Our cyber security products span from our next gen SIEM used in the most secure government and critical infrastructure environments, to automated cyber risk reporting applications for commercial and government organisations of all sizes.
The Australian Prudential Regulation Authority (APRA) regulates Australia’s financial services industry and, as such, has responsibility for compliance and governance over all aspects of the finance industry. This is a wide and complex remit, since financial services cover a wide range of specific business types, so when they announced their draft standard for cyber security last week, APRA CPS 234, it immediately begs the question, how can it be applied?
APRA is discharged a wide and diverse remit by the Australian government to regulate consumer banks, business banks, insurance companies, hedge funds, investment banks and superannuation providers, so their announcement on the 7th March 2018, relating to new cyber security measures, was received with interest by the security community. The Discussion Paper they published with the press release, entitled, Information Security Management: A new cross-industry prudential standard, shows that their intent is to enforce this standard immediately after they have been through the industry consultation period.
APRA say that the cyber security measures they are proposing will help APRA-regulated entities to repel cyber adversaries, as well as handle incident response swiftly and effectively if a breach occurs.
The proposed standard, called APRA CPS 234, requires that all APRA-regulated entities do the following:
Interestingly, these security controls are all taken from the international standards, as proposed in frameworks like ISO 27001, so this is nothing new to the security industry. However, the good thing is that APRA sees the need to publish enforceable standards to the businesses they regulate, which means cyber security will be a requirement rather than a nice to have.
It’s worth noting that there are a variety of improvements that can be introduced into the business over time regarding security posture. These improvements should be managed by a security professional, hired into the role of Information Security Manager, or at board level, Chief Information Security Officer. This head of security role should be charged with demonstrating continual service improvement across the organisation’s entire security programme, that way allowing the board to rest assured the business is always striving to be ahead of the threats.
Operational security, which encompasses the people, processes and technology needed to deliver appropriate technical security outcomes for the business, must become a major focus for APRA governed organisations. This encompasses the mechanisms to detect and respond to information security incidents and many of the cyber security controls needed to fortify their networks, systems and premises. The focal point of any successful operational security capability often becomes the Security Operations Centre (SOC), which is either a standalone control centre for all security matters, or is a capability integrated into the Network Operations Centre (NOC) designed to handle security monitoring and threat response.
The simplest way to look at this is to use the process model to derive an appropriate set of staff and technology requirements. However, before jumping into any technical solution, it’s imperative to ask what it is that needs protecting? Sensitive data, such as intellectual property, confidential financial information and customer or employee personal information, all need to be secured. Start with an internal audit of this information and rationalise what really needs protecting rather than what is often misconstrued as requiring security, when in fact it may already be in the public domain.
Next, identify threats to the business. Each information category identified in the internal audit needs consideration from this threat perspective. Who would benefit from compromising the confidentiality, integrity or availability of this information? Remember, it’s as important to consider external threat, such as cybercriminals trying to get their hands on your PII, but also look at the possibility of insider threats, be them negligent employees or potentially disgruntled workers.
Next, it’s time to assess your networks and systems for what the security industry refers to as vulnerability. These are unpatched systems or configuration mistakes that leave the system vulnerable to attack. A Vulnerability Assessment is usually undertaken by an external expert service provider as it involves specialist tools and experience to make sure it’s comprehensive.
Armed with the knowledge of where sensitive data exists, who the threat actors are and where vulnerabilities are within the business’s systems, it’s much more accurate to calculate information risk based on these facts. A risk assessment will help focus investment decisions in information security onto what’s important rather than running blindly into buying technology to thwart and unquantified and unknown set of risks.
Finally, it’s time to mitigate the most important risks, using people, processes and technology.
Start with the processes the business already has in place for implementing and managing change. If the business already uses a service management framework, such as ITIL, then change management processes should already exist and employees can follow these when system or process changes are required. Every single change resulting from the information security programme should be well-considered, designed and tested, and rolled out with a backout strategy, just in case something goes wrong.
