Tools for bulding a Security Program
A comprehensive security program requires strategic planning, clear governance structures, and continuous improvement. This guide explores the essential frameworks, processes, and best practices that security leaders need to establish robust security programs that protect organizational assets while enabling business objectives.
Summary
Governance
  • Tools for Building a Security Program
  • Governance
  • Security Policy Governance Life Cycle
  • Roles & Responsibilities
  • Three Lines Model of Defense
Risk Management
  • Risk Management
  • Risk Profile and Appetite
  • Risk Treatment Strategies
Frameworks
  • Frameworks
  • CIS Controls Foundation
  • NIST Cybersecurity Framework
  • ISO 27001 Requirements
Compliance & Regulation
  • EU Cyber Resilience Act
  • Cyber Resilience Act Key Requirements
  • Compliance
  • Regulatory Compliance Landscape
  • GDPR Key Requirements
Threat Intelligence
  • Threat Intelligence
  • Intrusion Kill Chain
Security Functions
  • Security Functions
  • Security Architecture Function
  • Risk Culture
  • Pillars to Change the Business
  • Threat Management
  • Audit and Monitoring
Assessment
  • Assessment
  • Enterprise Risk Management
Cryptography
  • Cryptography
  • Symmetric vs. Asymmetric Encryption
  • Cryptographic Hash Functions
  • Digital Certificates
  • Digital Certificates and PKI
Emerging Technologies
  • Emerging Technologies
  • Blockchain Technology
Privacy
  • Privacy
  • Privacy Principles
  • NIST Privacy Framework
  • Consent Management
Secure Development
  • Secure Development
  • OWASP Top Ten
  • Application Security Testing
  • Web Application Firewall
Cloud Security
  • Cloud Security
  • Cloud Security Tools
  • Cloud Architecture Security
Identity & Access
  • Identity & Access
  • IAM Security Capabilities
  • Zero Trust Network Access
Network Security
  • Network Security
  • Network Security Controls
  • Network Attack Vectors
Malware & Endpoints
  • Malware
  • Endpoint Protection
Vulnerability Management
  • Vulnerability Management
  • Vulnerability Management Maturity
  • Vulnerability Scanning Tools
  • CVSS Scoring System
Patch Management
  • Patch Management
  • Patch Management Workflows
  • Endpoint Management Capabilities
Metrics
  • Metrics
  • Metrics Hierarchy
Security Awareness
  • Security Awareness
  • Strategic Plan for Awareness Programs
  • Training Methods
  • Security Awareness Metrics
Business Skills
  • Negotiation
  • Zone of Possible Agreement
  • Negotiating Tips
  • Procurement
  • Total Cost of Ownership
  • Analytical Hierarchy Process
  • Project Management
  • Project Methodologies
  • Work Breakdown Structure
Leadership
  • Leadership
  • Building Excellence in Security
Governance
Policy and Standards Framework
A policy provides direction for defining standards, guidelines, and procedures. Policies serve as the foundation of your security program, establishing the rules and expectations that guide organizational behavior. They must be clear, actionable, and aligned with business objectives to be effective.
The policy pyramid illustrates the hierarchy from high-level principles down to specific baselines. At the top are principles—the highest-level ideas and values that serve as reference points to guide organizational conduct. Policies follow, providing high-level mandatory statements that define courses of action. Standards offer medium-level instructions with prescribed criteria, while guidelines provide best practices for achieving policy objectives. Procedures detail the discrete steps employees follow, and baselines contain the most specific configuration requirements.
Socializing policies is critical for success. This involves distributing policies electronically or through awareness training, employee onboarding, or published employee handbooks to communicate organizational policies to employees and third parties. Without proper socialization, even the best-written policies will fail to achieve their intended purpose.
Security Policy Governance Life Cycle
The security policy governance life cycle ensures policies remain relevant and effective. The develop phase involves documenting drafts and revisions for ratification. Socialize distributes policies through training and handbooks. Measure provides ongoing compliance review and enforcement mechanisms. Assess reviews policies as internal processes evolve, technology changes emerge, or new threats expose the organization to additional risks that need management.
Roles & Responsibilities
RACI Matrix for Security Programs
Responsible
The person or group who actually performs the work. There must be at least one person defined for each activity.
Accountable
The person ultimately accountable for ensuring the work is completed. There must only be one person defined.
Consulted
Those who have knowledge about a topic and should be consulted on the matter before decisions are made.
Informed
Those who need to be informed about progress and kept updated on activities and outcomes.
In the Responsibility Assignment Matrix (RACI), accountable defines the person who is ultimately accountable for ensuring that work is completed. There must only be one accountable individual to avoid confusion and ensure clear ownership. The consulted role refers to those who have knowledge about a topic and should be consulted on the matter, providing valuable input without being directly responsible for execution.
Three Lines Model of Defense
The Three Lines Model from the Institute of Internal Auditors describes best practices for assigning risk-related roles and responsibilities within an organization. Risk management is included in the second line of defense, which provides expertise, support, monitoring, and challenge on risk-related matters.
The first line consists of operational management who own and manage risks. The second line includes risk management and compliance functions that provide oversight, monitoring, and challenge. The third line encompasses internal audit functions that provide independent assurance. Line 3 responsibilities should provide value to lines 1 and 2 by helping them understand the efficacy of information security controls in place, ensuring controls adequately provide intended results and deliver value.
This model ensures proper separation of duties while maintaining accountability to stakeholders for organizational oversight. The governing body provides direction and oversight, while management takes actions to achieve organizational objectives. Internal audit delivers independent and objective assurance and advice on all matters related to achievement of objectives.
Risk Management
Understanding Risk Components
Asset
Anything that may be affected in a manner whereby its value is diminished or the act introduces liability to the owner.
Threat
A threat has the potential to harm assets such as information, processes and systems and therefore organizations.
Vulnerability
Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited by a threat source.
The basic risk formula is Risk = Impact × Likelihood, with likelihood composed of both threat and vulnerability. What threats are potentially harmful and what vulnerabilities are likely to be exploited? Incorporating this understanding, the risk formula becomes Risk = Impact × (Threat × Vulnerability). This formula helps organizations quantify and prioritize security risks based on both the potential damage and the probability of occurrence.
Risk Profile and Appetite
Key Risk Concepts
The risk profile is a snapshot of the organization's overall risk at any point in time. Risk capacity represents the absolute maximum risk an organization can incur before facing existential threats.
Risk appetite defines the level of risk that an organization will accept to meet business objectives. This is a strategic decision that balances opportunity with protection. Risk tolerance refers to the thresholds that allocate risk appetite to certain types of risks, providing operational boundaries for decision-making.
Risk Appetite Statement
A risk appetite statement (RAS) is a critical policy that defines the number and types of risks that an organization is willing to take to meet business objectives.
Benefits include guiding and informing strategic planning, optimizing resource allocation, and ultimately helping the organization create a more risk-aware culture.
Risk Treatment Strategies
1
Mitigate
Implement additional controls with defined tolerance levels to reduce risk to acceptable levels.
2
Accept
Continue current activities when risk falls within acceptable tolerance levels.
3
Avoid
Choose not to engage in certain activities that present unacceptable risk levels.
4
Transfer
Transfer risk to a third party through insurance or hedging agreements.
Organizations mitigate risk by implementing additional controls with defined tolerance levels. This is distinct from accepting risk by continuing current activities, avoiding risk by not engaging in certain activities, or transferring risk to a third party through insurance or hedging agreements. The choice of strategy depends on the organization's risk appetite, available resources, and business objectives.
