CITATION

Hayden, Lance. IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data. US: McGraw-Hill Osborne Media, 2010.

IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data

Authors:

Published:  June 2010

eISBN: 9780071713412 0071713417 | ISBN: 9780071713405
  • Contents
  • Foreword
  • Acknowledgments
  • Introduction
  • Part I: Introducing Security Metrics
  • 1 What Is a Security Metric?
  • Metrics and Measurement
  • Security Metrics Today
  • The Dissatisfying State of Security Metrics: Lessons from Other Industries
  • Reassessing Our Ideas About Security Metrics
  • Summary
  • Further Reading
  • 2 Designing Effective Security Metrics
  • Choosing Good Metrics
  • GQM for Better Security Metrics
  • More Security Uses for GQM
  • Summary
  • Further Reading
  • 3 Understanding Data
  • What Are Data?
  • Data Sources for Security Metrics
  • We Have Metrics and Data—Now What?
  • Summary
  • Further Reading
  • Case Study 1: In Search of Enterprise Metrics
  • Scenario One: Our New Vulnerability Management Program
  • Scenario Two: Who’s on First?
  • Scenario Three: The Value of a Slide
  • Scenario Four: The Monitoring Program
  • Scenario Five: What Cost, the Truth?
  • Summary
  • Part II: Implementing Security Metrics
  • 4 The Security Process Management Framework
  • Managing Security as a Business Process
  • The SPM Framework
  • Before You Begin SPM
  • Summary
  • Further Reading
  • 5 Analyzing Security Metrics Data
  • The Most Important Step
  • Analysis Tools and Techniques
  • Summary
  • Further Reading
  • 6 Designing the Security Measurement Project
  • Before the Project Begins
  • Phase One: Build a Project Plan and Assemble the Team
  • Phase Two: Gather the Metrics Data
  • Phase Three: Analyze the Metrics Data and Build Conclusions
  • Phase Four: Present the Results
  • Phase Five: Reuse the Results
  • Project Management Tools
  • Summary
  • Further Reading
  • Case Study 2: Normalizing Tool Data in a Security Posture Assessment
  • Background: Overview of the SPA Service
  • Objectives of the Case Study
  • Summary
  • Part III: Exploring Security Measurement Projects
  • 7 Measuring Security Operations
  • Sample Metrics for Security Operations
  • Sample Measurement Projects for Security Operations
  • Summary
  • Further Reading
  • 8 Measuring Compliance and Conformance
  • The Challenges of Measuring Compliance
  • Sample Measurement Projects for Compliance and Conformance
  • Summary
  • Further Reading
  • 9 Measuring Security Cost and Value
  • Sample Measurement Projects for Compliance and Conformance
  • The Importance of Data to Measuring Cost and Value
  • Summary
  • Further Reading
  • 10 Measuring People, Organizations, and Culture
  • Sample Measurement Projects for People, Organizations, and Culture
  • Summary
  • Further Reading
  • Case Study 3: Web Application Vulnerabilities
  • Source Data and Normalization
  • Outcomes, Timelines, Resources
  • Initial Reporting with “Dirty Data”
  • Working with Stakeholders to Perform Data Cleansing
  • Follow-up with Reports and Discussions with Stakeholders
  • Lesson Learned: Fix the Process, and Then Automate
  • Lesson Learned: Don’t Wait for Perfect Data Before Reporting
  • Summary
  • Part IV: Beyond Security Metrics
  • 11 The Security Improvement Program
  • Moving from Projects to Programs
  • Managing Security Measurement with a Security Improvement Program
  • Requirements for a SIP
  • Measuring the SIP
  • Case Study: A SIP for Insider Threat Measurement
  • Summary
  • Further Reading
  • 12 Learning Security: Different Contexts for Security Process Management
  • Organizational Learning
  • Three Learning Styles for IT Security Metrics
  • Final Thoughts
  • Summary
  • Further Reading
  • Case Study 4: Getting Management Buy-in for the Security Metrics Program
  • The CISO Hacked My Computer
  • What Is Buy-in?
  • Corporations vs. Higher Ed: Who’s Crazier?
  • Higher Education Case Study
  • Conclusion
  • Index