Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

The Security Model is Broken, Part 2: The Risk Assumption Process

In February of this year, I published an article in SC Magazine called The Security Model is Broken. Because every organization is susceptible to a breach, we must rethink our security models and implement better preventive measures. That first article outlined some of the technologies and controls that enterprises should use to strengthen their security postures. In today's article, I will explain how an organization's risk assessment model should be updated to assure that the appropriate people are assuming risk and making the right decisions.

Risk based security model background

Ensure that whoever makes the decision to assume the risk has the proper purview and span of organizational control to assume all the inherent security risks—including reputational risks

Today, it is a generally accepted practice to justify and/or make decisions on security safeguards based on a risk assessment. But all too often, risk based security or the risk assessment process that is commonly practiced by many enterprises is flawed and misused to justify doing nothing or to delay the implementation of necessary security safeguards. Basically, the risk assessment process involves evaluating probable threats, their likelihood and impact against the cost of the security controls that would mitigate the threats. Risk assessment is usually performed by the security unit and the business unit; or someone in management makes the decision to either implement the security safeguard to mitigate the risk, or to assume the risk.

The underlying challenge is to ensure that whoever makes the decision to assume the risk has the proper purview and span of organizational control to assume all the inherent security risks—including reputational risks—associated with the decision.

How the risk security model is broken

Many CISOs or security units believe their job is done when they have presented the results of their risk assessment to management and they have assumed the risk, even if they disagree with management's decision. Many, if not most enterprises, have no formal risk assumption model to identify who can assume enterprise level risk, and have no escalation procedures when a disagreement occurs.

Also, many decisions are made by the wrong people for the wrong reasons. Most business units do not have the subject matter expertise to make decisions about security risks, and they do not appreciate the dynamic and changing landscape of cyber threats and the IT environment. Additionally, business people have conflicted goals such as expense, income, or project deadline pressures. These different drivers can—and many times do—cloud their judgment.

Finally, security assessments or risk based security practices are often used to justify doing nothing. Many enterprises use an ROI (return on investment) risk assessment methodology. There is no ROI in security safeguards, unless you are replacing or consolidating technologies; it is a judgmental risk mitigation or avoidance decision. Cybersecurity, like safety measures on airplanes, is a cost of doing business, period!

What needs to be done

Enterprises need a formal risk assumption model which clearly states who can assume security risks and which types of risks they can assume—similar to the approach that CFOs use to delegate obligatory financial authority for the enterprise. Just as important, the risk security model must delegate to the CISO arbitration powers over business risk assumption decisions. Such a documented approach enables the CISO to be an honest broker to escalate security risk assumption decisions with unfettered access to senior management, including the CEO and if need be, to the board of directors.

Enterprises need a formal risk assumption model which clearly states who can assume security risks and which types of risks they can assume

In my next article, I'll address transparency, why we need it and why we don't have it now.

Related Articles

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try Tenable Lumin

Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.

Buy Tenable Lumin

Contact a Sales Representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.

Try Tenable Nessus Professional Free

FREE FOR 7 DAYS

Tenable Nessus is the most comprehensive vulnerability scanner on the market today.

NEW - Tenable Nessus Expert
Now Available

Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.

Fill out the form below to continue with a Nessus Pro Trial.

Buy Tenable Nessus Professional

Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Select Your License

Buy a multi-year license and save.

Add Support and Training

Try Tenable Nessus Expert Free

FREE FOR 7 DAYS

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional?
Upgrade to Nessus Expert free for 7 days.

Buy Tenable Nessus Expert

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Select Your License

Buy a multi-year license and save more.

Add Support and Training