Frameworks
Three Types of Security Frameworks
Control Frameworks
Provide baseline sets of controls for security programs. Examples include NIST 800-53 and CIS Controls.
Program Frameworks
Define systematic approaches for building security programs. Examples include ISO 27001, NIST CSF or CRA.
Risk Frameworks
Provide methodologies for evaluating and managing risk. Examples include ISO 27005 and FAIR.
A program framework like the ISO 27000 series can help an organization assess the state of its overall security program by conducting industry comparisons. The ISO 27000 framework is a systematic and holistic approach for defining, building, operating, and monitoring a security program that helps the organization achieve business objectives. The CIS Controls and NIST 800-53 are control frameworks that provide a baseline of controls better suited for creating a security program than they are for revamping an existing one. FAIR is a risk framework best suited to complement other frameworks by providing a quantitative means of evaluating risk.
CIS Controls Foundation
An organization developing a security program needs to begin with a control framework like the CIS Controls. They define the "Top 18" controls that have been shown to mitigate the majority of the most common and impactful security attacks. A control framework provides an industry-accepted baseline set of controls that serves as the initial roadmap for a security team and program.
The CIS Controls Self Assessment Tool (CSAT) allows you to gather accurate information about your organization and answer simple questions about whether policy is defined and controls are implemented, automated, and reported. This practical approach helps organizations understand their current security posture and identify gaps that need to be addressed.
Of the available frameworks, only the CIS Controls are specifically designed as a control framework for organizations just starting their security journey. The others—ISO 27001 as a program framework, and ISO 27005 and FAIR as risk frameworks—are more suitable for programs that have had time to develop and mature.
NIST Cybersecurity Framework
01
Govern
Establish organizational context, risk management strategy, roles, policies, and oversight.
02
Identify
Develop understanding of assets, business environment, and risks to enable focus on critical areas.
03
Protect
Implement safeguards to ensure delivery of critical services and limit impact of events.
04
Detect
Develop and implement activities to identify occurrence of cybersecurity events.
05
Respond
Take action regarding detected cybersecurity incidents to contain impact.
06
Recover
Maintain plans for resilience and restore capabilities or services impaired by incidents.
The NIST Cybersecurity Framework contains six high-level functions that define a common language for managing security risk. Risk assessment strategy is included within the "Identify" function, along with Asset Management and Improvement. Identity management, authentication, and access control is part of the protect function, supporting the goal of ensuring delivery of important services.
ISO 27001 Requirements
ISO 27001 defines information security management system requirements and areas of focus when building a security program. These include organizational context, leadership, planning, support, operation, performance evaluation, and improvement. The ISO 27006 provides requirements for certification bodies, ISO 27002 provides implementation guidance for controls, and ISO 27003 provides implementation guidance for management.
The ISO 27000 series defines a family of standards for information security, also referred to as the Information Security Management System (ISMS). An ISMS is made up of the policies, procedures, guidelines, resources, and processes that an organization uses to protect information assets. It also includes the documents and standards that make up the framework for security, helping ensure coverage is complete while serving as the outline rather than providing low-level guidance.
ISO 27005 defines an iterative risk management process that consists of context establishment, risk assessment, risk treatment, risk acceptance, risk communications and consultation, and risk monitoring and review. This comprehensive approach ensures organizations can effectively manage information security risks throughout their lifecycle.
EU Cyber Resilience Act
The EU Cyber Resilience Act (CRA) is a regulation that establishes horizontal cybersecurity requirements for products with digital elements placed on the EU market. It addresses the historically low level of cybersecurity in connected devices and the inconsistency in security updates provided by manufacturers.
Key Objectives
  • Strengthen cybersecurity of hardware and software products with digital elements
  • Ensure manufacturers provide security updates throughout the product lifecycle
  • Improve transparency about security properties of products
  • Create a uniform legal framework across the EU internal market
Scope
The CRA applies to products with digital elements (hardware and software) placed on the EU market, including Internet of Things (IoT) devices, software applications, and connected products. It excludes certain medical devices, aviation, and automotive products that are already covered by existing sector-specific legislation.
Product Categories
  • Default products: Standard cybersecurity requirements
  • Important products: Enhanced requirements and conformity assessment
  • Critical products: Strictest requirements with third-party certification
Essential Requirements (Annex I)
  • Secure by design and by default
  • Protection against unauthorized access
  • Confidentiality, integrity, and availability of data
  • Minimize attack surface and vulnerabilities
  • Secure software development lifecycle
  • Vulnerability handling and disclosure
Manufacturer Obligations
  • Conduct cybersecurity risk assessments
  • Provide security updates for a defined support period
  • Report actively exploited vulnerabilities within 24 hours
  • Provide security documentation and Software Bill of Materials (SBOMs)
  • Maintain technical documentation for 10 years
Timeline
The regulation entered into force in 2024, with full application expected 36 months after its entry into force, which will be around 2027.
Compliance
Third-Party Certifications
SOC 2 Type II
The most commonly used report to obtain independent validation that a security program is following industry best practices. Focuses on five trust service principles and addresses operational effectiveness of specified controls over a specified time.
ISO 27001
Validates that the information security management system (ISMS) is properly designed, implemented, and in operation according to international standards.
FedRAMP
US government program that defines standard security approach for cloud products and services. A federal standard for services in the cloud.
CMMC
Cybersecurity Maturity Model Certification for U.S. Department of Defense contractors who handle Controlled Unclassified Information. Requires third-party assessment.
Regulatory Compliance Landscape
United States
  • GLBA - Financial sector protection of consumer financial information
  • HIPAA - Healthcare sector protection of patient health information
  • COPPA - Protection of children's online privacy
  • CPRA - California consumer privacy rights and data protection
International
  • GDPR - European Union comprehensive data protection regulation
  • CRA - Cyber Resilience Act
  • Privacy Act - Australia and Canada personal information protection
  • PIPEDA - Canadian electronic document privacy protection
An important step toward reducing risk is to draft security policies that align with the legal, contractual, and regulatory controls for your industry. Policies should reflect the current state of maturity in the organization while meeting compliance obligations. Division-specific policies should be avoided as they can be difficult to implement organization-wide.
GDPR Key Requirements
Breach Disclosure
Notification within 72 hours of becoming aware of a breach. Penalties up to 4% of global turnover or €20 million, whichever is higher.
Personal Data Rights
Obtain customer consent to collect data, describe what data is collected, provide data in portable format, implement right to erasure and correction.
Security Program
Implement data protection by design and default, appoint a data protection officer, perform data protection impact assessments.
Ireland, as part of the European Union, requires compliance with the General Data Protection Regulation (GDPR). One of the security program requirements within the GDPR is the appointment of a data protection officer who oversees data protection strategy and implementation to ensure compliance with GDPR requirements.
