Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


09:00 AM
Connect Directly

New Metrics Assign Grades to Your Security Posture

Free, user-driven metrics a step toward making security measurement more of 'a science instead of a black art'

A coalition of enterprises, government agencies, universities, and vendors from around the globe tomorrow will release a set of free metrics for measuring an organization’s security posture.

The nonprofit Center for Internet Security (CIS) hopes the metrics will serve as a standard method for assessing security readiness. “Today there are thousands of ways to measure this… but no two organizations measure these things the same way, and no two divisions [in the same organization] measure them in the same way,” says Bert Miuccio, CEO of CIS. “Today we are creating an objective, data-driven way to measure the security status of an enterprise.”

Miuccio says this “number grade” can be used to help a company make more informed security buying decisions or change its security strategy, for instance. “This lets decision-makers understand the security status of their organization over time,” he says.

CIS consists of more than 150 member companies, including Fidelity National Financial, General Dynamics, Lockheed Martin TSS, Mortgage Guaranty Insurance Group, Royal Bank of Canada Capital Markets, Southwest Airlines, Union Bank of California, and the Federal Reserve Board and U.S. Dept of Homeland Security ‘s Computer Emergency Readiness Team (US-CERT)

Security experts say only time will tell whether CIS’s security metrics will take off. But even if it only gets the conversation going, that is progress, since there hasn’t before been an effective, standard way to test and measure security postures, they say.

“It’s at least the basis for the next try,” says Fred Pinkett, vice president of product management for Core Security. “There has come a time in security where we need to be looking at this more scientifically than the technical people in the back room saying ‘Listen to us’ and ‘Go about your business.’ We need the business to understand what we’re doing.”

Companies need a way to determine why their security policies and procedures may not be working. “They put all of these policy and procedures in, but they may still be getting attacked and they want to know what’s going on,” Pinkett says. “Measuring and testing yourself” is a good way to start truly understanding what’s working and what’s not, he notes.

The first set of metrics that the CIS will release tomorrow for download are: mean time between security incidents; mean time to recover from security incidents; percentage of systems configured to approved standards; percentage of systems patched to policy; percentage of systems with anti-virus; percentage of business applications that had a risk assessment; percentage of business applications that had a penetration or vulnerability assessment; and percentage of application code that had a security assessment, threat model analysis, or code review prior to production deployment.

Miuccio says the metrics define what to measure and how, and then let an organization look at the trends over time. They also allow an organization to compare its scores with other organizations in its vertical market to see where it stands compared to others in the same industry, he says.

Ensuring a meaningful comparison among organizations’ security postures won’t be easy, experts say. “It’s always great to have data. It’s interesting to see what constraints they put around the data so they get an apples-to-apples comparison,” says Dick Mackey, vice president of consulting for SystemExperts.

Meanwhile, CIS will also launch a software-based security metrics service for its members that helps them correlate their security practices with their number grades, as well as anonymously compare their grades to other organizations in their field.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • Core Security Technologies
  • SystemExperts Corp.

    Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    US Turning Up the Heat on North Korea's Cyber Threat Operations
    Jai Vijayan, Contributing Writer,  9/16/2019
    MITRE Releases 2019 List of Top 25 Software Weaknesses
    Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2019
    Register for Dark Reading Newsletters
    White Papers
    Cartoon Contest
    Write a Caption, Win a Starbucks Card! Click Here
    Latest Comment: "He's too shy to invite me out face to face!"
    Current Issue
    7 Threats & Disruptive Forces Changing the Face of Cybersecurity
    This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
    Flash Poll
    The State of IT Operations and Cybersecurity Operations
    The State of IT Operations and Cybersecurity Operations
    Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2019-09-21
    An issue was discovered in GNOME file-roller before 3.29.91. It allows a single ./../ path traversal via a filename contained in a TAR archive, possibly overwriting a file during extraction.
    PUBLISHED: 2019-09-21
    The Traveloka application 3.14.0 for Android exports com.traveloka.android.activity.common.WebViewActivity, leading to file disclosure and XSS.
    PUBLISHED: 2019-09-21
    An issue was discovered in idreamsoft iCMS V7.0. admincp.php?app=members&do=del allows CSRF.
    PUBLISHED: 2019-09-21
    admin/urlrule/add.html in YzmCMS 5.3 allows CSRF with a resultant denial of service by adding a superseding route.
    PUBLISHED: 2019-09-21
    Gila CMS before 1.11.1 allows admin/fm/?f=../ directory traversal, leading to Local File Inclusion.