02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Making <strong>the</strong> case to management to ga<strong>the</strong>r support for building a CSIRT will involve several<br />

steps. The need to identify and collect data for both <strong>the</strong> direct and indirect cost <strong>of</strong> incidents<br />

will be helpful in this regard. Such costs will include, as mentioned before, staff time spent<br />

on recovery and on implementing any lessons learned, system downtime, loss <strong>of</strong> productivity,<br />

loss <strong>of</strong> critical service, any loss <strong>of</strong> revenue from services and operations that are unavailable,<br />

repair costs, value <strong>of</strong> compromised information, loss <strong>of</strong> reputation, or an increase in insurance<br />

premiums. O<strong>the</strong>r data to ga<strong>the</strong>r will include <strong>the</strong> risks to <strong>the</strong> organization’s information<br />

security assets.<br />

Matched against <strong>the</strong>se costs and risks will be <strong>the</strong> benefits that <strong>the</strong> CSIRT can provide, including<br />

reduction in recovery costs due to more streamlined response processes and better communication<br />

channels; <strong>the</strong> ability to ga<strong>the</strong>r and evaluate new threats to <strong>the</strong> organization’s operation;<br />

and <strong>the</strong> ability to provide an enterprise-wide view <strong>of</strong> not only <strong>the</strong> security<br />

weaknesses but <strong>the</strong> related response efforts and <strong>the</strong>ir implementation. The CSIRT, in essence,<br />

becomes one <strong>of</strong> <strong>the</strong> providers <strong>of</strong> business intelligence to <strong>the</strong> organization.<br />

The CSIRT will also show that it will be able to reduce incident activity and <strong>the</strong> damage resulting<br />

from those incidents that do occur. The CSIRT will need to put a cost on <strong>the</strong> “loss”<br />

avoided and <strong>the</strong> risk minimized by <strong>the</strong> work a CSIRT performs. It’s generally accepted that a<br />

CSIRT will show a business benefit in <strong>the</strong> long term, when successfully implemented,<br />

whe<strong>the</strong>r in business efficiency, reduced customer complaints, or enhanced reputation <strong>of</strong> <strong>the</strong><br />

parent organization. These types <strong>of</strong> issues and success stories are needed as part <strong>of</strong> <strong>the</strong> overall<br />

business case to management. The organization’s business continuity plans and risk models,<br />

if in place, should be able to be used to support <strong>the</strong> case for a CSIRT.<br />

In <strong>the</strong> article by Sarah Scalet entitled “Risk: A Whole New Game,” she mentions <strong>the</strong> increased<br />

interest in insurance companies who are <strong>of</strong>fering cyber insurance and <strong>the</strong> move towards<br />

creating actuarial models that map security practices to financial losses (versus guesses<br />

at loss figures). Scalet mentions that courts are beginning to apply dollar figures to losses<br />

from security breaches as well and that this could have an impact on companies being asked<br />

to meet a certain standard <strong>of</strong> due care [Scalet 02].<br />

The emergence <strong>of</strong> such legal precedents and standards will be ano<strong>the</strong>r impetus to organizations<br />

to develop incident handling capabilities. These capabilities are beginning to become<br />

requirements in various laws and regulations. For example, in <strong>the</strong> U.S., <strong>the</strong> Gramm-Leach-<br />

Bliley Act <strong>of</strong> 1999 (GLBA, also known as <strong>the</strong> Financial Services Modernization Act <strong>of</strong> 1999)<br />

requires financial institutions to not only have customer privacy policies and an information<br />

security program, but also a response capability. The European Data Protection regulations<br />

require all data controllers to have appropriate technical and procedural means to protect <strong>the</strong><br />

data <strong>the</strong>y hold. The establishment <strong>of</strong> a CSIRT or a response capability can be seen as one indicator<br />

<strong>of</strong> a company actively engaging in due care or providing <strong>the</strong> required procedural response.<br />

64 CMU/SEI-2003-TR-001

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!