Cyber Resilience Act Key Requirements
Essential Cybersecurity Requirements
  • Products must be secure by design and by default
  • Protection against unauthorized access and exploitation
  • Minimize attack surface and vulnerabilities
  • Ensure confidentiality, integrity, and availability of data
  • Implement secure software development lifecycle practices
  • Provide mechanisms for secure installation, updates, and deletion
Manufacturer Obligations
  • Conduct cybersecurity risk assessments before placing products on market
  • Provide security updates for defined support period (minimum 5 years or product lifetime)
  • Report actively exploited vulnerabilities to ENISA within 24 hours
  • Report severe incidents within 72 hours
  • Provide Software Bill of Materials (SBOM) for critical products
  • Maintain technical documentation for 10 years after product placement
  • Provide clear security documentation to users
Conformity Assessment
  • Default products: Self-assessment by manufacturer
  • Important products: Third-party assessment or self-assessment with notification
  • Critical products: Mandatory third-party certification by notified body
Market Surveillance
  • National authorities monitor compliance
  • CE marking required for products meeting requirements
  • Penalties for non-compliance up to €15 million or 2.5% of global turnover
  • Products can be withdrawn from market for non-compliance
Threat Intelligence
MITRE ATT&CK Framework
MITRE ATT&CK is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations. It strives to make threat analysis even more actionable by focusing on how adversaries gain access and what they do once they obtain access. This practical approach helps security teams understand attacker behavior and implement effective defenses.
The framework provides a comprehensive matrix of tactics and techniques that adversaries use throughout the attack lifecycle. By understanding these patterns, defenders can better anticipate attacker moves, identify gaps in their defenses, and prioritize security investments. The knowledge base is continuously updated based on real-world incidents and threat intelligence, making it an invaluable resource for security professionals.
Organizations can use MITRE ATT&CK to assess their security posture, identify coverage gaps, and develop detection and response capabilities aligned with actual adversary behavior. This threat-informed defense approach is more effective than traditional compliance-based security strategies.
Intrusion Kill Chain
The Intrusion Kill Chain defines a seven-step process that attackers follow to achieve their goal. By breaking just one link in the chain of steps in the attack process, the defender can disrupt the adversary and stop the attack. Understanding in detail the attackers' perspective and approach enables defenders to gain an advantage against even the most sophisticated attackers.
This means that you can more easily protect against zero-day exploits, which are only one phase of the overall Kill Chain (that is, Exploitation), by identifying and blocking attackers before they reach their ultimate goal in the final Actions step. Attackers must progress through each phase of the chain to achieve their goal, and breaking just one link disrupts the adversary. By understanding the attackers' perspective, defenders can gain an edge against even the most sophisticated attackers and protect against zero-day exploits.
Security Functions
Core Security Functions
Govern
Risk management to identify and prioritize areas of greatest impact. Compliance management to fulfill regulatory obligations. Oversight to run program, align to business, manage finances and metrics. Asset management for inventory of hardware, software, and services.
Identify
Risk assessment to evaluate vulnerabilities and threats. Security architecture to determine how security controls should be designed and improved to meet business requirements.
Protect
Data protection for data at rest and in motion. Vulnerability management to identify and remove weaknesses. Identity and access management to ensure only authorized users have access to resources.
Detect
Threat management to monitor for actors attempting to cause harm. Includes SOC operations, SIEM analysis, and penetration testing to identify security gaps.
Respond
Incident management and forensics to respond to and investigate incidents. Technical incident response actions to contain and minimize damage.
Change
Culture and change execution to champion a risk-aware culture. Sustain change across organization, manage talent, and deliver security awareness programs.
Security Architecture Function
A security architecture determines how security controls are designed to meet business requirements by addressing the modern threat landscape. A security architecture function should first understand the business drivers to then identify technology requirements to accomplish business goals. As part of this work, security standards serve as references for other parts of the team and organization.
Security architecture frameworks provide different perspectives on building secure systems. TOGAF focuses on the process to create enterprise architecture and artifacts. SABSA describes layers of abstraction and business attributes, focusing on requirements. The Open Group O-ESA defines governance, principles, policy, technology, and security operations best practices. OSA provides visual design patterns and corresponding security controls.
When compared to a structural architect, SABSA is equivalent to understanding the required diagrams and corresponding building codes, like the maximum number of allowed bedrooms, parking requirements, and egress requirements. By analyzing business requirements from the start, you can link business goals to technology throughout the process.
Risk Culture
Three Types of Risk Cultures
1
2
3
1
Poor Risk Culture
Even when informed and told what to do from a security perspective, people tend to do the wrong thing. Indicates lack of risk and security governance and need to improve security awareness and implement measures to change behavior over time.
2
Typical Risk Culture
People may be generally aware of security issues, but they need to be reminded. This can come in the form of increased awareness training, monitoring, and recognition. Continuous effort and oversight are required to remind people what should be done.
3
Powerful Risk Culture
Security, privacy, and risk are seen as core principles for the business. People tend to do the right thing even when they are not told or reminded what to do. This represents the ideal state for organizational security culture.
In a typical risk culture organization, people may generally be aware of security issues, but they need to be reminded. This can come in the form of increased awareness training, monitoring, and even recognition. This is a much better place to be than in a poor risk culture, but continuous effort and oversight are required to remind people what should be done.
Pillars to Change the Business
Outcome-Focused Culture
Drive to outcomes and not just results. Focus on achieving meaningful business objectives rather than simply completing tasks or meeting metrics.
Frictionless Security
Seek to improve user experience and business processes. Security should enable business rather than impede it, making secure choices the easy choices.
Risk-Aware Culture
Embed an understanding of security and risk throughout the organization. Every employee should understand their role in protecting organizational assets.
These three pillars work together to transform how organizations approach security. An outcome-focused culture ensures security investments deliver real business value. Frictionless security removes barriers that might tempt users to work around controls. A risk-aware culture distributes security responsibility throughout the organization rather than concentrating it in a single team.
Threat Management
Threat Management Overview
Threat management encompasses monitoring, analysis, and detection of security threats. This includes a security operations center (SOC) that maintains situational awareness of systems by monitoring logs that are typically consolidated in a SIEM system. To understand and manage threats, the SOC also leverages internal and external threat intelligence to gain insight into attacker tactics, techniques, and procedures (TTPs).
Sometimes, it might be necessary to demonstrate adversary attack methods via penetration testing or red team exercises as well. These proactive security assessments help organizations understand their vulnerabilities from an attacker's perspective and validate the effectiveness of their security controls.
The SOC performs five key activities: collection of security data from various sources, detection of suspicious events, triage to set priorities for events, investigation to verify whether events are malicious or benign, and incident response to contain and remediate confirmed security incidents. This systematic approach ensures efficient use of security resources while maintaining comprehensive threat coverage.
Audit and Monitoring
Regular Audits
How do you know if policy is being followed? Regular audits and monitoring help detect policy violations. In some organizations, the internal audit department serves this function and reports to the board on the current state of compliance.
Continuous Monitoring
Measure is an ongoing effort to review compliance with policies and provide an enforcement mechanism to change behavior when gaps are recognized between written policy statements and employee actions that cause unnecessary risk for the organization.
Assessment Process
The assess step of the security policy governance life cycle involves reviewing policies as internal processes evolve, technology changes emerge, or new threats expose the organization to additional risks that need to be managed.
Assessment
Assessing Your Security Program
The CIS Controls Self Assessment Tool (CSAT) allows you to gather accurate information about your organization and answer simple questions about whether policy is defined and controls are implemented, automated, and reported. This practical tool helps organizations understand their current security posture and identify areas for improvement.
The NIST SP 800-53 document is quite lengthy. Its 450+ pages contain information about every security and privacy control that you could possibly implement. ISO 27005 is a risk framework suitable for organizations with mature security programs. Reviewing group policies, critical updates, and privileges is important but is not enough to assess controls comprehensively.
