may have wider ramifications<br />

further down the line, but there are times when the cause really is individuals acting<br />

in ways that are counter to an intentional security culture. In those cases, negative<br />

reinforcement is called for, rather than simply blame.<br />

7.5 When All Else Fails<br />

If a security culture is to have any meaning, there are times when it is necessary to<br />

take decisive and punitive action against those who determinedly defy everything<br />

for which the culture stands. Notwithstanding all that has been said before in this<br />

volume, security cannot always be positive, upbeat, supportive and reassuring.<br />

Those who run counter to the culture must be warned <strong>of</strong> the consequences <strong>of</strong> their<br />

actions and receive those consequences if behavior does not change. Behavioral<br />

modification is sufficient; it is unrealistic to enforce changes in attitude. However,<br />

generally, when people act differently, their hearts and minds do follow.<br />

There are two analogous cultural changes in the business world that can be used<br />

as examples <strong>of</strong> the effective use <strong>of</strong> negative reinforcement: smoking and sexual<br />

harassment. It is true that these have not developed in the same way and at the<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 123


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

same speed in all parts <strong>of</strong> the world. There are still nations where people routinely<br />

smoke in the <strong>of</strong>fice, and the treatment <strong>of</strong> coworkers is not the same everywhere.<br />

Nonetheless, in many countries, management has made a commitment to the<br />

health <strong>of</strong> employees and banned smoking in the workplace. Those who were told<br />

to change their actions were, in the most literal sense, addicted to a behavior that<br />

was harmful to themselves and those around them. There was resistance at first,<br />

but change has been accomplished. In Spain, where there is a higher percentage <strong>of</strong><br />

smokers than in the rest <strong>of</strong> Europe, the smoking ban has been effective as applied<br />

to public buildings and workplaces. Nonsmokers have no problems in government<br />

buildings, airports, <strong>of</strong>fices and so on. 11 In Germany, some still smoke at work,<br />

but only behind closed doors in their private <strong>of</strong>fices. 12 In China, progress against<br />

smoking has been slower, “but even there, the smoking ban is mostly targeting<br />

<strong>of</strong>fices and public working areas.” 13 The same may be said <strong>of</strong> all corners <strong>of</strong> the<br />

globe. <strong>Culture</strong> can be changed if it is enforced.<br />

As a cultural issue in the workplace, sexual harassment is both different and the<br />

same as that <strong>of</strong> security—different in that:<br />

124<br />

Even within a single culture, the definition <strong>of</strong> sexual harassment is<br />

<strong>of</strong>ten misunderstood and is the subject <strong>of</strong> considerable debate in legal,<br />

psychological and human resource management literature, both [in the<br />

US] and abroad. 14<br />

However defined, harassment, like misuse <strong>of</strong> information, is morally<br />

indefensible and, in many cases, is criminal. Nonetheless, it was a fixture in<br />

many societies and continues as such in some even today, but it is changing<br />

due to stern and deliberate management action.<br />

The point is that cultural attitudes and behaviors were forced to change by<br />

public mores, to be sure, but also through certain managers saying that this is<br />

unacceptable. Despite the cultural differences as to what constitutes permissible<br />

behavior, a consensus has arisen that:<br />

[A] work environment should not be <strong>of</strong>fensive, uncomfortable<br />

or embarrassing, even to the culturally based sensibilities <strong>of</strong> an<br />

employee (to the point <strong>of</strong> impairing his/her work) would not violate<br />

the boundaries established by majority values and traditions; it would<br />

certainly not undermine the order and stability <strong>of</strong> the society. 15<br />

This understanding did not simply occur haphazardly in businesses and government<br />

agencies. The spirit <strong>of</strong> the times did change, but managers made it happen in<br />

their enterprises by making it clear that certain behaviors and attitudes were<br />

impermissible and taking forceful action to stop them.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


7.0 negative reinforCement<br />

If cultural change can be made to happen through decisive responses to such<br />

ingrained habits as smoking or harassment, it can work in defending a culture <strong>of</strong><br />

security. People did not stop smoking in the <strong>of</strong>fice simply because management<br />

made them aware <strong>of</strong> the dangers nor did people stop mistreating their colleagues<br />

because management said it was not nice. Change occurred because external and<br />

internal forces brought management to the realization that these behaviors had to<br />

cease and that policies to that effect had to be enforced.<br />

7.5.1 Penalties<br />

In some cases, it is not enough to reward good conduct. There are times when<br />

penalties must be exacted for bad behavior. As applied to security, those penalties<br />

range from reprimands to prosecution. The latter, <strong>of</strong> course, is reserved for very<br />

bad behavior indeed: fraud, espionage, sabotage or theft. While criminal cases<br />

are necessary when there are crimes, this actually does little to improve a security<br />

culture. It is, in the minds <strong>of</strong> many, the exception that proves the rule. They do not<br />

see themselves as criminals, and for the most part, they are not. To base security<br />

on extreme cases leads to complacency for those in the middle. One <strong>of</strong> the tests <strong>of</strong><br />

criminality is intent, and most people who do not participate in a culture <strong>of</strong> security<br />

intend no harm—they just cannot be bothered.<br />

When management, through the auspices <strong>of</strong> a CISO, promulgates security policy,<br />

there is an implicit commitment to enforcement, which, in turn, means that those<br />

who flout the policies must face the consequences. If there are no consequences,<br />

there is no policy and, by extension, no security culture. The repercussions do not<br />

need to be severe, or at least not for first (and minor) <strong>of</strong>fenses. A stern word from<br />

a superior is <strong>of</strong>ten quite enough to make people mend their ways. If the superior is<br />

not in synch with a security culture, then that individual should receive the rebuke<br />

and so on, up the line. The closer the line gets to senior management, the greater<br />

the role <strong>of</strong> the security champion to stiffen spines.<br />

If a warning is insufficient, then more drastic action needs to be taken. People who<br />

violate security policy by sharing passwords, disclosing sensitive information,<br />

reading prohibited records or bypassing access restrictions should be told bluntly<br />

that these actions are impermissible and that a memorandum will be added to<br />

their personnel file or some such permanent record. Such a statement indicates<br />

that the acts were noticed; that the <strong>of</strong>fenders were rebuked; and, most important,<br />

that the acts will have effect over time. The time in question may be when raises,<br />

bonuses and promotions are given out. If people believe that they will be penalized<br />

in material ways in the future, behavior (and maybe even attitudes) will change.<br />

