ABSTRACT
There are persistent cyber security attacks which leads unauthorized access to internal corporate networks and other critical confidential information. It is essential to build security solutions by adopting a Security Framework for any organization to find solutions for majority of vulnerabilities and flaws. The proposed work provides a platform to study methodical, controlled and repeatable approach to assess an organization’s cyber security posture especially for asset management. The study helps organization’s owners to assess their operational and information system’s cybersecurity practices by querying a set of comprehensive questions about cyber security assets like Authentication, Authorization, Access controls, Database, Email security, Removable media, Backup &, Firewalls, Incident management etc. The proposed model improves the cyber security posture of the organization and escalate the chances of mitigating cyber security risks.
Key words: Cyber security, Cyber security evaluation, cyberattacks, Cyber Security Assets, Maturity Assessment
1. INTRODUCTION
Cyber security can be defined in many ways. It can be considered as a set of techniques used for the security practice to defend computers, servers, mobile devices, electronic systems, networks, and data from several cyber-attacks. However, now it has been extended and included other aspects like critical assets including information assets, infrastructure, and people and even processes [1]. Understanding about cybercrimes and cyber security is a must to reduce the cyber-attacks.
Achieving well accepted security posture is a challenging task for many organizations. It is very important to maintain sustainable security environment because to protect the sensitive data of the customers and organization from the hackers. In today’s world every organization can be affected by different kinds of cyber-attacks. It is always better to prevent the attack rather than responding to the attack after it occurs. Organization should adopt offensive and defensive measures to build a secure environment. These measures play a crucial role in developing an effective security posture in an organizational level. Each organisation possesses different domains and assets.
The work considers each security category in cyber security domain as a cyber-security asset. All existing maturity models were evaluated in domains with few limitations. For instance, security category (Authentication) is used in different domains and the maturity is calculated in a different manner as the authentication mechanism is adopted from different solutions, process and polices. In new proposed model we considered each security category as an asset and posed related questions to understand the existing defend process and controls. And also provide the recommendation controls to the respective cyber security asset.
Some of the cyber security assets in the organization are Authentication, Authorization, Sensitive data, Exception Management, Auditing and logging, Cryptography, Database, Access control, network, Configuration, error information disclosure, Data, Firewall configuration, security awareness training, secure development guidelines, Backup & restoration and many more …
Authentication: It is the process of validating and ensuring a user’s identity. With complex authentication it is very hard for the hackers for breaking into the systems.
Authorization: It is a security mechanism for specifying user/client privileges or access levels related to computer security and system security including files, computer programs, services, data and other application features.
Sensitive Data: Data should be classified by data owner like public, internal, restricted, highly restricted and critical. Security controls should be implemented based on the data classification.
Exception Handling: It is used to protect error information to attackers/unauthorized users. Hackers would construct attacks based on disclosed technology information.
Auditing& Logging: It is detection method which is used to investigate post security incident. Logs should be noted as read only mode and not store any sensitive information.
Database Security: Database is the collection of data including stored function, database systems and servers. The data in database can be easily accessed, modified and manipulated. So security should be provided.
Access control: It is a process of granting access to the users and certain privileges to resources, systems and information. Credentials must be presented by users before granting the access.
Email-Security: Email is a popular security platform for spreading malware, spam and other attacks. So providing security for an email communication is essential in organizations. Majority of the organizations allow Email application to be handled through Authentication procedure allocating access levels and creates a user hierarchy with policy. These policies will be put together and be part of the proposed framework.
Email security refers as a procedure or collective steps for access and content of an email account or service. It gives security for an individual or organization to protect the overall access to one or more email addresses/accounts.
Firewalls: A Firewall can be software or hardware or can be combination of both. Firewall is a network security system designed for the purpose of preventing unauthorized users entering into the private networks.
Incident management: It is the process takes place after an incident happened in an organization. It is the process involves steps like identify, analyze and taking steps to prevent the incident happening in the future. This is an important process which should take place in the right time.
Security awareness training: It is the process of educating employees in an organization about their procedures and corporate policies for developing a secure environment in information technology in an organization.
Secure guide lines should be developed and followed by all the IT and NON-IT employees in an organization.
Security Audit: It is the process of technical and manual assessment of a system or application and employees in an organization.
Backup & Restoration: It is the process used in case of data loss. Data backup process can be done only when copying and archiving data is done. So that data can be accessible in case of deletion and disruption. Restoration is important in case of any incidents happened in the organization level.
Removable media: This term referred as data storage devices which can be removed without powering off the system. This devices can transfer data easily from one system to another system. CDs, DVDs, USB drives, Bluray, disks are some examples of removable media.
This model gives asset based assessment. The term assessment means it is a process of collecting, reviewing and using data, for the purpose of improvement in the current performance. Assessing each asset in the organization leads to the improvement of security in all domains.
2. SYSTEMATIC STUDY OF EXISTING MATURITY MODELS
Maturity models are accomplished through effective planning, managing, responding to and recovering from threats and vulnerabilities. In the developing world, many organizations are not able to equip themselves with sufficient technology, or able to integrate capabilities or knowledge to achieve security posture within their organisation. Attaining different levels of maturity and capabilities is one of the most important method to determine the state of cyber security readiness. This can be done by maintaining a structured set of requirements or indicators to aid in progressively. There are some maturity models existed for the efficient development of security posture in the organization. Some of the frameworks will be discussed in the subsequent content mentioned below
2.1 NIST Cyber Security Framework:
It is a framework which has been issued within critical infrastructure sectors in order to provide guidance for the organizations to moderate the risk associated with security. It is a framework but not a maturity model so there is a necessity to adopt an existing maturity model or create one to have a common way to measure the CSF implementation progress.
NIST CSF implements critical infrastructure to enhance the security postures of organizations. It is generally recommended for organizations to complement the existing cyber security maturity model in the organization. This will help to define and prioritize their improvement areas in building the information security.
2.2 The Cyber Security Capability Maturity Model (CM2)
CM2 is developed to achieve and maintain security advantage by providing guidance on the necessary considerations and requirements. Society, technical, operational, business, legal and regulatory, and education/capability building measures are the principal underlying measures. CM2 can serve as the basis of comparative assessment across nations and enhances over time cross-border collaboration through buy-in [1].
A five factor model is proposed to elevate security advantage through advancement in capabilities. The stages of CM2 in turn influenced by 5-factor model as the premise for capability development in cybersecurity. It is proposed that to achieve sustainable security advantage countries need to dynamically build its capabilities to counter threats, vulnerabilities and advance with technology.
2.2.1 Levels of CM2
There are six capabilities and maturity levels for improving security advantage and cyber security capabilities which are indicated by the levels 0 to 5. The stages of human development are used to define the transition since a corollary can be seen, in that, through advancement in age and experience maturity is generally achieved. Also, it helps to clearly describe the level of capabilities or competencies in cyber security achieved at each stage.
0. Undefined or Prenatal: Undefined process and capabilities primarily non-existent.
1. Initial or Infant: unstructured process and development of capabilities are tentative, ad-hoc, reactive and threat-based.
2. Basic or Child: unstructured process and development of capabilities have basic coverage reactive and threat based.
3. Defined or adolescent: structured formal process and development of capabilities are defined in most areas proactive approach but still threat based.
4. Optimizing or Sage: structured formal process and development of capabilities are optimized, capability-based approach and continuous improvement to keep pace with technological development and changing environment.
5. Dynamic or Adult: structured formal process and development of capabilities are dynamic, more pervasive and advanced in all areas, and capability-based strategy is employed.