A program framework like the ISO 27000 series can help an organization assess the state of its overall security program by conducting industry comparisons. The ISO 27000 framework is a systematic and holistic approach for defining, building, operating, and monitoring a security program that helps the organization achieve business objectives.
Enterprise Risk Management
ERM Definition
ERM is an integrated and continuous process for managing enterprise-wide risks—including strategic, financial, operational, compliance, and reputational risks—in order to minimize unexpected performance variance and maximize intrinsic firm value.
Key Components
This process empowers the board and management to make more informed risk/return decisions by addressing fundamental requirements with respect to governance and policy (including risk appetite), risk analytics, risk management, and monitoring and reporting.
Risk management is included in the second line of defense as outlined by the Institute of Internal Auditors (IIA) in the Three Lines of Defense in Effective Risk Management and Control, which describes best practices for assigning risk-related roles and responsibilities within an organization. This model ensures proper separation of duties while maintaining accountability for risk management activities.
Cryptography
Cryptography Fundamentals
Encryption is the encoding of a message to conceal content. The unencrypted message is the plaintext, and the encrypted message is ciphertext. Decryption, in contrast, reveals the content (or plaintext). The key is a variable parameter used to transform the message. The development of an effective key management solution is critical when planning out an encryption strategy, regardless of the mathematics used to encrypt.
Symmetric key cryptography uses a single key for both encryption and decryption; this key is the shared secret between sender and receiver. Because symmetric key encryption uses only one key for both encryption and decryption, the key must be kept secret; it is also referred to as secret-key encryption. The primary application of symmetric encryption is privacy, such that only the parties with the key can encrypt and decrypt messages for each other.
Kerckhoff's principle states that a cryptosystem should be secure even if everything about the system, except the key, is public knowledge. In other words, there's no such thing as security by obscurity. Do not create your own cryptographic algorithms. Key management is vital—attack the key, not the mathematics. The user can be the target of attack.
Symmetric vs. Asymmetric Encryption
1
AES (Symmetric)
  • Speed: Thousands of times faster than RSA
  • Strength: 128-bit AES comparable to 3072-bit RSA in resisting attack
  • Cannot exchange keys with opponent watching
  • Used for bulk data encryption
2
RSA (Asymmetric)
  • Can exchange keys with opponent watching
  • Slower than symmetric encryption
  • Used for key exchange and digital signatures
  • Provides non-repudiation
The solution combines the best of both approaches: exchange AES keys securely with RSA, then exchange data rapidly with AES. This hybrid approach leverages the speed of symmetric encryption for data protection while using asymmetric encryption for secure key exchange and authentication.
Cryptographic Hash Functions
Leveraging a hashing algorithm (like SHA-256 or MD5) can provide message integrity. Given the result of a hash, one cannot re-create the input except through exhaustively guessing every possibility. If even one letter of a message changes from the time it is entered on the website to when it is written to the database, the hash will change significantly, indicating there has been a compromise.
Hash Message Authentication Code (HMAC) combines hashing with a secret key. The goal is integrity and authenticity across an insecure medium such as the internet. While not sufficient for end-to-end confidentiality, it can be a building block. HMAC is commonly used for website shopping carts where the secret key is your password—the message (your order) and HMAC are sent together over the internet.
Integrity means that it should be possible to prove a message has not been tampered with, that a received message is exactly the same as the one that was sent. This is a fundamental security principle that cryptographic hash functions help achieve through their one-way, collision-resistant properties.
Digital Certificates
Transport Layer Security (TLS)
01
Client Hello
Client initiates connection and sends supported cipher suites and TLS versions.
02
Server Hello
Server responds with chosen cipher suite, protocol version, and digital certificate containing public key.
03
Key Exchange
Client and server generate and exchange keys to use for encryption.
04
Session Keys
Both parties create session keys from random information exchanged earlier in the handshake process.
TLS must be used to encrypt data in transit. Do not use the legacy Secure Sockets Layer (SSL). The term "SSL" is still widely used to refer to TLS as well. TLS provides encryption at TCP/IP transport layer with confidentiality through symmetric encryption, integrity through hashing, authentication through signed certificates, and non-repudiation through digital signatures.
Digital Certificates and PKI
X.509 is the standard for certificates. Each certificate contains demographic data, validity period, supported encryption algorithm, public/private key, and signature from issuing CA. The serial number of revoked certificates is added to the certificate revocation list (CRL). The subject alternate name contains all the (web server) names that a certificate can secure.
Public Key Infrastructure (PKI) is a set of practices and technology used to manage digital certificates and public-key encryption. It includes keys, certificates, protocols, policies, and roles. A Certificate Authority (CA) binds public keys with people and organizations, ensures that the entity requesting the certificate is authentic, and issues the digital certificate. A hierarchy of certificate authorities creates the certificates that make up the public key infrastructure.
Commonly used CAs include IdenTrust, DigiCert, Comodo, Let's Encrypt, and Go Daddy. These are trusted by web browsers and other software. Server-side certificates are usually called SSL or TLS certificates and provide a means for client systems to determine the authenticity of the server, in addition to providing the basis for all encrypted connections to the server.
Emerging Technologies
Quantum Computing and Cryptography
Grover's Algorithm
Grover's algorithm is a quantum search algorithm that runs quadratically faster than any equivalent classical algorithm. Practically speaking, it defeats the strength of symmetric ciphers and cryptographic hash functions by a factor of two.
Mitigation Strategy
Doubling key size can mitigate this attack. Organizations should begin planning for post-quantum cryptography to ensure long-term data protection against quantum computing threats.
Trusted Platform Module (TPM) is a separate processor that stores keys on a hardware chip on your device. It enables trusted boot (by verifying the computer's hardware and software) as well as whole disk encryption. TPM also includes a random number generator to generate cryptographically strong random numbers, which is essential for secure key generation.
Blockchain Technology
Blockchain is a decentralized, distributed, and oftentimes public, digital ledger consisting of records called blocks that is used to record transactions across many computers so that any involved block cannot be altered retroactively. This technology provides transparency, immutability, and security through cryptographic techniques.
Proof of work requires miners to create hashes to find values that meet a certain "difficulty" level. The difficulty level is based on the number of leading zeros in the hash. A value is accepted to the blockchain when enough other systems confirm and accept your solution. This consensus mechanism ensures the integrity of the blockchain.
Proof of stake offers an alternative approach where miners "stake" a portion of their holdings. They promise not to spend it to participate in consensus decisions. The probability of being chosen to create a new block is proportional to the percentage of the overall stake they control. This method is more energy-efficient than proof of work.
Privacy
Data Types and Privacy
Anonymous Data
Not unique or tied to a person. Cannot be used to identify individuals even when combined with other data.
Pseudonymous Data
Unique identifier that does not identify a person but could be associated with an individual through additional information.
Personally Identifiable Information
Identifies a specific individual. Includes name, address, phone number, email, and other direct identifiers.
Sensitive PII
Identifiable information that has higher risk. Includes financial data, health records, biometric information, and other sensitive categories.
Any information relating to an identifiable individual constitutes PII: name, alias, national identifier (i.e., Social Security number), date of birth, location of birth, addresses, photographs, x-rays, fingerprints, vehicle registration, department of motor vehicle number, mother's maiden name, shopping habits, email/mobile phone number. The combination of non-PII can create PII.
Privacy Principles
Predictability
Users should be able to predict how their data will be used and protected.
Manageability
Users should have control over their personal data and how it is used.
Disassociability
Data should be separated from personally identifiable information when possible.