Regardless <strong>of</strong> what caused the violation, unless fired, the <strong>of</strong>fenders need to be<br />

reeducated in security policy and its importance.<br />

Therefore, it is necessary that threats be realized, or at least be seen as being<br />

realized. If, for example, a salesperson has been reprimanded about use <strong>of</strong><br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 125


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

information, but has had an excellent body <strong>of</strong> sales, it is not necessary to dock<br />

commissions or bonuses. A statement at a regular review that the bonus would<br />

have been greater were it not for security-related problems will go a long way<br />

to bringing that salesperson into a culture <strong>of</strong> security. If there are still repeated<br />

instances <strong>of</strong> insecure behavior, then there can be actual monetary penalties.<br />

7.5.2 Defiance<br />

What <strong>of</strong> the people who deliberately refuse to follow security policy or to act in a<br />

secure manner? There is no point in reminding them <strong>of</strong> the potential harm in failing<br />

to secure information resources. They have indicated that they do not care. They,<br />

too, are a part <strong>of</strong> an intentional culture <strong>of</strong> security; one that is dismissive, disdainful,<br />

disobedient and defiant. These are not the people who violate security requirements<br />

inadvertently. They see themselves apart from an enterprise’s expressed intent to<br />

promote security, believing that it only interferes with some “higher purpose.”<br />

These people are the most destructive <strong>of</strong> a security culture. If management fails to<br />

counter their defiance, then management implicitly buys into their higher purpose. It<br />

avails nothing to appeal to the organizational commitment <strong>of</strong> those who defy security<br />

requirements; they have placed their own goals in front <strong>of</strong> the enterprise’s. The issue<br />

is no longer security, but insubordination. That is exactly how smoking bans and<br />

antiharassment policies have taken effect. Management no longer debates the relative<br />

merits <strong>of</strong> a policy; it simply says that this is the policy and it must be observed.<br />

This tough line is not drawn all at once. There should be a period <strong>of</strong> time in which<br />

people learn how to behave under the security policies. As with nonsmoking<br />

policies, the level <strong>of</strong> top management support is directly correlated with the speed<br />

at which the enterprise becomes compliant. Where senior management strongly<br />

supports security (or smoking or harassment prohibition) policies, they move ahead<br />

without resistance. Once compliance with security policies is considered the norm, 16<br />

an intentional, positive security culture has been achieved. Those who refuse to<br />

conform to normative behavior have to be removed from an enterprise.<br />

The real pro<strong>of</strong> <strong>of</strong> a security culture comes when otherwise valuable employees are<br />

let go for refusing to protect the information with which they come in contact. This<br />

is not a routine occurrence; many security cultures do need strengthening. However,<br />

termination for cause does exist, and in the military and intelligence fields, it is<br />

understood that compliance is mandatory. This attitude is also spreading to the<br />

fields <strong>of</strong> education, health care and financial services. 17<br />

7.5.3 Career Impact<br />

The message <strong>of</strong> negative reinforcement is that insecure actions are not only bad in<br />

and <strong>of</strong> themselves, but they are bad for careers. There really is no positive way <strong>of</strong><br />

conveying that message. People will adapt to a security culture when they see that<br />

doing otherwise will cost them money, advancement and opportunities. Negative<br />

126<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


7.0 negative reinforCement<br />

reinforcement does not need to be as draconian as termination or loss <strong>of</strong> income.<br />

Within a corporate culture, the regard <strong>of</strong> one’s peers is a mighty incentive. (See<br />

section 4.7.) Just as obtaining the respect <strong>of</strong> others is a response to WIFM, losing<br />

that respect can be motivational as well.<br />

Being the person who causes a security problem should result in more than snide<br />

comments at the water cooler. For example, reports <strong>of</strong> security and privacy<br />

breaches due to loss <strong>of</strong> physical media (one aspect <strong>of</strong> data leakage) are so numerous<br />

that they barely make the news. 18 When they do happen, the people responsible<br />

receive unwanted attention from their superiors. They also become participants in<br />

an intentional culture <strong>of</strong> security, but only too late.<br />

Endnotes<br />

1 “Metrics—Perverse Incentives,” Test Side Story, 23 June 2010,<br />

http://testsidestory.wordpress.com/2010/06/23/metrics-perverse-incentives/<br />

2 European University Institute, “Strong Password Policy,” Italy, 20 July 2009,<br />

www.eui.eu/ServicesAndAdmin/ComputingService/Documentation/<br />

PolicyDocuments/StrongPasswordPolicy.aspx#One<br />

3 Smith, Richard E.; “Password Expiration Considered Harmful”, Cryptosmith,<br />

USA, 15 June 2002, www.cryptosmith.com/sanity/expharmful.html<br />

4 As with every rule, there is an exception. <strong>Security</strong> pr<strong>of</strong>essionals may actively<br />

override safeguards, with management approval, when not to do so would cause<br />

