'What', 'Where', and 'Why' Cybersecurity Controls to Enforce for Optimal Risk Mitigation

Ashutosh Dutta, Ehab Al-Shaer

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

16 Scopus citations

Abstract

Most enterprises depend on information security standards and guidelines such as CIS Critical Security Controls (CIS CSC)to adopt and manage cybersecurity controls. With the escalation and diversity of cyber attacks, hundreds of cybersecurity controls have been defined to implement NIST Cybersecurity Framework (i.e., Identify, Detect, Protect, Respond, and Recover)[1]. However, the selection of the most appropriate set of security controls to optimize cyber defense Return on Investment (ROI)is still a highly complex and error-prone task due to the large number of security controls, the consideration of various risk factors (such as vulnerabilities and attack incidents), and budget constraints. Moreover, the complexity exacerbates due to the presence of various enterprise-oriented usability requirements. In this paper, we present a novel model and optimization techniques to select the most cost-effective set of Critical Security Controls (CSC) for optimal risk mitigation planning considering affordable residual risk, budget, and usability constraints. We developed Cyber Defense Matrix (CDM), that our automated approach uses to determine 'what' security controls are needed at a particular enterprise for security function (Identify, Protect, Detect, Respond, and Recover), 'where' to enforce in the cyber environment (Network, Device, People, Application, and Data), and 'why' it is effective in the cyber attack kill chain phases. We formulate the CDM decision-making problem using SMT constraints and developed a tool, called CyberARM, that computes correct-by-construction planning to satisfy cybersecurity ROI with bounded residual risk under specific budget constraints.

Original languageEnglish
Title of host publication2019 IEEE Conference on Communications and Network Security, CNS 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages160-168
Number of pages9
ISBN (Electronic)9781538671177
DOIs
StatePublished - Jun 2019
Externally publishedYes
Event2019 IEEE Conference on Communications and Network Security, CNS 2019 - Washington, United States
Duration: 10 Jun 201912 Jun 2019

Publication series

Name2019 IEEE Conference on Communications and Network Security, CNS 2019

Conference

Conference2019 IEEE Conference on Communications and Network Security, CNS 2019
Country/TerritoryUnited States
CityWashington
Period10/06/1912/06/19

Bibliographical note

Publisher Copyright:
© 2019 IEEE.

Keywords

  • Cyber Defense Matrix
  • formal modeling
  • risk mitigation

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of ''What', 'Where', and 'Why' Cybersecurity Controls to Enforce for Optimal Risk Mitigation'. Together they form a unique fingerprint.

Cite this