Confidentiality
Data should be protected from unauthorized access and disclosure.
Integrity
Data should be accurate, complete, and protected from unauthorized modification.
Availability
Data should be accessible to authorized users when needed.
Privacy and security principles must be balanced. The left side of the scale includes privacy principles: predictability, manageability, and disassociability. The right side includes security principles: confidentiality, integrity, and availability. Organizations must find the right balance between these competing interests to protect both data and user rights.
NIST Privacy Framework
Identify-P
Inventory and mapping, business environment, risk assessment, data processing ecosystem risk management.
Govern-P
Governance policies, processes, and procedures. Risk management strategy, awareness and training, monitoring and review.
Control-P
Data processing policies, processes, and procedures. Data processing management and disassociated processing.
Communicate-P
Communication policies, processes, and procedures. Data processing awareness for stakeholders.
Protect-P
Data protection policies, identity management, authentication, access control, data security, maintenance, and protective technology.
Consent Management
Explicit Consent
To collect and use personal information, organizations often need to obtain consent. Explicit consent requires users to take a specific action allowing data to be collected and used. Opt-in consent is most beneficial for users because the action will not occur unless the user agrees.
Implicit Consent
The user gives implicit consent by continuing their activity after the warning. Implicit consent is granted simply by engaging in a certain activity, rather than explicitly giving consent by checking a box.
Organizations must be transparent about data collection and use. Privacy policies should clearly explain what data is collected, how it will be used, who it will be shared with, and how long it will be retained. Users should have the ability to access, correct, and delete their personal information. These principles are fundamental to building trust and maintaining compliance with privacy regulations.
Secure Development
Secure Software Development Lifecycle
Injecting security into various SDLC phases is essential for building secure applications. Popular methodologies include Microsoft SDL and Security Touchpoints. The goal is to move security further left in the process, addressing security concerns as early as possible when they are less costly to fix.
Coding errors found in production are 30 times more costly to fix than coding errors found during development when they are created. Similar costs apply to design and integration errors found at later stages of the development cycle. It pays to find defects earlier in the SDLC through proactive security measures and testing.
The secure SDLC includes security requirements and abuse cases in the requirements phase, threat modeling and attack surface analysis in design, code review and static analysis in development, security testing and dynamic analysis in testing, and final security review with incident response planning in production. Each phase builds upon the previous to create a comprehensive security approach.
OWASP Top Ten
1
Broken Access Control
Failures in access control allow unauthorized users to access restricted functionality or data.
2
Cryptographic Failures
Inadequate protection of sensitive data through weak or missing encryption.
3
Injection
Untrusted data sent to an interpreter as part of a command or query.
4
Insecure Design
Missing or ineffective control design that cannot defend against attacks.
5
Security Misconfiguration
Insecure default configurations, incomplete setups, or verbose error messages.
The OWASP Top Ten from the Open Web Application Security Project is a consensus list of the most critical security risks to web applications. Developers can use it to introduce security early in the development cycle. This list is regularly updated to reflect the current threat landscape and provides practical guidance for addressing each risk category.
Application Security Testing
SAST - Static Analysis
Static Application Security Testing analyzes the static, or non-running, application code. Includes source code, byte code, and binaries. Three types of tools exist: code quality and style, bugs and functional correctness, and security-focused SAST tools.
DAST - Dynamic Analysis
Dynamic Application Security Testing tests the dynamic, or running, application. Includes web applications, APIs, microservices, and clients. Can use active scanning (sending malicious data) or passive scanning (observing responses).
Tool support varies across technology stacks. There is good support for widely used languages and platforms, but a lag in support for new languages and technologies. Good security-focused tools are typically commercial offerings. DAST tools can be run through a GUI requiring a skilled operator, or in headless mode to automate regular scans.
Web Application Firewall
Web Application Firewalls (WAFs) provide the ability to monitor and block HTTP/HTTPS traffic, looking for common attack types and behaviors. Traditional WAFs are deployed at the network level, receiving traffic via a switch span port or inline via a tap. Next-generation WAFs are deployed at the application level, integrated with the web server or a web proxy.
Many WAFs are deployed in monitor mode only due to the risk of blocking legitimate traffic. This is because many teams running a WAF do not often know what is legitimate application traffic versus malicious traffic. WAFs inspect both HTTP and HTTPS traffic and can be integrated into web servers and web proxies.
WAFs may block legitimate traffic, which is a significant concern. However, they provide valuable protection against common web application attacks including SQL injection, cross-site scripting, and other OWASP Top Ten vulnerabilities. Organizations should carefully tune their WAF rules to minimize false positives while maintaining strong security protection.
Cloud Security
Cloud Shared Responsibility Model
Under the cloud shared responsibility model, the customer's responsibility for security varies depending on the type of cloud service used. For Platform-as-a-Service (PaaS) like Azure SQL Database service, the customer is responsible for data classification and accountability, including access to the data. The cloud provider is responsible for the host infrastructure, which includes endpoint protection, operating systems on virtual machines, and network controls including firewall settings.
For Infrastructure-as-a-Service (IaaS), customers have more responsibility including operating system configuration, network security, and application security. For Software-as-a-Service (SaaS), the provider takes on most security responsibilities while customers remain responsible for data classification, user access management, and proper configuration of the service.
Understanding this shared responsibility model is critical for cloud security. Organizations must clearly understand which security controls they are responsible for implementing and maintaining versus those managed by the cloud provider. This clarity prevents security gaps and ensures comprehensive protection.
Cloud Security Tools
CSPM
Cloud Security Posture Management scans public cloud IaaS and PaaS offerings, compares configuration to benchmarks and best practices, and identifies misconfigurations and insecure settings.
CWPP
Cloud Workload Protection Platform scans "cloud native" infrastructure, supports container-based and Kubernetes architectures, and identifies issues in private, public, and hybrid deployments.
CASB
Cloud Access Security Broker provides visibility and control of SaaS solutions, identifies SaaS services used by the organization, and can provide access control and encryption.
The Center for Internet Security (CIS) has published security benchmarks for the leading cloud providers that can be used as a baseline for the security of cloud services and platforms. These benchmarks provide detailed configuration guidance for securing cloud environments according to industry best practices.
Cloud Architecture Security
In a modern architecture, the tried-and-true principles of confidentiality, integrity, and availability are still important. However, the cloud-first approach has highlighted the importance of taking additional principles into account. Sounil Yu created a model called the D.I.E. triad that nicely summarizes these foundational principles: distributed, immutable, and ephemeral.
Modern architectures assume the use of public infrastructure and platform cloud services (e.g., AWS, Azure, GCP), the use of multiple software-as-a-service offerings (e.g., Microsoft 365, Google Workspace, Salesforce, Slack, ServiceNow), and connections back to traditional, legacy data centers. The security requirements have changed from being defined by network-based information to being defined by identity and contextual information.
If the network is not trusted, then measures must be taken to secure network traffic. The two main factors when providing security in a seemingly hostile environment are to enforce authentication and encryption. Encryption provides confidentiality between two systems, and authentication allows them to identify themselves before sending data.
Identity & Access
Authentication Factors
Something You Know
Knowledge-based authentication including passwords, PINs, security questions, and other information only the user should know.
Something You Have
Possession-based authentication including hardware tokens, smart cards, mobile devices, and other physical items.
Something You Are
Biometric authentication including fingerprints, facial recognition, iris scans, and other biological characteristics.
