Tuesday, September 26, 2017

Security Should Pay, Not Cost

1. Security --A Cost of Doing Business
There is a television commercial in the U.S. that shows an automobile mechanic. In one hand
he has some worn piston rings. In the other he holds an oil filter. The mechanic looks from
hand to hand and says, "You can pay me now, or you can pay me later." The point of the
commercial is that friction is inevitable. It is a cost of running an automobile. It is
inescapable. You will pay. The only choice that is open to you is how you pay. You may pay
in a regular and orderly manner, or you may pay in a destructive and unpredictable manner,
but you must pay.

So it is with information protection. It is a cost of doing business. It is unavoidable. You will
pay. The only choice that you have is how you pay. You can pay in a regular, orderly, and
business-like manner, or you can pay in an irregular and unpredictable manner, but you must
pay.

Now, I know what you are thinking. You are thinking that those rings came from an
American car, not from a Mercedes or a BMW. You are thinking of all those stories that you
have heard about the little old lady who drove her 500 SEL for a million kilometers without
ever changing the oil, much less the filter. Perhaps you can get away with not changing your
oil filter. Perhaps you will be lucky.

But the mechanic in our advertisement portrays himself as a friend, giving friendly advice. He
is trying to help us understand our choice so that we will make the one that is best for us. He
too has heard the story about the little old lady; he's even seen some of those cars. But he
understands that those cars are the exceptions. While one driver may get away with it, for
most drivers and cars, periodic changes of oil filters is a smart and efficient policy.
While one department or manager within your organization may get away with poor security,
taken across all departments and all managers, security can pay and its absence will put the
health ofthe business at risk. You are in the role of the friendly mechanic. It is your job to
convince management in general and managers in particular to change their oil filters. 

2. Security Should Pay; not Cost 
Security should pay, it should not cost. Management has a fundamental responsibility to 
conserve and protect the assets and interests of the institution and its constitutents. However, 
it should spend no more to do that than will contribute to the objectives of the institution, at 
least across the whole institution and across time. Security is a means, not an end. As with 
safety programs, personnel programs, recognition programs, and the like, we have security 
programs because they contribute to the bottom line. 

3. Efficiency 
Some of you, with keen ears for English, might have noted that I said "security can pay." It 
does not necessarily do so. As with anything else, it is possible to pay too much for security. 
Of course, if you do, then it will not pay. Courtney's second law says, "You should spend no 
more to deal with a risk than tolerating it will cost you." 

Security must be efficient. That is, it must be effective without waste. A security measure is 
efficient when it costs less than the alternatives, including the alternative of doing nothing. A 
collection of security measures is efficient over time when the sum of the cost of losses and 
the cost of the measures is at a minimum. Infinite security means infinite cost, and zero 
security means intolerable losses. 

Of course, there is part of the problem. This is a difficult number to know. While we can 
measure the cost of security measures, the frequency of large losses is low and the period 
long. The cost of frequent, but controllable, losses is often beneath our notice and, when 
noticed, is not seen as related to the cost of security. Therefore, it is difficult to identify the 
value of our day-to-day activity, to convey it our management, and to motivate our peers and 
colleagues. 

We have a saying in English, "No one promised you a rose garden." No one promised that 
management was easy. If it were easy, it might not pay so well and offer such nice working 
conditions. 

One important form of efficiency is consistency. It is important that security measures result 
in a similar level of security across like parts of the institution and similar resources. We do 
not want to spend a great deal of money to raise the average height of a fence by greatly 
increasing the height of one section while leaving most of it alone. Therefore, efficiency 
requires that like resources receive similar protection. It requires that all resources receive the 
appropriate protection, while reserving expensive measures for only those resources that need 
them. 

4. Efficient Management Systems 
Having said that, we can now begin to identify efficient management systems and efficient 
measures. 

It may be that there are some institutions that are so homogeneous that one level of protection 
would serve for all but a small, easily identified, set of their resources. I have not encountered 
one in my 25 years in this field. It may also be that there is a management system, other than 
classifying resources by their sensitivity or according to the protection measures that they 
measures that they should get, that will ensure that everything is properly protected but 
expensive measures are reserved. Again, I have not encountered one, but wonders never 
cease. In the meantime, I do not expect to see an institution the size of those represented here 
that has an efficient security program that does not require management to classify and label 
information resources. 

