1、 ETSI GS ISI 003 V1.1.2 (2014-06) Information Security Indicators (ISI); Key Performance Security Indicators (KPSI) to evaluate the maturity of security event detection Disclaimer This document has been produced and approved by the Information Security Indicators (ISI) ETSI Industry Specification Gr
2、oup (ISG) and represents the views of those members who participated in this ISG. It does not necessarily represent the views of the entire ETSI membership. Group Specification ETSI ETSI GS ISI 003 V1.1.2 (2014-06) 2Reference RGS/ISI-006 Keywords ICT, security ETSI 650 Route des Lucioles F-06921 Sop
3、hia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/www.etsi.org The present document m
4、ay be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in
5、print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status o
6、f this and other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced or utiliz
7、ed in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETSI. The copyright and the foregoing restriction extend to rep
8、roduction in all media. European Telecommunications Standards Institute 2014. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE are Trade Marks of ETSI registered for the benefit of its Members and of t
9、he 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI GS ISI 003 V1.1.2 (2014-06) 3Contents Intellectual Property Rights 4g3Foreword . 4g3Introduction 5g31 Scope 6g32 References 6g32.1 Normative references . 6g32.2 Informative re
10、ferences 7g33 Definitions, symbols and abbreviations . 7g33.1 Definitions 7g33.2 Symbols 7g33.3 Abbreviations . 7g34 Background 7g34.1 Key Performance Indicators . 7g34.2 Key Performance Security Indicators . 7g34.3 SANS CAG 8g35 Key Performance Security Indicators . 9g35.1 How to use KPSIs to asses
11、s the organisations overall maturity level in security event detection and response posture . 9g35.2 How to use KPSIs as a first step to evaluate the detection levels of security events 10g35.3 KPSIs description table 10g35.4 Description of the relevant KPSIs 11g3Annex A (normative): Recap of availa
12、ble KPSIs 15g3Annex B (informative): Authors Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/ipr.etsi.org). Pursuant to the ETSI IPR Policy, no investiga
13、tion, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Group Specification
14、(GS) has been produced by ETSI Industry Specification Group (ISG) Information Security Indicators (ISI). The present document is included in a series of 6 ISI specifications. These 6 specifications are the following (see figure 1 summarizing the various concepts involved in event detection and inter
15、actions between all specifications): GS ISI 001-1 1: addressing (together with its associated guide GS ISI 001-2 2) information security indicators, meant to measure application and effectiveness of preventative measures. GS ISI 002 3: addressing the underlying event classification model and the ass
16、ociated taxonomy. GS ISI 003: addressing the key issue of assessing an organisations maturity level regarding overall event detection (technology/process/ people) and to evaluate event detection results. GS ISI 004 4: addressing demonstration through examples how to produce indicators and how to det
17、ect the related events with various means and methods (with a classification of the main categories of use cases/symptoms). GS ISI 005 i.1: addressing ways to produce security events and to test the effectiveness of existing detection means within an organization. More detailed and more a case by ca
18、se approach than the present document and therefore complementary. Figure 1 summarizes the various concepts involved in event detection and the interactions between the specifications. GS ISG ISI Series Summary DefinitionReal eventsSecurity prevention measuresEvent detection measuresFake events (Sim
19、ulation) Event reaction measuresDetectedeventsResidual risk (event model-centric vision)Figure 1: Positioning the 6 GS ISI against the 3 main security measures ETSI ETSI GS ISI 003 V1.1.2 (2014-06) 5Introduction The present document addresses the event detection aspects of the information security p
20、rocesses in an organization. The maturity level assessed during event detection can be considered as a good approximation of the overall Cyber Defence and SIEM maturity level of an organization. ETSI ETSI GS ISI 003 V1.1.2 (2014-06) 61 Scope The present document defines and describes a set of Key Pe
21、rformance Security Indicators (KPSI) to be used for the evaluation of the performance, the maturity levels of the detection tools and processes used within organizations for security assurance. The response is not included in the scope of the present document. In particular, the purpose of the prese
22、nt document is to enable organizations to: assess the overall maturity level of the security event detection; provide a reckoning formula to assess detection levels of major security events as summarized in GS ISI 001-1 1; evaluate the results of measurements. This work is mainly based on the US SAN
23、S CAG 5. The target groups of the present document are Head of detection, reaction teams, Cyber defence team and head of security governance. 2 References References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific referenc
24、es, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. Referenced documents which are not found to be publicly available in the expected location might be found at http:/docbox.etsi.org/Reference. NOTE: While
25、 any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. 2.1 Normative references 1 ETSI GS ISI 001-1: “Information Security Indicators (ISI); Indicators (INC); Part 1: A full set of operational indicators for organizations to use
26、 to benchmark their security posture“. 2 ETSI GS ISI 001-2: “Information Security Indicators (ISI); Indicators (INC); Part 2: Guide to select operational indicators based on the full set given in part 1“. 3 ETSI GS ISI 002: “Information Security Indicators (ISI); Event Model A security event classif
27、ication model and taxonomy“. 4 ETSI GS ISI 004: “Information Security Indicators (ISI); Guidelines for event detection implementation“. 5 SANS Consensus Audit Guidelines V4.0: “20 Critical Security Controls for Effective Cyber Defence“. 6 The Capability Maturity Model Integration (Software Engineeri
28、ng Institute, 2001). 7 Portfolio, Programme and Project Management Maturity Model (OGC, 2008). NOTE: See http:/www.sans.org/critical-security-controls/ for an up-to-date version. ETSI ETSI GS ISI 003 V1.1.2 (2014-06) 72.2 Informative references The following referenced documents are not necessary fo
