Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Strategies

The hidden value in creating cybersecurity audit programs

  • Dale Peterson
  • December 8, 2021
Courtesy of Brett Sayles
Total
0
Shares
0
0
0
0

One of my first tasks after leaving the National Security Administration (NSA) for private industry in the early ’90s was to write my new company’s information security policy. I’m not sure my previous job as a cryptanalyst left me qualified for this, but I was viewed as the security guy. So I attacked the task with vim and vigor.

That first information security policy I wrote was a thing of beauty. I scoured the Orange Book and other resources to find every security requirement that might help us prevent a security incident. I picked the most rigorous option for every security control. There was no way we were going to get hacked. Not on my watch.

The policy came in at just under 100 pages. It was completely unusable. It was completely ignored.

I’ve learned a lot about effective security governance documents since that early fail. One of the unexpected, and quite frankly most effective, lessons learned is developing the audit program in parallel with a security governance document. The actual audit has value, as well, but I believe the planning for the audit prior to policy approval is even more important.

Mandatory and auditable statements

You need to be clear about whether you are writing a mandatory policy or procedure or a helpful guideline document filled with recommendations. Mandatory security governance documents are filled with sentences that use “must” or “shall.” These are not optional good security practices that are encouraged or security controls to consider. They are firm requirements that carry consequences if they are not followed.

Security governance documents in which only some of the security requirements are considered real and enforced are unfair to all. How are the employees to know which “musts” or “shalls” are serious and which are only guidance? You risk losing the benefits of the whole policy if large portions are considered guidance rather than policy.

The key is to write a security audit test for every “must” or “shall” prior to releasing even the first full draft of the policy. There are multiple benefits to this approach:

1. You will identify security requirements that cannot be audited because it is unclear what is required. If they are unclear, it will be impossible for your people to do what you intended in the security requirement.

2. You will identify security requirements that will require a huge effort to meet. Writing the audit tests forces you to look at the practical ramifications and work necessary to meet the requirement. Typical discussions on this issue are, “Do we really expect our people to do this?” and “This is going to be a huge, ongoing investment in time and resources to meet this requirement. Is it worth it?”

Security professionals can fall into the trap of thinking every good practice should be implemented. After all, the name “good practice” or the increasingly popular “cyber hygiene” imply that not doing something is bad or dirty. Each security control is going to have an associated cost and risk reduction achieved. The audit document will help you understand this, and it may result in the easing or eliminating of some planned security controls.

3. You will identify security requirements that are difficult to audit. And conversely, you will find ways to write security requirements that are simple and automated to audit using products such as Tripwire. More on this later.

4. You will have the audit program ready on Day 1 when the policy is approved.

This last point is very different than what we see in most companies today. Internal or external audit will get tasked with a security audit, and part of their task is to figure out what to audit and how to audit. The success or failure of the audit is highly determined by the auditor’s decision on the audit program. This doesn’t serve the company, those being audited or the auditors well.

It should be clear to the audited and auditor what evidence will be required to pass each audit test as soon as the security policy is approved.

Cybersecurity audit tests

Audit tests can include interview, inspection, configuration file review, data analysis and other means. To the degree possible, using tools to generate audit data is a big plus. This reduces the time and cost of the audit. Perhaps even more important, it can provide ongoing metrics so that the security posture is something that is known and managed at all times rather than once a year after the annual audit.

The benefits of automating the generation of audit data and metrics is so great that you should consider which data sources you have during the writing of the security policy. Tripwire has compliance templates for multiple security standards such as NERC CIP. A similar approach could be taken to monitor compliance with your company’s security governance.

One last lesson from writing and auditing security governance documents: The first audit almost always goes poorly, and it should be viewed as a security awareness exercise more than an audit. The people responsible for the security requirements will then understand what is required, and it is likely that some of the security requirements will be modified. The second audit is when consequences for audit failures should begin, and progress towards compliance should be seen audit by audit.

Original content can be found at dale-peterson.com.

Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.

Dale Peterson

Dale Peterson is the founder, chief executive and head catalyst of industry security provider Digital Bond.

Related Topics
  • CFE Content
  • Featured
Previous Article
  • IIoT & Cloud

How industrial control systems can be secure in the cloud

  • David Masson
  • December 7, 2021
Read More
Next Article
Figure 1: Asset visibility and network monitoring. Courtesy: Velta Technology
  • IT/OT

What OT teams can learn from IT teams

  • Dino Buasalachi
  • December 10, 2021
Read More
You May Also Like
Read More

Protecting Critical Infrastructure eBook

Courtesy: Bundy Group
Read More

Cybersecurity mergers and acquisitions and capital markets update

Read More

Webcast: How to Protect Against Supply Chain Attacks

Courtesy of: Louisiana State University
Read More

Taking a ‘hands-on’ approach to smartphone identity verification

Courtesy: Applied Control Engineering Inc.
Read More

New funding will help University of Arizona grow the cybersecurity workforce

Hero and Rajapaske stand next to the microscope display showing an image of the multiplying B-cells. (Courtesy of: Silvia Cardarelli, Electrical and Computer Engineering, University of Michigan)
Read More

Immune to hacks: Inoculating deep neural networks to thwart attacks

Read More

Introduction to ICS security fundamentals

Courtesy: CFE Media and Technology
Read More

NSF award will help IUPUI train, increase diversity of next wave of cybersecurity engineers

SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Berkeley Internet Name Domain (BIND) - May 19, 2022
  • Mitsubishi Electric - May 19, 2022
  • Apache - May 16, 2022
  • CISA - May 16, 2022
  • Joint Cybersecurity Advisory - May 17, 2022

RECENT NEWS

  • Throwback Attack: Hackers attempt to flood Israeli water supply with chlorine
  • Will CISA recommend securing industrial control systems?
  • How to implement layered industrial cybersecurity in volatile times
  • Throwback Attack: DDoS attacks are born in the Big Ten
  • Improve two-factor authentication system security

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT