Tripwire, Inc., a provider of security and compliance solutions for enterprises and industrial organizations, announced the results of an extensive study conducted for Tripwire by Dimensional Research. The study evaluated the confidence of IT professionals regarding the efficacy of seven key security controls, which must be in place to quickly detect a cyber attack in progress. Study respondents included 763 IT professionals from various industries, including 100 participants from the energy sector.
According to the Department of Homeland Security, the energy sector faces more cyber attacks than any other industry. Despite the frequency in attacks, energy IT professionals participating in Tripwire’s survey were very confident in their ability to collect the data needed to detect a cyber attack. For example, 72% of energy respondents believe they could detect configuration changes to endpoint devices on their organization’s network within hours, but over half (52%) said their automated tools did not pick up all the necessary information, such as the locations, department and other critical details, needed to quickly identify unauthorized configuration changes to endpoint devices that can indicate an attack in progress.
“These results show that most security professionals are assuming they are doing the right things to secure their environments, but lack real world data to back up their assumptions,” said Travis Smith, senior security research engineer for Tripwire. “This highlights the importance of testing security controls to ensure they are functioning as expected. It’s not enough to install security tools throughout the environment. You must test the policies and procedures to be confident the controls in place will stop or detect real-world intrusions.”
Additional findings from the study include:
- 73% of energy respondents believe they could detect unauthorized software added to the organization’s network within hours, but only fifty-nine% know exactly how long the detection process would actually take.
- 84% of energy respondents believe they would receive alerts within hours if their vulnerability scanning systems detected unauthorized devices. However, over half (fifty-two%) did not know how long it took to generate these alerts.
- 44% of energy sector respondents said that less than eighty% of patches succeed in a typical patch cycle.
- 40% of the respondents did not know how long it took to generate an alert if a system fails to log properly, however ninety-five% assumed a report would be generated within hours
“The energy sector has made significant improvements in securing their slice of the nation’s critical infrastructure, but broader adoption of security best practices is still lacking,” said Tim Erlin, director of IT security and risk strategist for Tripwire. “While dedicated security staff are intimately familiar with the deployed capabilities and gaps, IT at large is often working on assumptions of protection.”
Tripwire’s study is based on seven key security controls required by a wide variety of compliance regulations, including PCI DSS, SOX, NERC CIP, MAS TRM, NIST 800-53, CIS Top 20 and IRS 1075. These controls also align with the United States Computer Emergency Readiness Team (US-CERT) recommendations and international guidance, such as the Australian Signals Directorate’s Strategies to Mitigate Targeted Cyber Intrusions.
Recommendations and guidance include:
- Accurate hardware inventory.
- Accurate software inventory.
- Continuous configuration management and hardening.
- Comprehensive vulnerability management.
- Patch management.
- Log management.
- Identity and access management.
When implemented across an organization, these controls deliver specific, actionable information that is necessary to defend against the most pervasive and dangerous cyber attacks. Before any damage is done, it is vital for organizations to identify indicators of compromise quickly so that appropriate action can be taken.
For more on this study:
http://www.tripwire.com/it-resources/are-energy-sector-it-pros-overconfident-in-data-breach-detection-skills/
Filed Under: Cybersecurity