Watch Frank Kim’s talk How to Make Sense of Cybersecurity Frameworks on the RSAC website (registration required).
Frank is the former CISO of the SANS Institute. He currently leads the management and software security curricula for SANS, the largest security training and certification organization in the world, and runs his own Thinksec CISO advisory firm.
Frank separates the cybersecurity frameworks into three groups that security organizations adapt in turn as they mature.
Control Frameworks
These are the foundation of any security operation. NIST 800-53 is a complete list of controls, so complete no one would ever implement them all. The CIS controls help focus the list on the controls that mitigate 80% of the attacks
Program Frameworks
With the basics in place, security organizations need a way to talk to the rest of the business in non-technical terms. ISO 27001 goes beyond security specific controls to bring in business requirements but, Frank says, it’s costly and time-consuming to implement. The popular NIST CSF maps specific controls to each cybersecurity function, down to a high level of detail, with references to CIS and other frameworks for direction on execution but it’s still basically a checklist of good practices.
Risk Frameworks
The most experienced organizations move up “to analyze what your [stakeholders] actually want”, Frank said, an answer to the question: How much risk do we have? Risk frameworks such as NIST 800-39 outline a process for assessing and managing risk but have a limitation: They “keep it open ended” on how to actually measure risk, qualitatively or quantitatively or a hybrid of the two. “For many years, people said how would we go about measuring it in a quantitative way? This is where FAIR comes into play and it is a complement to those other risk management approaches.” Frank said that FAIR frees cyber risk professionals from limited thinking brought on by the conventional equation for risk.
Risk = Impact x Likelihood
Or, breaking down the right side…
Risk = Impact x (Vulnerability x Threat)
“When we manage risk, historically we in security have focused on which of these three components of risk? Vulnerability…
“It’s easy for us to scan our organization and find vulnerabilities…We’ve also got to think about the Threat and we’ve also got to think about the Impact, how bad is it to our organization.”
The FAIR model puts Vulnerability and the other factors of risk in a relationship that not only enables them to be quantified but requires that they all be considered to complete the picture of risk, adding up to FAIR’s reworking of the traditional equation to this statement:
Risk = Probable Frequency and Probable Magnitude of Loss Events
Frank Kim’s view -- seeing FAIR at the top of the evolutionary scale for cyber risk management -- is spreading. The SANS institute now offers FAIR training and the latest version of its CIS Controls poster, a handy guide used by many in the profession, covers FAIR.
Besides Frank’s presentation, the recent RSA Conference included many other signs of acceptance of cyber risk quantification, including the award given during the conference by SC Media, honoring the FAIR Institute as one of the three most important industry organizations of the last 30 years.
RiskLens is the only cyber risk analytics platform purposely built on the FAIR model and offering true cyber risk quantification. Let us show you a demo