US11170334B1 - Systems and methods for security operations maturity assessment - Google Patents
Systems and methods for security operations maturity assessment Download PDFInfo
- Publication number
- US11170334B1 US11170334B1 US17/025,783 US202017025783A US11170334B1 US 11170334 B1 US11170334 B1 US 11170334B1 US 202017025783 A US202017025783 A US 202017025783A US 11170334 B1 US11170334 B1 US 11170334B1
- Authority
- US
- United States
- Prior art keywords
- security
- data sources
- score
- organization
- maturity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 56
- 230000008520 organization Effects 0.000 claims abstract description 162
- 230000006870 function Effects 0.000 claims description 22
- 238000013480 data collection Methods 0.000 claims description 15
- 238000005516 engineering process Methods 0.000 claims description 15
- 230000006872 improvement Effects 0.000 claims description 14
- 238000004364 calculation method Methods 0.000 claims description 8
- 238000012544 monitoring process Methods 0.000 claims description 8
- 238000010801 machine learning Methods 0.000 claims description 6
- 239000011159 matrix material Substances 0.000 claims description 6
- 230000002452 interceptive effect Effects 0.000 claims description 5
- 238000007726 management method Methods 0.000 description 22
- 230000015654 memory Effects 0.000 description 18
- 238000013507 mapping Methods 0.000 description 16
- 238000001514 detection method Methods 0.000 description 15
- 238000004891 communication Methods 0.000 description 14
- 238000010586 diagram Methods 0.000 description 11
- 230000008569 process Effects 0.000 description 10
- 238000012545 processing Methods 0.000 description 9
- 239000000047 product Substances 0.000 description 7
- 230000002155 anti-virotic effect Effects 0.000 description 6
- 230000002265 prevention Effects 0.000 description 6
- 238000004458 analytical method Methods 0.000 description 4
- 230000008878 coupling Effects 0.000 description 4
- 238000010168 coupling process Methods 0.000 description 4
- 238000005859 coupling reaction Methods 0.000 description 4
- 230000003993 interaction Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 230000004224 protection Effects 0.000 description 4
- 230000015556 catabolic process Effects 0.000 description 3
- 238000004590 computer program Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000013439 planning Methods 0.000 description 3
- 239000008186 active pharmaceutical agent Substances 0.000 description 2
- 238000003491 array Methods 0.000 description 2
- 230000003416 augmentation Effects 0.000 description 2
- 239000006229 carbon black Substances 0.000 description 2
- 238000013499 data model Methods 0.000 description 2
- 238000001914 filtration Methods 0.000 description 2
- 238000007689 inspection Methods 0.000 description 2
- 230000005291 magnetic effect Effects 0.000 description 2
- 230000000116 mitigating effect Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 102100035606 Beta-casein Human genes 0.000 description 1
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 101000947120 Homo sapiens Beta-casein Proteins 0.000 description 1
- 241001223864 Sphyraena barracuda Species 0.000 description 1
- 230000001133 acceleration Effects 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- ZPUCINDJVBIVPJ-LJISPDSOSA-N cocaine Chemical compound O([C@H]1C[C@@H]2CC[C@@H](N2C)[C@H]1C(=O)OC)C(=O)C1=CC=CC=C1 ZPUCINDJVBIVPJ-LJISPDSOSA-N 0.000 description 1
- 230000000052 comparative effect Effects 0.000 description 1
- 229910052802 copper Inorganic materials 0.000 description 1
- 239000010949 copper Substances 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 238000013523 data management Methods 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000003292 diminished effect Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000035800 maturation Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000003389 potentiating effect Effects 0.000 description 1
- 230000003449 preventive effect Effects 0.000 description 1
- 230000036593 pulmonary vascular resistance Effects 0.000 description 1
- 238000004445 quantitative analysis Methods 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 238000005067 remediation Methods 0.000 description 1
- 238000012502 risk assessment Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000011895 specific detection Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 230000000153 supplemental effect Effects 0.000 description 1
- 230000001629 suppression Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0639—Performance analysis of employees; Performance analysis of enterprise or organisation operations
- G06Q10/06393—Score-carding, benchmarking or key performance indicator [KPI] analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2455—Query execution
- G06F16/24564—Applying rules; Deductive queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computing arrangements using knowledge-based models
- G06N5/02—Knowledge representation; Symbolic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computing arrangements using knowledge-based models
- G06N5/04—Inference or reasoning models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0637—Strategic management or analysis, e.g. setting a goal or target of an organisation; Planning actions based on goals; Analysis or evaluation of effectiveness of goals
- G06Q10/06375—Prediction of business process outcome or impact based on a proposed change
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
Definitions
- FIG. 7 illustrates an example schema used to assess threat detection capability of an organization based on given data sources in accordance with an embodiment of the present disclosure.
- FIG. 12 is an example dashboard illustrating maturity score of the organization and maturity score against each of the individual attributes in accordance with an embodiment of the present disclosure.
- the input receiving module 202 may also receive coverage details such as a list of data sources, number of domain controllers, details about cloud providers, details of endpoint security providers, number of endpoints, location of data centers and critical resources, etc. from customers.
- the input receiving module 202 may display customer detail completeness score in percentage to indicate missing details, which can always be updated by the customer.
- the input receiving module 202 may determine missing details about the organization based on the partially filled customer details. For example, if the size of the organization and nature of business is known, input receiving module 202 may determine the compliance requirements of the organization.
- FIG. 3B illustrates example maturity scores over a period of time for a customer measured in accordance with an embodiment of the present disclosure.
- the security maturity assessment system uses a logistic equation like the one above to determine the overall maturity score.
- the security operations maturity of organization increases as their visibility into data sources increases.
- the curve 352 represents the increasing operations maturity of the organization.
- An organization that has no visibility into its data, getting started, has a huge value by additional data sources.
- FIG. 3B represents the best potential curve to model out the ease of implementation vs. the gains in security that happen along the maturity curve. As one appreciates, for better assessment for the security maturity of an organization, it is important to capture comprehensive details about IT resources of the organization.
- FIG. 5B illustrates an example recommended list of data sources in accordance with an embodiment of the present disclosure. Other data sources with lower criticality score may also be recommended by the system to be active.
- FIG. 5C illustrates an example list of data sources having a low criticality score in accordance with an embodiment of the present disclosure. Other data sources with lower criticality score may also be recommended by the system to be active.
- the security maturity scoring model may help organizations proactively drive security operation maturity through quantitative analysis and industry benchmarking.
- the system starts collecting, storing, and analyzing the maturity score and can provide the actual score vs. the potential score through the dashboard.
- the output provided may match the collection scope for a new customer and validates their overall scope.
- FIG. 14 illustrates an example scoring engine compartments used to assess security maturity in accordance with an embodiment of the present disclosure.
- scoring engine compartments such as data source selection, use case coverage, and asset collection coverage are used to determine the overall maturity score of any organization.
- the maturity score is calculated separately for each compartment.
- These scores represent the default data sources that the system suggests at baseline without any customizations made to the customer scoring engine and reflect a potential maturity score until these systems are actively collecting data sources.
- the system enables customization and planning of potential data sources against the actual collection, providing a score for both actual collection and potential score if all data sources are activated.
- FIG. 16 illustrates an exemplary computer system in which or with which embodiments of the present invention may be utilized.
- the various process and decision blocks described above may be performed by hardware components, embodied in machine-executable instructions, which may be used to cause a general-purpose or special-purpose processor programmed with the instructions to perform the steps, or the steps may be performed by a combination of hardware, software, firmware and/or involvement of human participation/interaction.
- the computer system includes an external storage device 1610 , bus 1620 , main memory 1630 , read-only memory 1640 , mass storage device 1650 , communication port 1660 , and processor 1670 .
- processing circuitry 1670 should be understood to mean circuitry based on one or more microprocessors, microcontrollers, digital signal processors, programmable logic devices, field-programmable gate arrays (FPGAs), application-specific integrated circuits (ASICs), etc., and may include a multi-core processor (e.g., dual-core, quadcore, Hexa-core, or any suitable number of cores) or supercomputer.
- multi-core processor e.g., dual-core, quadcore, Hexa-core, or any suitable number of cores
- Mass storage 1650 may be an electronic storage device.
- the phrase “electronic storage device” or “storage device” should be understood to mean any device for storing electronic data, computer software, or firmware, such as random-access memory, read-only memory, hard drives, optical drives, digital video disc (DVD) recorders, compact disc (CD) recorders, BLU-RAY disc (BD) 10 recorders, BLU-RAY 3D disc recorders, digital video recorders (DVRs, sometimes called a personal video recorder or PVRs), solid-state devices, quantum storage devices, gaming consoles, gaming media, or any other suitable fixed or removable storage devices, and/or any combination of the same.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Economics (AREA)
- Strategic Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Educational Administration (AREA)
- Development Economics (AREA)
- General Engineering & Computer Science (AREA)
- Tourism & Hospitality (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Software Systems (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Computer Hardware Design (AREA)
- Game Theory and Decision Science (AREA)
- Computer Security & Cryptography (AREA)
- Data Mining & Analysis (AREA)
- Computing Systems (AREA)
- Computational Linguistics (AREA)
- Evolutionary Computation (AREA)
- Artificial Intelligence (AREA)
- Mathematical Physics (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Primary Health Care (AREA)
- Medical Informatics (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Systems and methods for assessing, tracking and improving security maturity of an organization are provided. Described is a system for assessing security maturity of an organization. The system receives a list of data sources located across multiple jurisdictions for the organization, collects data sources/data using custom rules from a plurality of data sources of the list of data sources, determine criticality score for each of the plurality of data sources, calculates data source coverage and asset collection coverage, determines use case coverage, and determines security maturity score using a maturity score model. The maturity score model is a logistic equation which is a function of the data source coverage, the asset collection coverage, the criticality score associated with each of the plurality of data sources, the use case coverage, asset coverage by each the plurality of data sources.
Description
Embodiments of the present invention generally relate to security operations (SecOps) assessment. In particular, embodiments of the present invention relate to monitoring, assessing, quantifying, and improving security operations (SecOps) maturity.
Individuals and organizations throughout the world are trying to ensure that their network, cyberspace, and systems dependent on it are resilient to increasing attacks. Organizations are more concerned about their cybersecurity than ever before as they are moving their infrastructure, data, and services into cloud platforms and are also subscribed to external services, APIs, and cloud infrastructure. In this connected world, Information Technology (IT) resources, which may include network infrastructures, data center infrastructures, external services, and internal resources of an organization, may be located in different jurisdictions and may have to be compliant to specific requirements of jurisdictions where segments of their IT resources are located. Security measures to be implemented to protect Information Technology (IT) infrastructures of an organization differ based on the nature of the business, size of the business, and type of internal and external IT resources used by the organization in addition to other factors.
As the organizations are implementing more and more security measures to secure their Information Technology (IT) resources, they are not able to assess whether the security measures are adequately performing their function and whether the security measures in place serve the requirements of compliance standards that apply to various segments of their IT environment.
Some attempts have been made in the past to solve some of the related problems discussed above. An example is disclosed in the U.S. Pat. No. 9,930,061 titled “System and Method for Cyber Attacks Analysis and Decision Support” (the “'061 Patent”). The '061 Patent discloses a method for cyber-attack risk assessment, the method including continuously collecting, from a networked resource, cyber-attack data having multiple attack methods directed at multiple objectives. The method also collects organizational profile data, having: assets, each relevant to at least one of the objectives, and defensive controls, each configured to protect at least one of the assets by resisting one or more of the attack methods. The method continuously computes an enterprise risk score and an asset risk score for each of the assets. Each asset risk score is computed with respect to the attack methods directed at the objectives relevant to the asset, the defensive controls provided to protect the asset, and a maturity score representing the capability of the defensive controls to protect the asset. The method also continuously displays a dynamic rendition of the risk scores.
Another example is disclosed in the United States Patent Application No. 2019/0207968 titled “Methods and Systems for Providing an Integrated Assessment of Risk Management and Maturity for an Organizational Cybersecurity/Privacy Program” (the “'968 Publication”). The '968 Publication discloses systems and methods for computing a risk factor for a cybersecurity/privacy program implemented by an enterprise, computing a maturity factor for the cybersecurity/privacy program, and determining an integrated result for the cybersecurity program based at least in part on a combination of the risk factor and the maturity factor. In some embodiments, computing the risk factor may include computing a current risk management level and a target risk management level for the cybersecurity program, and computing the maturity factor may include computing a current maturity level and a target maturity level for the cybersecurity program. In some embodiments, the processor may be configured to perform operations that further include tracking any remediation activities based on the integrated result and monitoring any changes to the current risk management level or the current maturity level for the cybersecurity/review program.
Another example is disclosed in U.S. Pat. No. 10,592,938 titled “System and Methods for Vulnerability Assessment and Provisioning of Related Services and Products for Efficient Risk Suppression” (the “'938 Patent”). The '938 Patent discloses systems and methods for cyber vulnerability assessment include obtaining assessment data including information pertaining to domains of cybersecurity vulnerability of an enterprise and, for each security domain, a respective domain-level vulnerability score, identifying risk(s) relevant to the enterprise based on domain-level vulnerability score(s), identifying recommended products or services for mitigating each of the risks, and preparing a graphical user interface for selecting a portion of the recommended products or services. A user may select one or more products or services through the user interface for purchase and/or deployment planning. The domain-level vulnerability scores may be compared to peer vulnerabilities scores, target vulnerability scores, or prospective vulnerability scores based upon the application of certain recommended products or services.
Yet another example is disclosed in U.S. Pat. No. 8,196,207 titled “Control Automated Tool” (the “'207 Patent”). The '207 Patent discloses a control automation tool (“CAT”) that is configured for supporting discrete management of controls and their corresponding metrics. The control automation tool includes a software application connected with, stored on, and executed by one or more relational, closed-loop data repositories and computer systems. The use and maturation of control within an organization depend on management of operational performance and expenses, which the CAT assists through lean project management, effective implementation of action plans, and financial functions. Further, people resources, organizational hierarchy, and access management functions are used to support mapping of controls arranged by organizational units and support access permissions that are consistent with appropriate data management. The CAT also provides transparency and meaning to control and metric status and relevant data regarding controls and their associated metrics and is configured for ease of control and metric management via the CAT interface.
Therefore, there is a need for a system that can assess the security maturity of an organization in evolving cyberspace where resources located across different jurisdictions and exposure of the organization is not limited to the managed internal network. The organizations need to know what IT resources they need to manage, where those resources are, know where their security posture stands in this evolving IT environment, what they can do to improve it, and exactly what it will take to achieve that improvement
The present disclosure makes possible a number of the needed solutions and makes a material and substantial improvement to the current state of the art for the assessment of security maturity for related purposes.
Systems and methods are described for assessing security maturity, identifying security gaps, and improving the security maturity level of an organization. According to an embodiment, a system receives onboarding inputs that include a list of data sources of an organization, a list of jurisdictions where the organization has a business interest, and a list of applicable use cases to track. The system collects data using custom rules from multiple data sources of the list of data sources, determines use case coverage, determines criticality score for each of the data sources, calculates data source coverage, calculates asset collection coverage, and determines an overall security maturity score of the organization based on above parameters using a maturity score model. The maturity score model above listed assessment parameters and data from different data sources and determines the security maturity score using a logistic equation. The equation is a function of the data source coverage, the asset collection coverage, the use case analytics coverage, the criticality score associated with each of the plurality of data sources, and asset coverage by each of the data sources. The system may further determine potential compliance coverage mapping and other factors that may be used to calculate the maturity score of the organization.
The system provides a user interface to receive onboarding inputs. For example, the system provides the user interface to receive a list of data sources of the organization, wherein the data source includes internal and external data sources forming part of the IT infrastructure of the organization. The list of data sources includes data center resources, internal network resources, cloud infrastructures, and software as a Service (SaaS) services and serverless environments. The system receives other onboarding inputs, such as a list of security operations assets to be collected and monitored, and a list of use cases to track against selected data source assets. Once onboarding inputs are received, the system may initiate the process of tracking data sources, use cases, and may quantify the security maturity of the organization against all selected inputs and outputs.
The system calculates the data source coverage and asset collection coverage based on the data collected from data sources. The system may estimate compliance coverage of the organization based on the mapping of the use cases against respective compliance frameworks.
In an embodiment, the system determines the criticality score for each of the data sources based on different use cases covered by each of the data sources. The criticality score of a data source is a weighted criticality score of use cases covered by the data source. The weighted criticality score is determined using a historically developed criticality score matrix. In an embodiment, the system discovers one or more use cases covered by a data source and may use a machine learning model to determine the criticality score of the data source.
The system may also identify data sources of the list of data sources and inactive use cases of the list of use cases to further project improvement of the security maturity score of the organization as each of the data sources and inactive use cases becomes active. The system may benchmark the determined security maturity score with respect to multiple benchmarks. One such benchmark may include a potential security maturity score determined considering all data sources and use cases are active. Other benchmarks may include the security maturity score of a similar organization, security maturity score of industry related to the organization, security maturity score of a state, and security maturity score of a nation.
The system may identify security gaps of the organization based on benchmarking of the security maturity score with respect to multiple benchmarks and may recommend security improvement measures for the organization.
Other features of embodiments of the present disclosure will be apparent from accompanying drawings and detailed description that follows.
The present subject matter will now be described in detail with reference to the drawings, which are provided as illustrative examples of the subject matter so as to enable those skilled in the art to practice the subject matter. It will be noted that throughout the appended drawings, like features are identified by like reference numerals. Notably, the FIGURES and examples are not meant to limit the scope of the present subject matter to a single embodiment, but other embodiments are possible by way of interchange of some or all of the described or illustrated elements and, further, wherein:
The detailed description set forth below in connection with the appended drawings is intended as a description of exemplary embodiments in which the presently disclosed process can be practiced. The term “exemplary” used throughout this description means “serving as an example, instance, or illustration,” and should not necessarily be construed as preferred or advantageous over other embodiments. The detailed description includes specific details for providing a thorough understanding of the presently disclosed method and system. However, it will be apparent to those skilled in the art that the presently disclosed process may be practiced without these specific details. In some instances, well-known structures and devices are shown in block diagram form in order to avoid obscuring the concepts of the presently disclosed method and system.
Systems and methods for assessing security maturity, identifying security gaps, and improving the security maturity level of an organization are described. Described are systems and methods for monitoring, assessing, and improving the security maturity of an organization. In an embodiment, a system receives various inputs related to an organization's IT infrastructure, determines active and data sources for collecting data, collects data from data sources, determines coverage of these data sources, determines use cases covered by active security systems, maps those use cases with applicable compliance frameworks and computes a security maturity score of the organization using a logistic equation which is a function of above parameters.
The system may provide live security maturity score based on data collected from data sources and may also provide a projected security maturity score considering all available data source and security systems of the organization are active. The system can further benchmark the computed security maturity score with respect to the projected security maturity score and other industry benchmarks.
Embodiments of the present invention include various steps, which will be described below. The steps may be performed by hardware components or may be embodied in machine-executable instructions, which may be used to cause a general-purpose or special-purpose processor programmed with the instructions to perform the steps. Alternatively, steps may be performed by a combination of hardware, software, firmware and human operators.
