Skip to main content

Arming your security operations center with the right technology & services.

This paper discusses the importance of IT security for enterprises especially as they deal with challenging business conditions. The consequences of not having proper IT security measures in place can result in substantial losses – both financial as well as intangibles such as diminishing reputation, credibility and so on. It is imperative for enterprises to embark on a holistic security program in their SOC. At the same time, enterprises need to be aware of which technology and service is relevant for their kind of business to get the maximum returns. This paper throws light on this topic too.

Security - a key requirement

Technology has become the pivot to an organization’s success in today’s demanding business environment. And within that, IT security has assumed significant importance –to handle the compliance and regulatory demands along with the myriad threats and vulnerabilities that businesses are exposed to continuously. The consequence of not allocating this importance can be quite expensive –the recent Sony PlayStation Network incident resulted in damages of $171 million to Sony. Similarly, Citigroup lost $2.7 million to hackers who accessed information of 200, 000 clients illegally. To appreciate the seriousness, consider this finding from PwC - the cost of information security breaches just in the UK was a whopping £5 - £10 billion in 2011. Clearly, the findings from a survey conducted by the Enterprise Strategy Group is no surprise then which states that IT security is among the top five priorities identified by IT professionals for 2012. To compound matters, threats and attacks are only becoming more complex and sophisticated and so a well-equipped Security Operations Center (SOC) with the required security technologies and services is the order of the day. Many enterprises plan to increase security budgets to deal with this situation and enhance the capabilities of their SOC.

Challenges abound

No doubt that IT security is gaining much needed attention; however, the road ahead is replete with challenges. Most IT security professionals seldom take a holistic view while securing their organization. Typically, they adopt a siloed approach and secure the entire network without paying attention to individual host systems. It is assumed that access controls implemented across the network will, by extension, be sufficient to protect host systems and associated information. Unfortunately, this approach falls short in protecting business and technology services against attacks, threats and vulnerabilities comprehensively. In addition, SOCs today have to contend with not only the physical networks, computers and applications, but extend their purview to the online realm and mobile devices too - no easy task. Verizon’s “2011 Data Breach Investigations Report” reports alarming news that the number of online attacks increased by a factor of five between 2005 and 2010. Plus, there is the issue of mobile malware and anti-theft measures especially with the growing popularity and acceptance of the BYOD trend that needs to be addressed.

Some hard facts:
• According to McAfee, there were 8 million new kinds of malware more within the space of a quarter in 2012.
• Mobile vulnerabilities rose by 93% in 2011
• Estimated losses due to phishing attacks was $687 million in the first half of 2012 as per RSA

The way forward

Organizations must view the security portfolio holistically to provide a comprehensive cover enterprise-wide. Consequently, every host whether it is service oriented devices/servers or user oriented workstations, should be considered as a potential target and its vulnerability to attacks assessed.
It is therefore essential to consider different technologies and services that can help mitigate these risks. The key technologies and services required in an SOC are as follows:

A practical framework to determine the right mix of security technology and services for enterprises

While the security elements introduced above are essential to protect enterprises and meet compliance requirements successfully, the choice and implementation of these technologies depend both on the industry they belong to and the size of the enterprise. For instance, large enterprises require security of a higher order and have stringent compliance requirements such as ISO 27001, SOX, HIPAA, and SAS 70. Such enterprises typically face a large volume of transactions resulting in terabytes of data which has to be managed securely. In specific cases such as in the financial sector, there is the added complexity of handling sensitive data. Failing to secure critical data can not only result in monetary losses but also lead to intangible consequences such as loss of reputation and credibility which can be equally damaging.

Stringent regulations:

• BFSI – Compliance requirements such as ISO 27001, PCI-DSS, SOX, GLBA, HIPAA, SAS 70 and Regulatory compliances such as RBI, SAMA, FRB, FSA
• Telecom – Compliance requirements such as ISO 27001, IEC15408, 3GPP, SAS70, Telecom Regulatory Authorities

However, the same norm is not necessary for mid-size and smaller enterprises or those belonging to other industries such as manufacturing or CPG.

Not only is the volume of transactions much lesser, the resources required to manage a comprehensive security portfolio is generally not available warranting a different approach to security. Clearly, a “one-size fits all” approach will not be effective.

The following framework has been conceptualized keeping in mind the specific needs of different kinds of organizations.

While this framework can be applied across industries, it becomes particularly critical for the BFSI and telecom owing to the nature of their business.

For enterprises belonging to the BFSI industry, all the above services are recommended; however, the Identity and Access Management, Fraud, Forensic Analysis & SIRT and Wireless IPS are optional for smaller banks for obvious reasons. Similarly for enterprises in the telecom industry, other than Wireless IPS service, the rest of the elements are mandatory

Essential elements for your SOC

Basic Security Implementations

All organizations need to implement a basic list of security technologies for overall protection. This includes a strong firewall, anti-virus and spam software, VPN devices for site-to-site and remote access as well as physical security checkpoints such as CCTVs, security guards etc.

