KPI definition
A key performance indicator(KPI) is a measure of performance,
commonly used to help an organization defineand evaluate how successful it is,
typically in terms of making progress towards its long-term organizational goals.
–KPIs provide business-level context to
security-generated data
–KPIs answer the “so what?” question
–Each additional KPI indicates a step
forward in program maturity
–None of these KPIs draw strictly from security data
COBIT
Control Objectives
for Information and Related Technology (COBIT) is a
framework created by ISACA for information technology (IT) management and IT
governance. It is a supporting toolset that allows managers to bridge the gap
between control requirements, technical issues and business risks.
COBIT was first released in 1996; the current version, COBIT 5, was
published in 2012. Its mission is “to research, develop, publish and promote an
authoritative, up-to-date, international set of generally accepted information
technology control objectives for day-to-day use by business managers, IT
professionals and assurance professionals.”.
COBIT, initially an acronym for 'Control objectives for information and
related technology', defines a set of generic processes to manage IT. Each
process is defined together with process inputs and outputs, key process
activities, process objectives, performance measures and an elementary maturity
model. The framework supports governance of IT by defining and aligning
business goals with IT goals and IT processes.
The framework provides good practices across a domain and process
framework.
The business orientation of COBIT consists of linking business goals to
IT goals, providing metrics and maturity models to measure their achievement,
and identifying the associated responsibilities of business and IT process
owners
COBIT 5 is the only business framework for the governance and management
of enterprise IT. This evolutionary version incorporates the latest thinking in
enterprise governance and management techniques, and provides globally accepted
principles, practices, analytical tools and models to help increase the trust
in, and value from, information systems. COBIT 5 builds and expands on COBIT
4.1 by integrating other major frameworks, standards and resources, including
ISACA’s Val IT and Risk IT, Information Technology Infrastructure Library
(ITIL®) and related standards from the International Organization for
Standardization (ISO).
Benefits
COBIT 5 helps enterprises of all sizes:
-Maintain high-quality information to support business decisions
-Achieve strategic goals and realize business benefits through the
effective and innovative use of IT
-Achieve operational excellence through reliable, efficient application
of technology
-Maintain IT-related risk at an acceptable level
-Optimize the cost of IT services and technology
-Support compliance with relevant laws, regulations, contractual
agreements and policies
Figure 1. COBIT
The relationship between governance and management in COBIT is presented
in the next figure.
Figure 2. Relationship between governance and management in COBIT 5(Courtesy to COBIT)
The governance and management key areas are presented below.
Figure 3. Governance and management key areas in COBIT 5( (Courtesy to COBIT)
The relationship between KPI and COBIT is shown in the next figure.
Figure 4. Relationship between KPI and COBIT (Courtesy to COBIT)
The principles that are founding COBIT are presented in the next figure.
Figure 5. COBIT principles (Courtesy to COBIT)
How to choose KPI in relationship with vulnerability
KPI’s must be aligned at least with a business goal:
· KPI’s must be in accordance with risk or targets that are recognised by the various stakeholders[1].
When the (business) risk or objective is not lucid a KPI will not come alive.
KPI’s are measured by measures. It
is desirable to not define the KPI too specifically so as to avoid the KPI
influencing the selection of measures still to be implemented.
Some questions could better define KPI.
· Are the KPI’s meant for internal use or for external communication to
customers, partners, shareholders, affiliated organisations, certifying bodies,
etc.?
Must they be connected to other standards in the sector so that KPI’s are somewhat
comparable between organizations or is an organization free to choose their own
definition?
Even when using the same framework (for example Cobit) the comparability
of KPI’s will never be optimal. Organisations will always, in practice, make a
translation to their own situation.
· How generic or how specific must a KPI’s definition be? Are they
applicable to the whole company or just for a department?
In a centrally run organisation a KPI can be much more generically
defined across n different process than in a de-centrally run organization.
After all in a de-centrally organised organisation similar processes will
differ more and therefore so will the measurability and steerage possibilities.
And KPI’s must fit optimally with a process in order for it to be effective.
· Are KPI’s stable during the life cycle of the subject to be
measurement?
During the life cycle of an application, for example, the need for
measurements shifts.KPI’s that play a role in the development phase of
applications differ from those in the operational phase. Also the target group
being reported on can shift during the life cycle.Measurements must be trustworthy
and meaningful
· What maturity level does an organisation or a process have and
which KPI’s are useful for this maturity level?
Controlled measurement of certain KPI’s demands reproducibility
and a tight framework in the execution
of administration processes. KPI’ s meant for tuning of an administration
process that is not (yet) there, have little additional value. The accumulation
of detailed measurements and trend information concerning intrusions, for
example, is of little use when an organisation does not have
its basic incident management process in order.· The measurability of the desired information is important.
The filling in of a security paragraph in a project
phase document is simple to measure. Whether the quality of the paragraph is
sufficient, is already more difficult to determine and without the involvement
of security experts will probably not lead to accurate and objective
information.