Embodiments of the present invention may be provided as a computer program product, which may include a machine-readable storage medium tangibly embodying thereon instructions, which may be used to program a computer (or other electronic devices) to perform a process. The machine-readable medium may include, but is not limited to, fixed (hard) drives, magnetic tape, floppy diskettes, optical disks, compact disc read-only memories (CD-ROMs), and magneto-optical disks, semiconductor memories, such as ROMs, PROMs, random access memories (RAMs), programmable read-only memories (PROMs), erasable PROMs (EPROMs), electrically erasable PROMs (EEPROMs), flash memory, magnetic or optical cards, or other types of media/machine-readable medium suitable for storing electronic instructions (e.g., computer programming code, such as software or firmware).
Various methods described herein may be practiced by combining one or more machine-readable storage media containing the code according to the present invention with appropriate standard computer hardware to execute the code contained therein. An apparatus for practicing various embodiments of the present invention may involve one or more computers (or one or more processors within the single computer) and storage systems containing or having network access to computer program(s) coded in accordance with various methods described herein, and the method steps of the invention could be accomplished by modules, routines, subroutines, or subparts of a computer program product.
The terms “connected” or “coupled”, and related terms are used in an operational sense and are not necessarily limited to a direct connection or coupling. Thus, for example, two devices may be coupled directly, or via one or more intermediary media or devices. As another example, devices may be coupled in such a way that information can be passed there between, while not sharing any physical connection with one another. Based on the disclosure provided herein, one of ordinary skill in the art will appreciate a variety of ways in which connection or coupling exists in accordance with the aforementioned definition.
If the specification states a component or feature “may”, “can”, “could”, or “might” be included or have a characteristic, that particular component or feature is not required to be included or have the characteristic.
As used in the description herein and throughout the claims that follow, the meaning of “a,” “an,” and “the” includes plural reference unless the context clearly dictates otherwise. Also, as used in the description herein, the meaning of “in” includes “in” and “on” unless the context clearly dictates otherwise.
The phrases “in an embodiment,” “according to one embodiment,” and the like generally mean the particular feature, structure, or characteristic following the phrase is included in at least one embodiment of the present disclosure and may be included in more than one embodiment of the present disclosure. Importantly, such phrases do not necessarily refer to the same embodiment.
As used herein, a “network security appliance” or a “network security device” generally refers to a device or appliance in virtual or physical form that is operable to perform one or more security functions. Some network security devices may be implemented as general-purpose computers or servers with appropriate software operable to perform the one or more security functions. Other network security devices may also include custom hardware (e.g., one or more custom Application Specific Integrated Circuits (ASICs)). A network security device is typically associated with a particular network (e.g., a private enterprise network) on behalf of which it provides one or more security functions. The network security device may reside within the particular network that it is protecting, or network security may be provided as a service with the network security device residing in the cloud. Non-limiting examples of security functions include authentication, next-generation firewall protection, antivirus scanning, content filtering, data privacy protection, web filtering, network traffic inspection (e.g., secure sockets layer (SSL) or Transport Layer Security (TLS) inspection), intrusion prevention, intrusion detection, denial of service attack (DoS) detection and mitigation, encryption (e.g., Internet Protocol Secure (IPSec), TLS, SSL), application control, Voice over Internet Protocol (VoIP) support, Virtual Private Networking (VPN), data leak prevention (DLP), antispam, antispyware, logging, reputation-based protections, event correlation, network access control, vulnerability management, and the like. Such security functions may be deployed individually as part of a point solution or in various combinations in the form of a unified threat management (UTM) solution. Non-limiting examples of network security appliances/devices include network gateways, VPN appliances/gateways, UTM appliances, messaging security appliances, database security and/or compliance appliances, web application firewall appliances, application acceleration appliances, server load balancing appliances, vulnerability management appliances, configuration, provisioning, update and/or management appliances, logging, analyzing and/or reporting appliances, bypass appliances, Domain Name Server (DNS) appliances, wireless security appliances, and DoS attack detection appliances.
As used herein a “network resource” generally refers to various forms of data, information, services, applications and/or hardware devices that may be accessed via a network (e.g., the Internet). Non-limiting examples of network resources include web applications, cloud-based services, networked devices and/or associated applications (e.g., user interface applications), and network security devices and/or associated applications (e.g., user interface applications). Exemplary embodiments will now be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. These embodiments are provided so that this invention will be thorough and complete and will fully convey the scope of the invention to those of ordinary skill in the art. Moreover, all statements herein reciting embodiments of the invention, as well as specific examples thereof, are intended to encompass both structural and functional equivalents thereof. Additionally, it is intended that such equivalents include both currently known equivalents as well as equivalents developed in the future (i.e., any elements developed that perform the same function, regardless of structure).
Thus, for example, it will be appreciated by those of ordinary skill in the art that the diagrams, schematics, illustrations, and the like represent conceptual views or processes illustrating systems and methods embodying this invention. The functions of the various elements shown in the figures may be provided through the use of dedicated hardware as well as hardware capable of executing associated software. Similarly, any switches shown in the figures are conceptual only. Their function may be carried out through the operation of program logic, through dedicated logic, through the interaction of program control and dedicated logic, or even manually, the particular technique being selectable by the entity implementing this invention. Those of ordinary skill in the art further understand that the exemplary hardware, software, processes, methods, and/or operating systems described herein are for illustrative purposes and, thus, are not intended to be limited to any particular name.
The platform 106 collects data from different data sources 120 a-n using wireless and wired connections, facilitate the transfer of data to the security maturity access system 104. The system 104 may quantify, track, and provide visibility and capability of security systems or services of the organization. System 104 may determine a maturity score of the organization and quantify it in a predefined range. For example, the system may provide a score in the range of 0-10, wherein 10 indicates the best possible security maturity of any organization.
In some embodiments, data sources 102 a-n may include a firewall, an Endpoint Detection & Response (EDR) system, an Antivirus (AV), a web server, a Web Application Firewall (WAF), an email security system, a Windows domain controller, an authentication system, a remote access control system, a web proxy, a cloud service API, a cloud infrastructure, a cloud security system, a Windows member server, a Linux server security system, an active directory infrastructure, an Intrusion Detection System (IDS), an Intrusion Prevention System (IPS), a privileged account management system, a DNS server, a Data Loss Prevention (DLP) system, a network infrastructure, a Host Based Intrusion Detection System (HIDS), a Dynamic Host Configuration Protocol (DHCP) server, a configuration management tool, a database access and activity logging system, a vulnerability management tool, an asset identity data source, a workstation operating system, an email server and other security systems and networked devices.
Table-1 illustrates an example list of technology stacks, products, and vendors for which custom rules for data collection may be defined in the spirit of representing the data type categories/sources and example technologies/products.
TABLE 1 |
Data sources and example technology stacks |
supported by security maturity assessment systems. |
Data Source | Example Technologies |
Firewall | Palo Alto Networks, Checkpoint, |
Fortinet | |
Endpoint Detection & Response | Crowdstrike, Carbon Black Respond, |
(EDR) | Cylance, SentinelOne |
Anti-Virus (AV) | McAfee, Symantec Endpoint |
Protection (SEP), Carbon Black | |
Defense, McAfee ePO | |
Web Server/WAF Data | Incapsula (WAF), W3C Web Logs, |
Access-Combined Web Logs, | |
Microsoft IIS | |
EMail Security | Mimecast, Proofpoint, IronPort |
Windows Domain Controllers | Windows Security Logs, Windows |
(OS - Windows) | Application Logs, Windows System |
Logs, PowerShell Logs, AD | |
Authentication | |
Multi-Factor Authentication | Okta, Duo, RSA SecurID |
(MFA) | |
Remote Access | Cisco ASA (AnyConnect), Citrix, |
RDP | |
Web Proxy | Zscaler, Bluecoat, Next Generation |
Firewall (NGFW) | |
Cloud | Microsoft Azure, Microsoft O365, |
Google Cloud Platform (GCP), | |
Amazon Web Services (AWS), Box | |
Cloud Security | sift, redlock |
Windows Member Servers (OS - | Windows Security Logs, Windows |
Windows) | Application Logs, Windows System |
Logs, PowerShell Logs, Local | |
Authentication | |
Linux Server Secure & | secure logs, audited logs |
Audited Logs (OS - Linux) | |
Active Directory Infrastructure | Operational-Site-Health-Replication |
Intrusion Detection Systems | Snort, Bro, Next Generation Firewall |
(IDS) & Intrusion Prevention | (NGFW) |
Systems (IPS) | |
Privileged Account Management | CyberArk |
DNS Server | Windows DNS Server, Infoblox, |
Cisco Umbrella | |
Data Loss Prevention (DLP) | Netskope, Symantec DLP |
Network Infrastructure | Cisco, Juniper, Meraki, NetScaler |
Host Based Intrusion Detection | OSSEC, McAfee HIDS |
System (HIDS) | |
DHCP Server | Windows DHCP Server |
Configuration Management | Puppet, Windows SCOM, Windows |
Tools | SCCM, Chef, Ansible |
Database Access & Activity | Microsoft C2 Auditing |
Logs | |
Vulnerability Management Tools | Tenable, Qualys, Rapid7 |
Asset & Identity Data | LDAP, Active Directory Objects |
Workstation Operating System | Windows Security Logs, Windows |
(OS) Logs | Application Logs, Windows System |
Logs, PowerShell Logs | |
Email Server | Microsoft Exchange |
In some embodiments, data sources may be categorized into “High” value data sources, “Medium” value data sources, and “Low” value data sources and may be assigned separately. High-value data sources may include platforms that directly address the confidentiality, integrity, or availability of a customer's operational environment. For example, High-value data sources may include firewalls, email security, proxy, and authentication devices. Medium and Low value data sources are typically supplemental sources that can provide further enrichment within the customer's environment. For example, Medium value data sources may include a vulnerability management system, LDAP server, and Configuration Management integration system.
In some embodiments, use cases may be categorized in the form of criticalities such as “High” use cases, “Medium” use cases and “Low” use cases. Use case categorization may be used to determine the criticality of such use cases. Use cases marked as high may include security features related to the detection of cyber threats. Use cases marked as “Medium” may relate to security features associated with advanced detection and investigation. Use cases marked as “Low” may relate to security features associated with data correlation and analytics for taking corrective measures, automated blocking and tackling, as well as lower value findings.
