Everyone talks about "risk and compliance" in security, but what do companies have to do to make it through audits and meet regulations related to information security? And what are the costs?
McAfee asks those questions in its "Risk and Compliance Outlook -- 2012" survey of 438 IT professionals in the United States as well as Europe and Brazil, Australia and Singapore, finding the main challenge is getting visibility into IT operations. Four out of five of those surveyed believe "visibility into the risk posture of their IT environment" is important, and one-quarter estimated they shaved off six to ten hours per week in IT staff time with good visibility.
[ Keep up with the latest approaches to managing information overload and staying compliant in InfoWorld's Enterprise Data Explosion newsletter. | Learn how to greatly reduce the threat of malicious attacks with InfoWorld's Insider Threat Deep Dive PDF special report. ]
But the patching of software remains a chief stumbling block to good risk management, according to the findings.
"Before the advent of numerous regulations and the rise of malicious code targeting known vulnerabilities, patch management was not a top issue for many organizations," states the McAfee report. "Today, patch management must be a top priority to mitigate the continuous threat of malicious code and compliance failure. These concerns have pushed organizations to gain better control and oversight of their information assets. This is seen with nearly half of the surveyed organizations applying patches monthly and near one third doing so on a weekly basis."
But as they patch away, there's the sense this is a time-intensive process that's costly. The IT professionals surveyed indicated they are tempted to do routine vulnerability patching less in order to save money.
About half of the companies say they are able to pinpoint risks associated with vulnerabilities and threats well, "and 43% indicate they over-protect and patch everything they can." This might be substantial indeed, given that the National Vulnerabilities Database reported 3,532 vulnerabilities last year.
But the most disruptive aspect of patching is said to be "out-of-cycle patches" that defy the monotonous, scheduled "Patch Tuesday" of every month led by Microsoft, with other vendors also now releasing patch announcements on that second Tuesday of every month.
Out-of-cycle patches can have critical security importance, and 70% of the survey respondents said these events do have an impact, But only 13% described this as a "major impact."
The most important regulations that companies have to comply with are the Payment Card Industry Data Security Standards (PCI-DSS), Sarbanes-Oxley, the HIPAA regulations for healthcare, and others such as the Basel Accords rules for financial. The most popular compliance frameworks are said to be ISO, ITIL, and COBIT.
The survey respondents indicated the "most challenging" regulatory mandates revolved around database security, with a focus on access control for the privileged insider and trying to monitor based on "normal" usage. Other needed controls are encryption of data at rest and establishing separation of duties.