2.3 The Community Cyber Security Maturity Model (CCSMM)
This model was proposed to define healthier methods to outline the existing state of the communities in its cyber readiness and also to provide a roadmap for organizations to follow in their groundwork. This model includes different elements to address the issues faced by different communities. This model needs to define the metrics used for measurement, the technology that is required, the threats that are being addressed, mechanisms to communicate between the dissimilar community entities, and tests which can be used along with the metrics to measure the current status of a community’s security preparedness level. Community can actually possess organizations that are at different levels in the model at the same time. This model can differentiate between the different community organizations and their own level of cyber security readiness.
2.3.1 The five maturity levels are:
1. Security Aware: In this level the activities are carried out to make organizations and individuals aware of the threats, problems, and issues related to cyber security.
2. Process Development: In this level elements are designed to effectively address cybersecurity issues by establishing and improving upon the security process required.
3. Information Enabled: In this level specifies the awareness of all organizations within communities about issues related to security and have the methods and mechanisms in right place to identify security relevant events. The goal is to improve information sharing mechanisms among the organizations in the communities.
4. Tactics Development: IN this level more proactive methods are developed to efficiently address against threats and attacks .More prevention methods comes into place by this level.
5. Full Security Operational Capability: This is the top level of the model. In this level elements are developed to place the entities in the organization in a safe place so that prevents attacks and threats by doing everything they could. Communities at this level are in excellent shape to effectively respond in the event that they were not able to prevent an attack from succeeding in the first place.
2.4 A Security Engineering Capability Maturity Model
A Security Engineering Capability Maturity Model (SE CMM) is being developed to guide process improvement in the practice of security engineering. This model presents a framework for a mature security engineering process and organization that can lead to better, cheaper, and faster development of secure systems and products .This model consists of a sequence of levels that guides the security engineering organization towards process improvement through small, incremental steps. The goal of this model is to develop an organizational culture of continuous process improvement.
This model has five maturity levels. Those levels represents the maturity of security organizations. These maturity levels are based on both the levels defined in the SEI CMM and also factor in how well coordinated the security engineering practices are with each other, with other engineering disciplines, and with outside organizations. Each practice was assigned to a maturity level based on its complexity, dependency on other engineering disciplines, and level of definition and integration.
2.5 Limitations of existing models:
• All models can be adapted to different types of organizations; however, they need some level of customization.
• All Models perform different types of processes to get the maturity of cyber security. But there are no other models that work on assets, system components and all services of organization to evaluate individual maturity level.
• It was identified that all cyber security capability maturity models need a level of customization to be implemented in an organization.
• All cyber security capability maturity models are based on cyber security risk management not on the asset maturity.
3. PROPOSED MODEL
Figure 1. depicts the architecture of our proposed model named as Cyber Security Assessing Maturity for Organization (CSAMO). The model is built on IT firms for Category Based Maturity Evaluation. The Maturity Model has been divided into below modules.
Cyber Security Asset Inventory
Cyber security Asset Questionnaire
Asset Recommendation Solutions
Reports/charts
Figure 1: Architecture
3.1 Cyber Security Asset Inventory: It is a collection of all cyber security assets. Each and every asset has to be identified with the below details.
Asset Name
Asset Priority ( High, Medium , Low)
Asset type
Asset Description
Asset Starting Date
Asset Expiry Date
Asset Used Domain
Asset Owner
Figure 2 gives a screen shot about Asset Inventory
Figure 2: Asset Inventory
Asset can be added/modified/deleted from the cyber security asset inventory. There is an option to sort the asset based on priority, owner, and type. This inventory has a search option to find the existing asset from the list.
3.2 Asset Questionnaire: This module is having the comprehensive list of questions about the cyber security asset. Questionnaire covers the controls, practices and policies which supports all domains. Figure 3 depicts the specified module
Here we have given 4 options to each and every question to understand the existing practices for the asset. Options are as mentioned below
Not implemented
Partially Implemented
Fully Implemented
Continues Improvement
Figure 3: Asset Controls
Question-driven approach helps to expose the highest-risk design considerations and the security frame helps you to focus on the areas that reveal common mistakes. The module is implemented in detail that gives the list of controls, questions related to Cyber Security Asset as shown in Figure 3.
