Boosting Holistic Cybersecurity Awareness with Outsourced Wide-Scope CyberSOC: A Generalization from a Spanish Public Organization Study
Abstract
:1. Introduction
2. Analysis of the State of the Art
Topic | Analyzed Source |
---|---|
Holistic cybersecurity foundations and cybersecurity context in public sector | [2,3,13,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34] |
Tactical-operational cybersecurity workforce management | [1,35,36,37,38,39,40,41,42,43,44,45,46,47] |
Cybersecurity talent development and retention | [4,5,6,7,8,9,10,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66] |
Outsourcing in public sector | [11,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82,83,84,85,86,87,88] |
Outsourcing CyberSOC services | [89,90,91,92,93,94,95] |
2.1. The Importance of a Holistic Approach to Cybersecurity
2.2. Tactical-Operational Cybersecurity Workforce Management
2.3. Cybersecurity Talent Development and Retention
2.4. Outsourcing in Public Sector
2.5. Outsourcing CyberSOC Services
- Continuous monitoring of an organization’s networks and systems for signs of potential cyber threats;
- Detection of cyber threats through the use of advanced technology and analysis of security data;
- Response to detected threats, including implementing countermeasures to prevent or mitigate the impact of the threat;
- Communication with relevant stakeholders, such as the organization’s leadership and other security teams, about detected threats and response efforts;
- Ongoing analysis of security data to identify patterns and trends that can help improve the organization’s overall security posture.
2.6. Insights after Reviewing the State of the Art
- The role of tactical-operational cross-functional teams in cybersecurity management is crucial, as they are responsible for implementing the actual cybersecurity countermeasures within the organization and provide the corresponding holism. There is a dearth of research studies that examine this specific niche from a managerial standpoint, thereby creating a void that hampers the implementation of a comprehensive cybersecurity management approach. It is imperative that such an approach be undertaken at these levels to prevent the formation of isolated units, both within the public and private sectors;
- Currently, there is a shortage of cybersecurity professionals that is expected to continue in the short and medium term. This shortage is particularly acute in public sector organizations, which often have personnel capable of managing at all levels but lack technical staff with hands-on expertise. Therefore, it is imperative to undertake certain actions aimed at raising awareness among the cross-functional cybersecurity workforce regarding the implications of their specific areas of expertise in the broader realm of cybersecurity. This will enable them to become personnel who possess the necessary expertise and managerial acumen to effectively confront the prevailing cyber threats;
- Public sector entities heavily rely on the practice of outsourcing. One of the reasons for that is to gain access to technical staff with hands-on expertise, trying to avoid the mentioned workforce shortage. As a result, their cross-functional tactical-operational teams are often composed of a mix of employees and outsourced workers, which are frequently replaced as their outsourcing contracts come to an end. It is common for public organizations to also outsource CyberSOC services. Although outsourcing appears to be a necessary step in many instances, it is crucial that it is executed in a manner that ensures the service provider aligns with the cybersecurity requirements of the business. Specifically, it must be capable of facilitating the implementation of a comprehensive tactical-operational cybersecurity management approach.
3. Method
- Stage 1. Pre-study of public sector requirements and context
- o
- Phase 1. In this phase, after a systematic analysis of the existing literature was carried out, the corresponding insights were analyzed and organized to detect whether the features, requirements, and impediments to deploy a truly holistic cybersecurity management model are shared by different public sector organizations worldwide; this phase corresponds to the work described in Section 2.
- o
- Phase 2. During this phase, a series of meetings were conducted with the participating organization to discuss the prerequisites for implementing a comprehensive cybersecurity management model. These discussions aimed to enable the organization to assess challenges and barriers that could impede the adoption of such a model. Additionally, the organization shared anonymously, and whenever possible, information about other public entities it is related to, which allowed gathering relevant insight both directly and indirectly. This phase focused on determining the organization’s capability to fulfill the model’s requirements and identify potential obstacles. Continuing with our work, the information retrieved in the mentioned meetings was channelized using the Strengths, Weaknesses, Opportunities, and Threats (SWOT) analysis technique described by Benzaghta et al. in [96] to analyze deeply and systematically de current circumstances of the participating public entity. We also determine at this point whether the resulting insights coincide with the common features identified for public organizations in a wider context.
- o
- Phase 3. At this stage, we identified a specific set of actionable strategies that we understood as universally applicable to all public sector entities due the fact that they share common root characteristics as determined in Phase 1 and Phase 2. These strategies were aimed at the successful implementation of a comprehensive tactical-operational cybersecurity management model. This model takes into consideration the distinctive attributes of the public organizations identified in the previous phase and we use the Threats, Opportunities, Weaknesses, and Strengths (TOWS) matrix technique, described in Pasaribu et al. [97], to analyze the external opportunities and threats and compare them to the organization’s strengths and weaknesses, resulting in a set of actionable strategies. The combined use of SWOT–TOWS analysis is common to analyze and interpret systems, especially to develop strategies; the work of Hattangadi in [98] analyzes them together.
- Stage 2. Model development.
- o
- Phase 4. Finally, we carried out our proposal to develop the identified strategies, that would allow public entities to seamlessly adopt a holistic management model of cybersecurity, taking into account and incorporating the previously identified peculiarities and facing the existing specific challenges of public entities. Throughout the duration of this phase, the research team benefited from the active engagement of the participating public entity. Their involvement enriched the solutions devised by providing insights from the perspective of the recipient institution.
3.1. Stage 1: Pre-Study of Public Sector Requirements and Context
- Strengths and Opportunities (SO) strategies, commonly referred to as the “Maxi-Maxi Strategy”, encompass the utilization of strengths to optimize opportunities. In a TOWS analysis, this type of strategy is considered highly proactive and has a higher likelihood of yielding success. In our case, the public organization could leverage its expertise, skills, and capabilities in public procurement and outsourcing to effectively utilize the available funding. By establishing public-private contracts, the organization can transform itself into a resilient entity in the field of cybersecurity and provide better and more secure public services;
- Strengths and Threats (ST) strategies, commonly referred to as the “Maxi-Mini Strategy”, involve leveraging strengths to mitigate threats. In our study, by leveraging the growing allocation of funds for cybersecurity enhancements and the heightened focus on modernizing and fortifying public entities and services, the public organization can seize the opportunity to engage public sector companies. This strategic move aims to facilitate the organization’s adaptation to the dynamic, challenging, and rapidly evolving contexts of cybersecurity and cyber threats;
- Weakness and Opportunities (WO) strategies, commonly referred to as the “Mini-Maxi Strategy”, encompass the approach of minimizing weaknesses by capitalizing on available opportunities. In our work, the growing allocation of funds for cybersecurity enhancements, coupled with the heightened emphasis on modernizing and fortifying public entities and services, presents an opportunity for the public organization to utilize outsourced personnel, augment the cybersecurity skills and career progression of its existing employees, and establish methodological foundations to foster true holism;
- Weaknesses and Threats (WT) strategies, also recognized as the “Mini-Mini Strategy”, are employed to minimize weaknesses and evade threats. Within a TOWS analysis, this type of strategy is considered highly reactive/defensive and may not be as reliable in generating success. Due to this rationale, this strategy is not deemed conducive to steering the advancement of our proposal.
3.2. Stage 2: Model Development
- The establishment of a cybersecurity management framework that can deliver the necessary holism at lower organizational levels is imperative. Contracting a Wide-Scope CyberSOC to assist the organization in overcoming silos and adopting a holistic approach would be futile if the procedural foundations to support such an extended CyberSOC have not been put in place. Consequently, based on the reasons outlined in Section 2.2, we opted for the CyberTOMP framework.
- Since the Wide-Scope CyberSOC is intended to provide guidance and assistance in designing and implementing multidisciplinary cybersecurity measures, it is essential to pre-identify the potential set of such cybersecurity actions. This enables us to contractually demand support for each of these actions. As our proposal is based on CyberTOMP, this set of actions is already identified within this framework. The Unified List of Expected Outcomes (ULEO) of CyberTOMP (Table 3) precisely represents a compilation of potential cybersecurity actions. There, every unified expected outcome is represented together with its corresponding function and category from the cybersecurity framework of National Institute of Standards and Technology (NIST). Each expected outcome in the ULEO has its own identifier. Expected outcomes from [99] are identified with the prefix “9D”, those from [100] are identified with the prefix “CSC”, and the remainder are identified using the original terminology from [101]. Furthermore, the associated Implementation Groups (IGs), to which the unified expected outcome should be applied, are determined. This enables the development of a proportionate cybersecurity approach, as lower IGs define the unified expected outcomes applicable to assets of lower criticality, while higher IGs pertain to assets with greater criticality. Additionally, leveraging this list for our proposal allows us to utilize the associated set of metrics concerning its implementation and the cybersecurity status of each asset to which they are applied.
NIST Function | NIST Category | Unified Expected Outcome | IG1 | IG2 | IG3 |
---|---|---|---|---|---|
Protect | PR.PT | 9D-4 | √ | √ | |
Protect | PR.PT | CSC-4.12 | √ | ||
· | · | · | · | · | · |
· | · | · | · | · | · |
· | · | · | · | · | · |
Protect | PR.PT | PR.PT-5 | √ | √ | √ |
- It is also crucial to identify which functional area should be responsible for each of these cybersecurity actions, ensuring that the contribution of each functional area to overall cybersecurity enables genuine holistic cybersecurity. Furthermore, this allows the Wide-Scope CyberSOC to focus its efforts on supporting each area in developing specific cybersecurity actions from the perspective of its specialized field. During our research efforts, we conducted a detailed analysis of the various functional areas involved in cybersecurity, as defined in CyberTOMP (Table 4). We also examined the specific scope of each cybersecurity action and established the association between functional areas and corresponding actions in all cases, as described in [99,100,102]. The comprehensive results of our investigation can be found in Appendix A.