· In all scenarios the integrity of measurements is of great
importance. The costs of the measuring
must be in balance with the eventual objective. Often tooling is required to
keep measurements cost-effective during a longer period of time, to guarantee
integrity and to keep reports consistent. With manual aggregation of information,
manipulation is possible and reliability cannot always be guaranteed.
-KPI’s on different levels must be correlated and provide a consistent
view. Multiple
KPI on a lower level can be translated to one KPI on a higher level.
Because these
KPI’s are usually geared towards another target group with a higher
aggregation level,
word usage in the explanation must often also be adjusted. The word usage must fit in
with the actual world and
interests of the target group.KPI must be easy to understand. Higher management may for example be more accountable for the
percentage of application development projects where a risk analysis was
carried out in due time, than for the completeness and depth
of an analysis carried out for a specific development project.
· Aside from standard reports there must be a mechanism for exception
reports.Exceptions are important to keep people awake. In the case of exception
reports it is often effective to give people ‘the naked truth’. Allow
the shop floor to speak and do not try to make the reality prettier than it
actually is. If for example, the management of a department does not tackle
events that structurally occur and remains vague about it in his reports, it
can be worthwhile to magnify an incident with
more than average impact. Diligence and care for disclosure of sensitive
information remains an important factor.
· The chance that Security Management KPI’s are effectively used is
greatest when applied to processes where people are already used to reporting
other quality aspects by means of KPI’s.
This is reason to define Security Management KPI’s based on a process
approach and to assure that KPI’s are built into processes where security is
relevant, such as incident management and change management.
KPI design. KPI developed for vulnerability analysis
approach
whereby initial reports based on measurements at hand are the stimulant for
more
and sharper reports.
Top-down
The basis and starting point in the model is obtaining a strong top-level
management
commitment. Subsequent policies and measurements must be defined.
The top-down
approach will work especially when management is experiencing great pressure,
like for complying with SOX regulation on time.This is only attainable in the
short run with
sufficient
management commitment.This approach will, in nearly all cases, be based on
checklists from existing models like Cobit.
Bottom-up
An alternative
approach is to ‘just start anywhere’ with presentation of easily obtainable
measuring results
from operational processes. In this way management is made aware of the
interesting
information reported from processes which can be used for steerage. Initially
the
information
offered will not suitably comply with the information requirement of the
process
owner, but the
imagination of the process owner will be stimulated and he will be in a better
position to define
a modified KPI which is more in line with the requirement.
By means of an
iterative process, KPI’s can be constantly improved. Important in this
bottom-up approach
is that expectations must be well managed to avoid the threat of a
process owner
quitting prematurely and losing his confidence.
An example of a bottom up approach is given below.
No
|
Actions
|
1
|
Determine
security maturity e.g. by examining Stacey’s security model
|
2
|
Keep
registration of:
· Incidents (reactive)
· Identified risks (proactive)
Classify these e.g. by sort, object, department.
Also think outside the borders
|
3
|
Personalise
reports to target groups
For example: Legal matters, HRM, financial affairs
Aim is to increase awareness
|
4
|
Explaining
reports per part area
- Point out consequences per responsibility area
Refer to damage table, in which damage categories are defined
|
5
|
Expand
this:
· Formalise KPI’s: Where is the threshold?
· Ascertain trends
· Provide steerage by coupling trends to advised measures
|
We have defined the following KPIs for vulnerability:
Vulnerability level (Vl)- Vulnerability
level expresses the overall vulnerability for the whole company or for the
section analysed. Vulnerability level could be measured on a scale from 1- no
significant vulnerability to 5- extreme vulnerability. Vulnerability level is a lagging KPI.
Vl=(VbO+VbOP+VbM+VbT+VbE)/5
The oposite of Vl
would express the level of preparedness
against the action of vulnerabilities.
The KPI corresponding is:
Preparedness level (Pl)= 1/Vl Preparedness
level is a leading KPI.
Vulnerability level is given by other 5 lagging Kpi as seen in the
figure.
Figure 6. Components of the Vulnerability level KPI
All the components are lagging KPI.
Vulnerability by Outsider (VbO)-
gives the enterprise vulnerability to the attack by outsiders. Such attacks
could be direct (physicall) or could be virtual, through the network of the
enterprise, towards the command and control functions, etc. The more the
enterprise is interconnected in a large technical and societal network ,the
more it is exposed to attacks by the outsiders. There are two main kind of outsider attackers:
-with financial
motivation- are looking for financial awards as a result of the attack;
-with other
motivation such as revenge, curiosity, etc.
Financial
motivated attackers could be more easy identified and their attack prevented. The
most valuable assets of the enterprise must be guarded and proteged . Redundant
solutions should be ready in the case of failure of critical significant
systems.
