11/26/2024 | News release | Distributed by Public on 11/26/2024 07:49
One of the struggles security leaders face is prioritizing risk reduction activities in a way that effectively decreases the attack surface, while optimizing associated costs and effort. In practice, different variables play a role in these decisions and ultimately choosing the right security controls. Keep reading to get insight into these different factors and how to address one of the most common dilemmas - evaluating high probability/low impact risks versus low probability/high impact - without losing sight of control coverage and total cost of ownership (TCO).
What Risk Means in Cybersecurity
There are various definitions of risk, but in cybersecurity it's generally seen as the potential for loss or damage when a threat exploits a vulnerability. This encompasses the likelihood of a cyberattack and the impact it would have on an organization. Quantifying risks involves assessing this likelihood and impact, often using a risk matrix or formula, such as "Risk = Likelihood x Impact". Likelihood is the probability of a threat exploiting a vulnerability, while impact measures the potential damage. This quantification helps organizations prioritize risks, guiding resource allocation and mitigation strategies to protect critical assets effectively.
Looking in detail at the two factors that influence risk, we see that likelihood is determined by a combination of external and internal variables, while impact is almost entirely based on an asset's specific internal context.
Likelihood can be influenced by factors such as:
Impact, in contrast, is very specific to the internal context of an organization. The following factors influence impact:
By understanding these factors, organizations can better quantify risks and develop strategies to mitigate them effectively.
Strategies to Address Risk
A sound risk analysis usually starts with an asset inventory. From a high-level perspective, security leaders look at identities, endpoints, email, network, cloud environments, data, business applications, and more. After classifying, categorizing, and performing a business impact analysis, "heat maps" can be used to map assets to their corresponding risk. Heat maps evaluate likelihood and impact, highlighting the risk posed by each of the identified assets.
Armed with this insight, it's time to start looking at solutions that address these findings and decrease risk to a level within the organization's risk appetite. Some actions will relate to internal activities such as hardening, tightening access and revoking permissions, segmentation, and others. Others will require additional investment - and this is the hardest nut to crack - ensuring the right balance between risk reduction, coverage, and TCO.
Risk reduction looks to address as much of the risk heat map as possible, by decreasing risk to a level accepted by the organization. In practice, one challenge security leaders face is prioritizing mitigation between:
Coverage relates to the attack surface and attack vectors controls aim to address. There are many types of controls and no shortage of security vendors and services. However, from a coverage standpoint, we see two clear categories:
TCO per control is the cost of implementing and maintaining a control. This needs to be considered in relation to the potential impact of the risk, the coverage provided, and the cost of doing nothing. In other words, is the asset being protected worth the cost? When we combine coverage and TCO, we see that the more specific the control, the higher overall cost for the organization. Security monitoring use cases exemplify this. An EDR tool delivers hundreds, if not thousands, of different prevention and detection use cases. When we divide the TCO of an EDR tool by the number of use cases and attack vectors it blocks, what emerges is an effective and efficient control. At the opposite end of the spectrum, deploying and maintaining custom use cases for a business application has a significantly higher cost per use case / attack vector, because of the expert technology deployed and the need for highly skilled individuals.
Aligning Risk Reduction to the Threat Landscape
Even with all this information at hand, prioritizing and implementing the most effective controls is still a difficult equation - with multiple variables for security leaders to consider. At Secureworks, we know the value of an outside-in perspective.
By stepping outside the context of an organization and looking at the external threat landscape, you get the insight you need to make the right choices. In the end, the more we tailor controls to how threat actors actually operate, the better we'll get at preventing and detecting malicious behavior early, well before any impact occurs.Secureworks data really drives this home. Our Incident Response and Counter Threat Unit™ (CTU™) teams have observed the following trends over the past two years:
How Best to Prioritize Risk Reduction Implementation
With all of this in mind, the following practical strategies will help organizations pursue rapid and cost-effective risk reduction:
By following this strategy, organizations can swiftly reduce their risk profile and align their security efforts with their overall risk appetite - all while maintaining cost effectiveness.
Secureworks has been successfully reducing cyber risk for global customers of all sizes and industries for over two decades. Using an open cybersecurity platform that integrates your existing technology stack with our native controls, AI, threat data, and decades of expertise, we are able to help you strike the ideal balance between risk mitigation and cost effectiveness. To speak to a security expert about the ideal approach to risk reduction in your organization, don't hesitate to get in touch.