Multi-Factor Authentication (MFA) is based on more than one factor. Passwordless authentication is based on something you have or are, eliminating the weakest link of passwords. Organizations should implement MFA wherever possible to significantly reduce the risk of unauthorized access, even if credentials are compromised.
IAM Security Capabilities
Directory
Central repository for identity related information including user, role, group, and certificate information. Examples: Active Directory, Entra ID, Okta Universal Directory.
Single Sign-On
Centralized authentication with federated SSO using SAML and social logins via OpenID. Examples: Okta, Microsoft Entra ID.
Identity Governance
Manages onboarding and offboarding lifecycle and workflows. Examples: Sailpoint, Saviynt.
Privileged Access
Privileged access governance, delegation and secrets management. Examples: CyberArk, Delinea.
Zero Trust Network Access
Gartner defines Zero Trust Network Access (ZTNA) as a product or service that creates an identity- and context-based logical access boundary around an application or set of applications. Notice the focus on identity and context. Interestingly, perimeter-based approaches are not included in the definition.
Mutual Transport Layer Security (TLS) authentication requires both the client and server to authenticate. That means that even if a system is vulnerable, an attacker cannot connect to it because they must first steal the client certificate to authenticate. In this way attacks are both prevented and detected because any invalid authentication attempts will be logged.
Ideally, network traffic is secured through mutual bidirectional authentication and encryption. Two solutions that allow this are TLS and IPsec. TLS is a transport-layer solution, and IPsec is kernel level. Single packet authorization (SPA) and 802.1X provide authentication methods by default but no encryption.
Network Security
Network Security Fundamentals
OSI Model Layers
The network layer handles interaction with the network address scheme and connectivity over multiple network segments. It describes how systems on different network segments find and communicate with each other. The Internet Protocol (IP) is associated with this layer.
Transport Protocols
TCP is the most commonly used transport layer protocol today. It establishes a virtual connection between hosts and provides reliable connections over possibly unreliable networks. Unlike UDP, which blindly sends datagrams, TCP can guarantee packet arrival or notify of problems.
Switches operate at the data link layer and can provide a basic type of segmentation. A switch consults its content-addressable memory (CAM) table and only directs a data frame to the system or network segment for which it is destined, narrowing each port to its own collision domain. Routers and firewalls operate at layer 3 and direct traffic based on internal route tables and destination addresses.
Network Security Controls
Firewalls
A firewall is a type of router that actively determines whether traffic can pass the device based on configured rules and policies.
IDS/IPS
IDS collects packets from the network for analysis in a passive manner. IPS is more active, designed to prevent malicious traffic by blocking it.
Web Proxy
A web proxy has security benefits including blocking undesirable content, allowing listing of known good sites, and segmenting device access to resources.
VPN
VPNs can be configured with split tunneling where certain traffic goes directly to the Internet while other traffic is sent to the corporate network over an encrypted tunnel.
Network Attack Vectors
Worms like Mirai are self-replicating programs that scan networks for vulnerable Internet of Things (IoT) devices, such as CCTV, HVAC, and other building management systems. The initial version of Mirai used a set of 64 default user ID/password combinations. It is generally best to keep IoT devices on a segregated network to limit the potential impact of compromise.
In switch spoofing, an attacker imitates a trunking switch to enable access to target VLANs. MAC spoofing occurs when an attacker changes their MAC address to impersonate another device on the network. ARP cache poisoning involves sending fake ARP replies so that the attacker receives regular user traffic at their MAC address.
A smurf attack occurs when an ICMP request packet is sent to the broadcast address with a spoofed IP. This results in most devices on the network responding to the spoofed IP address, inundating the victim with replies. Configuring the router not to forward packets to the broadcast address can easily mitigate this attack.
Malware
Malware Overview
Virus
Software that is hidden in a normal program or file and spreads by infecting other files.
Trojan Horse
Pretends to be a normal program or utility to trick the user into installing it.
Spyware
Used to gather data without the target's knowledge and send data to another party without consent.
Rootkit
Modifies the operating system or other programs to hide malicious software to prevent detection.
Worm
Replicates itself to spread to other systems without requiring user interaction.
Ransomware
Performs malicious action such as encrypting data, with the goal of extracting payment from the victim.
Malware is malicious software used to intentionally cause damage to target systems. One especially troublesome form of alteration attack is the rootkit, which is designed to subvert the system in such a way that the system is fully compromised, yet almost impossible for the defender to detect the compromise on the system.
Endpoint Protection
Endpoint Protection Platform (EPP) is a solution deployed on endpoint devices to prevent file-based malware attacks, detect malicious activity, and provide the investigation and remediation capabilities needed to respond to dynamic security incidents and alerts. EPP capabilities go beyond traditional signature-based antivirus and static indicators of compromise.
Modern EPP can include behavioral analysis, machine learning, artificial intelligence, and managed services like threat hunting. Deception capabilities can trick attackers into revealing themselves. Deployment options include cloud-based and on-premise solutions, with cloud-based offering advantages in speed of updates and reduced processing burden on endpoints.
File Integrity Monitoring (FIM) validates integrity of system and application files using cryptographic hashes. It compares current hashes to a known good baseline to identify unexpected changes that can indicate malicious activity. FIM helps organizations meet compliance objectives that require monitoring of system integrity.
Vulnerability Management
Vulnerability Management Process
The vulnerability management process consists of five key phases that work together to reduce organizational risk. The prepare phase creates the governance structure, policies, processes, and asset inventory. Identify performs vulnerability scans to discover weaknesses. Analyze evaluates risk, defines controls, and prioritizes response. Communicate defines metrics and reports activities to operations and management teams. Treat patches vulnerabilities, implements security controls, and verifies remediation.
Asset inventory is the lynchpin of an effective vulnerability management improvement program. A comprehensive and well-maintained asset inventory is a foundational capability for every security program. Knowing the footprint of an organization (or the scale of the problem) is vital for determining approach and prioritization strategies.
Vulnerability Management Maturity
1
2
3
4
5
1
Level 1: Initial
Ad-hoc vulnerability scanning with basic processes and metrics. Regulatory driven approach with manual external scanning.
2
Level 2: Managed
Scheduled vulnerability scanning with emerging processes. Basic patching and scan to patch correlation.
3
Level 3: Defined
Risk focused approach with measurable processes. Scanning prioritized with data and remediation driven by priority.
4
Level 4: Quantitatively Managed
Attacker and threat focused with threat driven metrics. Remediation based on risk to critical assets.
5
Level 5: Optimizing
Aligned with business goals and unified processes. Comprehensive identification based on risk with continuous remediation.
When all the work of an organization is risk focused, the organization has achieved the "Defined" level of vulnerability management maturity. The highest level of maturity is a program with a robust metrics framework in place to track progress and measure impact, resulting in continuous improvement and demonstrated return on investment.
Vulnerability Scanning Tools
When to Use
  • Host Scanning: Foundational component of every security program
  • Web App Scanning: Use basic capabilities for scale or dedicated tools for detailed analysis
  • Penetration Testing: Leverage for specific use cases and ongoing red team exercises
  • Attack Simulation: Automated, ongoing ability to execute real-world attacks
  • Compliance Scanning: Ongoing evidence of adherence to compliance requirements
  • Cloud Configuration: Gain visibility into cloud security misconfigurations
Tool Examples
Vulnerability scanners include Qualys, Rapid7, and Tenable. Web application scanners include Acunetix, Burp Suite, IBM AppScan, and WhiteHat. Attack simulation tools include AttackIQ, Verodin, and SafeBreach. Cloud configuration tools include AWS, Azure, Orca, Wiz, and Palo Alto Networks Prisma Cloud.
