IT security managers too focused on compliance, experts say
'Check-the-box' mentality is causing companies, government agencies to overlook growing cyber threats
Computerworld - SAN FRANCISCO -- Companies with IT security strategies that focus mostly on complying with key standards are dangerously unprepared for emerging cyber threats, said security experts at the RSA Conference 2013 here this week.
Over the past few years, the security strategies of many companies and government agencies have centered around meeting the requirements of Sarbanes-Oxley, Health Information Portability and Accountability Act (HIPAA), the Payment Card Industry Data Security Standards (PCI DSS), Federal Information Security Management Act (FISMA) and other government and industry standards.
Experts say that meeting such standards is important, but they should be used as baseline controls in a broader IT security strategy.
"The audit industry has become a monster," said Anup Ghosh, founder of security firm Invincea.
"Keeping those guys at bay" has become a full-time job in many IT security organizations, he said. "A lot of compliance regimens have been all about checking boxes and following processes."
Most of the standards call on companies to implement a fairly minimal set of security controls, Ghosh said. Nonetheless, he added, the task makes up the bulk of security budgets at many companies.
"If all you are doing is meeting an audit need, you are not focusing on what the threats are. We've got to get away from compliance driven security to threat-based security," Ghosh said.
Compliance requirements are often static and prescriptive, according to security executives. Compliance gives organizations a way to measure the outcome of security efforts, though the measurements can be misleading and provide only a one-time snapshot.
For instance, security experts maintain that organizations can be fully compliant with a specific standard, but still lack protection from multiple threats.
Critics cite the efforts of federal agencies over the past decade to implement FISMA requirements and pass compliance audits. The FISMA standards, while well intentioned, have become mostly an exercise in paperwork by agencies whose primary goal is compliance rather than security, they argue.
Increasingly, information security is about situational awareness, said Stephen Trilling, chief technology officer at Symantec. It is about understanding all potential threats and making sure IT security can respond to any that comes up.
"A lot of companies have compliance without actually doing the work," Trilling said. "You can always do the minimum to check a box," but that's not enough to ensure that a company or government agency can ward off cyberattacks, he said.
Trilling noted that the latest cyberattacks are highly targeted and carried out by persistent and sophisticated adversaries.
Traditional signature-based security tools cannot protect against somewhat unique, auto generated malware that's becoming widely used by cybercriminals. "Now you have millions of threats, each of which is one or two or three machines," Trilling said.
IT security personnel must therefore look beyond compliance-driven security models to deal with these threats, he said.
"I've lived through an earthquake, so I have a visceral sense for why you need earthquake insurance," Trilling said. IT security managers must have that same sense when it comes to information security, he added.
"Companies that have experienced attacks don't have that sense so they have been doing what they need to do to check the box," Trilling said.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is firstname.lastname@example.org.
- Researcher claims two hacker gangs exploiting unpatched IE bug
- Update: Third of Internet Explorer users at risk from attacks
- Microsoft plans another short patch slate for next week, but finds a few XP bugs to crush
- Target attack shows danger of remotely accessible HVAC systems
- Target hackers try new ways to use stolen card data
- Update: Microsoft to patch just-revealed Windows zero-day tomorrow
- NSA spying prompts open TrueCrypt encryption software audit to go viral
- Microsoft warns of Office zero-day, active hacker exploits
- Hackers move to create next Blackhole after 'Paunch' arrest
- Adobe hack shows subscription software vendors lucrative targets
Read more about Security in Computerworld's Security Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts