Return On Security Investment
Return On Security Investment
Return On Security Investment
About ENISA
The European Network and Information Security Agency (ENISA) is a centre of network and
information security expertise for the EU, its Member States, the private sector and Europes
citizens. ENISA works with these groups to develop advice and recommendations on good
practice in information security. It assists EU Member States in implementing relevant EU
legislation and works to improve the resilience of Europes critical information infrastructure
and networks. ENISA seeks to enhance existing expertise in EU Member States by supporting
the development of cross-border communities committed to improving network and
information security throughout the EU. More information about ENISA and its work can be
found at www.enisa.europa.eu
Follow us on Facebook Twitter LinkedIn YouTube & RSS feeds
Contact details
To contact ENISA for this report please use the following details:
E-mail: [email protected]
Internet: http://www.enisa.europa.eu
Legal notice
Notice must be taken that this publication represents the views and interpretations of the
authors and editors, unless stated otherwise. This publication should not be construed to be an
action of ENISA or the ENISA bodies unless adopted pursuant to the ENISA Regulation (EC) No
460/2004 as amended by Regulation (EC) No 1007/2008. This publication does not necessarily
represent state-of the-art and it might be updated from time to time.
Third-party sources are quoted as appropriate. ENISA is not responsible for the content of the
external sources including external websites referenced in this publication. Member States are
not responsible for the outcomes of the study.
This publication is intended for educational and information purposes only. Neither ENISA nor
any person acting on its behalf is responsible for the use that might be made of the
information contained in this publication. Reproduction is authorised provided the source is
acknowledged.
European Network and Information Security Agency (ENISA) 2012
II
Contents
1
2.1
2.2
3.2
4.2
Conclusion ........................................................................................................................... 13
Executive Summary
As for any organization, CERTs need to measure their cost-effectiveness, to justify their
budget usage and provide supportive arguments for their next budget claim. But
organizations often have difficulties to accurately measure the effectiveness and the cost of
their information security activities. The reason for that is that security is not usually an
investment that provides profit but loss prevention. So what is the right amount an
organization should invest in protecting information?
The aim of this document is to initiate a discussion among CERTs to create basic tools and best
practices to calculate their Return on Security Investment (ROSI). This key notion is essential
when justifying costs engagement and budgets for those entities that deal with security on a
regular basis (security departments, CERTs, etc.).
Although the methods outlined here are straightforward, their application to the real world
should take into account a general tendency to misevaluate the actual cost of an incident, a
central notion of the ROSI calculation. While being controversial, the Gordon & Loeb Model1 is
an attempt to ease the finding of the optimal level of investment to protect a given asset.
Due to the diversity of their nature, funding models and capabilities, calculating the return on
investment of CERTs has to go beyond a single ROSI calculation. In fact, assessing the costeffectiveness of CERTs should take into account the beneficial actions that CERTs achieve by
contributing to detect, handle, recover from and deter incidents early and efficiently. And, the
earlier an incident is handled, the less expensive is its mitigation. The profitability of a CERT is
therefore assessed by determining the difference of incident handing costs with the help of
CERT versus not having a CERT.
The Economics of Information Security Investment , Lawrence Gordon and Martin Loeb,
http://ns1.geoip.clamav.net/~mfelegyhazi/courses/BMEVIHIAV15/readings/04_GordonL02economics_security_investment.pdf
Loss
reduction
Security
Investment
Assessing security investment involves evaluating how much potential loss could be saved by
an investment. Therefore, the monetary value of the investment has to be compared with the
monetary value of the risk reduction. This monetary value of risk can be estimated by a
quantitative risk assessment.
See detailed Cost of ICT incident calculation exercise, CERT exercise handbook, ENISA, 2012
depending on the existing security measures: the ARO of a successful malicious code attack
will decrease significantly after implementing an effective anti-virus.
Annual Loss Expectancy (ALE)
The ALE is the annual monetary loss that can be expected from a specific risk on a specific
asset. It is calculated as follow:
Implementing an effective security solution lowers the ALE: the more a solution is effective,
the more reduced is the ALE. This monetary loss reduction can be defined by the difference of
the ALE without the security solution versus the modified ALE (mALE) implementing the
security solution.
Which also equals to the mitigation ratio of the solution applied to the ALE:
Example 1:
The Acme Corp. is considering investing in an anti-virus solution. Each year, Acme suffers 5
virus attacks (ARO=5). The CSO estimates that each attacks cost approximately 15.000 in loss
of data and productivity (SLE=15.000). The anti-virus solution is expected to block 80% of the
attacks (Mitigation ratio=80%) and costs 25.000 per year (License fees 15.000 + 10.000 for
trainings, installation, maintenance etc.).
The Return on security investment for this solution is then calculated as follow:
(
In the end, ROSI calculation is based on 3 variables: estimated potential loss (ALE), estimated
risk mitigation, and cost of the solution. If the cost of the solution is easier to predict
provided all indirect costs are considered the two other variables are estimations that
makes ROSI more approximate.
4.1
4.2
The Economics of Information Security Investment , Lawrence Gordon and Martin Loeb,
http://ns1.geoip.clamav.net/~mfelegyhazi/courses/BMEVIHIAV15/readings/04_GordonL02economics_security_investment.pdf
In their study, the authors state that, contrary to the basics of risk assessments, an asset of
greater value should not necessarily benefit from a greater investment to protect it. The
optimal information security investment does not always increase proportionately to
increases in vulnerability; there is a point at which it is not in the best interest of a firm to
make increasingly larger investments in information security.
According to this study, the optimal amount to spend on information security never exceeds
37% of the expected loss resulting from a security breach (and is typically much less that 37%).
