+ All Categories
Home > Documents > Sample Security Controls Matrix - leocybersecurity.com · The matrix below represents a...

Sample Security Controls Matrix - leocybersecurity.com · The matrix below represents a...

Date post: 01-May-2018
Category:
Upload: dangxuyen
View: 214 times
Download: 1 times
Share this document with a friend
3
Page 1 of 3 Sample Security Controls Matrix Tactics for Negotiating Security Provisions Disclaimer This document is a case study of a hypothetical company. The matrix below represents a hypothetical company’s posture as it relates to a particular standard—in this case, CIS 20. This type of matrix can be prepared for other standards, such as ISO 27002, NIST 800-53, etc. Bear in mind, however, that the matrix is specific to a particular company and, in some cases, to a particular venture. This document is not intended to be used as a generic reference, but rather, it is an example document of the type of deliverable that can assist transactional attorneys in negotiating security provisions. Overview The intent of this document is to present a case study based upon a fictitious organization—in this scenario a software as a service (SaaS) provider (“SaaSCorp”)—targeting mid-size to large companies. As it is awarded contracts, SaaSCorp’s customers impose certain security provisions by way of a Master SaaS Agreement. One of the provisions stipulates that SaaSCorp represent and warrant that administrative, physical, and technical safeguards are in place that are no less rigorous than those set out in the CIS 20 standard. 1 SaaSCorp’s attorney is concerned about whether SaaSCorp can make those representations, as she does not wish for her organization to be in breach immediately upon execution of the contract. For this reason, she engages a cyber security company to assess SaaSCorp’s cyber program against the CIS 20 standard (and other security provision requirements) for this type of industry/venture for the purpose of building a matrix she can use in this and subsequent contract negotiations. Negotiation Tactics Oftentimes security standards are negotiated in an all or nothing fashion, but SaaSCorp’s attorney recognizes that she may be able to break up a standard control by control, for granular negotiations. Her negotiation tactics include the following strategies 1. Determine which controls/items have already been completed so that she can accept them outright 2. Identify those controls/items that could be completed with low to moderate difficulty and at reasonable cost 3. Negotiate out controls/items that are not applicable to SaaSCorp’s security program requirements for this engagement 4. Defer, for a period of time, certain controls/items that are considered difficult to implement or are costly 5. Offer, as an alternative, a liability supercap in lieu of completing a control/item 6. Put in place, as an alternative, additional insurance coverage in lieu of completing a control/item 7. Shift back to the customer, for a price discount, responsibility for a control/item 1 CIS 20 was selected in this exercise in part because of its division of security controls into 20 defined categories.
Transcript

Page1of3

SampleSecurityControlsMatrixTacticsforNegotiatingSecurityProvisions

DisclaimerThisdocumentisacasestudyofahypotheticalcompany.Thematrixbelowrepresentsahypotheticalcompany’spostureas

itrelatestoaparticularstandard—inthiscase,CIS20.Thistypeofmatrixcanbepreparedforotherstandards,suchasISO

27002,NIST800-53,etc.Bearinmind,however,thatthematrixisspecifictoaparticularcompanyand,insomecases,toa

particularventure.Thisdocumentisnotintendedtobeusedasagenericreference,butrather,itisanexampledocumentof

thetypeofdeliverablethatcanassisttransactionalattorneysinnegotiatingsecurityprovisions.

OverviewTheintentofthisdocumentistopresentacasestudybaseduponafictitiousorganization—inthisscenarioasoftwareasa

service(SaaS)provider(“SaaSCorp”)—targetingmid-sizetolargecompanies.Asitisawardedcontracts,SaaSCorp’s

customersimposecertainsecurityprovisionsbywayofaMasterSaaSAgreement.Oneoftheprovisionsstipulatesthat

SaaSCorprepresentandwarrantthatadministrative,physical,andtechnicalsafeguardsareinplacethatarenolessrigorous

thanthosesetoutintheCIS20standard.

1

SaaSCorp’sattorneyisconcernedaboutwhetherSaaSCorpcanmakethoserepresentations,asshedoesnotwishforher

organizationtobeinbreachimmediatelyuponexecutionofthecontract.Forthisreason,sheengagesacybersecurity

companytoassessSaaSCorp’scyberprogramagainsttheCIS20standard(andothersecurityprovisionrequirements)for

thistypeofindustry/ventureforthepurposeofbuildingamatrixshecanuseinthisandsubsequentcontractnegotiations.

NegotiationTacticsOftentimessecuritystandardsarenegotiatedinanallornothingfashion,butSaaSCorp’sattorneyrecognizesthatshemay

beabletobreakupastandardcontrolbycontrol,forgranularnegotiations.Hernegotiationtacticsincludethefollowing

strategies

1. Determinewhichcontrols/itemshavealreadybeencompletedsothatshecanacceptthemoutright

2. Identifythosecontrols/itemsthatcouldbecompletedwithlowtomoderatedifficultyandatreasonablecost

3. Negotiateoutcontrols/itemsthatarenotapplicabletoSaaSCorp’ssecurityprogramrequirementsforthis

engagement

4. Defer,foraperiodoftime,certaincontrols/itemsthatareconsidereddifficulttoimplementorarecostly

5. Offer,asanalternative,aliabilitysupercapinlieuofcompletingacontrol/item

6. Putinplace,asanalternative,additionalinsurancecoverageinlieuofcompletingacontrol/item

7. Shiftbacktothecustomer,forapricediscount,responsibilityforacontrol/item

1 CIS20wasselectedinthisexerciseinpartbecauseofitsdivisionofsecuritycontrolsinto20definedcategories.

SecurityControlsMatrix- CaseStudy&SampleControlsMatrix

Page2of3

Requirement/Control

Description StatusDifficulty CapEx OpEx

NotesEasy Medium Hard $ $$ $$$ $ $$ $$$

SANSCIS20SecurityControls

1.InventoryofAuthorizedandUnauthorizedDevices Complete X X SaaSCorphasprocessesinplacetoperform&maintaincurrenthardware

inventories,andcandemonstratehavingmetthisrequirement.