360-Degree Security Incident/Event Management and Analysis

Security Incident and Event Management (SIEM)

The main requirement for SIEM tools is to monitor security incidents in real time and generate reports in case of any lapses. This tool also functions as a centralized security incident management framework as it can be easily integrated with other security technologies and services

Database Activity Monitoring (DAM)

Often database administrators and other privileged users in organizations can access and modify sensitive information. DAM provides privileged user and application access monitoring, helps improve database security by detecting unusual activities, triggers alarms and meets compliance requirements.

Web Application Firewall (WAF)

WAF is necessary to ensure secure internet based (HTTP) communication and can detect common attacks such as Injection Vulnerability, Cross Site Scripting (XSS), Broken Authentication and so on. It is particularly useful in detecting and blocking out unwanted content when dealing with sensitive HTTP data and the logs generated by WAF can be used for forensic analysis and reporting.

Network Behaviour Anomaly Detection (NBAD)

NBAD is used for monitoring the network traffic behavior in real-time to protect the organization against zero day attacks that are not detected by signature/rule-based security systems like firewalls.
It typically detects malwares through traffic analysis in all devices including those not discovered by the OEM vendor products and subscription services.

Vulnerability and Risk Management and Analysis

Vulnerability Management (VM)

To protect the software and hardware systems from attacks and exploiting inherent vulnerabilities, a security team must know what vulnerabilities are present. This means that organizations should have effective vulnerability management tools and processes as part of their IT security.

Threat Intelligence

Threat Intelligence Service is essential for the organizations to track, update and integrate the evolving threats and vulnerabilities for monitoring and mitigation. It would track global threats and vulnerabilities, chart an action plan and notify stakeholders through advisories.

Risk Management

Risk management services would ensure all the identified security incidents, vulnerabilities and threats are tracked and closed. It would also monitor technology related risks like design, configuration, security baselining, etc. These services would also regularly upgrade employee skills in dealing with security challenges, process violations and unauthorized changes/access.

Anti-Malware Service for Critical Websites

This service is to ensure that the websites are proactively monitored and protected from malicious attacks particularly defacements, malwares, etc. Through real time crawling and behavior analysis of a website, this service helps avoid blacklisting of the website in search engines.

Anti-Phishing Service for Critical Websites

Phishing attempts to acquire information like usernames, passwords, credit card details etc., through emails/sms to direct users to fake websites. Anti-phishing services are essential to proactively monitor, identify, detect and protect the user’s identity and sensitive data from malicious elements.

Security Matrix & Dashboard

A Security Matrix and Dashboard provides a consolidated security status reporting of all the security technologies and services along with key metrics through a portal. This is very critical in enabling a comprehensive understanding of the security posture of the organization and typically includes dashboards for vulnerabilities, risks, security incidences, compliance, Anti X and patch management reports, and so on.
In addition to the key technologies, enterprises should invest in a SOC customized to their organization’s environment for a drill down on business and technology risks, vulnerabilities, trends and comparisons with global practices.

Concluding thoughts

It is evident that enterprises need to implement the right set of security technologies and have a robust Security Monitoring Framework in place in their SOC. By adopting the proposed framework, enterprises stand to gain significantly – they choose the right set of technologies and hence secure their organization effectively. By doing this, they also invest wisely and this is critical in today’s tough market conditions.
Finally, with the right set of tools and technologies, the SOC becomes easier to manage and services business requirements better.

About the Author
Gopinathan. K. is the Practice Head for Managed Security and Network Services, Global Infrastructure Services (GIS).


Popular posts from this blog

This is How Engineers Cook

How do you create a PMO Strategic Plan that provide value?

How do you create a PMO Strategic Plan that provide value?

Firstly, identify that the Strategic Plan for the PMO is not the PMO Charter.
The PMO charter is the legislative mandate for the PMO. It defines the role, purpose and functions of the PMO. It expresses who the PMO's sponsors and customers are, the services that it offers, and the staffing and support structures required to deliver those services. And, it assumes that a decision to have a PMO has already been made.
Secondly, align the Strategic Plan for the PMO to the needs of the business for which the PMO exists to serve.
For example, when you do this, providing project management assistance to the organization and implementing a project management system is not the mission, rather, they become strategies in support of the goals and objectives to be achieved.
To build an outcomes-driven Strategic Plan for the PMO, it is helpful to follow a top down format. The most commonly used and accepted format is the classical strateg…

IT Security Maturity Assessment | Control Self Assessment

IT – Security Maturity Assessment – Control Self-Assessment IT Security maturity assessment: it is a Self-Evaluation assessment carried out by organization that informs where it stands in terms of IT Security and shows its Strength, weakness and areas where  IT security improvement is needed in an organization. Organizations analyze IT Security on the bases of ISO 27002 standards. This tool was intended for use by an institution as a whole, although a unit within an institution may also use it to help determine the maturity of its information security program. Unless otherwise noted, it should be completed by chief information officer, chief information security officer or equivalent, or a designee and hardly takes few hours to analyze the overall IT maturity. The rating scale consist on 5 levels from 1 to 5 and every IT security related point carefully analyze by the analyze maturity team or individual and then they decided where that point put down.

Level 1 Level 2 Level 3 Level 4 Level 5 P…