One of the most important things to take control of regarding security is gaining the visibility of what’s really going on, down in the depths of the networks and systems the organisation uses to process and store data. A comprehensive identity, access control, authentication, authorisation and accounting solution will require a holistic capability for monitoring who is doing what, where and to what company assets, with that information fed back as an audit trail to the SOC.
Lastly, ensure the organisation’s disaster resilience, backup and recovery and incident management capabilities (covering people, processes and technology) are all in place. Even the most robust operational security controls are no guarantee the business won’t be breached, so construct and test plans to respond to incidents before they really happen, as this will identify issues with the process and ensure people understand what to do in a crisis.
Huntsman Security provides a technology solution that fundamentally supports the activities of the SOC. Our Security Information and Event Management (SIEM) solution ingests security audit information at high speed (> 5 billion events per day) from every corner of the network, from every system and application plugged into the network and from every user interaction with corporate information. This information is then mined using sophisticated algorithms to firstly baseline what looks normal for your business, and then reports any anomalies to the SOC team to investigate.
<<< Part 2a: Australia’s Essential Eight: Beyond Endpoint Control <<< Part 2b: Activating UK NCSC & US NIST Guidelines: Beyond Endpoint Control Part 4: Systematic Measurement of Cyber Controls >>> As much as we invest into cyber security controls, external threats are inevitable. In a recent Notifiable Data Breaches Report from the Office of the […]Read more
Keen campers, scouts and even the Swiss Army know – that a good penknife is indispensable. This simple device has mitigated many a disaster at one point in time or another. Whether it’s to cut through a bit of string, tighten a screw or simply to solve the problem of no bottle opener in the […]Read more
Supply chain risk is an area of cyber security that demands the ongoing attention of every enterprise; because it can make the difference between being resilient or not. It’s no surprise that insurers warn that the vulnerability of supply chains is potentially a systemic risk that can quickly propagate across supply chain dominated industries. Organisations […]Read more
It took a “tripartite cyber assessment” by the Australian Prudential Regulation Authority (APRA) to identify that a sample of financial organisations had inadequate cyber security: poor security control management, a lack of business recovery planning and inadequate 3rd party risk assessment. Why were there gaps? Where is the failure? Clearly the common practice of unsubstantiated […]Read more
The discussion over data-driven vs qualitative cyber security assessment has been going for some time. Nowadays, it is at the top of the priority list for many security and senior executive teams. Managing cyber security has always been a noble ambition but without reliable measurement, the lack of actionable information makes evidence-based management decisions almost […]Read more
Attack Surface Management (ASM) characterises a business’s security risks as the monitoring and risk mitigation of a constantly changing and vulnerable “risk-surface”. Importantly, this attack surface extends to both internal and external assets and services. Some ASM solutions deliver clear visibility across both Internet facing and internal assets. Others do not. Instead, they assess external […]Read more
The UK Government has released its annual “Cyber Security Breaches Survey 2023”. It provides some valuable insights into how cyber security is currently being managed in the UK, by a range of organisations. It also speaks to how current competing economic priorities are impacting the effectiveness of some cyber security management efforts. The full report […]Read more
Solving the mismatch between cyber security reporting and directors’ requirements You are undoubtedly familiar with the headlines; you may have even become in part desensitised to them: ‘Cyber-attacks are increasingly damaging’, or ‘large amounts of personal data are most at risk’. The important take-away, however, is that modern day thieves can easily gain access to […]Read more
A system to address the untrustworthy security environment Zero trust approaches to security have been talked about for a while; but in recent times they have certainly gained more currency. As a model for protecting data and services, the simplicity of the concept is its biggest strength – assume, as a default position, there is […]Read more
The ongoing protection of Critical Infrastructure from cyber-attacks has implications for us all – whether it’s supporting our health, well-being or simply our way of life, there is good reason to reflect on the effectiveness your cyber security. Cyber security risks are nothing new and the vulnerability of critical infrastructure to them (and the heightened […]Read more
Read by directors, executives, and security professionals globally, operating in the most complex of security environments.