more harm than good.<br />

5 Schneier, Bruce; “How Perverse Incentives Drive Bad <strong>Security</strong> Decisions,” Wired,<br />

Condé Nast, 26 February 2009, www.wired.com/politics/security/commentary/<br />

securitymatters/2009/02/securitymatters_0226<br />

6 Personal Data Protection Code, Legislative Decree no. 196 <strong>of</strong> 30 June<br />

2003, p. 168, in English translation at www.garanteprivacy.it/garante/<br />

document?ID=311066<br />

7 Bettinger, Cass; “Managing Your Corporate <strong>Culture</strong> for High Performance,” Cass<br />

Bettinger & Assoc., 2008, p.2, www.cassbettinger.com/Articles/Managing_CC_<br />

for_High-Performance.pdf<br />

8 ISACA, An Introduction to BMIS, op. cit., p. 13<br />

9 The term “management” is used in this section without specificity. It does not<br />

necessarily mean senior management; it could be a CISO, a risk manager or a<br />

department head. Implicitly, it is the appropriate level <strong>of</strong> management in a given<br />

organization, based on the context <strong>of</strong> its risks and operations.<br />

10 Thornton, Shane; “Definition <strong>of</strong> Key Performance Indicators”, eHow,<br />

www.ehow.com/about_5142698_definition-key-performance-indicators.html<br />

11 “Smoking Spain—A Really Tough Smoking Ban in Spain, or Not,” <strong>Culture</strong><br />

Spain, 23 July 2010, www.culturespain.com/living-in-spain/smoking-spain-<br />

%E2%80%93-a-really-tough-smoking-ban-in-spain-or-not<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 127


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

12 Tracie Marquardt; “Smoking Ban in Germany,” Bella Online, 2010,<br />

www.bellaonline.com/articles/art16340.asp<br />

13 “Future <strong>of</strong> China’s Smoking Ban Looks Hazy,” Wall Street Journal, USA, 26 July<br />

2010, http://blogs.wsj.com/chinarealtime/2010/05/14/future-<strong>of</strong>-china%<br />

E2%80%99s-smoking-ban-looks-hazy/<br />

14 Zembr<strong>of</strong>f, Jennifer; “Cultural Differences in Perceptions <strong>of</strong> and Responses to Sexual<br />

Harassment,” 2005, www.thefreelibrary.com/Cultural+differences+in+<br />

perceptions+<strong>of</strong>+and+responses+ to+sexual...-a0166350028<br />

15 Ibid.<br />

16 Harris, Jeffrey S.; “Clearing the Air—Enforcing No Smoking Policies in the<br />

Workplace,” HR Magazine, February 1993, http://findarticles.com/p/articles/<br />

mi_m3495/is_n2_v38/ai_14152258/pg_3/?tag=content;col1<br />

17 See examples, including Wright State University, USA, “<strong>Security</strong> Violations,” Feb.<br />

1993, www.wright.edu/rsp/<strong>Security</strong>/S3stndrd/Adjudica.htm#<strong>Security</strong> Violations;<br />

Ivinson Memorial Hospital, “Sanctions for privacy and Information <strong>Security</strong><br />

Violations,” www.ivinsonhospital.org/docs/HP015_<strong>Security</strong>_Violations.pdf, USA,<br />

2007; FIA Card Services, “Terms <strong>of</strong> Use,” http://disclosures.fiacardservices.com/<br />

terms/index.html#terms, USA, 2008.<br />

The Wright State document is notable for describing the particulars <strong>of</strong> just the sort<br />

<strong>of</strong> defiant behavior discussed here:<br />

• Leaving a classified file or security container unlocked and unattended either<br />

during or after normal working hours<br />

• Keeping classified material in a desk or unauthorized cabinet, container, or area<br />

• Leaving classified material unsecured or unattended on desks, tables, cabinets or<br />

elsewhere in an unsecured area, either during or after normal working hours<br />

• Reproducing or transmitting classified material without proper authorization<br />

• Losing your security badge<br />

• Removing classified material from the work area in order to work on it at home<br />

• Granting a visitor, contractor, employee or any other person access to classified<br />

information without verifying both the individual’s clearance level and need-to-know<br />

• Discussing classified information over the telephone, other than a phone<br />

approved for classified discussion<br />

• Discussing classified information in lobbies, cafeterias, corridors or any other<br />

public area where the discussion might be overheard<br />

• Carrying safe combinations or computer passwords (identifiable as such) on<br />

one’s person, writing them on calendar pads, keeping them in desk drawers, or<br />

otherwise failing to protect the security <strong>of</strong> a safe or computer<br />

• Failing to mark classified documents properly<br />

• Failing to follow appropriate procedures for destruction <strong>of</strong> classified material<br />

18 A few recent cases have. See Wilson, Tim; “Two Major Breaches Caused<br />

By Loss Of Physical Media,” <strong>Security</strong> Dark Reading, 14 July 2010,<br />

www.darkreading.com/security/privacy/showArticle.jhtml?articleID=225800186<br />

128<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


8.0 how good iS good enough?<br />

8.0 how good IS good enough?<br />

A culture <strong>of</strong> security is made up <strong>of</strong> many elements, including champions,<br />

management, staff, policy, rewards and penalties. All <strong>of</strong> them are needed to effect the<br />

transition from an unintentional or negative culture to one that is simply functional<br />

and, finally, to one that is intentionally strong and supportive <strong>of</strong> overall business<br />

goals. As has been emphasized repeatedly in this volume, the culture must align with<br />

the context <strong>of</strong> an enterprise’s business and be balanced between too great and too<br />

little <strong>of</strong> an emphasis on security. Consideration <strong>of</strong> context and balance means that no<br />

two enterprises have precisely the same intentional security culture. With different<br />

business models, people, processes and information resources, there is no reason to<br />

think that they could or should be identical.<br />

If management wishes to develop an intentional culture <strong>of</strong> security, it follows<br />

that management’s intentions should be well thought out from the beginning.<br />