29、r the application of the present document but they assist the user with regard to a particular subject area. i.1 ETSI GS ISI 005: “Information Security Indicators (ISI); Event Testing; Part 5: Event Testing“. 3 Definitions, symbols and abbreviations 3.1 Definitions For the purposes of the present do
30、cument, the terms and definitions given in GS ISI 001-2 2 apply. 3.2 Symbols For the purposes of the present document, the symbols given in GS ISI 001-2 2 apply. 3.3 Abbreviations For the purposes of the present document, the abbreviations given in GS ISI 001-2 2 and the following apply: CAG Consens
31、us Audit Guidelines CC Critical Control CMMI Capability Maturity Model Integration CSIRT Computer Security Incident Response Team KPI Key Performance Indicators KPSI Key Performance Security Indicators MSSP Managed security service provider SOC Security Operation Centre 4 Background 4.1 Key Performa
32、nce Indicators Key Performance Indicators (KPIs) are quantifiable variables which can measure the performance of an organization, evaluate the success of specific activities and support decision making processes. KPIs are metrics that allow to measure progress and deficiency. The metrics have to be
33、well-defined and quantifiable to be useful. KPIs can be used to assess the performance of IT services. Examples of IT KPIs are the availability of IT systems and services, the Service Level Agreements (SLAs), the Mean Time Between Failures (MTBF) and the Mean Time To Recover (MTTR), and Mean-Time-Be
34、tween-System-Incidents (MTBSI). The usage of KPI in the field of Information Assurance is at its early stage. Defining KPIs for the Security Assurance processes is difficult because of the complexity of regulations, certifications, technical and organizational issues, and budget constraints. Hence i
35、t is a complex task to quantify clear Security Assurance objectives and performance in terms of KPIs. 4.2 Key Performance Security Indicators Key Performance Security Indicators (KPSIs) can measure the maturity level of the information security processes (detection and detection-related processes).
36、ETSI ETSI GS ISI 003 V1.1.2 (2014-06) 8A Maturity Model to measure the performance in the Security Assurance field can be based on the five level maturity framework adapted from The Capability Maturity Model Integration (Software Engineering Institute, 2001) 6 and Portfolio, Programme and Project Ma
37、nagement Maturity Model (OGC, 2008) 7. Organizations using these models, can assess the maturity level of their performance management practices in the five dimensions of the model: 1) Initial: Processes are managed ad hoc. No measure of the performance is requested. 2) Managed: Processes characteri
38、zed for projects and are often reactive. 3) Defined: Processes are tailored for the organization and are proactive. 4) Quantitatively Managed: Processes are measured and controlled. 5) Optimizing: Continuous Process Improvement. To adapt these models to security event detection and detection-related
39、 reactions, a simplified 3-level scale is proposed: The present document, level 1 corresponding to CMMI levels 1 and 2; The present document, level 2 corresponding to CMMI levels 3 and 4; The present document, level 3 corresponding to CMMI level 5. The three levels can be defined as follows: 3 matur
40、ity levels in Cyber Defense and SIEM approaches- Infrastructure monitoring- Technical focus (log collection and retention)- Plain incident response- Merged operations (Security/IT)1 Regulatory compliance enfor-ced and forensics enabled2 Cyber Defense capabilities(against major known attacks)3 Whole
41、organisations IT security mobili-zation with enterprise risks focus - Full detection capabilities (all kinds of sec events int./ext.)- Comprehensive list of use cases- Detailed reaction processes- Dedic. SOC (& possibly CSIRT)- Critical apps security monitoring- Users/managers/executives full awaren
42、ess- Strong gouvernance (indicators & accurate benchmarking)- Link with business risksIdem 1Idem 2Figure 2: 3 majority levels in Cyber Defence and SIEM approaches 4.3 SANS CAG The SANS Consensus Audit Guidelines 5 is a compliance standard that specifies 20 “control points“ that have been identified
43、through a consensus of security professionals from the federal and private industry. The aim is to begin the process of establishing a prioritized baseline of information security measures and controls that can be applied across organizations to help improving their defences. The 20 Critical Control
44、s subject to collection, measurement, and validation currently defined are: 1) Inventory of Authorized and Unauthorized Devices 2) Inventory of Authorized and Unauthorized Software ETSI ETSI GS ISI 003 V1.1.2 (2014-06) 93) Secure Configurations for Hardware and Software on Laptops, Workstations, and
45、 Servers 4) Continuous Vulnerability Assessment and Remediation 5) Malware Defenses 6) Application Software Security 7) Wireless Device Control 8) Data Recovery Capability (validated manually) 9) Security Skills Assessment and Appropriate Training to Fill Gaps (validated manually) 10) Secure Configu
46、rations for Network Devices such as Firewalls, Routers, and Switches 11) Limitation and Control of Network Ports, Protocols, and Services 12) Controlled Use of Administrative Privileges 13) Boundary Defense 14) Maintenance, Monitoring, and Analysis of Security Audit Logs 15) Controlled Access Based
47、on the Need to Know 16) Account Monitoring and Control 17) Data Loss Prevention 18) Incident Response Capability (validated manually) 19) Secure Network Engineering (validated manually) 20) Penetration Tests and Red Team Exercises (validated manually) Each Critical Control (CC) is described in detai
48、l, is subject to continuous monitoring and checking and has gained a broad consensus as regards their relevancy and effectiveness. The KPSIs defined within the present document are based on the CC list concerning detection, with adaptation and extension whenever needed to cover the scope of the ETSI
49、 ISG ISI series. 5 Key Performance Security Indicators This clause describes the Key Performance Security Indicators (KPSI) defined for the detection mechanisms. 5.1 How to use KPSIs to assess the organisations overall maturity level in security event detection and response posture The first purpose of KPSIs is to assess the organisations overall maturity level of security event detection and response posture. The way to do it is to reckon the average of all KPSIs in order to get the unique level for the who