In an embodiment, system 104 may determine the score for each individual segment of IT infrastructure of the organization. For example, system 104 may determine the data center maturity score, cloud service provider maturity score, software as a Service (SaaS) maturity score. As one may appreciate, system 104 may assess security maturity of cloud infrastructures and cloud services as well, in addition to security maturity assessment of internal network and on-premises devices. System 104 may perform data source maturity assessment 112, asset collection maturity assessment 114, use-case maturity assessment 116, and compliance maturity assessment 118 for determining an individual score for coverage maturity, data source maturity, use case maturity, and compliance maturity, respectively, at a granular level. System 104 may determine the overall maturity score of the organization based on factorized collective scores of the above parameters.
The security maturity assessment system 104 may perform data source maturity assessment 112 to assess data source coverage percentage, which is the percentage score of IT resources of the organization from where data can be collected out of total IT resources of the organization. For example, if there are a total 100 IT resources of the organization and data can be collected from only 80 IT resources, the coverage percentage would be 80. As one may appreciate, organizations should aim to get maximum visibility and be able to gather, identify, and perform advanced data collection from all their IT resources. The higher the data source coverage, the higher the maturity score of the organization. Collections of data enable the model to assess whether the security systems are working, what threats are being detected, what preventive actions are being taken by respective security systems and may also assist in identifying security gaps. Similarly, system 104 may perform asset collection coverage maturity assessment 114 to assess where IT resources of the organization are located across the globe and assess from which locations data can be collected out of all existing locations. The goal is to increase data collection and coverage from different data sources for better accuracy.
In an embodiment, system 104 may enable self-assessment of data source maturity and asset collection coverage maturity through a customer onboarding module. The customer onboarding module may collect data related to an organization through an interactive user interface. In an embodiment, the customer onboarding module may collect required data associated with an organization if permissions are granted to discover IT infrastructure of the organization.
Security maturity assessment system 104 may perform compliance maturity assessment to determine a compliance score of the organization against different compliance frameworks 110. Applicable compliance framework(s) for an organization may differ depending on the location of its IT resources, size of the organization, nature of the business, type of data that it processes, and other such factors. System 104 may find one or more applicable compliance requirements and suitable compliance frameworks against which the compliance maturity assessment 118 may be performed. Example compliance frameworks may include but are not limited to MITRE ATT&CK, Center for Internet (CIS) Benchmark, Lockheed Killchain, and National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF). System 104 may determine compliance coverage based on active use cases.
Security maturity assessment system 200 includes input receiving module 202 configured to receive onboarding inputs, including a list of data sources of an organization, a list of jurisdictions where the organization has a business interest, and a list of use cases to track. System 200 may include data collection module 204 configured to collect data using custom rules from a plurality of data sources of the list of data sources, a use case coverage determination module 206 configured to determine use case coverage by the plurality of data sources by referring to a content library, a criticality score determination module 208 configured to determine a criticality score for each data source of the plurality of data sources based on one or more use cases covered by respective data source, data source coverage calculation module 210 configured to calculate data source coverage based on the data received and the list of data sources, an asset collection coverage determination module 212 configured to determine asset collection coverage based on the data received and the list of data sources, and security maturity determination module 214 configured to determine a security maturity score of the organization using a maturity score model. The maturity score model may be a function of the data source coverage, the asset collection coverage, the criticality score associated with each of the plurality of data sources, the compliance coverage, asset coverage by each the plurality of data sources, and use case coverage.
In an embodiment, security maturity assessment system 200 may allow a customer, upon authentication, to access system 200 through a web-application, a stand-alone on-premise system, or through a dedicated application. In an embodiment, the input receiving module 202 may receive a list of IT resources of an organization, asset collection presence, and use case details. The input receiving module 202, also referred interchangeably as a customer onboarding module may provide an interactive user interface to the customer to receive a list of IT resources of an organization. As one may appreciate, these IT resources of the organization may be located across different jurisdictions. Input receiving module 202 may present a form to be filled with onboarding inputs about the organization for which maturity assessment needs to be performed. An organization may access, once authenticated, a customer onboarding portal through an interactive user interface. The input receiving module 202 may request through an onboarding portal basic details of an organization, such as organization name, parent organization name, username, email address, the contact information of a person concerned, business unit details, industry details, competitors' details, list of subsidiaries, annual revenue, etc. The input receiving module 202 may receive industry driven compliance requirements of the organization and one or more compliance drivers for the organization based on business-driven regulatory requirements. Some of these customer details may not be mandatory and can be skipped. The input receiving module 202 may also receive a list of continents, regions, countries, and states where IT resources of the organization may be located or where the organization may have a business interest.
In an embodiment, the input receiving module 202 may also receive coverage details such as a list of data sources, number of domain controllers, details about cloud providers, details of endpoint security providers, number of endpoints, location of data centers and critical resources, etc. from customers. The input receiving module 202 may display customer detail completeness score in percentage to indicate missing details, which can always be updated by the customer. In an embodiment, the input receiving module 202 may determine missing details about the organization based on the partially filled customer details. For example, if the size of the organization and nature of business is known, input receiving module 202 may determine the compliance requirements of the organization.
The input receiving module 202 may also retrieve required onboarding inputs related to an organization automatically if permission is granted by the IT resource manager to discover IT resources if the organization. The input receiving module 202 may analyze network traffic of the organization and discover available IT resources of the organization. Input receiving module 202 may present the discovered IT resources of the organization for correction if required. Once the onboarding details of the organization is in place, system 200 may perform a security maturity assessment of the organization.
Use case coverage determination module 206 of system 200 provides a percentage score of active use cases against a list of use cases recommended and stored in a content library for the organization.
Criticality score determination module 208 of system 200 may determine the criticality score for each of the data sources. Criticality score determination module 208 may explore one or more use cases covered by a data source, refer to a criticality score matrix that maintains the criticality score for each use case to determine the criticality score associated with each of the use cases and determine criticality score of the data source. The criticality score of the data source may be the weighted average of the criticality score of each of the individual use cases covered by the data source. The criticality score matrix maintains the criticality score against known use cases based on historical knowledge. In an embodiment, the criticality score for a new use case may be estimated based on the matching of the new use case with an existing use case. The matching use case may depend on the type of security coverage provided by use cases. In an embodiment, criticality score determination module 206 may use a machine learning model to determine the criticality score of a new use case or a data source based on historical learning. The criticality score to a use case may be assigned as 3 to indicate very high criticality, 2 to indicate high criticality, 1 to indicate medium criticality, and 0 to indicate low criticality. To maximize the maturity score, the organization should ensure use cases with criticality scores of High and Medium are active and have the capability to share data. Some of the factors that can be used to determine the criticality score of use cases and criticality score of data sources may include the determination of whether the data source contains data for external authentication capabilities, whether the traffic is inbound traffic, outbound traffic, or internal traffic, whether use case contains potential security threat reports, whether the use contains potential Indication of Compromise (IoC) data, and whether the use case assists in finding advance threats (e.g., kerberoasting, lateral movement, live off the land, etc.). As mentioned earlier, the criticality score of the data source may be determined based on the weighted average of the criticality score of use cases covered by the data source.
Data source coverage maturity calculation module 210 of system 200 may calculate data source coverage based on the data received and the list of data sources to assess percentage coverage of data collection out of all existing IT resources of the organization. System 200 should be able to collect data from maximum IT resources for better security maturity score. Data sources should be able to monitor all IT resources of the organization and provide data to data collection module 204. Data source coverage calculation module 208 may determine out of all existing data sources how many are data sources and how many are data sources. Module 210 may calculate the percentage score of data sources from which data collection module 204 is able to collect data over total data sources of the organization. As one may appreciate, each data source may cover one or more IT resources of the organizations and may provide data on behalf of one or more IT resources.
Asset collection coverage determination module 212 may determine asset collection coverage based on the data received and the list of data sources. Module 212 evaluates out of all data sources located across different jurisdictions from how many jurisdictions data source collection module 204 is able to collect the data. For a better maturity score, for each jurisdiction, depending on the residing IT resources in each jurisdiction, system 200 should be able to collect data from respective data sources. To ensure IT resources of the organization are secure in each jurisdiction. It is essential that all the security systems responsible for the security of respective jurisdictions are active and provide data for further analysis. Asset collection coverage determination module 210 may provide a percentage of asset collection coverage by the data sources.
Security maturity determination module 214 may determine the overall security maturity of the organization using a security maturity model. In an embodiment, the security maturity model may be a logistic equation, which is a function of the data source coverage, the asset collection coverage, the use case coverage, the criticality score associated with each of the plurality of data sources, and asset coverage by each the plurality of data sources. In an embodiment, the maturity model may receive data associated with data source coverage, asset collection coverage, use case coverage, and weighted average of collection asset coverage per data source by all data sources and quantify the security maturity of the organization in a range of 0-10, wherein security maturity score-10 is the best possible score.
In an embodiment, metadata enrichment and augmentation module 328 may work as an abstraction layer for pushing and pushing data from content library 318 and storing data collected from different sources. The metadata enrichment and augmentation module 328 may collect metadata, augment the metadata, and add additional context in input variable mapping.
The security maturity scoring model may help organizations proactively drive security operation maturity through quantitative analysis and industry benchmarking.
The system may generate security recommendation 1206, such as add CASB, add network, and add firewall and present the recommendation through the interface 1200. The recommendations 1206 demonstrates the top data source recommendations as outputs based on the maturity model and gaps in an organization's security operations visibility. The interface 1200 may present a maturity score leaderboard 1208 to show the comparative industry vertical maturity score for baselining maturity against peer organizations. The interface 1200 provides to a user to check its organization's maturity score and compare it against the industry averages. A user through interface 1200 may initiate calculation of the actual maturity score of the organization based active data sources by clicking the button 1210. Once a user has modeled all data sources for their organization, they can then “request my actual score” through the interface 1210. On click of the button 1208, the system starts collecting, storing, and analyzing the maturity score and can provide the actual score vs. the potential score through the dashboard. In an embodiment, when the actual score if received from the scoring engines, the output provided may match the collection scope for a new customer and validates their overall scope.