Unfortunately, cultures do not evolve that way. If an appropriate security culture<br />

could be ordered on demand, there would be no need for any champions or policies.<br />

It could simply be obtained, not developed. At some point, a culture reaches a<br />

desired point and then the emphasis shifts from creation to maintenance. It is <strong>of</strong>ten<br />

hard to tell whether one is at the crest <strong>of</strong> a hill until one has gotten there.<br />

Management has the more difficult task <strong>of</strong> having to understand just how secure its<br />

information needs to be to establish a culture at the right level. Clearly, information<br />

in an intelligence agency calls for more security (and a tighter culture to protect it)<br />

than in a bank, which may need more security than a pharmaceutical maker, which<br />

may need more than a manufacturer <strong>of</strong> shoes; etc. In short, managers, CISOs,<br />

auditors and others need to confront the question: How good is good enough?<br />

Figure 9 <strong>of</strong>fers some metrics that may be applied to that decision. No enterprise<br />

wants to have a culture that could be called “lagging” in security (or at least<br />

no enterprise should want one). Yet, there are too many enterprises with senior<br />

management that exhibit no support for security, middle managers who are<br />

actively hostile to anything that limits their ability to do whatever they want, and<br />

complacent staff and systems that show no evidence <strong>of</strong> security in their design or<br />

operation. Although a security culture does exist in these enterprises, “lagging” is<br />

too nice <strong>of</strong> a word for to describe it.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 129


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

130<br />

Role Lagging Aware<br />

Senior<br />

management<br />

Middle<br />

management<br />

Figure 9—<strong>Security</strong> <strong>Culture</strong> Maturity Model<br />

Uncaring Caring,<br />

but more<br />

concerned<br />

about cost<br />

Actively<br />

opposed to<br />

most security<br />

requirements<br />

Concerned,<br />

but bypasses<br />

security when<br />

it seems to<br />

hamper goals<br />

Staff Unconcerned Concerned,<br />

but inactive<br />

IT Does not build<br />

security into<br />

systems<br />

<strong>Security</strong><br />

pr<strong>of</strong>essionals<br />

Are only<br />

administrators<br />

Builds minimal<br />

security into<br />

systems<br />

Partially<br />

Effective Effective Leading Edge<br />

Funds a<br />

security<br />

program<br />

Respects<br />

security as<br />

long as other<br />

goals can be<br />

met<br />

Follows<br />

security rules<br />

Builds required<br />

security into<br />

systems<br />

Write policy Implement<br />

security<br />

safeguards<br />

Involves<br />

security<br />

in tactical<br />

decision<br />

making<br />

Involves<br />

security<br />

pr<strong>of</strong>essionals<br />

in major<br />

initiatives<br />

Considers the<br />

security <strong>of</strong><br />

information<br />

while using it<br />

Seeks the<br />

assistance<br />

<strong>of</strong> security<br />

pr<strong>of</strong>essionals<br />

in building<br />

security into<br />

systems<br />

Advise<br />

management<br />

on tactical<br />

issues<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .<br />

Involves<br />

security in<br />

strategic<br />

decision<br />

making<br />

Sees security<br />

as a<br />

competitive<br />

advantage<br />

Thinks about<br />

security<br />

before using<br />

information<br />

Anticipates<br />

the need for<br />

security in<br />

the systems it<br />

builds<br />

Advise<br />

management<br />

on strategic<br />

issues<br />

An enterprise that is aware <strong>of</strong> the need for security, but does not do enough to<br />

achieve it, is little better. One could argue that having good intentions, but ignoring<br />

them, is worse than having no intentions for security at all. If anything positive may<br />

be said about an enterprise at this level <strong>of</strong> cultural maturity, it is that a champion is<br />

more likely to emerge in one <strong>of</strong> these than in one totally oblivious to the need for<br />

security and a culture supportive <strong>of</strong> it.<br />

If no enterprise would or should want to find itself in these categories, it is less<br />

clear how much more it would want to do to have an acceptable culture. Having a<br />

partially effective security culture is enough for many enterprises. After all, there<br />

is a funded security program that implements safeguards that managers adhere<br />

to most <strong>of</strong> the time. This is, in many ways, a restatement <strong>of</strong> a functional security<br />

culture. (See section 5.2.) For a certain sort <strong>of</strong> enterprise—one with few people,<br />

little information and even less <strong>of</strong> consequence, minimal information systems and<br />

a generous appetite for risk—a “partially effective” security culture may well be all<br />

that is needed or desired.