2.InventoryofAuthorizedandUnauthorizedSoftware Complete X X SaaSCorphasprocessesinplacetoperform&maintaincurrentsoftware

inventories,andcandemonstratehavingmetthisrequirement.

3.SecureConfigurationsforHardwareandSoftware Tactic2:Cancomplete X X X ThemajorityoftheexpenditurewouldbeinOpXbecausesecuringsystems

canbecompletedwithSaaSCorp’sexistinginformationsecurityteam.

4.ContinuousVulnerabilityAssessmentandRemediation Tactic2:Cancomplete X X X

SaaSCorphasalreadycompletedavulnerabilityassessment.Uponexecutionofthisagreement,SaaSCorpwillcontractwithathirdpartytosatisfythiscontrol.

5.ControlledUseofAdministrativePrivileges Complete X X SaaSCorphasprocessesandtechnologyinplacetoprovidethiscapability,

andcandemonstratehavingmetthisrequirement.

6.Maintenance,Monitoring,andAnalysisofAuditLogs Tactic2:Cancomplete X X X

SaaSCorpwillneedtoimplementtechnologysolutionstosupportthisrequirement,andwillcontractwitha3rdpartyforsupportandmonitoringservicestominimizeoperationalcosts.

7.EmailandWebBrowserProtections Tactic2:Cancomplete X X X

SaaSCorphasbasicemailsecuritytechnologiesinplace;however,theexistingprogramdoesnotaddresswebbrowsingdefenses.

Addressingthisissuewillberelativelyeasy,butwillrequirethepurchaseanddeploymentofadditionaltechnologysolutions.

8.MalwareDefenses Complete X X SaaSCorphaspurchased&implementedcurrentanti-malwaretechnology,andcandemonstratehavingmetthisrequirement

9.LimitationandControlofNetworkPorts Complete X X SaaSCorphasnetworkconfigurationstandards&processesinplaceto

addressthis,andcandemonstratehavingmetthisrequirement

10.DataRecoveryCapability Tactic7:Shifttocustomer NotApplicable Customerisacloudserviceprovider,sothiscontrolcanbepushedtothecustomerinnegotiation,perhapswithapriceshift.

11.SecureConfigurationsforNetworkDevices Complete X X X SaaSCorphasdevelopedabasicdevicesecuritymanagementprocess,,and

candemonstratehavingmetthisrequirement

SecurityControlsMatrix- CaseStudy&SampleControlMatrix

Disclaimer: This document represents a hypothetical case study involving a fictitious organization, for educational purposes, and does not refer to any specific or actual organization

Requirement/ControlDescription Status

Difficulty CapEx OpExNotes

Easy Medium Hard $ $$ $$$ $ $$ $$$

12.BoundaryDefense Complete X X SaaSCorphasboundarycontrolssuchasfirewallsandintrusiondetectionsystemsinplace,andcandemonstratehavingmetthisrequirement.

13.DataProtection Tactic5:Supercap X X X

SaaSCorpdoesnotcurrentlyhavetheabilitytoencryptdata,butreliesonothercontrolsandaspectsofitscybersecurityprogramtoprotectcustomerdata.Untilsuchencryptioncanberolledout,SaaSCorpmayofferasupercapinthelimitationofliabilityforthiscontrol.Asanalternative,SaaSCorpcanoffertoattainadditionalcybersecurityinsurance.

14.ControlledAccessBasedontheNeedtoKnow Complete X X SaaSCorphasdefinedpolicyrequirements&processestolimitaccessbased

onrole,andcandemonstratehavingmetthisrequirement.

15.WirelessAccessControl Tactic3:N/A NotApplicable SaaSCorppreventswirelessnetworkingbypolicyanddoesnotemploywirelessnetworks.

16.AccountMonitoringandControl Tactic6:Insurance X X

SaaSCorpcanmonitorwhenusersareloggingin,buthaslimitedinsightintoaccountusagedetails.Untiltechnologysolutionsareputinplace,SaaSCorpcanoffertoattainadditionalcybersecurityinsuranceandnameCustomerasabeneficiary.

17.SecuritySkillsAssessment&AppropriateTrainingtoFillGaps Tactic2:QuickWin X X SaaSCorpcanmeetthisrequirementwithrelativeeasebyleveraging3rd

partysolutionstoassessexistingsecurityskillsandprovidetrainingcourses.18.ApplicationSoftwareSecurity Complete X X SaaSCorphasadocumentedsecuresoftwaredevelopmentprocessinplace,

andcandemonstratehavingmetthisrequirement.

19.IncidentResponseandManagement Tactic4:Deferforoneyear X X

WhileSaaSCorphasagenericincidentresponseplan,theattorneyisconcernedthatitisnotactionableandmaynotwithstandscrutiny.SaaSCorpwillconveyitsplanstoemployarecognizedincidentresponseprogramandwillnegotiateoneyeartocomply.

20.PenetrationTestsandRedTeamExercises Complete X X SaaSCorphasperformedapenetrationtestwithintheprior12months,and

candemonstratehavingmetthisrequirement.


Recommended