Those skilled in the art will appreciate computer system 1600 may include more than one processing circuitry 1670 and communication ports 1660. Processing circuitry 1670 should be understood to mean circuitry based on one or more microprocessors, microcontrollers, digital signal processors, programmable logic devices, field-programmable gate arrays (FPGAs), application-specific integrated circuits (ASICs), etc., and may include a multi-core processor (e.g., dual-core, quadcore, Hexa-core, or any suitable number of cores) or supercomputer. In some embodiments, processing circuitry 1670 is distributed across multiple separate processors or processing units, for example, multiple of the same type of processing units (e.g., two Intel Core i7 processors) or multiple different processors (e.g., an Intel Core i5 processor and an Intel Core i7 processor). Examples of processing circuitry 1670 include, but are not limited to, an Intel® Itanium® or Itanium 2 processor(s), or AMD® Opteron® or Athlon MP® processor(s), Motorola® lines of processors, System on Chip (SoC) processors or other future processors. Processing circuitry 1670 may include various modules associated with embodiments of the present invention.
Communication port 1660 may include a cable modem, integrated services digital network (ISDN) modem, a digital subscriber line (DSL) modem, a telephone modem, an Ethernet card, or a wireless modem for communications with other equipment, or any other suitable communications circuitry. Such communications may involve the Internet or any other suitable communications networks or paths. In addition, communications circuitry may include circuitry that enables peer-to-peer communication of electronic devices or communication of electronic devices in locations remote from each other. Communication port 1660 can be any of an RS-232 port for use with a modem-based dialup connection, a 10/100 Ethernet port, a Gigabit or 10 Gigabit port using copper or fiber, a serial port, a parallel port, or other existing or future ports. Communication port 1660 may be chosen depending on a network, such a Local Area Network (LAN), Wide Area Network (WAN), or any network to which the computer system connects.
Memory 1630 may include Random Access Memory (RAM) or any other dynamic storage device commonly known in the art. Read-only memory 1640 can be any static storage device(s), e.g., but not limited to, a Programmable Read-Only Memory (PROM) chip for storing static information, e.g., start-up or BIOS instructions for processing circuitry 1670.
Mass storage 1650 may be an electronic storage device. As referred to herein, the phrase “electronic storage device” or “storage device” should be understood to mean any device for storing electronic data, computer software, or firmware, such as random-access memory, read-only memory, hard drives, optical drives, digital video disc (DVD) recorders, compact disc (CD) recorders, BLU-RAY disc (BD) 10 recorders, BLU-RAY 3D disc recorders, digital video recorders (DVRs, sometimes called a personal video recorder or PVRs), solid-state devices, quantum storage devices, gaming consoles, gaming media, or any other suitable fixed or removable storage devices, and/or any combination of the same. The non-volatile memory may also be used (e.g., to launch a boot-up routine and other instructions). Cloud-based storage may be used to supplement storage memory in 1630. Memory 1650 may be any current or future mass storage solution, which can be used to store information and/or instructions. Exemplary mass storage solutions include, but are not limited to, Parallel Advanced Technology Attachment (PATA) or Serial Advanced Technology Attachment (SATA) hard disk drives or solid-state drives (internal or external, e.g., having Universal Serial Bus (USB) and/or Firmware interfaces), e.g., those available from Seagate (e.g., the Seagate Barracuda 7200 family) or Hitachi (e.g., the Hitachi Deskstar 7K1000), one or more optical discs, Redundant Array of Independent Disks (RAID) storage, e.g., an array of disks (e.g., SATA arrays), available from various vendors including Dot Hill Systems Corp., LaCie, Nexsan Technologies, Inc. and Enhance Technology, Inc.
Optionally, operator and administrative interfaces, e.g., a display, keyboard, and a cursor control device, may also be coupled to bus 1620 to support direct operator interaction with computer systems. Other operator and administrative interfaces can be provided through network connections connected through communication port 1660. An external storage device 1210 can be any kind of external hard-drives, floppy drives, IOMEGA® Zip Drives, Compact Disc-Read-Only Memory (CD-ROM), Compact Disc-Rewritable (CD-RW), Digital Video Disk-Read Only Memory (DVD-ROM). The components described above are meant only to exemplify various possibilities. In no way should the aforementioned exemplary computer system limit the scope of the present disclosure.
The computer system 1600 may be accessed through a user interface. The user interface application may be implemented using any suitable architecture. For example, it may be a stand-alone application wholly implemented on the computer system 1600. The user interfaces application and/or any instructions for performing any of the embodiments discussed herein may be encoded on computer-readable media. Computer-readable media includes any media capable of storing data. In some embodiments, the user interface application is a client server-based application. Data for use by a thick or thin client implemented on an electronic device computer system 1600 is retrieved on-demand by issuing requests to a server remote to the computer system 1600. For example, computer device 1600 may receive inputs from the user via an input interface and transmit those inputs to the remote server for processing and generating the corresponding outputs. The generated output is then transmitted to the computer device 1600 for presentation to the user.
While embodiments of the present invention have been illustrated and described, it will be clear that the invention is not limited to these embodiments only. Numerous modifications, changes, variations, substitutions, and equivalents will be apparent to those skilled in the art without departing from the spirit and scope of the invention, as described in the claims.
Thus, it will be appreciated by those of ordinary skill in the art that the diagrams, schematics, illustrations, and the like represent conceptual views or processes illustrating systems and methods embodying this invention. The functions of the various elements shown in the figures may be provided through the use of dedicated hardware as well as hardware capable of executing associated software. Similarly, any switches shown in the figures are conceptual only. Their function may be carried out through the operation of program logic, through dedicated logic, through the interaction of program control and dedicated logic, or even manually, the particular technique being selectable by the entity implementing this invention. Those of ordinary skill in the art further understand that the exemplary hardware, software, processes, methods, and/or operating systems described herein are for illustrative purposes and, thus, are not intended to be limited to any particular name.
As used herein, and unless the context dictates otherwise, the term “coupled to” is intended to include both direct coupling (in which two elements that are coupled to each other contact each other) and indirect coupling (in which at least one additional element is located between the two elements). Therefore, the terms “coupled to” and “coupled with” are used synonymously. Within the context of this document terms “coupled to” and “coupled with” are also used euphemistically to mean “communicatively coupled with” over a network, where two or more devices are able to exchange data with each other over the network, possibly via one or more intermediary devices.
It should be apparent to those skilled in the art that many more modifications besides those already described are possible without departing from the inventive concepts herein. The inventive subject matter, therefore, is not to be restricted except in the spirit of the appended claims. Moreover, in interpreting both the specification and the claims, all terms should be interpreted in the broadest possible manner consistent with the context. In particular, the terms “comprises” and “comprising” should be interpreted as referring to elements, components, or steps in a non-exclusive manner, indicating that the referenced elements, components, or steps may be present, or utilized, or combined with other elements, components, or steps that are not expressly referenced. Where the specification claims refer to at least one of something selected from the group consisting of A, B, C . . . and N, the text should be interpreted as requiring only one element from the group, not A plus N, or B plus N, etc.
While the foregoing describes various embodiments of the invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof. The scope of the invention is determined by the claims that follow. The invention is not limited to the described embodiments, versions, or examples, which are included to enable a person having ordinary skill in the art to make and use the invention when combined with information and knowledge available to the person having ordinary skill in the art.
The foregoing description of embodiments is provided to enable any person skilled in the art to make and use the subject matter. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the novel principles and subject matter disclosed herein may be applied to other embodiments without the use of the innovative faculty. The claimed subject matter set forth in the claims is not intended to be limited to the embodiments shown herein but is to be accorded to the widest score consistent with the principles and novel features disclosed herein. It is contemplated that additional embodiments are within the spirit and true scope of the disclosed subject matter.
Claims (22)
1. A method of assessing security operation visibility and monitoring capabilities of an organization, the method comprising:
receiving, at a computing device, a list of a plurality of data sources associated with the organization, a list of a plurality of jurisdictions where the organization has a business interest, and a list of a plurality of security feature use cases, the plurality of data sources including at least one of a network device or an application associated with the network device, each security feature use case of the plurality of security feature use cases indicating a scenario in which security features of a data source of the plurality of data sources are used;
collecting, at the computing device, data using custom rules from a plurality of active data sources from the plurality of data sources, the plurality of active data sources being a subset of the plurality of data sources that enable data collection capabilities;
determining, by the computing device and based on the data, security feature use case coverage indicating a percentage of a number of a set of security feature use cases covered by the plurality of active data sources out of a number of the plurality of security feature use cases;
determining, by the computing device and using a machine learning model, a criticality score for each active data source of the plurality of active data sources from a plurality of criticality scores based on one or more security feature use cases covered by that active data source from the set of security feature use cases;
calculating, by the computing device and based on the data, data source coverage indicating a percentage of a number of the plurality of active data sources out of a number of the plurality of data sources and asset collection coverage indicating a percentage of a number of jurisdictions from which the plurality of active data sources are located out of a number of the plurality of jurisdictions;
determining, by the computing device, a security operation maturity score of the organization using a maturity score model, wherein the security operation maturity score is indicative of security operation visibility and monitoring capability and the maturity score model is a function of the data source coverage, the asset collection coverage, the security feature use case coverage, and the criticality score associated with each active data source of the plurality of active data sources; and
causing the computer device to display through an interactive user interface the determined security operation maturity score of the organization.
2. The method of claim 1 , further comprising:
estimating, by the computing device, compliance coverage of the organization based on actual compliance by I.T. resources of the organization located in each jurisdiction of the plurality of jurisdictions against respective compliance frameworks.