8.0 how good iS good enough?<br />

There are nuanced decisions to be made between a fully effective security<br />

culture and one that may be classified as leading edge. Many <strong>of</strong> them deal with<br />

expectations. When challenged, manufacturers may say, “We are not a bank”;<br />

bankers may say that they are not the government; civilian agencies that they are<br />

not the military, etc., and the military accepts that it must have a leading-edge<br />

security culture. <strong>Security</strong> is, after all, the business <strong>of</strong> the military. If an enterprise is<br />

content to have an “effective” security culture, does it need to meet all the attributes<br />

stated in figure 9? Would it be sufficient to have a staff that follows the rules if that<br />

is balanced by an attuned IT function that builds in enough security into the systems<br />

it implements that it mitigates the necessity for considering the importance <strong>of</strong> the<br />

security <strong>of</strong> information while using it? The answer is a definite maybe.<br />

The metrics for a culture are not so well and sharply defined that anyone can say<br />

that only this practice, this belief or this attitude would make the best culture <strong>of</strong><br />

security, as opposed to one that is merely good enough. In these circumstances, it<br />

is too easy to make the best the enemy <strong>of</strong> the good. Yes, managers should want a<br />

culture that will support the appropriate level <strong>of</strong> security in their enterprises, but it<br />

is possible to overreach as well. The objective is not to keep building an intentional<br />

security culture indefinitely nor to get to a certain point and then stop. Rather,<br />

enterprises should always be aware <strong>of</strong> potential slippage, be vigilant and keep trying<br />

to do better. In short, within the context <strong>of</strong> any business, the ideal security culture<br />

will never be attained or, if it is, it will need to change with changing contexts.<br />

8.1 Getting There<br />

There is a cycle to the development and maintenance <strong>of</strong> an effective culture <strong>of</strong><br />

security within an enterprise and <strong>of</strong> the governance <strong>of</strong> the information within that<br />

enterprise. 1 It is, at the same time, a matter <strong>of</strong> positive reinforcement and insistence<br />

on management’s requirements, no less than it is <strong>of</strong> moving management to<br />

articulate those requirements.<br />

As with any endeavor, there are distinct phases to the implementation <strong>of</strong> a security<br />

culture. The first phase is always a dawning recognition that something should<br />

be done. Then, there is the doing followed by the effort to sustain that which<br />

was done. In the case <strong>of</strong> a security culture, it is a cyclical process because it is<br />

never-ending.<br />

ISACA has published a model for implementing IT governance, as shown in the<br />

figure 10. It is an inexact guide for implementing an intentional security culture,<br />

but there is considerable overlap between creating an effective IT governance<br />

structure and a supportive culture. It may even be argued that effective governance<br />

<strong>of</strong> IT, if not organizational information as a whole, cannot be accomplished without<br />

a culture that accepts governance.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 131


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

132<br />

6 Did we get there?<br />

Figure 10—Seven Phases <strong>of</strong> the Implementation Life Cycle<br />

7 How do we keep the momentum going?<br />

Realise benefits<br />

5 How do we get there?<br />

Embed new<br />

Execute plan<br />

approaches<br />

Review<br />

effectiveness<br />

Operate<br />

and use<br />

Operate<br />

Sustain<br />

and<br />

measure<br />

Implement<br />

improvements<br />

Monitor<br />

Identify role<br />

players<br />

Plan programme<br />

1 What are the drivers?<br />

Initiate programme Define problems and<br />

Establish desire<br />

to change<br />

Communicate<br />

4 What needs to be done? 3 Where do we want to be?<br />

Source: ISACA, Implementing • and Continually Improving IT Governance, USA, 2009, figure 5<br />

Programme management • Change enablement • Continual improvement life cycle<br />

(outer ring) (middle ring) (inner ring)<br />

and<br />

evaluate<br />

Recognise<br />

improvements<br />

Using the IT governance model as a guide, the stages <strong>of</strong> attaining a desired,<br />

intentional culture <strong>of</strong> security may be seen as follows.<br />

Build<br />

need to<br />

8.1.1 Establish the Need for Change<br />

The only way to have an intentional security culture, quite obviously, is to<br />

intend to have one. This implies recognition that the culture that exists within<br />

an enterprise does not measure up to the desires <strong>of</strong> those in a position to change<br />

it, the champions. It is not an easy moment when someone realizes that the way<br />

things are, perhaps the way things have always been, is not as they should be.<br />

This moment may come about because <strong>of</strong> an incident, a personal encounter with<br />

ineffective security or an observation <strong>of</strong> another enterprise. What typifies this<br />

mental transformation is not only recognition that something is wrong with the<br />

culture, but also that it can be changed in a positive direction. Moreover, the<br />

Form implementation<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .<br />

act<br />

state<br />

Define<br />

target<br />

Assess<br />

current<br />

state<br />

team<br />

outcome<br />

opportunities<br />

Define road map<br />

2 Where are we now?


8.0 how good iS good enough?<br />

person experiencing this breakthrough accepts personal empowerment to make a<br />

difference, takes on the role <strong>of</strong> “change maker” and convinces others to join the<br />

campaign—thus, are champions made.<br />

Creation <strong>of</strong> an intentional security culture is not a one-person affair, no matter how<br />

well-intentioned the initial champion may be. It requires the active involvement <strong>of</strong><br />

many people in positions <strong>of</strong> influence, if not authority. Widening the group that sees<br />

the need for positive change to a culture is a matter <strong>of</strong> persuasion and advocacy. It<br />

arises far more from interpersonal relationships than from management direction.<br />

The circle <strong>of</strong> champions will not constitute, in any real sense, an implementation<br />

team. The champions will not hold regular meetings, produce any documents or come<br />

up with a project plan. They will act as a group to build a new consensus within the<br />

enterprise, and to that end, they must reach a consensus among themselves. Some will<br />

be more aggressive and some more accepting <strong>of</strong> existing attitudes and ways <strong>of</strong> doing<br />

things. To be effective, they must be able to articulate a common vision <strong>of</strong> what an<br />

intentional culture would look like, how it would work in practice and how it would<br />

affect the interests <strong>of</strong> others within that enterprise.<br />

As in so many aspects in the development <strong>of</strong> a security culture within an enterprise,<br />

a balance must be attained. If the intended, strengthened security culture is too<br />

aggressive in making changes, it will inevitably lead to unintended consequences<br />

that will undermine its attainment. At the same time, if the imperative for change is<br />

