Security Data Analytics and Reporting, Developing reporting viewpoints: Board of Directors

So far in our SDAR series, we have identified the stakeholders, business drivers and the organizational requirements for security data analytics and reporting. Over the next few articles, we will demonstrate how organizational requirements, and monitoring and reporting domains can provide stakeholders with reporting viewpoints that will help them (and the organization) build a robust SDAR system. To walk you through the steps, we will use an imaginary publicly listed software engineering and Business to consumer product company to establish different stakeholders viewpoints. Let’s call this company Akrogoniaios Technologies Corp (ATC).

Security strategy

At ATC, the board of directors’ overall security strategy is driven by two main goals: 

  • Maintain regulatory compliance

  • Prevent data leakage

The scope of regulatory compliance requirements include a number of things such as corporate governance, human resources and health & safety. But our focus in this article is only on security compliance requirements for SDAR.  To achieve sufficient compliance, ATC’s  audit will focus on overall security governance, business continuity, incident management and other management controls (apart from the technical ones). Compliance requirements related to any security standard (such as ISO 27001) mandate that some of the security controls be present in every IT system that the organization has. 

Additionally, ATC places heavy emphasis on preventing confidential or restricted information (hereafter referred to as classified information ‘classified’) from leaking  from the organization. ATC offers its staff flexible working conditions (including the ability to work from home) and as such they ensure information remains classified by using SaaS products for emails and collaboration ⁠— software is licensed by subscription basis.  

The required compliance maturity stipulated by industry regulators will determine the depth of security strategy that the organization needs, in addition to steps taken in response to specific organizational requirements (like preventing data leakage). For an organization to sufficiently comply with mandatory and recommended technical controls (based on ISO 27001 and/or NIST CSF standards), it must be mature in the the following areas:

  • Firewall controls

  • Network segmentation (sometimes microsegmentation, if the organization adapts zero trust model)

  • Endpoint agents such as antivirus, malware prevention and end point firewalls

  • Identity and access management that includes privileged access management

  • Information classification and lifecycle management

  • Web application firewall

  • DDoS Protection

  • Vulnerability management

  • Geofencing

  • Data loss prevention controls such as full disk encryption and USB blockers

  • Traffic encryption

  • Guest wireless segregation and protection

  • Data anonymisation on non-production environments

  • Advanced threat protection on emails and other communications

In ATC’s case, their need to prevent information getting leaked and to comply with regulatory requirements mean they must add data leakage prevention to the above list.

Viewpoints

A Viewpoint is an architectural term in the Information Technology world that is used to describe the stakeholders and their concerns for constructing organizational views on technology. In the case of SDAR, a viewpoint is a reporting view for an organization’s stakeholders, based on their stakeholders’ concerns. It contains IT components, the target audience’s expectations and a presentation that the target audience can understand. Each viewpoint addresses the concerns of its stakeholders using the same information, but is presented in a way that’s optimized for its target audience. We will not define viewpoints for the external stakeholders since the internal stakeholders are responsible to address the concerns of the external stakeholders.

Board of Directors

A board of directors’ primary responsibility in a publicly listed company is to provide value to  shareholders. Hence, the directors take a special interest in monitoring any risks that arise as crucial business technologies are implemented. Once risks have been identified, the board plays an advisory role in resolving them. To succeed in this responsibility, the board asks high-level questions like:

  • How well is the organization complying with regulatory requirements?

  • Are the organization’s information technology systems secure enough to be used when conducting business?

  • Is the organization able to sufficiently secure critical information internally and effectively control any information that leaves the organization?

The above three questions make up the board of director’s SDAR viewpoint for technical controls. In an SDAR system, these controls can be split into three views: 

(1) Regulatory compliance 

(2) Security Posture  

(3) Data Leakage Prevention 

To assist the board in getting sufficient visibility for reporting, organizations need to consolidate large amounts of information from all information technology components, correlate them, normalize data if required, add any necessary context and then summarize all the above for the directors.

Note: The figures in the following sections are for illustrative purposes only and with respect to ATC’s imaginary business. Organizations building SDAR do not need to follow the examples provided in this article. Instead use these examples to inspire you as you build your own SDAR reporting structure. 