3. The method of claim 1 , wherein the plurality of data sources includes data center resources, internal network resources, cloud infrastructures, and software as a Service (SaaS) services.
4. The method of claim 1 , further comprising:
identifying, by the computing device, the plurality of active data sources of the list of plurality of data sources; and
projecting, by the computing device, improvement of the security operation maturity score of the organization as each data source of the plurality of data sources is added to the plurality of active data sources.
5. The method of claim 1 , further comprising:
benchmarking, by the computing device, the security operation maturity score with respect to one or more benchmarks.
6. The method of claim 5 , further comprising:
determining a potential security operation maturity score considering the plurality of data sources being all active data sources and using the maturity score model, the one or more benchmark including the potential security operation maturity score.
7. The method of claim 5 , wherein the one or more benchmarks comprises at least one of (1) a security operation maturity score of a similar organization, (2) a security operation maturity score of an industry related to the organization, a security operation maturity score of a state, or (4) a security operation maturity score of a nation.
8. The method of claim 5 , further comprising:
identifying, by the computing device, security gaps of the organization based on the benchmarking.
9. The method of claim 5 , further comprising:
identifying, by the computing device, security gaps of the organization based on the benchmarking; and
determining, by the computing device, one or more security improvement measure recommendations based on the identified security gaps.
10. The method of claim 1 , wherein the criticality score of each active data source of the plurality of active data sources is a weighted criticality score of the one or more security feature use cases covered by that active data source, wherein the weighted criticality score is determined using a historically developed criticality score matrix.
11. The method of claim 2 , wherein the compliance frameworks comprise MITRE ATT&CK, Center for the Internet (C.I.S.) Benchmark, Lockheed Killchain, and National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF).
12. A system for assessing security operation visibility and monitoring capabilities of an organization, the system comprising:
an input receiving module configured to receive a list of a plurality of data sources, a list of a plurality of jurisdictions where the organization has a business interest, and a list of a plurality of security feature use cases, the plurality of data sources including at least one of a network device or an application associated with the network device, each security feature use case of the plurality of security feature use cases indicating a scenario in which security features of a data source of the plurality of data sources are used;
a log collection module configured to collect logs from a plurality of active data sources of the plurality of data sources;
a use case coverage determination module configured to determine, based on the logs, use case coverage indicating a percentage of a number of a set of security feature use cases covered by the plurality of active data sources out of a number of the plurality of security feature use cases;
a criticality score determination module configured to determine, using a machine learning model, a criticality score for each data source of the plurality of active data sources from a plurality of criticality scores based on one or more security feature use cases covered by that active data source;
a log source coverage calculation module configured to calculate, based on the logs, log source coverage indicating a percentage of a number of the plurality of active data sources out of a number of the plurality of data sources;
an asset collection coverage determination module configured to determine asset collection coverage indicating a percentage of a number of jurisdictions from which the plurality of active data sources are located out of a number of the plurality of jurisdictions; and
a security maturity determination module configured to determine a security operation maturity score of the organization using a maturity score model, wherein the security operation maturity score is indicative of security operation visibility and monitoring capability and the maturity score model is a function of the log source coverage, the asset collection coverage, the use case coverage, and the criticality score associated with each active data source of the plurality of active data sources.
13. The system of claim 12 further comprises a compliance coverage estimation module configured to estimate compliance coverage of the organization based on actual compliance by I.T. resources of the organization located in each jurisdiction of the plurality of jurisdictions against respective compliance frameworks.
14. The system of claim 12 , wherein the plurality of data sources comprises data center resources, internal network resources, cloud infrastructures, and software as a Service (SaaS) services.
15. The system of claim 12 further comprises a security score projection module configured to identify the plurality of active data sources of the plurality of data sources and project improvement of the security operation maturity score of the organization as each of the plurality of data sources is added to the plurality of active data sources.
16. The system of claim 12 further comprises a benchmarking module configured to benchmark the security operation maturity score with respect to one or more benchmarks.
17. The system of claim 16 , further comprises:
a benchmarking module configured to determine a potential security operation maturity score considering the plurality of data sources being all active data sources and using the maturity score model, the one or more benchmark including the potential security operation maturity score.
18. The system of claim 16 , wherein the one or more benchmarks comprises at least one of (1) a security operation maturity score of a similar organization, (2) a security operation maturity score of an industry related to the organization, (3) a security operation maturity score of a state, or (4) a security operation maturity score of a nation.
19. The system of claim 16 further comprises a security gap identification module configured to identify security gaps of the organization based on benchmarking of the security operation maturity score with respect to the one or more benchmarks.
20. The system of claim 16 further comprises:
a security gap identification module configured to identify security gaps of the organization based on benchmarking of the security operation maturity score with respect to the one or more benchmarks; and
a recommendation module configured to recommend one or more security improvement measures based on the identified security gaps.
21. The system of claim 12 , wherein the criticality score of each active data source of the plurality of active data sources is a weighted criticality score of the one or more security feature use cases covered by each active data source of the plurality of active data sources, wherein the weighted criticality score is determined using a historically developed criticality score matrix.
22. The system of claim 13 , wherein the compliance frameworks comprise MITRE ATT&CK, Center for the Internet (C.I.S.) Benchmark, Lockheed Killchain, and National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF).
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/025,783 US11170334B1 (en) | 2020-09-18 | 2020-09-18 | Systems and methods for security operations maturity assessment |
EP21870205.8A EP4214659A4 (en) | 2020-09-18 | 2021-09-16 | SYSTEMS AND METHODS FOR MATURITY ASSESSMENT OF SECURITY OPERATIONS |
PCT/US2021/050643 WO2022060968A1 (en) | 2020-09-18 | 2021-09-16 | Systems and methods for security operations maturity assessment |
US17/521,311 US11631042B2 (en) | 2020-09-18 | 2021-11-08 | Systems and methods for security operations maturity assessment |
US18/301,070 US11966871B2 (en) | 2020-09-18 | 2023-04-14 | Systems and methods for security operations maturity assessment |
US18/609,584 US20240346424A1 (en) | 2020-09-18 | 2024-03-19 | Systems and methods for security operations maturity assessment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/025,783 US11170334B1 (en) | 2020-09-18 | 2020-09-18 | Systems and methods for security operations maturity assessment |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/521,311 Continuation US11631042B2 (en) | 2020-09-18 | 2021-11-08 | Systems and methods for security operations maturity assessment |
Publications (1)
Publication Number | Publication Date |
---|---|
US11170334B1 true US11170334B1 (en) | 2021-11-09 |
Family
ID=78467617
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/025,783 Active US11170334B1 (en) | 2020-09-18 | 2020-09-18 | Systems and methods for security operations maturity assessment |
US17/521,311 Active US11631042B2 (en) | 2020-09-18 | 2021-11-08 | Systems and methods for security operations maturity assessment |
US18/301,070 Active US11966871B2 (en) | 2020-09-18 | 2023-04-14 | Systems and methods for security operations maturity assessment |
US18/609,584 Pending US20240346424A1 (en) | 2020-09-18 | 2024-03-19 | Systems and methods for security operations maturity assessment |
Family Applications After (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/521,311 Active US11631042B2 (en) | 2020-09-18 | 2021-11-08 | Systems and methods for security operations maturity assessment |
US18/301,070 Active US11966871B2 (en) | 2020-09-18 | 2023-04-14 | Systems and methods for security operations maturity assessment |
US18/609,584 Pending US20240346424A1 (en) | 2020-09-18 | 2024-03-19 | Systems and methods for security operations maturity assessment |
Country Status (3)
Country | Link |
---|---|
US (4) | US11170334B1 (en) |
EP (1) | EP4214659A4 (en) |
WO (1) | WO2022060968A1 (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20210234882A1 (en) * | 2020-01-24 | 2021-07-29 | The Aerospace Corporation | Interactive interfaces and data structures representing physical and/or visual information using smart pins |
US11252181B2 (en) | 2015-07-02 | 2022-02-15 | Reliaquest Holdings, Llc | Threat intelligence system and method |
US11265338B2 (en) | 2018-06-06 | 2022-03-01 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11316887B2 (en) | 2019-11-26 | 2022-04-26 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US20220150270A1 (en) * | 2020-11-10 | 2022-05-12 | Accenture Global Solutions Limited | Cyber digital twin simulator for automotive security assessment based on attack graphs |
US11411981B2 (en) | 2019-09-09 | 2022-08-09 | Reliaquest Holdings, Llc | Threat mitigation system and method |
CN114936315A (en) * | 2022-04-07 | 2022-08-23 | 网易有道信息技术(北京)有限公司 | Method for self-adaptive question-pushing and related products thereof |
CN115170002A (en) * | 2022-09-07 | 2022-10-11 | 中国兵器科学研究院 | Guarantee capability evaluation method based on neural network and application thereof |
US20220368702A1 (en) * | 2020-04-23 | 2022-11-17 | Specter Ops, Inc. | System and method for continuous collection, analysis and reporting of attack paths choke points in a directory services environment |
US11631042B2 (en) | 2020-09-18 | 2023-04-18 | deepwatch, Inc. | Systems and methods for security operations maturity assessment |
US11709946B2 (en) | 2018-06-06 | 2023-07-25 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US20230259632A1 (en) * | 2022-02-13 | 2023-08-17 | Microsoft Technology Licensing, Llc | Response activity-based security coverage management |
US11954208B1 (en) * | 2020-11-24 | 2024-04-09 | Bae Systems Information And Electronic Systems Integration Inc. | System security evaluation model |
US20250133101A1 (en) * | 2023-10-18 | 2025-04-24 | Wells Fargo Bank, N.A. | Systems and methods for data protection utilizing modelers |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11611559B2 (en) * | 2020-12-16 | 2023-03-21 | Microsoft Technology Licensing, Llc | Identification of permutations of permission groups having lowest scores |
US20240111874A1 (en) * | 2022-09-30 | 2024-04-04 | Nucleus Security, Inc. | Asset Grouping Rules for Vulnerability Detection and Management in IT Systems |
US20250030742A1 (en) * | 2023-07-21 | 2025-01-23 | Wells Fargo Bank, N.A. | Cloud computing cybersecurity matrix with overlaid maturity model |
Citations (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010049793A1 (en) * | 2000-06-01 | 2001-12-06 | Asgent, Inc. | Method and apparatus for establishing a security policy, and method and apparatus for supporting establishment of security policy |
US20070192236A1 (en) * | 2006-02-02 | 2007-08-16 | Sun Microsystems, Inc. | IT risk management framework and methods |
US20100114634A1 (en) * | 2007-04-30 | 2010-05-06 | James Christiansen | Method and system for assessing, managing, and monitoring information technology risk |
US20100275263A1 (en) * | 2009-04-24 | 2010-10-28 | Allgress, Inc. | Enterprise Information Security Management Software For Prediction Modeling With Interactive Graphs |
US20120005542A1 (en) * | 2010-07-01 | 2012-01-05 | LogRhythm Inc. | Log collection, structuring and processing |
US8196207B2 (en) * | 2008-10-29 | 2012-06-05 | Bank Of America Corporation | Control automation tool |
US20140019194A1 (en) * | 2012-07-12 | 2014-01-16 | Bank Of America | Predictive Key Risk Indicator Identification Process Using Quantitative Methods |
US20150302420A1 (en) * | 2014-04-22 | 2015-10-22 | Mphasis | Compliance framework for providing regulatory compliance check as a service |
US9323428B1 (en) * | 2013-07-26 | 2016-04-26 | Bank Of America Corporation | On-boarding framework |
US20160255105A1 (en) * | 2001-11-30 | 2016-09-01 | Lancope Llc | System and methods for computer network security involving user confirmation of network connections |
US20170132539A1 (en) * | 2015-11-11 | 2017-05-11 | Tata Consultancy Services Limited | Systems and methods for governance, risk, and compliance analytics for competitive edge |
US20170359220A1 (en) * | 2016-06-02 | 2017-12-14 | Zscaler, Inc. | Cloud based systems and methods for determining and visualizing security risks of companies, users, and groups |
US20180018602A1 (en) * | 2016-02-25 | 2018-01-18 | Mcs2, Llc | Determining risk level and maturity of compliance activities |
US9930061B2 (en) * | 2012-02-29 | 2018-03-27 | Cytegic Ltd. | System and method for cyber attacks analysis and decision support |
US20180341782A1 (en) * | 2016-06-10 | 2018-11-29 | OneTrust, LLC | Data processing systems for measuring privacy maturity within an organization |
US20190052664A1 (en) * | 2017-08-08 | 2019-02-14 | American International Group, Inc. | System and method for assessing cybersecurity risk of computer network |
US20190073276A1 (en) * | 2017-09-06 | 2019-03-07 | Royal Bank Of Canada | System and method for datacenter recovery |
US20190207968A1 (en) * | 2018-01-02 | 2019-07-04 | Criterion Systems, Inc. | Methods and Systems for Providing an Integrated Assessment of Risk Management and Maturity for an Organizational Cybersecurity/Privacy Program |
US20190207981A1 (en) * | 2018-01-04 | 2019-07-04 | Opaq Networks, Inc. | Control maturity assessment in security operations environments |
US20190213115A1 (en) * | 2018-01-08 | 2019-07-11 | Accenture Global Solutions Limited | Utilizing artificial intelligence to test cloud applications |
US20190228161A1 (en) * | 2018-01-23 | 2019-07-25 | CMMI Institute, LLC | Cybersecurity maturity assessment |
US20190238598A1 (en) * | 2018-01-29 | 2019-08-01 | Oracle International Corporation | Dynamic client registration for an identity cloud service |
US20200005406A1 (en) * | 2018-06-27 | 2020-01-02 | Hydromax USA, LLC | Cross-bore risk assessment and risk management tool |
US10592938B2 (en) | 2018-01-31 | 2020-03-17 | Aon Risk Consultants, Inc. | System and methods for vulnerability assessment and provisioning of related services and products for efficient risk suppression |
US20200135049A1 (en) * | 2018-10-26 | 2020-04-30 | Circadence Corporation | Method and system for evaluating individual and group cyber threat awareness |
US20200225655A1 (en) * | 2016-05-09 | 2020-07-16 | Strong Force Iot Portfolio 2016, Llc | Methods, systems, kits and apparatuses for monitoring and managing industrial settings in an industrial internet of things data collection environment |
US10735910B1 (en) * | 2019-10-21 | 2020-08-04 | Oath Inc. | Network based enforcement of geographical compliance |
US20200342374A1 (en) * | 2019-04-29 | 2020-10-29 | V3 Cybersecurity, Inc. | Method of managing information security program maturity |
US20200351296A1 (en) * | 2013-01-06 | 2020-11-05 | Security Inclusion Now Usa Llc | System and method for evaluating and enhancing the security level of a network system |
Family Cites Families (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7290275B2 (en) * | 2002-04-29 | 2007-10-30 | Schlumberger Omnes, Inc. | Security maturity assessment method |
US20080167920A1 (en) * | 2006-11-29 | 2008-07-10 | Robert Schmidt | Methods and apparatus for developing cyber defense processes and a cadre of expertise |
US8122426B2 (en) * | 2007-08-29 | 2012-02-21 | International Business Machines Corporation | Governance framework for architecture design in a service oriented enterprise |
WO2011063269A1 (en) * | 2009-11-20 | 2011-05-26 | Alert Enterprise, Inc. | Method and apparatus for risk visualization and remediation |
US20110252479A1 (en) * | 2010-04-08 | 2011-10-13 | Yolanta Beresnevichiene | Method for analyzing risk |
US8752004B2 (en) * | 2010-10-01 | 2014-06-10 | International Business Machines Corporation | System and a method for generating a domain-specific software solution |
US20120084288A1 (en) * | 2010-10-01 | 2012-04-05 | Mohammed Abdul-Razzak | Criminal relationship analysis and visualization |
US20120290379A1 (en) * | 2011-05-13 | 2012-11-15 | Bottomline Technologies (De) Inc. | System and method for facilitating the onboarding of prospective payers to an electronic payment system. |
US20130211983A1 (en) * | 2012-02-15 | 2013-08-15 | Bank Of America Corporation | On-going customer risk assessment of a financial institution customer population |
US9294495B1 (en) * | 2013-01-06 | 2016-03-22 | Spheric Security Solutions | System and method for evaluating and enhancing the security level of a network system |
US20140297356A1 (en) * | 2013-04-02 | 2014-10-02 | Kpmg Llp | System and method for customer onboarding |
WO2016018289A1 (en) * | 2014-07-30 | 2016-02-04 | Hewlett-Packard Development Company, L.P. | Security risk scoring of an application |
EP3262815B1 (en) * | 2015-02-24 | 2020-10-14 | Cisco Technology, Inc. | System and method for securing an enterprise computing environment |
US20170330197A1 (en) * | 2015-02-26 | 2017-11-16 | Mcs2, Llc | Methods and systems for managing compliance plans |
US10171510B2 (en) * | 2016-12-14 | 2019-01-01 | CyberSaint, Inc. | System and method for monitoring and grading a cybersecurity framework |
US10915641B2 (en) * | 2017-10-30 | 2021-02-09 | Pricewaterhousecoopers Llp | Implementation of continuous real-time validation of distributed data storage systems |
US20200167798A1 (en) * | 2018-11-26 | 2020-05-28 | Apple Inc. | Customizing customer onboarding for a service with machine learning models |
US11244045B2 (en) * | 2018-12-14 | 2022-02-08 | BreachRX, Inc. | Breach response data management system and method |
US11188712B2 (en) * | 2019-02-28 | 2021-11-30 | Jpmorgan Chase Bank, N.A. | Systems and methods for wholesale client onboarding |
US11170334B1 (en) | 2020-09-18 | 2021-11-09 | deepwatch, Inc. | Systems and methods for security operations maturity assessment |
-
2020
- 2020-09-18 US US17/025,783 patent/US11170334B1/en active Active
-
2021
- 2021-09-16 EP EP21870205.8A patent/EP4214659A4/en active Pending
- 2021-09-16 WO PCT/US2021/050643 patent/WO2022060968A1/en unknown
- 2021-11-08 US US17/521,311 patent/US11631042B2/en active Active
-
2023
- 2023-04-14 US US18/301,070 patent/US11966871B2/en active Active
-
2024
- 2024-03-19 US US18/609,584 patent/US20240346424A1/en active Pending
Patent Citations (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010049793A1 (en) * | 2000-06-01 | 2001-12-06 | Asgent, Inc. | Method and apparatus for establishing a security policy, and method and apparatus for supporting establishment of security policy |
US20160255105A1 (en) * | 2001-11-30 | 2016-09-01 | Lancope Llc | System and methods for computer network security involving user confirmation of network connections |
US20070192236A1 (en) * | 2006-02-02 | 2007-08-16 | Sun Microsystems, Inc. | IT risk management framework and methods |
US20100114634A1 (en) * | 2007-04-30 | 2010-05-06 | James Christiansen | Method and system for assessing, managing, and monitoring information technology risk |