3.3 Authentication:
Is the Authentication mechanism planned/implemented for all domains? (Ex: form/windows/LDAP/SSO etc.…)
Does authentication happen in SSO service?
Are passwords required to immediately change the initial sign-in application?
Does the system/device/application require passwords to change regularly?
Is password entry for the system/device/application masked during sign-in?
And many more….
3.4 Authorization:
Do all applications integrate with any access manager product? (Oracle access manager, Tivoli access manager, CA access manager etc…)
Does the system/device/application accounts have least privilege?
Is there any existing process to request access to the system/device/application?
Is there any existing process to revoke access to the system/device/application?
Does the system/device/application maintain user access control list?
And many more…
3.5 Sensitive Data:
Is sensitive data classified in the organization?
Does the sensitive information secured at storage?
Does access control implemented to sensitive files?
Have you protected the sensitive information at transmit?
Are users/application/system passwords encrypted at storage? (Y/N)
And many more …
3.6 Exception Management:
Does application design outline a standardized approach to structured error/exception handling the application?
Does application exception handling minimize the information disclosure in case of an error / exception?
Does the application store errors/exception in the error log?
Does the application display generic/customised error message?
Does the application use platform specific error handle libraries?
And many more …
3.7 Auditing and Logging:
Does the design identify the level of auditing, logging necessary for the application and the key parameters to be logged and audited?
Are the user and system actions logged sufficiently for audit purpose?
Does the application architecture identify the storage, security, and analysis of the log files?
Are log files and application source files stored in the same location? (Y/N)
And many more …
3.8 Maturity Level Logic: This module contains the business logic to calculate the maturity of each cyber security asset and organization’s cyber security maturity. When the user selects the cyber security asset questions, each answer to the question carries specific score based on the option provided by the users. Figure 4 lists the criteria for evaluating the said parameters
Figure 4: Cyber security Asset Management Evaluation
Once calculate the scores of all questions related to specific cyber security asset to analyze the maturity of the specific asset. It also provides specific recommendation solutions to improve the maturity of this cyber security asset.
After user answered to all cyber security asset questions, the scores are calculated based on the answers and provides the report of final maturity level of organization. The exact recommendations to improve the exiting maturity of organization also provided.
3.9 Recommendation Solutions: It contains comprehensive list of the recommendation controls of the cyber security asset. When the user selects the options, this tool will display the recommendation controls.
User needs to select the existing recommendation controls from the available list to calculate the exact score of that particular question.
See the below few recommendation controls of cyber security asset.
Authentication:
Use strong passwords.
Support password expiration periods and account disablement.
Do not store credentials (use one-way hashes with salt).
Encrypt communication channels to protect authentication tokens.
And many more …
Authorization:
Use least-privileged accounts.
Consider authorization granularity.
Enforce separation of privileges.
Restrict user access to system-level resources.
And many more …
Sensitive Data:
Avoid storing sensitive data as plain text.
Encrypt sensitive data over the wire.
Secure the communication channel.
Provide strong access controls for sensitive data stores.
And many more …
Exception Management:
Use structured exception handling.
Do not reveal sensitive application implementation details.
Do not log private data such as passwords.
Consider a centralized exception-management framework.
And many more ….
Auditing and Logging:
Identify malicious behaviour.
Know what good traffic looks like.
Audit and log activity through all of the application tiers.
Secure access to log files.
Back up and regularly analyse log files.
