VIMRO Unveils the Cyber Security Enabling Methodology
An introduction to an effective cyber security program utilizing a holistic enabling methodology. VIMRO, LLC with locations throughout the United States is a PCI QSA.
An introduction to an effective cyber security program utilizing a holistic enabling methodology. VIMRO, LLC with locations throughout the United States is a PCI QSA.
BOSTON, Dec. 7, 2015 /PRNewswire/ -- In order to avoid exposing a company, clients, employees (not to mention yourself!) to cyber crime, it is vital to embrace a good cyber security program. VIMRO unveils its approach to an effective cyber security program incorporating a holistic security methodology. VIMRO's methodology maximizes value and effectiveness because they have combined the most efficient tactics to include frameworks, best practice guides, and work papers from reputable security organizations such as NIST, ISO2700/27002 and MITRE.
Photo - http://photos.prnewswire.com/prnh/20151207/293721-INFO
"Combining vetted complementary frameworks yields a program that is effective and yet efficient; a program dynamic enough to anticipate new risks, yet iterative enough to become familiar. Equally important, a holistic methodology prevents oversights within your program. For example, while a cyber security framework alone equips you with the controls you must implement and manage, it leaves you without the metrics you need to validate those controls and the overall success of your cyber security system," says Larry Boettger, VIMRO's Senior Solutions Architect.
"A successful methodology is dynamic, adapting to ever-changing threats; and that can only happen if you treat it as an evolving process. For any methodology to work, you must adopt it in a controlled, systematic manner. Implementing a cyber security program too quickly or without the adequate resources reduces its effectiveness and demotivates the team members involved," says Michael Horsch Fizz, VIMRO's Principal Analyst and CBDO.
The following is an overview of a VIMRO cyber security system:
To manage performance leading toward the optimal level (Level 5) in the security CMM, we recommend Key Performance Indicator (KPI) metrics. Many clients start with MITRE Cyber Resiliency Metrics[3].
VIMRO policies, standards, and procedures include all of the verbiage necessary to raise your organization to the upper levels of the cyber security CMM. These are critical to success. Without these, your organization will not even surpass Level 2 in the security CMM.
After writing your security policies, standards, and procedures, we implement technological mechanisms (these include IPS, DLP, SIEM, and so forth) to support your cyber security program, and train workforce members to apply the requirements of the formal documents to their practices
VIMRO's risk management program includes continuous evaluation of your technological mechanisms and processes to validate them, and find areas, which need improvement, so that your company always maintains optimized security controls.
Below is an example application of the VIMRO methodology to one specific security control item: a firewall. The NIST Cybersecurity Framework includes Configuration Management in the family of controls. Using the firewall as our example:
An organization includes firewall configuration requirements in a policy; procedures are written for how the firewall will be implemented and managed.
The procedure includes a baseline security assessment vulnerability report. The baseline is to be updated whenever a change is made on the firewall.
The policy, procedure, and baseline reports define the controls (CMM Level 3) for the firewall.
In order to determine if the company is maintaining controls for the firewall to meet CMM Level 4, the firewall is audited using KPIs (a common approach is to conduct firewall configuration audits every six months).
Some examples of KPIs include:
If during firewall configuration audits, some findings do not meet the KPI requirements, it is an opportunity to determine why this is the case. Perhaps there are too few people to meet the KPI objectives; perhaps skillsets are lacking and training on maintaining the firewall is necessary. For any items that do not meet KPIs, we implement a Corrective Action Plan (CAP), which sets expectation dates for the resolution of any issues cited. We conduct an audit immediately after said date to ensure that the items have been improved based on the CAP. This is an example of an optimized process (Level 5) for firewall controls practices.
All layers of VIMRO's Cyber Security Enabling Methodology are equally critical and require steady dedication. Systematic attention to each level of the process yields a solid foundation today that is also dynamic enough to safeguard you going forward. VIMRO's holistic approach arms your organization to prevent, detect, and respond to cyber criminal attacks that threaten your business, clients, employees, or sensitive data.
[1] NIST Cybersecurity Framework: http://www.nist.gov/cyberframework/
[2] ISO 27001/27002: http://www.27000.org/
[3] MITRE Cyber Resiliency Metrics: https://register.mitre.org/sr/12_2226.pdf
SOURCE VIMRO
Share this article