CVSS Scoring System
Common Vulnerability Scoring System (CVSS) provides a standardized way to assess vulnerability severity. The Base Metric Group includes exploitability metrics (attack vector, attack complexity, attack requirements, privileges required, user interaction) and impact metrics (vulnerable system and subsequent system confidentiality, integrity, and availability).
The Threat Metric Group measures exploitability, including exploit maturity and whether the vulnerability is being actively exploited. The Environmental Metric Group defines mitigations and compensating controls, including confidentiality, integrity, and availability requirements. The Supplemental Metric Group provides additional context without modifying the score.
Vulnerabilities for which exploits exist usually present the highest risk. The focus should be on vulnerabilities that have a known exploit, then determine which CVEs are being exploited. Addressing these vulnerabilities first reduces the chances of an attacker gaining unauthorized access. Strategies based on volume or age of vulnerabilities may address low severity vulnerabilities with no known exploits first, leaving exploitable vulnerabilities available to attack.
Patch Management
Patch Management Service Levels
Define three tiers of patch management workflows for different degrees of criticality. Pre-approved patches are "standard" or "routine" changes that are documented but approved by default—strive to have the majority of patches fall in this category. Patches to sensitive business systems require a more rigorous testing process. Emergency patches are for critical security issues.
Patch Management Workflows
1
Pre-Approved
Standard or routine changes documented but approved by default. Majority of patches should fall here.
2
Sensitive Systems
Require rigorous testing process. Include patches to databases or legacy systems of record.
3
Emergency
For critical security issues. Cannot always be started immediately but follow defined schedule.
Some patches can be defined as standard or routine changes. These patches are known to have no impact or minimal impact to systems and are approved by default; they can be deployed at any time. Emergency changes cannot always be started immediately—define an emergency change schedule to guide patch rollout with priority based on business impact to the systems in question.
Endpoint Management Capabilities
Endpoint management tools provide integration with vulnerability scanning solutions, asset inventory for both hardware and software, patch deployment and scheduling for OS and application patches, configuration and compliance management with ability to run scripts before and after patch installation, and cloud-based deployment for endpoints frequently disconnected from corporate network.
Key considerations include the ability to group systems to stage patch deployment and conduct testing, deploy updates from a central server to limit bandwidth utilization, and support for third-party applications with breadth of application support and ability to configure and script installation packages for silent installation, EULA removal, and auto-update disabled.
Tailor your approach for your organization. Small companies might integrate with service management tools because the service desk administers endpoints. Large companies should consider scalability, number of endpoints per patching server, distribution methods, and bandwidth usage. Don't patch the whole cluster at once, and sequence patches appropriately considering dependencies between web, application, and database servers.
Metrics
Vulnerability Management Metrics
72hrs
Window of Exposure
Average time systems are vulnerable to critical flaws, tracked by business unit with trend over time.
95%
Scanning Coverage
Percentage of assets included in regular vulnerability scanning with trend over time.
30d
Time to Remediate
Average time to remediate vulnerabilities from discovery to resolution with trend analysis.
5d
Processing Time
Average time to process and prioritize vulnerabilities with trend over time.
The communicate step of the PIACT vulnerability management process includes communicating the current state of your vulnerability landscape and regularly publishing metrics to show progress or lack thereof. Use a metrics hierarchy with technical, operational, and executive levels to ensure appropriate detail for each audience.
Metrics Hierarchy
Technical Level
  • Percentage of assets in inventory
  • Percentage of vulnerabilities processed via risk-rating
  • Percentage of assets with recent security updates
  • Percentage of assets recently scanned
  • Percentage of vulnerabilities not remediated within SLA
Operational Level
  • Average time to process and prioritize vulnerabilities with trend
  • Patch deployment coverage with trend
  • Vulnerability scanning coverage with trend
  • Average time to remediate vulnerabilities with trend
Executive Level
  • Window of exposure to critical flaws in hours/days with trend by business unit
  • Describe risk and any variance or significant drivers to metric
The executive column illustrates how senior leadership often will not want to be bogged down with too much information. They want to know the "so what?" In this example, "window of exposure" can be the one metric that summarizes the overall work on your vulnerability management program.
Security Awareness
Security Awareness Maturity Model
Non-Existent
No formal security awareness program exists. Ad-hoc training at best.
Compliance Focused
Annual training to meet compliance requirements. Focus on checking boxes rather than changing behavior.
Promoting Awareness & Behavior Change
Regular training and reinforcement activities. Focus on changing specific behaviors and measuring impact.
Long Term Sustainment & Culture Change
Security embedded in organizational culture. Takes 3-10 years to achieve. Focus on beliefs, values, and perceptions.
Metrics Framework
Robust metrics track progress and measure impact. Continuous improvement with demonstrated ROI.
Strategic Plan for Awareness Programs
A strategic plan consists of a three-step process: First, identify what are your top human risks. Second, determine what are the behaviors that manage those risks. Third, decide how you will change those behaviors. The goal is to provide the right training to the right people and nothing more.
As you identify risks you will have two categories of human risk. Core risks are common risks shared across most if not all your workforce, such as phishing or passwords. Role-specific risks are unique to different roles and are usually in addition to foundational risks. This targeted approach ensures training is relevant and effective.
The Fogg Behavior Model states that the key variables to changing behavior are motivation and ability. The greater you increase either variable, the more likely you are to change a behavior when a trigger happens. This is represented by the formula: Behavior = Motivation × Ability × Prompt. Understanding this model helps design more effective training programs.
Training Methods
Primary Method
Provide full training in a single package. Your goal is to convey all the topics at once, often annually. This is where most awareness programs begin and the part that meets most compliance requirements. Often mandatory.
Reinforcement
Does not teach anything new, reinforces topics taught during primary training. Key to changing behaviors. Rarely mandatory. Addresses issue that different people learn differently.
If you are only doing primary training, then you are in compliance mode. The forgetting curve shows that without reinforcement, people quickly forget what they learned. Regular reinforcement activities help maintain knowledge and change behaviors over time. This can include simulated phishing exercises, security tips, posters, newsletters, and other ongoing communications.
Security Awareness Metrics
Impact Metrics - Behaviors
Measure if training is changing people's behaviors, attitudes, or perceptions. Example: Number of people who detect and report a phishing email.
Impact Metrics - Strategic
Measure how your security awareness program is supporting your organization's overall security program. Example: Average time it takes to detect an incident.
Compliance Metrics
Measure what your awareness program is doing, who you are training and how. Example: Percentage of employees who have completed annual awareness training.
Ambassador Program Metrics
Measure the activity and impact of a security ambassador program. Example: Frequency with which ambassadors engage or communicate to their local team.
The biggest difference between technical and human metrics is that people have feelings. Announce your metrics program ahead of time, start slow and simple, do not embarrass people, do not release names of those who fail, include Board/Executives as targets, and focus on real-world risks rather than tricking people.
Negotiation
Negotiation Strategies
1
Distributive Bargaining
Assumes the pie is fixed. My gains are equal to your losses (win-lose). One party claims value at a cost to the other party. Grounded in each party's "best alternative to a negotiated agreement" (BATNA).
2
Integrative Bargaining
Focuses on each party's interests (win-win). Attempts to grow the pie by creating value. Develops a package of negotiating elements. Cooperate to increase each other's gains.
