Posted by:
admin
9 years, 3 months ago
Via @adamshostack came this post by @lennyzeltser Why Business Managers Ignore IT Security Risk Recommendations.
It is a tremendous list of excellent content. I will turn this around slightly and discuss some thoughts on how to increase the likelihood that your security risk recommendations are accepted. In many ways this comes down to does your management trust you to wisely invest capital? Not just that, but relative to others in your organization. They are looking at a number of projects that require time and money across a broader view of the organization that just your department. It is their job to optimize the outcomes for the organization. How can you build the case that you're to be trusted over another manager?
Here is what I would look for:
1. Display that you have optimized for cost reduction already. Moving SSH off port 22 is a great example of this. It may not increase security, but it greatly reduces logs and thus optimizes the resources needed to manage and review logs. Standardized configurations may be another, depending on your organization. Demonstrate you can manage OpEx.
2. Show that you have optimized the use of your existing security infrastructure. The best example of this is the two things that are proven effective in infosec: two-factor authentication and VPNs. Do your critical accounts use two-factor authentication for access? What about vendors? Is your firewall filtering mail attachments? Show you can manage CapEx.
3. Max out the use of free and open source tools. There are a lot of these in infosec and many can do all that you need. But often times not. This shows that you are aware of what's available and making informed decisions. For example: You have been using a free web-app scanner, but with the increased importance of the ecommerce site, a professional evaluation is warranted. This reduces the risk that you are paying an expert to find the easy problems and not the hard-to-find issues. Show you know how to use money wisely.
4. Know your capabilities. Most organizations cannot handle the bleeding edge. Trying to deploy a shiny new all-encompassing system that watches what all the users do every where will tax your resources and potentially fail big time. You need wins to maintain your credibility. Optimize for success.
To me this is just the infosec version of "Start where you are, with what you have" attributed to Teddy Roosevelt and Arthur Ashe. Corporations are just capital management organizations. The better the return on capital, the happier the shareholders, management etc. Your ability to consistently deliver projects on time and on budget will build your credibility. You should start with the basics.
(Note that I have not included any financial models on how to prove the value of your project. Maybe for another day. Or never.)
Share on Twitter Share on FacebookRecent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)