Vulnerability by Operator (VbOP)-describes
the vulnerabilities introduced in the system by the employees. The operator
could be trained insufficiently or incorrectly, he could make mistakes because
its physical and psychical state, could
be overstressed or affected by events that are not connected with the work. On
the other side , the operator could make intentionally mistakes, for various
reasons, from financial ones (for example he introduces a speed of work at
machine X greater than the prescribed parameter in order to gain more money)
till the ones connected with his relationship with the management.
Figure shows the
main elements that are leading to vulnerability by operator.
Figure 7. Vulnerability by operator
Vulnerability by Machine (VbM) is
given by the defects and failures that could appear during the work process at
the machines and instalations that are used in this process.It could be written
that:
VbM=f(Complexity, Protection, Work regime, Capability of repair)
Vulnerability by
machine[2] is
a function of complexity of the machine (the greater complexity leads to a
greater vulnerability to fail), existing protection systems, the work regime in
which the machine performs (better performances are requiring a more intensive
work regime which could overpass the prescribed thresholds) and also of the
training of the operator and the capability of repairing the machine in work.
Vulnerability by task (VbT) is specific to
the task being developed, transmitted and processed by the operator.Figure
shows the components for this type of vulnerability
Figure 8.Vulnerability by task
Vulnerability by Environment(VbE) is
given by the environment influnece on the work and on the global vulnerability.
If the work is done outside or in closed spaces or in noxes that are not
properly captured, etc. it could lead to loss or even incidents and work
accidents. For example a bad insulated ceiling could lead to a waterfall over
the electric instalation. Work in open spaces could lead to health problems,
etc.
A number of 5 specific KPI were defined as follows, based on the
Capability Maturity Model (CMM):
WRT–Weighted
Risk Trend=A business-based representation of risk from vetted (web)
application security defects over a specified time-period, or repeated
iterations of application development-Maturity level(rank): 1
WRT=[(Multipliercriticalx
defects) + (Multiplierhighx defects) + (Multipliermediumx
defects) + (Multiplierlowx defects)] x *Criticalitybusiness
Facts
regarding WRT:
-Metric is best graphed
-Risk trend will decrease over time
similar to 1/x
-Each defect criticality must have a non-linear factor assigned
•Critical
= 10
•High
= 5
•Medium
= 2
•Low = 1
-Application business criticality must be rigidly defined[3]
•Business
critical
•Critical
•Important
DRW–Defect
Remediation Window=The length of time from when a vetted (web) application
security defect is identified until it is verified closed-Maturity level:2
Facts
regarding DRW:
–#1 most critical KPI
–DRW will be potentially very large at
first
–Critical to shrink this metric as
quickly as possible
–Can be used to target education where
needed
–Important to note type of defect remediated (complex defects
take longer to fix)
RDR–Rate
of Defect Recurrence=The rate, over time, at which previously closed (web)
application security defects are re-introduced into a given application,
organization, or other logical unit-Maturity level:3.
Requirements:
–Advanced defect tracking system
–Advanced web application security
testing capabilities
–Capabilities to identify similar or likedefects across an
application or logical trackable unit
Facts
regarding RDR:
–Reappearing defects measure internal
development confusion
–Recurring defects should prompt a
systemic investigation into root-cause
–Critical for identifying poorly-run development organizations
SCM–Specific
Coverage Metric=The flow-based or component-based coverage of total
functionality that web application security testing has achieved-Maturity
level:4
Total
functionality = known functionality + discovered functionality
Requirements
–Advanced security testing capabilities
using flow-based, data-driven methodology for completeness
–Integration with Quality Assurance for functional specification
coverage
Facts regarding SCM:
–Most difficult KPI to achieve
–Most organizations cannot identify
even known attack surface coverage
–Flow-driven & data-driven
methodology is required to fully test known attack surface
–Exploratory testing required to discover “unknown functionality”
SQR–Security
to Quality defect Ratio[4]=The
ratio of security defects to the total number of software quality defects being
generated (functional + performance + security)-Maturity level:4.
SQR=Ds/Dt:
Ds= Total Security defects; Dt= Total Overall Quality defects
Requirements
–Mature defect reporting system (tracking combined quality defects)
•Security
as a quality defect
•Performance
as a quality defect
•Functional (+related) as a quality
defect
–Tight cooperation of Information Security & Quality Assurance
Facts
regarding SQR:
–Final step in organizational maturity
with respect to security testing
–Demonstrates security adoption as a component of overall software
quality
[1] H.Bell and others (2006) GvIB
Expert Letter – September 2006 ISSN 1872-4884, Volume 1 – No. 2
[2]
Institute of Internal Auditors, UK&Ireland, Position Statement 2004, The
Role of Internal Audit in Enterprise-wide Risk Management
[3] BS6079-3:2000
Project Management Part 3—Guide to the Management of Business Risk.
[4] Flesher,
Dale (1996) Internal Auditing: A One-Semester Course, Florida: The Institute of
Internal Auditors
Niciun comentariu:
Trimiteți un comentariu