Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
140 views1 page

Metric Based Security Assessment

This document proposes a Metrics Based Security Assessment (MBSA) that combines the ISO 17799 information security standard with the Systems Security Engineering Capability Maturity Model (SSE-CMM). It argues that previous approaches to assessing system security are not effective. The MBSA aims to overcome weaknesses by using security metrics to measure security efforts in a consistent, reliable and timely manner. This will allow organizations to better evaluate the effectiveness of security tools/techniques and qualitatively measure returns on security investments. It presents the MBSA framework and process for mapping metrics to the SSE-CMM model to provide a self-assessment tool for measuring an organization's information security maturity.

Uploaded by

sresearcher7
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
140 views1 page

Metric Based Security Assessment

This document proposes a Metrics Based Security Assessment (MBSA) that combines the ISO 17799 information security standard with the Systems Security Engineering Capability Maturity Model (SSE-CMM). It argues that previous approaches to assessing system security are not effective. The MBSA aims to overcome weaknesses by using security metrics to measure security efforts in a consistent, reliable and timely manner. This will allow organizations to better evaluate the effectiveness of security tools/techniques and qualitatively measure returns on security investments. It presents the MBSA framework and process for mapping metrics to the SSE-CMM model to provide a self-assessment tool for measuring an organization's information security maturity.

Uploaded by

sresearcher7
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Metrics Based Security Assessment (MBSA): Combining the ISO 17799 Standard with the Systems Security Engineering

Capability Maturity Model (SSE-CMM)


J.E. Goldman, V.R. Christie
1

Department of Computer Technology, School of Technology, Purdue University, West Lafayette, IN 47907

Abstract
This research introduces the Metrics Based Security Assessment (MBSA) as a means of measuring an organizations information security maturity. It argues that the historical (i.e., first through third generations) approaches used to assess/ensure system security are not effective and thereby combines the strengths of two industry proven information security models, the ISO 17799 Standard and the Systems Security Engineering Capability Maturity Model (SSE-CMM), to overcome their inherent weaknesses. Furthermore, the authors trust that the use of information security metrics will enable information security practitioners to measure their information security efforts in a more consistent, reliable, and timely manner. Such a solution will allow a more reliable qualitative measurement of the return achieved through given information security investments. Ultimately, the MBSA will allow professionals an additional, more robust self-assessment tool in answering management questions similar to: How secure are we?

Problem
Defining specific, timely metrics in the field of information security is not easy; in fact, such metrics are in their infancy. Though the lack of specific, timely measures with which to measure information security is significant, the overall requirement for information technology security is not questioned by organizations. However, the need to measure and evaluate the effectiveness of the tools and techniques used to secure todays highly connected, alwayson businesses continues to grow. The desire to arrive at a single discrete value by which to buy or rate new technologies and/or to commit organizational resources to information security initiatives has largely been inadequate; in fact, the techniques currently used are neither generally accepted nor reliable measures for rating information technology security or requisite security assurance. As argued by the National Institute of Standards and Technology (NIST), information security metrics are needed to understand the current state of system security, to improve that state, and to procure/obtain the necessary resources to implement improvements. Effectively, there are no measures, no standard way of scoring security implementations. Unfortunately, the practice of developing information security metrics is an undeveloped science.
Figure 1 MBSA Architecture

Proposed Solution
Using the SSE-CMM as the guiding framework and complementing that with the ISO 17799 Standard, a self-facilitated information security metrics model can be developed that will offer the security community a tool that may be transposed across cultural, organizational and structural jurisdictions. Furthermore, such a model will offer security professionals a flexible tool that can be adapted to their specific needs or easily used as a starting point in designing their own information security metrics. As a final contribution, a model of this nature may be used to better assess the maturity of an organizations information security practices, and provides a clearly defined path toward improvement.

Figure 2 MBSA to SSE-CMM process model mapping


Legend 2002 Underlined 2003 Highlighted 2004 Box 2005 Bold

Category Metric Maturity Level Goal Scale/Rating Frequency

Implementation Evidence Data Source

Description Identify the metric being assessed. Identify the SSE-CMM level goal for this control (e.g., Level 2, etc.). Identify the percentage of maturity level goal attainment via the previously documented definitions (see Response Scale, above). Identify: The date of the current assessment An appropriate frequency of assessments (i.e., how often) Proposed date for the next assessment Justify the assessors rating of the control. Identify the sources/references/resources used to make the assessment.

Metric

Maturity Level Goal Scale/Rating Frequency

Implementation Evidence Data Source

Terms and conditions of employment state employee responsibilities regarding information security and (where appropriate) are continued for a period of time after the employment period. Level 3 012345 N/A Unknown Current Date: Frequency: Next Assessment Date: Sample only. Sample only.

Figure 3 Metric templates

You might also like