5. Efficient Measures 
While we tend to focus our attention on the effectiveness of security measures, efficiency is 
inversely proportional to effectiveness. That is to say, the most effective measures are rarely 
efficient. Either they cost too much, or they have too large a negative impact on our ability to 
accomplish other objectives. The most important factor in efficiency is the breadth of the 
measure. Those measures that are most efficient are those that address the largest set of risks, 
including: 

• Direction to employees 
• Management supervision 
• Physical security 
• Access control 
• Encryption 
• Data base backup 
• Contingency planning . 

Tell your people what you expect and what you rely upon them for. When employees fail to 
do what we expect, it is far more often the result of a failure to communicate on our part than 
of any failure of motive or intent on theirs. 

‘Supervise. Note variances from intent or expectation and take timely corrective action. 
Management supervision is the most general, flexible, and effective of all controls. We use 
others only to the extent that they are more efficient. 

Provide a safe environment. The test should be that what is safe for people will generally be 
safe for computers and information. The skills and special knowledge of your people makes 
them irreplaceable, while property is cheap, and information easily copied. 

Limit access to sensitive and valuable resources. The more valuable the resource, the more 
layers of control and the fewer the number of people with access. 

When you cannot limit access to information, then record it in codes that only the intended 
parties can read. Modem cryptography can be fully automated and arbitrarily strong. It 
enables us to protect infonnation independent of the media on which it is recorded or the 
environment through which it must pass. We can implement both logical envelopes and 
logical signatures. We can compose these to simulate any control that we have ever been able 
to implement with paper. Using the computer, we can do these things in a manner transparent 
to the user and too cheap to meter. 

Create multiple copies of important data and distribute them over space such that not all 
copies are vulnerable to the same event. Consistent with the needs to keep the copies current 
and confidential, the more the better. 

Use slack time and resource before a disaster to reduce the cost and duration of the outage. 
You will survive and recover from most disasters. The issue is not whether you will survive 
but, rather, of how much it will cost and how long it will take to return to nonnal. Do not 
focus on tactics that might fail, or might not apply, but on strategies that must succeed. 

None of these measures is one hundred percent effective against any hazard; all involve some 
residual risk. Therefore, their efficiency does nol result from their effectiveness versus their 
cost. Rather, it results from the number of hazards that they address. While not completely 
effective against any exposures, they are efficient because they marginally reduce our exposure 
to a large number of risks and vulnerabilities, some of which we cannot even identify in 
advance. 

Now, that is all there is to it. That is half a century of experience in a nutshell. That is 
all you really need to know. But it is only the beginning of what you must do. 

Note that what is good for one security objective may be bad for another. The more copies of 
the data, the lower the likelihood that they will all be destroyed, but the greater the chance 
that one will be disclosed. Security is the act of balancing the cost of security measures 
against the cost of losses. The balance is not stable; It requires the continual application of 
experience and judgment. 

6. The Price of Security 
So we see how we should manage and what measures we ought to employ. All of this begs 
the question of how much we ought to spend. It may be that what I have said so far is all that 
can be confidently said on the issue. On the other hand, my experience suggests that these 
answers are not satisfying. To say that "you should spend less than it would cost to do 
nothing" is unsatisfying ifthe cost of doing nothing cannot be readily known. 

Most organizations cannot tell you with much confidence how much they spend on security. 
Their books are not set up to measure things so small. Neither can they tell you much about 
the cost oflosses; the books are not set up to track things that occur so seldom. 

Early in my career, I used to respond to this question by saying that if you were spending 
more than three percent of your budget on security, then you were not likely to be efficient. 
The longer I am in the business, the lower the number gets. Perhaps it is as little as one-tenth 
of one percent. That is to say, perhaps one employee in a thousand works full-time in 
security. 

How much you spend may be a measure of intent, but it is not a measure of accomplishment. 
Accomplishment is measured by how well you spend. We maximize our chances of spending 
wisely by spending on the efficient measures. Now it is time to get on with it. 

You can pay me now, or you can pay me later. 

No comments:

Post a Comment