too feeble, then the security culture will remain essentially as it is.<br />

8.1.2 Communicate the Desired Vision<br />

At some point, preferably sooner than later, the definition <strong>of</strong> the desired cultural<br />

changes must be communicated to those not (yet) converted. Some will be puzzled<br />

by the need for change, others will give lip service to proposed enhancements simply<br />

because <strong>of</strong> the eminence <strong>of</strong> the champions, and still others will be hostile. Each<br />

must be spoken with in their own terms. The unifying element is the benefits to the<br />

enterprise and to each individual. As stated in section 5.1.1, the message must be<br />

crafted to appeal to the interests <strong>of</strong> different audiences, “their behavioral pr<strong>of</strong>iles and<br />

information requirements, communication channels, and principles.” 2 In general,<br />

the expanded group <strong>of</strong> champions and supporters need to communicate not only the<br />

benefits <strong>of</strong> an improved security culture, but also the risks <strong>of</strong> leaving it as it is. The<br />

champions should portray the desired state and the road map for getting there.<br />

8.1.3 Achieve Initial Objectives<br />

It should be apparent that any culture, <strong>of</strong> security or otherwise, cannot be<br />

transformed all at one go. The desired changes must be implanted and expanded a<br />

little at a time. That is not to say that there cannot be “quick wins.” Management<br />

that is supportive <strong>of</strong> an intentional security culture should identify the most<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 133


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

important revisions and also those most readily achieved. For example, it may<br />

be thought that protecting data from unintended leakage, the greatest risk to an<br />

enterprise, is the highest priority for implementation. Unfortunately, it may be quite<br />

difficult to prevent well-meaning personnel from taking sensitive information home<br />

to work on after hours, much less to stop deliberate theft <strong>of</strong> information. Therefore,<br />

despite the priority <strong>of</strong> data leakage prevention, it may not be achievable in the short<br />

term. Something less critical, such as a clean desk policy, may be more enforceable<br />

and, hence, easier to attain in short order.<br />

8.1.4 Strike a Balance<br />

As has been continually emphasized throughout this volume, a balance <strong>of</strong> interests<br />

within an enterprise is essential to implementing an intentional culture <strong>of</strong> security.<br />

As different aspects <strong>of</strong> management’s intended improvements to that culture roll<br />

out, they will inevitably bump up against other, competing interests. Those will<br />

have to give way somewhat to security, but not in all cases and not always to<br />

the same extent. Solutions will be rolled out, and during this process, mentoring<br />

and coaching will be critical to ensure uptake among all those affected. The<br />

change requirements and objectives that have been set when the initial champion<br />

recognized the need for change should be revisited to ensure that they were<br />

adequately addressed—or need to be revised. 3<br />

8.1.5 Institutionalize the Intentional <strong>Security</strong> <strong>Culture</strong><br />

Over time, the enhanced culture <strong>of</strong> security will become the new norm. Behaviors,<br />

beliefs, assumptions, attitudes and ways <strong>of</strong> doing things will have been reshaped,<br />

and stakeholders will not even realize that they are participating in a culture that<br />

is intentionally supportive <strong>of</strong> security. This does not imply that slackness is now<br />

permissible, but rather that the drive for change can be relaxed once change has<br />

been achieved.<br />

8.1.6 Sustain the Intentional <strong>Security</strong> <strong>Culture</strong><br />

It should not be inferred that an intentional security culture will be self-perpetuating.<br />

It requires attention by auditors, risk managers, information security pr<strong>of</strong>essionals<br />

and even the champions, as required when backsliding becomes evident.<br />

Sustainment calls for both positive and negative reinforcement, as described<br />

in sections 6 and 7. Moreover, business, technology and legal changes must be<br />

reflected in the culture, making it endlessly cyclical. As shown in figure 11, the<br />

cycle <strong>of</strong> implementing a security culture is very much like that <strong>of</strong> implementing<br />

IT governance.<br />

134<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


Institutionalize.<br />

Sustain.<br />

Strike a balance.<br />

8.2 Conclusion<br />

8.0 how good iS good enough?<br />

Figure 11—<strong>Security</strong> <strong>Culture</strong> Life Cycle<br />

Champions<br />

Senior<br />

Management<br />

Middle<br />

Management<br />

Staff<br />

Achieve initial<br />

objectives.<br />

Establish the need.<br />

Communicate<br />

the vision.<br />

A security culture is more than a policy, although it needs a security policy to<br />

give it form and substance. It is broader than management, although it needs<br />

to be managed. It is more than individual attitudes and beliefs because it is the<br />

interaction among many attitudes and beliefs that give a culture life. It is more than<br />

the awareness <strong>of</strong> the need for security because, no matter how aware an enterprise<br />

may be, its security culture means nothing if the proper safeguards are not funded,<br />

implemented and maintained. A culture <strong>of</strong> security is not an end in itself, and it is<br />

the end result <strong>of</strong> many efforts to secure an enterprise’s information resources. It is<br />

about IT, and it is about more than just electronic information. It is ephemeral, but<br />

real; it is hard to identify and easy to recognize. A security culture is both more and<br />

less than security itself. It says more about what people are than what they do, and<br />

what they do is the basis <strong>of</strong> a culture. A culture <strong>of</strong> security is the result <strong>of</strong> change,<br />

and it makes change happen. It is the end result <strong>of</strong> the actions <strong>of</strong> many; it starts<br />

with an individual making a decision to act and think in a secure manner.<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 135<br />

Widen the circle.


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

Endnotes<br />

1 ISACA, Implementing and Continually Improving IT Governance, USA, 2009,<br />

p. 35-36<br />

2 Ibid., p. 36<br />

3 Ibid.<br />

136<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


iSaCa Pr<strong>of</strong>eSSional guidanCe PubliCationS<br />

ISACA PR<strong>of</strong>eSSIonAl guIdAnCe PuBlICAtIonS<br />

Many ISACA publications contain detailed assessment questionnaires and work program that<br />

provide valuable guidance. Please visit www.isaca.org/bookstore or e-mail bookstore@isaca.<br />

org for more information.<br />

Frameworks and Model<br />

• The Business Model for Information <strong>Security</strong>, 2010<br />

• COBIT ® 4.1, 2007<br />

• Enterprise Value: Governance <strong>of</strong> IT Investments: The Val IT TM Framework 2.0, 2008<br />

• ITAF TM : A Pr<strong>of</strong>essional Practices Framework for IT Assurance, 2008<br />

• The Risk IT Framework, 2009<br />

BMIS-related Publication<br />

• An Introduction to the Business Model for Information <strong>Security</strong>, 2009<br />

COBIT-related Publications<br />

• Aligning COBIT ® 4.1, ITIL ® V3 and ISO/IEC 27002 for Business Benefit, 2008<br />

• Building the Business Case for COBIT ® and Val IT TM : Executive Briefing, 2009<br />

• COBIT ® and Application Controls, 2009<br />

• COBIT ® Control Practices: Guidance to Achieve Control Objectives for Successful<br />

IT Governance, 2 nd Edition, 2007<br />

• COBIT ® Mapping: Mapping <strong>of</strong> CMMI ® for Development V1.2 With COBIT ® 4.1, 2011<br />

• COBIT ® Mapping: Mapping <strong>of</strong> FFIEC With COBIT ® 4.1, 2010<br />

• COBIT ® Mapping: Mapping <strong>of</strong> ISO/IEC 17799:2000 With COBIT ® , 2 nd Edition, 2006<br />

• COBIT ® Mapping: Mapping <strong>of</strong> ISO/IEC 17799:2005 With COBIT ® 4.0, 2006<br />

• COBIT ® Mapping: Mapping <strong>of</strong> ISO/IEC 20000:2005 With COBIT ® 4.1, 2011<br />

• COBIT ® Mapping: Mapping <strong>of</strong> ITIL ® V3 With COBIT ® 4.1, 2008<br />

• COBIT ® Mapping: Mapping <strong>of</strong> NIST SP 800-53 With COBIT ® 4.1, 2007<br />

• COBIT ® Mapping: Mapping <strong>of</strong> PMBOK ® With COBIT ® 4.0, 2006<br />

• COBIT ® Mapping: Mapping <strong>of</strong> SEI’s CMM ® for S<strong>of</strong>tware With COBIT ® 4.0, 2006<br />

• COBIT ® Mapping: Mapping <strong>of</strong> TOGAF 8.1 With COBIT ® 4.0, 2007<br />

• COBIT ® Quickstart TM , 2 nd Edition, 2007<br />

• COBIT ® <strong>Security</strong> Baseline TM , 2 nd Edition, 2007<br />

• COBIT ® User Guide for Service Managers, 2009<br />

• Implementing and Continually Improving IT Governance, 2009<br />

• IT Assurance Guide: Using COBIT ® , 2007<br />

• IT Control Objectives for Basel II, 2007<br />

• IT Control Objectives for Sarbanes-Oxley: The Role <strong>of</strong> IT in the Design and<br />

Implementation <strong>of</strong> Internal Control Over Financial Reporting, 2 nd Edition, 2006<br />

• ITGI Enables ISO/IEC 38500:2008 Adoption, 2009<br />

• SharePoint ® Deployment and Governance Using COBIT ® 4.1: A Practical Approach, 2010<br />

Risk IT-related Publication<br />

• The Risk IT Practitioner Guide, 2009<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 137


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

Val IT-related Publications<br />

• The Business Case Guide: Using Val IT TM 2.0, 2010<br />

• Enterprise Value: Getting Started With Value Management, 2008<br />

• Value Management Guidance for Assurance Pr<strong>of</strong>essionals: Using Val IT TM 2.0, 2010<br />

Academic Guidance<br />

• IT Governance Using COBIT ® and Val IT TM :<br />

– Student Book, 2 nd Edition, 2007<br />

– Caselets, 2 nd Edition, and Teaching Notes, 2007<br />

– TIBO Case Study, 2 nd Edition, and Teaching Notes, 2007 (Spanish translation<br />

also available)<br />

– Presentation, 2 nd Edition, 2007 (35-slide PowerPoint deck on COBIT)<br />

– Caselets, 3 rd Edition, and Teaching Notes, 2010<br />

– City Medical Center Case Study, 3 rd Edition, and Teaching Notes, 2010<br />

• Information <strong>Security</strong> Using the CISM ® Review Manual and BMIS TM :<br />

– Caselets, 2010<br />

– More4Less Foods Case Study, 2010<br />

– Caselets and More4Less Foods Case Study—Teaching Notes, 2010<br />

Executive and Management Guidance<br />

• Board Briefing on IT Governance, 2 nd Edition, 2003<br />

• Defining Information <strong>Security</strong> Management Position Requirements: Guidance for<br />

Executives and Managers, 2008<br />

• An Executive View <strong>of</strong> IT Governance, 2008<br />

• Identifying and Aligning Business Goals and IT Goals: Full Research Report, 2008<br />

• Information <strong>Security</strong> Governance: Guidance for Boards <strong>of</strong> Directors and Executive<br />

Management, 2 nd Edition, 2006<br />

• Information <strong>Security</strong> Governance: Guidance for Information <strong>Security</strong> Managers, 2008<br />