Hence, the optimal amount to spend on information security would typically be far less than
even the expected loss from a security breach.
The Gordon & Loeb model has been questioned by another study4 showing that there was
possibly no fixed percentage for optimal investment.
These conflicting studies show that ROSI calculation remains an approximate model and that
the resulting numbers should be regarded with care. Organisations should consider the results
as guidelines rather than strict rules to follow. ROSI calculation will never be perfectly
accurate.
On the Gordon&Loeb model for Information Security Investment, 2006, Jan Willemson, Universtity of Tartu,
http://weis2006.econinfosec.org/docs/12.pdf
CERTs internally providing services to an entity are non-profit organisations; their goal is not
to make money but to prevent losses by avoiding, containing and recovering from an incident
in a quick and efficient way. Therefore, the cost-effectiveness of CERTs has to be regarded as
security investment: their returns on investments are the savings they provide.
A factual approach is advised here: ALE is often easier to calculate a posteriori, from more
accurate historical data. Therefore, assessing the cost-effectiveness of CERTs can be
approximated by assessing the difference of past incident response cost done with CERTs
versus what would have been the incident response cost without CERTs.
Cyber-attacks can get costly if not resolved quickly. Results show a positive relationship between the
time to contain an attack and organisational cost. The average time to resolve a cyber-attack was 24
days, with an average cost to participating organisations of 135,744 over this 24-day period. Results
show that malicious insider attacks can take more than 50 days on average to contain.
Source Ponemon Study, Oct. 2012 Cost of cybercrime UK
http://www.hpenterprisesecurity.com/collateral/report/HPESP_WP_PonemonCostofCyberCrimeStudy2012_UK.pdf
Cost of incident
As a rule of thumb, the quicker an incident is detected, the less expensive it is to recover from
it. Depending on the type of incident, damages can grow exponentially over time. Therefore
the time-saving provided by CERTs activities in incident eradication represents a financial
saving in terms of damage and downtime reduction. The actual savings provided by a CERT
can then be estimated by summing all the savings provided to its constituency.
18 days without
CERT
2 days with
CERT
Savings provided by CERT
Days to eradication
CERT leads to faster response which leads to savings
10
Obviously, to estimate the net savings of CERT, the cost of operating a CERT has to be
deduced from the overall savings. In that matter, the cost of logistics such as building,
trainings, administrative, materials, etc. will have to be deduced from the savings a CERT
provides and the resulting number will be the actual savings of a CERT.
This introductory study offers a quick overview on how cost-effectiveness of security can be
approached. ROSI is a complex topic and despite the numerous studies on this topic, a lot of
aspects remain unresolved.
Gathering statistical data
Data accuracy is essential in ROSI calculations. Unfortunately, the threats move quickly and
companies are often reluctant to reveal data on their security incidents. Therefore, little
statistical information exists on the occurrence and cost of incident and effectiveness of
security measure. Some CERTs regularly produce activity reports and incident statistics. These
are valuable information to better estimate the Annual Loss Expectancy of a threat.
Some interesting figures:
Title
URL
http://www.enisa.europa.eu/activities/Resilience-andCIIP/Incidents-reporting/annual-reports/annual-incidentreports-2011
http://gocsi.com/survey
CSIRT CZ
https://www.csirt.cz/files/csirt/statistics/stats.html
Internet
Data
Security
Breach
https://www.trustwave.com/global-security-report
Threat http://www.symantec.com/threatreport/
Investigations http://www.verizonbusiness.com/about/events/2012dbir/
http://public.tableausoftware.com/views/VERISCommunity
/DemographicsandAgent
http://www.veriscommunity.net/
11
12
Other models
The ALE model presented here is a classic approach to calculate ROSI. More complex models
exist. For instance, the Net Present Value model5 takes into consideration the decreasing
value of saved income.
The Australian Department of Finance and Services introduced a hybrid ROSI calculation
model combining ALE and an Australian risk assessment method called Threat and Risk
Assessment (TRA). This method is based on tables covering the possible threats and their
counter measures. In this bottom-up approach, each risk and its associated counter measure
are evaluated resulting in a global ROSI calculation for an entity. This model is detailed in the
Guide for Government Agencies Calculating Return on Security Investment6.
ROSI Calculator
Tools exist to help the calculation of ROSI. Although they can present a simplified and partial
view of this complex task, they are useful to support the workflow and calculations involved in
this process:
http://www.iso27001standard.com/en/rosi/return-on-security-investment
See Waldo Rocha Flores et al., Assessing Future Value of Investments in Security-Related IT Governance Control Objectives
Surveying IT Professionals, http://www.ejise.com/issue/download.html?idArticle=773
6
http://www.services.nsw.gov.au/sites/default/files/ROSI%20Guideline%20SGW%20%282.2%29%20Lockstep.pdf
Conclusion
This introductory paper presents the basis of Return on Security Investment calculation and
how it can help CERTs in assessing their cost effectiveness. ROSI is a complex topic and this
first attempt to introduce this topic has to be further developed to address remaining issues
on CERTs and ROSI calculation: Which model best applies to CERTs? What to include in the
cost of an incident? How to measure the added value of CERT teams in incident handling?
How can CERTs estimate the value of assets they protect indirectly? How this valuable
information could be shared among CERTs and benefits to all the community?
The FIRST Metrics SIG7 is working to better the metrics and evaluation methods for internal
evaluation of CERTs. As part of this work, the Metrics SIG is addressing the topic of cost of
incidents and return on security investment. The results of this research will help CERTs in
assessing their profitability.
See http://www.first.org/global/sigs/metrics
13
14
Annex I: References
15