US8196207B2 (en) * | 2008-10-29 | 2012-06-05 | Bank Of America Corporation | Control automation tool |
US20100275263A1 (en) * | 2009-04-24 | 2010-10-28 | Allgress, Inc. | Enterprise Information Security Management Software For Prediction Modeling With Interactive Graphs |
US20120005542A1 (en) * | 2010-07-01 | 2012-01-05 | LogRhythm Inc. | Log collection, structuring and processing |
US9930061B2 (en) * | 2012-02-29 | 2018-03-27 | Cytegic Ltd. | System and method for cyber attacks analysis and decision support |
US20140019194A1 (en) * | 2012-07-12 | 2014-01-16 | Bank Of America | Predictive Key Risk Indicator Identification Process Using Quantitative Methods |
US20200351296A1 (en) * | 2013-01-06 | 2020-11-05 | Security Inclusion Now Usa Llc | System and method for evaluating and enhancing the security level of a network system |
US9323428B1 (en) * | 2013-07-26 | 2016-04-26 | Bank Of America Corporation | On-boarding framework |
US20150302420A1 (en) * | 2014-04-22 | 2015-10-22 | Mphasis | Compliance framework for providing regulatory compliance check as a service |
US20170132539A1 (en) * | 2015-11-11 | 2017-05-11 | Tata Consultancy Services Limited | Systems and methods for governance, risk, and compliance analytics for competitive edge |
US20180018602A1 (en) * | 2016-02-25 | 2018-01-18 | Mcs2, Llc | Determining risk level and maturity of compliance activities |
US20200225655A1 (en) * | 2016-05-09 | 2020-07-16 | Strong Force Iot Portfolio 2016, Llc | Methods, systems, kits and apparatuses for monitoring and managing industrial settings in an industrial internet of things data collection environment |
US20170359220A1 (en) * | 2016-06-02 | 2017-12-14 | Zscaler, Inc. | Cloud based systems and methods for determining and visualizing security risks of companies, users, and groups |
US20180341782A1 (en) * | 2016-06-10 | 2018-11-29 | OneTrust, LLC | Data processing systems for measuring privacy maturity within an organization |
US20190052664A1 (en) * | 2017-08-08 | 2019-02-14 | American International Group, Inc. | System and method for assessing cybersecurity risk of computer network |
US20190073276A1 (en) * | 2017-09-06 | 2019-03-07 | Royal Bank Of Canada | System and method for datacenter recovery |
US20190207968A1 (en) * | 2018-01-02 | 2019-07-04 | Criterion Systems, Inc. | Methods and Systems for Providing an Integrated Assessment of Risk Management and Maturity for an Organizational Cybersecurity/Privacy Program |
US20190207981A1 (en) * | 2018-01-04 | 2019-07-04 | Opaq Networks, Inc. | Control maturity assessment in security operations environments |
US20190213115A1 (en) * | 2018-01-08 | 2019-07-11 | Accenture Global Solutions Limited | Utilizing artificial intelligence to test cloud applications |
US20190228161A1 (en) * | 2018-01-23 | 2019-07-25 | CMMI Institute, LLC | Cybersecurity maturity assessment |
US20190238598A1 (en) * | 2018-01-29 | 2019-08-01 | Oracle International Corporation | Dynamic client registration for an identity cloud service |
US10592938B2 (en) | 2018-01-31 | 2020-03-17 | Aon Risk Consultants, Inc. | System and methods for vulnerability assessment and provisioning of related services and products for efficient risk suppression |
US20200005406A1 (en) * | 2018-06-27 | 2020-01-02 | Hydromax USA, LLC | Cross-bore risk assessment and risk management tool |
US20200135049A1 (en) * | 2018-10-26 | 2020-04-30 | Circadence Corporation | Method and system for evaluating individual and group cyber threat awareness |
US20200342374A1 (en) * | 2019-04-29 | 2020-10-29 | V3 Cybersecurity, Inc. | Method of managing information security program maturity |
US10735910B1 (en) * | 2019-10-21 | 2020-08-04 | Oath Inc. | Network based enforcement of geographical compliance |
Cited By (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11418536B2 (en) | 2015-07-02 | 2022-08-16 | Reliaquest Holdings, Llc | Threat intelligence system and method |
US11252181B2 (en) | 2015-07-02 | 2022-02-15 | Reliaquest Holdings, Llc | Threat intelligence system and method |
US12120145B2 (en) | 2015-07-02 | 2024-10-15 | Reliaquest Holdings, Llc | Threat intelligence system and method |
US11921864B2 (en) | 2018-06-06 | 2024-03-05 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11709946B2 (en) | 2018-06-06 | 2023-07-25 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11323462B2 (en) | 2018-06-06 | 2022-05-03 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11588838B2 (en) | 2018-06-06 | 2023-02-21 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11363043B2 (en) | 2018-06-06 | 2022-06-14 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11374951B2 (en) | 2018-06-06 | 2022-06-28 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11265338B2 (en) | 2018-06-06 | 2022-03-01 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11297080B2 (en) | 2018-06-06 | 2022-04-05 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US12229276B2 (en) | 2018-06-06 | 2025-02-18 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US12204652B2 (en) | 2018-06-06 | 2025-01-21 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11611577B2 (en) | 2018-06-06 | 2023-03-21 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11637847B2 (en) | 2018-06-06 | 2023-04-25 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11528287B2 (en) | 2018-06-06 | 2022-12-13 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11687659B2 (en) | 2018-06-06 | 2023-06-27 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11411981B2 (en) | 2019-09-09 | 2022-08-09 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11316887B2 (en) | 2019-11-26 | 2022-04-26 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11483337B2 (en) | 2019-11-26 | 2022-10-25 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11973797B2 (en) | 2019-11-26 | 2024-04-30 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11985157B2 (en) * | 2020-01-24 | 2024-05-14 | The Aerospace Corporation | Interactive interfaces and data structures representing physical and/or visual information using smart pins |
US20210234882A1 (en) * | 2020-01-24 | 2021-07-29 | The Aerospace Corporation | Interactive interfaces and data structures representing physical and/or visual information using smart pins |
US11539725B2 (en) * | 2020-04-23 | 2022-12-27 | Specter Ops, Inc. | System and method for continuous collection, analysis and reporting of attack paths choke points in a directory services environment |
US20220368702A1 (en) * | 2020-04-23 | 2022-11-17 | Specter Ops, Inc. | System and method for continuous collection, analysis and reporting of attack paths choke points in a directory services environment |
US11631042B2 (en) | 2020-09-18 | 2023-04-18 | deepwatch, Inc. | Systems and methods for security operations maturity assessment |
US11966871B2 (en) | 2020-09-18 | 2024-04-23 | deepwatch, Inc. | Systems and methods for security operations maturity assessment |
US20220150270A1 (en) * | 2020-11-10 | 2022-05-12 | Accenture Global Solutions Limited | Cyber digital twin simulator for automotive security assessment based on attack graphs |
US11973790B2 (en) * | 2020-11-10 | 2024-04-30 | Accenture Global Solutions Limited | Cyber digital twin simulator for automotive security assessment based on attack graphs |
US11954208B1 (en) * | 2020-11-24 | 2024-04-09 | Bae Systems Information And Electronic Systems Integration Inc. | System security evaluation model |
US20230259632A1 (en) * | 2022-02-13 | 2023-08-17 | Microsoft Technology Licensing, Llc | Response activity-based security coverage management |
CN114936315A (en) * | 2022-04-07 | 2022-08-23 | 网易有道信息技术(北京)有限公司 | Method for self-adaptive question-pushing and related products thereof |
CN115170002A (en) * | 2022-09-07 | 2022-10-11 | 中国兵器科学研究院 | Guarantee capability evaluation method based on neural network and application thereof |
US20250133101A1 (en) * | 2023-10-18 | 2025-04-24 | Wells Fargo Bank, N.A. | Systems and methods for data protection utilizing modelers |
Also Published As
Publication number | Publication date |
---|---|
EP4214659A1 (en) | 2023-07-26 |
US20240346424A1 (en) | 2024-10-17 |
EP4214659A4 (en) | 2024-10-23 |
US11631042B2 (en) | 2023-04-18 |
US20230252393A1 (en) | 2023-08-10 |
WO2022060968A1 (en) | 2022-03-24 |
US11966871B2 (en) | 2024-04-23 |
US20220092510A1 (en) | 2022-03-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11966871B2 (en) | Systems and methods for security operations maturity assessment | |
US11637853B2 (en) | Operational network risk mitigation system and method | |
US20230362200A1 (en) | Dynamic cybersecurity scoring and operational risk reduction assessment | |
US11645396B2 (en) | Cybersecurity vulnerability management based on application rank and network location | |
US12242602B2 (en) | Malicious enterprise behavior detection tool | |
US10691796B1 (en) | Prioritizing security risks for a computer system based on historical events collected from the computer system environment | |
EP3643036B1 (en) | Enterprise cyber security risk management and resource planning | |
US20240039954A1 (en) | Cybersecurity Risk Analysis and Modeling of Risk Data on an Interactive Display | |
US10841332B2 (en) | System and method for passive assessment of industrial perimeter security | |
Ho et al. | Hopper: Modeling and detecting lateral movement | |
US11770403B2 (en) | Determination of a security rating of a network element | |
US11481478B2 (en) | Anomalous user session detector | |
US20240220303A1 (en) | Cyber security system for cloud environment analytics | |
US11985156B2 (en) | Dysfunctional device detection tool | |
Peiris et al. | Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks | |
Joseph | AI-driven cloud security: Proactive defense against evolving cyber threats | |
Onwubiko | Rethinking security operations centre onboarding | |
US20220311796A1 (en) | Method and system for assessing risk within a network | |
Caldeira | Security Information and Event Management (SIEM) Implementation Recommendations to Enhance Network Security | |
Welberg | Vulnerability management tools for COTS software-A comparison | |
CN119182545A (en) | Automatically prioritize digital identity cyber risks | |
Keskin et al. | Cyber Third-Party Risk Management: A Comparison of Non-Intrusive Risk Scoring Reports. Electronics 2021, 10, 1168 | |
Lufaj | Virtual desktop and cloud services: new security demand | |
Algamdi | An assessment of Cloud models against security vulnerabilities using a semi-automated vulnerability test model | |
Assumption | Magic Quadrant for Endpoint Protection Platforms |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 4 |