• Information <strong>Security</strong> Governance—Top Actions for <strong>Security</strong> Managers, 2005<br />

• IT Governance Domain Practices and Competencies:<br />

– Governance <strong>of</strong> Outsourcing, 2005<br />

– Information Risks: Whose Business Are They?, 2005<br />

– IT Alignment: Who Is in Charge?, 2005<br />

– Measuring and Demonstrating the Value <strong>of</strong> IT, 2005<br />

– Optimising Value Creation From IT Investments, 2005<br />

• IT Governance and Process Maturity, 2008<br />

• IT Governance Roundtables:<br />

– Defining IT Governance, 2008<br />

– IT Staffing Challenges, 2008<br />

– Unlocking Value, 2009<br />

– Value Delivery, 2008<br />

• Managing Information Integrity: <strong>Security</strong>, Control and Audit Issues, 2004<br />

• Understanding How Business Goals Drive IT Goals, 2008<br />

• Unlocking Value: An Executive Primer on the Critical Role <strong>of</strong> IT Governance, 2008<br />

138<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .


iSaCa Pr<strong>of</strong>eSSional guidanCe PubliCationS<br />

Practitioner Guidance<br />

• Audit/Assurance Programs:<br />

– Apache TM Web Services Server Audit/Assurance Program, 2010<br />

– Change Management Audit/Assurance Program, 2009<br />

– Cloud Computing Management Audit/Assurance Program, 2010<br />

– Crisis Management Audit/Assurance Program, 2010<br />

– Generic Application Audit/Assurance Program, 2009<br />

– Identity Management Audit/Assurance Program, 2009<br />

– Information <strong>Security</strong> Management Audit/Assurance Program, 2010<br />

– IT Continuity Planning Audit/Assurance Program, 2009<br />

– Micros<strong>of</strong>t ® Internet Information Services (115) 7 Web Services Server<br />

Audit/Assurance Program, 2011<br />

– Mobile Computing <strong>Security</strong> Audit/Assurance Program, 2010<br />

– MySQL TM Server Audit/Assurance Program, 2010<br />

– Network Perimeter <strong>Security</strong> Audit/Assurance Program, 2009<br />

– Outsourced IT Environments Audit/Assurance Program, 2009<br />

– <strong>Security</strong> Incident Management Audit/Assurance Program, 2009<br />

– Social Media Audit/Assurance Program, 2011<br />

– Systems Development and Project Management Audit/Assurance Program, 2009<br />

– UNIX/LINUX Operating System <strong>Security</strong> Audit/Assurance Program, 2009<br />

– VMware ® Server Virtualization Audit/Assurance Program, 2011<br />

– Windows Active Directory Audit/Assurance Program, 2010<br />

– z/OS <strong>Security</strong> Audit/Assurance Program, 2009<br />

• <strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> <strong>Security</strong>, 2011<br />

• Cybercrime: Incident Response and Digital Forensics, 2005<br />

• Enterprise Identity Management: Managing Secure and Controllable Access in the<br />

Extended Enterprise Environment, 2004<br />

• Information <strong>Security</strong> Career Progression Survey Results, 2008<br />

• Information <strong>Security</strong> Harmonisation—Classification <strong>of</strong> Global Guidance, 2005<br />

• Monitoring Internal Control Systems and IT, 2010<br />

• OS/390—z/OS: <strong>Security</strong>, Control and Audit Features, 2003<br />

• Peer-to-peer Networking <strong>Security</strong> and Control, 2003<br />

• Risks <strong>of</strong> Customer Relationship Management: A <strong>Security</strong>, Control and Audit Approach, 2003<br />

• <strong>Security</strong> Awareness: Best Practices to Serve Your Enterprise, 2005<br />

• <strong>Security</strong> Critical Issues, 2005<br />

• <strong>Security</strong> Provisioning: Managing Access in Extended Enterprises, 2002<br />

• Stepping Through the InfoSec Program, 2007<br />

• Stepping Through the IS Audit, 2 nd Edition, 2004<br />

• Technical and Risk Management Reference Series:<br />

– <strong>Security</strong>, Audit and Control Features Oracle ® Database, 3 rd Edition, 2009<br />

– <strong>Security</strong>, Audit and Control Features Oracle ® E-Business Suite, 3 rd Edition, 2010<br />

– <strong>Security</strong>, Audit and Control Features PeopleS<strong>of</strong>t, 2 nd Edition, 2006<br />

– <strong>Security</strong>, Audit and Control Features SAP ® ERP, 3 rd Edition, 2009<br />

• Top Business/Technology Survey Results, 2008<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d . 139


<strong>Creating</strong> a <strong>Culture</strong> <strong>of</strong> SeCurity<br />

Practitioner Guidance (cont.)<br />

• White Papers:<br />

– Cloud Computing: Business Benefits With <strong>Security</strong>, Governance and Assurance<br />

Perspectives, 2009<br />

– Data Leak Prevention, 2010<br />

– E-commerce and Consumer Retailing: Risks and Benefits, 2010<br />

– Electronic Discovery, 2011<br />

– New Service Auditor Standard: A User Entity Perspective, 2010<br />

– Securing Mobile Devices, 2010<br />

– <strong>Security</strong> Information and Event Management: Business Benefits and <strong>Security</strong>,<br />

Governance and Assurance Perspectives, 2010<br />

– Social Media: Business Benefits and <strong>Security</strong>, Governance and Assurance<br />

Perspectives, 2010<br />

– Virtualization: Benefits and Challenges, 2010<br />

140<br />

© 2 0 1 1 I S A C A . A l l R I g h t S R e S e R v e d .

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!