And many more …
4. REPORTS
These modules collate all the information provided by users against the cyber security asset and generate the reports. Reports can be downloaded into different types
Html based report
PDF based report
Doc based report
Xls based report
Figure 5: Asset risk statistics
These reports gives the complete information of assets involved in criticality, scope and its maturity level, recommendations. The above Figure 5 depicts the same through pie chart
The below kind of graphs will be generated
Top 10 strong assets
Top 10 weak assets
All critical assets
All high assets
All medium assets
5. WHO CAN USE THIS METHODOLOGY
A methodology for assessing cyber security maturity for an organization was defined with flexibility such that it would be utilized by small, medium, and large organizations (Government, Private and Educational) using any style of development.
As our model is completely based on cyber security assets, it will be useful to organization teams to improve their cyber security control to their own assets.
Business Owners: Individuals performing decision making activities on business requirements.
CISO: Head of Cyber Security in the Organization, Asset owner, data owner, Organization board members.
Managers: Individuals performing day-to-day management of development staff.
Security Experts: Individuals performing cyber security activates in Organization.
Developers: Individuals who write code to develop the software.
Support Operations: Individuals performing customer support or direct technical operations support.
Clients: Individuals who can work/adopt the services of software in the organization.
6. ACKNOWLEDGEMENT
This work is supported by the eSF Labs Ltd as part of the project/consultancy work taken by Department of Computer Science and Engineering of KLEF. I am very thankful to all my colleagues at eSF Labs Ltd. for their continuous support and helping me in completing the project.
7. CONCLUSION
It is a complete cyber security asset based model where these assets can be used anywhere in the cyber security area without reassessment. It is flexible, adoptable, reusable, time and process benefits, easily maintainable and cost saving approach compared to other models. This model is adaptable to small, medium and high level organization. It gives the accurate cyber security maturity assessment for the organization. Centralized cyber security assets which can be used in existing and new domains without re-maturity assessment. This will reduce the process, people and time while creating new domains.
This model gives a better understanding of the organization’s cybersecurity posture; to improve cyber practices and maturity model of organization where there is a need for effective cybersecurity practices, identification of cybersecurity improvement areas and other solutions/Recommendations.
It avoids the duplication of controls which are used in different domains. Recertification Revalidation on existing cyber security assets is very easy because there is no need to test entire domain.
8. REFERENCES
Corlane Barclay “SUSTAINABLE SECURITY ADVANTAGE IN A CHANGING ENVIRONMENT: THE CYBERSECURITY CAPABILITY MATURITY MODEL (CM2) “IEEE 6858466.
Gregory B. White “The Community Cyber Security Maturity Model” IEEE 4076571.
Online “Assessment” icss-cert.
Online “Resources available for those impacted by Roosevelt Fire” wyohomelandsecurity.
Sultan Almuhammadi, Majeed Alsaleh “INFORMATION SECURITY MATURITY MODEL FOR NIST CYBER SECURITY FRAMEWORK” airccj vol7, csit76505.
Richard M. Adler “A dynamic capability maturity model for improving cyber security” IEEEXplore 10.1109/THS.2013.6699005
Corlane Barclay “Sustainable security advantage in a changing environment: The Cybersecurity Capability Maturity Model (CM2)” IEEEXplore 10.1109/Kaleidoscope.2014.6858466
“Cybersecurity Assessment Tool “ FFIEC May 2017
Nancy R. Mead ; Dan Shoemaker “The software assurance competency model: A roadmap to enhance individual professional capability” IEEEXplore 10.1109/CSEET.2013.6595243
Ganesh B. Regulwar ; V.S. Gulhane ; P. M. Jawandhiya “A Security Engineering Capability Maturity Model” IEEEXplore 10.1109/ICEIT.2010.5607700
“Software Assurance Maturity Model 1.0” Open samm
Ngoc T. Le , Doan B. Hoang “Can maturity models support cyber security?” IEEEXplore 10.1109/PCCC.2016.7820663
Richard Nilsen “A Developmental Study on Assessing the Cybersecurity Competency of Organizational Information System Users” Digital Commons Kennesaw State University
“Usable cyber security competency framework” Deliverable 3.2 ECESM
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download