Many real-world negotiations combine both strategies. First the parties increase the pie by creating value through integrative bargaining. Then each party claims value to get as big a piece of the pie as it can through distributive tactics. Understanding when to use each approach is key to successful negotiations.
Zone of Possible Agreement
Reservation values depend on each party's BATNA (Best Alternative To a Negotiated Agreement). The Zone of Possible Agreement (ZOPA) exists when there is overlap between the parties' reservation values. The seller will not accept less than their reservation point, while the buyer will not spend more than theirs.
For a negotiation to result in agreement there must be an overlap in the parties' reservation values. If the terms are lower than the reservation value for all parties, all parties believe they will be better off with no agreement. An integrative strategy will not change that unless priorities are reexamined and changed.
Open communications are key to creating value. Beware of fixed pie assumption, establish shared interests, determine differences, and pursue trust while being aware both sides usually mislead one another as part of negotiation strategy. Never internalize—don't allow past negotiations to color future negotiations with a person.
Negotiating Tips
Expect Change
The only thing that is certain is change. In a negotiation, expect and be alert for change. Don't be afraid to revisit already negotiated topics.
Use Silence
When you make a statement in a negotiation quit talking. If you keep talking because the other party is silent, you are likely to weaken your position.
Consider Total Cost
Price is certainly the easiest metric, but can be misleading. Performance and total cost of ownership are much harder to calculate but more accurate.
Timing Matters
Speed is often a mistake in negotiations. A good deal today should still be a good deal tomorrow. Patience can save money, especially near end of quarter or year.
Walking Away
Never force a bad deal. Walking from the negotiating table is high stakes if you take it seriously, but it is also very effective.
Procurement
Vendor Selection Process
Involve as many vendors as possible. Ensure requirements do not artificially limit your options. Have a common set of questions to ask each vendor. Use ricochet responses—bounce vendor answers off the competing vendors. Answers that sound good aren't necessarily good, sound answers.
When someone is uncertain there will usually be a delay, blanket statements, badmouthing competitors, or revealing body language. Get first-hand information by talking to other customers and references, test driving the product over a period of time, and doing a cross-product comparison.
A standard set of questions makes it possible to compare vendors using the same criteria. Managers must ensure proper attention has been spent on determining requirements before investigating the tools. Regardless of what security tools will be implemented, start with a requirements document. A solid requirements document should have its own list of requirements to ensure mutual acceptance and agreement on what's required to be secured.
Total Cost of Ownership
Direct Costs
Hardware and software purchase, vendor maintenance contracts, and licensing fees.
Indirect Costs
Upgrades to existing infrastructure, additional space, power, cooling, cabling, and other requirements for new equipment.
Depreciation
Accounting allowance for the decrease in value of an asset. Hardware is generally five years; software is generally three years.
Operational Costs
Staff training, ongoing management, log review, rule creation, product updates, and maintenance activities.
Total Cost of Ownership is a financial estimate to determine costs of a product or system. Staff training represents additional cost that the company indirectly incurs by purchasing the solution. Because staffing and training are not included in the vendor quote, the company must calculate them as indirect costs along with depreciation.
Analytical Hierarchy Process
The analytical hierarchy process (AHP) cuts through political agendas that might exist in your organization. It does this by rating vendors on a balanced, unbiased basis that is hard to argue with, especially if you let others help establish the criteria. One of the benefits of AHP is that it reduces the complexity of vendor selection decision.
By applying simple arithmetic to the problem, a score is computed comparing the vendor candidates to each other. Instead of weighing multiple, unrelated criteria, you let the process do the weighing for you. Two vendors may be evenly matched in how well they suit your needs, but for different reasons. The AHP points that out to you.
Using AHP, a team can score each of the potential vendors under the same system and compare their overall scores against each other. Each member of the vendor selection team scores each vendor independently. Then, combine the team members' scores into an average score for each criterion. If there is a significant difference in the way team members scored a particular criterion, this can be the basis for fruitful discussion.
Project Management
Project Management Fundamentals
Projects vs Programs
A program is a group of related projects. Programs may include associated work that is outside the scope of its projects. Program management is centralized. Portfolios are collections of programs and/or projects that typically compete for funds.
Project Manager Responsibilities
Lead the project team to achieve objectives. Identify what needs to be done. Set clear, achievable objectives. Manage the top three constraints (scope, time, cost) while maintaining quality. Employ progressive elaboration as details become available.
The level of formality applied to project management processes should be commensurate with the project scope and overall importance of the project to the performing organization. Smaller projects need a less formal approach, while larger projects will benefit from a more detailed approach.
Project Methodologies
Waterfall
Traditional project management approach using sequential phases. Use when requirements are unlikely to change. Provides higher assurance that the project is following a set plan.
Agile
General term for iterative project management approaches. More easily adapts to changing requirements and market forces. Can develop functionality much more quickly.
DevOps
Way of working to improve collaboration across all teams. Focused on delivering value to improve the business overall. Trust and automation rule.
DevOps is an approach to project management that is intended to improve collaboration. Unlike Agile, which has a heavy focus on collaboration between the development team and product or business owners, DevOps focuses on collaboration across all areas of an organization.
Work Breakdown Structure
The essence of creating a work breakdown structure (WBS) is decomposing high-level project information into identifiable and tangible work packages. The WBS divides the project work into manageable pieces. Creating a WBS always comes before creating a project schedule. It helps you understand detailed levels of work packages and tasks.
The WBS is the basis for all effort, cost, and performance reporting and is used by many other processes. A work package is work defined at the lowest level of the work breakdown structure for which cost and duration are estimated and managed. It is impossible to effectively complete any project without breaking things down into manageable components.
Every project should have a formally documented project charter. The charter identifies a project sponsor and is used as authorization to start deploying organizational resources. It usually contains project objectives and high-level purpose, needs and requirements, initial milestones and critical success factors, stakeholders, assumptions, constraints, boundaries and initial budget, initial risks, project impacts and dependencies, business needs and ROI, and approval requirements.
Leadership
Principles of Persuasion
Reciprocity
People feel the need to return favors and respond to positive actions with positive actions.
Scarcity
People are afraid of missing out and value things more when they are rare or limited.
Authority
People defer to authority figures and experts in their fields.
Consistency
People like consistency with prior actions and want to appear reliable.
Liking
People prefer to say yes to those they like and have rapport with.
Social Proof
People want the approval of others and look to others' behavior to guide their own.
Research shows that the principles of persuasion lead people to say yes. These principles can be used to proactively consider how to persuade people to undertake activities they might otherwise not normally do. Understanding these principles helps security leaders communicate more effectively and drive organizational change.
Building Excellence in Security
Building an effective security program requires a combination of technical expertise, strategic thinking, strong communication, and leadership skills. The frameworks, processes, and best practices outlined in this guide provide a foundation for security excellence, but success ultimately depends on execution and continuous improvement.
Security leaders must balance competing priorities: protecting the organization while enabling business objectives, implementing controls while maintaining usability, meeting compliance requirements while focusing on real risks, and building technical capabilities while developing organizational culture. This balance requires both art and science.
The journey to security excellence is ongoing. Threats evolve, technologies change, and business needs shift. Successful security programs adapt to these changes while maintaining focus on core principles: understanding risk, implementing appropriate controls, measuring effectiveness, and continuously improving. By following the guidance in this comprehensive resource, security leaders can build programs that protect their organizations while supporting business success.