Regulatory compliance reporting

ATC also has a regulatory compliance view that helps the directors monitor compliance. It is split into three:

(1) Security compliance

(2) PCI compliance

(3) Privacy compliance. 

To create this view, the analysts  who are implementing SDAR must summarize and compare the information that is shortlisted for the report with the agreed upon set of controls to be implemented and then graphically represent the status of ATC’s compliance. Beyond that, it’s up to the team to determine if additional reports are necessary. However, even just those reports will be accompanied by subjective interpretations, so any organizations looking to streamline their compliance view for the directors may want to keep additional reports to a minimum.

Figure 01: High level reporting for the board for regulatory compliance requirements

Each dashboard item of ATC’s IT system can be used to generate various kinds of reports that  are relevant to the board of directors’ security reporting. 

The rationale behind automated reporting is to provide the board with fact-based information that will help them make decisions. By looking at these reports, the board understands whether management’s support for security programs is sufficient. If privacy compliance is less than ideal, say 80%, then the data classification and information protection programs will benefit from  additional support from management.

Security posture

The second concern of regulatory compliance reporting is whether the information technology of the organization is safe enough for the organization to conduct business. This concern is split into five reporting views:

(1) Security posture of the staff’s computing devices such as workstations, desktops, laptops and virtual desktop interfaces (VDI) 

(2) Security of email communications infrastructure

(3) remote work technologies security posture 

(4) Performance of IT & Security in handling security incidents 

(5) Security posture of the customer applications

Figure 02: High level reporting for the board of directors on overall security posture of the organization’s information technologies.

The metrics that contribute to such consolidated, high level board reporting must be carefully selected to ensure they are relevant to the board of directors’ concerns. Implementing controls can be costly, so that alone is a good reason to customize implementation to organizational needs. As such, when calculating the percent of compliance it is only the directors' agreed upon controls that are referenced.

In our example, when ATC’s board of directors look at this chart, accompanied with a narrative, they gain a holistic understanding of their security maturity. This chart also helps the directors to ask the right questions to provide additional support to the organization, as needed. For example, when a director looks at the customer applications posture and inconsistencies in mitigating vulnerabilities per quarter, they may decide to outsource the mitigation activities, procure more manpower internally, buy a generous insurance policy or to generally prepare for any unforeseen cyberattacks in the future.

Data leakage prevention

One of the important concerns of the business, apart from regulatory compliance, is whether the organization is leaking sensitive information knowingly or unknowingly. This concern is divided into 4 categories and reported to the directors. They are: 

(1) Knowing the current state of information classification

(2) The ability to protect information and the information that are classified 

(3) Monitoring potentially sensitive information that exists outside the organization and 

(4) Monitoring the number of incidents related to information reported within the organization

Figure 03: High level reporting for the board of directors on overall data leakage prevention of the organization on its information technologies.

The metrics for data leakage must be carefully selected and agreed upon before reports can be automated. As directors gain visibility into the information that's being shared outside the organization, they naturally  follow up and mandate reducing such transfers. And so as their visibility grows, leakage reduces.

The directors, when looking at the overall progress of the organization's ability to protect classified information, can determine whether it’s necessary to recommend increased efforts from the  committee responsible for overseeing day-to-day information management activities. Having the ability to track the use of classified information, and take action when required, gives the directors confidence in adopting cutting-edge technologies for the business to lower costs and increase revenue generation.

Conclusion

In this article, we discussed how organizational ownership and stakeholder requirements shape Cybersecurity strategy. Developing reporting viewpoints helps organizations deliver security reporting to the right audience. Directors viewpoints are provided by three reporting views: (1) regulatory compliance, (2) security posture of the organization and (3) data leakage prevention. Similarly, understanding the  board of director’s security requirements helps organizations define reporting views that are useful. When the directors get visibility into security programs addressing their concerns, they will be able to make confident decisions. In the next article, we will discuss the viewpoint of security executives.

For more information on viewpoints (including GRC, IT Leadership and Business Leadership), stay tuned for additional articles that will be included in our premium toolkits.

Previous
Previous

Security Data Analytics and Reporting, Developing reporting viewpoints: CISO

Next
Next

Building Blocks: Geographically Distributed Organizations