Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:00 PM
Joshua Goldfarb
Joshua Goldfarb
Connect Directly
E-Mail vvv

'Make Your Bed' and Other Life Lessons for Security

Follow this advice from a famous military commanders' commencement speech and watch your infosec team soar.

In his 2014 commencement speech at the University of Texas at Austin, Admiral William Harry McRaven stated:

If you want to change the world, start off by making your bed. … If you make your bed every morning, you will have accomplished the first task of the day. It will give you a small sense of pride, and it will encourage you to do another task and another and another. And by the end of the day, that one task completed, will have turned into many tasks completed. Making your bed will also reinforce the fact that the little things in life matter. If you can't do the little things right, you'll never be able to do the big things right. And if by chance you have a miserable day, you will come home to a bed that is made, that you made. And a made bed gives you encouragement that tomorrow will be better.

The beginning of Admiral McRaven's speech teaches us an important lesson that we can apply to the world of information security. What do I mean by this? In our field, there are little things that we need to do day-in and day-out. We may not think of these tasks as particularly relevant or critical, and in fact, we may even dread doing them. Nonetheless, each of them is an important, fundamental, and essential part of a successful information security program.

What are some of these tasks? There are many of them, but here are the five fundamental information security tasks that I believe make great information security teams.

Task 1: Process
It may seem silly at times to follow a rigid process. It may be easier just to take care of or fix something when need be, rather than go through the formalities required by process. Nonetheless, following processes is important. Processes exist to ensure compliance with policy, to raise the quality and consistency of work, to reduce subjectivity, to lessen the likelihood of error, and to document and coordinate different work functions. While it may seem cumbersome at times, following processes improves a security organization's effectiveness.

Task 2: Documentation
To say that most security professionals don't enjoy documenting their work would be an understatement. Nevertheless, there is a strong need to document work, organizational knowledge, policies, processes, procedures, incidents, and other important details. This helps an organization with continuity when resources take time off, leave the organization, or transfer to other positions. Documentation also helps reduce the time required to perform work tasks — time often spent trying to understand what, exactly, needs to be done and how. Beyond that, documenting incidents and investigations well not only aids analysis, it also serves as an excellent resource when executives, customers, partners, auditors, or regulators come asking for evidence.

Task 3: Procedures
Properly following procedures is tough enough and writing them out in detail is even harder. Even so, it is worth your investment in time and money to have a reliable, thorough set of procedures that will ensures consistency across different work functions. Documented procedures also allow different team members to cross-train in different roles and job functions, and they provide back-up in instances where someone is ill, takes time off, transfers to another department, or leaves the company.

Task 4: Metrics
Every security organization knows that metrics are necessary to succeed, but few actually do the work to make them happen. When done properly, metrics allow us to objectively measure and monitor risk. When risk rises to an unacceptable level in one or more areas, it can be mitigated, and metrics can also be used to measure the effectiveness of that mitigation. High-quality metrics are one of the most effective tools we have in security to keep an eye on our secure posture.

Why, then, is it so difficult for so many organizations to effectively leverage them? Mainly because metrics require a tremendous amount of attention to detail. First, key risks must be enumerated and identified. Next, objective models must be developed to enable the assessment and measurement of risk. Acceptable ranges for those models must also be developed, along with procedures to handle instances where risk falls outside those acceptable ranges, followed by a process to regularly produce and report high-fidelity metrics. Lastly, these metrics must be continually adjusted and updated as the changing environment and threat landscape necessitate.

Task 5: Plan
To you, a security manager, it may be obvious what you need to do. You know what processes need improving, what technology needs repurposing or replacing, what staff needs retraining, or what program areas need a closer look. It's important to document these issues, along with why you need to do them and how you intend to do it. This, in turn, will help you measure and report progress and increased maturity. Planning also has the side benefit of making it easier for yourself and others to understand and recall the circumstances under which a decision was made, as well as to adjust course in a logical, rational way as necessary.

Related Content:


Josh (Twitter: @ananalytical) is currently Director of Product Management at F5.  Previously, Josh served as VP, CTO - Emerging Technologies at FireEye and as Chief Security Officer for nPulse Technologies until its acquisition by FireEye.  Prior to joining nPulse, ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
When It Comes To Security Tools, More Isn't More
Lamont Orange, Chief Information Security Officer at Netskope,  1/11/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-15
An issue was discovered in flatCore before 2.0.0 build 139. A stored XSS vulnerability was identified in the prefs_smtp_psw HTTP request body parameter for the acp interface. An admin user can inject malicious client-side script into the affected parameter without any form of input sanitization. The...
PUBLISHED: 2021-01-15
An issue was discovered in flatCore before 2.0.0 build 139. A time-based blind SQL injection was identified in the selected_folder HTTP request body parameter for the acp interface. The affected parameter (which retrieves the file contents of the specified folder) was found to be accepting malicious...
PUBLISHED: 2021-01-15
An issue was discovered in flatCore before 2.0.0 build 139. A reflected XSS vulnerability was identified in the media_filter HTTP request body parameter for the acp interface. The affected parameter accepts malicious client-side script without proper input sanitization. For example, a malicious user...
PUBLISHED: 2021-01-15
A stored cross-site scripting (XSS) issue in Envira Gallery Lite before allows remote attackers to inject arbitrary JavaScript/HTML code via a POST /wp-admin/admin-ajax.php request with the meta[title] parameter.
PUBLISHED: 2021-01-15
A stored cross-site scripting (XSS) issue in Envira Gallery Lite before allows remote attackers to inject arbitrary JavaScript/HTML code via a POST /wp-admin/post.php request with the post_title parameter.