Adam Groenhout

Fortifying Flavors: A Comparison of Security Programs and the Path to Maturity

imgur

Overview

This post covers different kinds of security programs types (or flavors, if you will), how to think about each one, and why this matters. For this post, we will simplify things for the sake of understanding and categorize security programs into three common types: compliance-based, risk-based, and business-aligned. The main points are as follows.

Security Program Flavors

I just recently celebrated my daughter’s birthday and we all went to an ice cream shop to celebrate. It was absolutely frigid outside, but the birthday girl wanted ice cream! Using this as inspiration, let’s explore for a moment how types of security programs are like flavors of ice cream. Humor me (pun intended).

Cybersecurity programs, like the organizations that they protect, are all snowflakes. They are unique with each having their own inherent set of characteristics and each being shaped by their external environments. However, security programs often share the same fundamental mission and challenges, and therefore share common approaches to meet these needs.

Intentionality

It is vital to be aware of what kind of security program you have or want to build, and that you are intentional about it for the life of the program. If this intentionality is not ever present, leaders who make high-impact decisions will be at the whims of various forces that will distract, waste effort, and pave the way for failure. Forces include external and internal threat actors, strong opinions from big personalities, persuasive vendors, and the latest headlines. Having a clear view of a program’s focus will help keep these things at bay and preserve strategic continuity.

Explicitly orienting one way helps leaders acknowledge trade-offs and work to compensate for gaps. Like good meditation, it allows leaders to more objectively observe encounters with these influences and respond with appropriate speed and energy.

Let’s look at these types of security programs in more detail.

Program Attributes

This table breaks down each program type and describes key attributes.

Security Program Type Primary Driver Priorities Strengths Weaknesses
Compliance-Based Adhering to external regulations, standards, and control frameworks. * Meeting specific compliance requirements. * Implementing controls to demonstrate adherence. * Passing audits and assessments. * Clear framework to organize security efforts. * Minimizes legal and financial risks of non-compliance. * Can be too rigid and miss unique risks. * May lead to a "check-the-box" mentality. * Can struggle to adapt to new threats and needs.
Risk-Based Identifying, assessing, and mitigating organizational risks. * Understanding the threat landscape, attack surface, and vulnerabilities. * Analyzing likelihood and impact of risks. * Prioritizing security efforts based on risk assessment. * Focuses on the most critical issues. * Adapts to changing threats and business needs. * Promotes a proactive security posture. * Requires mature risk management processes. * Can be challenging to qualify, let alone quantify, risk. * May overlook compliance if not well integrated.
Business-aligned Supporting and enabling business objectives. * Understanding the organization's strategic and tactical goals. * Aligning security with business needs and processes. * Demonstrating and materializing the value of security to the business. * Ensures security is and is seen as an enabler. * Promotes collaboration between security and business units. * Increases likelihood of securing resources and support. * May require a shift in security culture. * Can be challenging to balance security with business demands. * May struggle to address risks that do not clearly connect to business objectives.

Program Relationships

This following diagram represents the interconnected but ultimately escalatory nature of the three security program types. Conceptually, when moving from a compliance-based, to risk-based, to business-aligned, maturity and efficacy increases. Business-aligned security programs are the most effective because they are designed to fully manifest why security programs exist in the first place.

imgur

Wrap Up

Clearly, these are simple descriptions on top of an overly simplistic taxonomy. In reality, security program orientations are not so monolithic, and things are messy. The majority of security programs are a blend of these types. Often, it’s not even clear which types are most prominent, and things fluctuate with time, usually happening slowly over the course of years, as dynamics change and programs mature. At any rate, it can be helpful to identify the orientation(s) of security programs and make explicit decisions to either stay the course or change as needed to best service the organization. Understanding these dynamics allows leaders to navigate through strategic options to shape programs to be most effective and ultimately move further towards business-aligned programs.