Area ID | Area’s Main Cybersecurity Responsibilities |
---|---|
FA1 | In charge of the security of Internet of Things (IoT) devices. |
FA2 | Implementation of active defense measures, vulnerabilities management, threat hunting, Security Information and Event Management (SIEM) operation, activities within a CyberSOC, and incident response. |
FA3 | Human resources preparation regarding cybersecurity threats through continuous training and its reinforcement, as well as the design and execution of practical cybersecurity exercises |
FA4 | Analysis of internal and external threats, exchange of threat intelligence with third parties, and preparation and incorporation of Indicators of Compromise (IoCs). |
FA5 | Surveillance of the applicable regulation and its incorporation into cybersecurity. Key Performance Indicators (KPI) monitoring, establishment of strategies, policies, standards, processes, procedures, and corporate instructions. |
FA6 | Risk treatment, business continuity management, crisis management, establishing the organization’s position regarding cyber risks, insurance contracting, risk registration, auditing, definition of groups of risk management, and definition of those responsible and owners of the processes and assets. |
FA7 | Cybersecurity risk analysis, vulnerability scanning, supply chain risk identification and analysis, asset inventory, risk monitoring, penetration testing of infrastructure, people, or information systems. |
FA8 | Leading the secure software development cycle, continuous integration and deployment, user experience security, software quality, API security, identification of information flows in information systems, management of the free software used and the static or dynamic analysis of the code. |
FA9 | Management, development, implementation, and verification of compliance with the standards and regulations defined at the corporate level for cybersecurity: CIS controls [100], CIS Community Defense Model [103], MITRE matrix [104,105], NIST framework [101] for the improvement of cybersecurity of critical infrastructures or the family of standards ISO27000, CyberTOMP. |
FA10 | Management, definition, implementation, operation, prevention, etc., in relation to cryptography, key and certificate management, encryption standards, security engineering, access controls with or without multiple authentication factors, single sign-on, privileged access management, identity management, identity federation, cloud security, container security, endpoint security, data protection and prevention of data leakage, network design to prevent distributed denial of service attacks, development and secure configuration of systems, patch and update management and the establishment of secure reference configurations. |
FA11 | Promote study, education and training, attendance at conferences and participation in related professional groups, training, or certification. |
FA12 | Internal and external corporate communication, social networks management, marketing and the establishment and maintenance of institutional relationship with interested third parties with whom the organization maintains some type of contact. |
- Given that the Wide-Scope CyberSOC is going to be outsourced to third parties, it is highly advisable to establish a set of general requirements that clearly distinguish what is being contracted as a Wide-Scope CyberSOC and not merely a technologically focused CyberSOC. This is important because many service providers tend to offer traditional, technology-focused CyberSOC services by default. In the context of a public entity that has outsourced some of its workforce and has an external CyberSOC, we define a Wide-Scope CyberSOC as a CyberSOC with the following general requirements:
- o
- Must poses the necessary skills and capabilities to understand, design, prescribe, advise, and monitor cybersecurity actions that can be executed by every functional area within an organization that can contribute to the organization’s strategic common effort, with a particular focus on those functional areas that fall outside of the realm of computing or information technologies;
- o
- Must be capable of positioning itself within the context of each organization’s functional areas, and from this vantage point, be able to understand the implications (including what, how, where, when, and who) of these areas of expertise with regards to cybersecurity. In fact, a Wide-Scope CyberSOC must be an expert in all fields of knowledge that are relevant to cybersecurity. Not only in the most technological ones;
- o
- Must be aware that those functional areas that do not typically participate in cybersecurity may not be conscious of the fact that they can significantly contribute to improving the overall state of cybersecurity from within their own areas of expertise. As such, a Wide-Scope CyberSOC must also act as a mentor to enhance the awareness of these functional areas and develop their cybersecurity skills from the perspective of their areas of expertise;
- o
- Must be able to understand the organizational context and address circumstances where the functional areas with which it engages in cybersecurity may be partially outsourced and frequently renewed. Its mode of operation must be adapted to this situation in a seamless manner.
- As a preliminary step before contracting the Wide-Scope CyberSOC service, it is also essential to turn the desired multidisciplinary capabilities, skills, and knowledge into explicit requirements for the service that any potential service provider must meet. These requirements will enable them to effectively mentor and provide the necessary support to the various functional areas contributing to cybersecurity. As part of our study, we have conducted this analysis and defined the necessary prerequisites, which can be directly incorporated into the technical specifications of the Wide-Scope CyberSOC. The specific knowledge requirements can be found in Appendix A;
- Finally, after addressing all the relevant points explained in this section, the public entity will be able to outsource the Wide-Scope CyberSOC service using its expertise in public procurement. Once the service is contracted, it should be managed using the existing procedures in the selected model, CyberTOMP. Figure 3 illustrates the specific activities of the tactical-operational cybersecurity management process defined in CyberTOMP, where the Wide-Scope CyberSOC should play a key role by contributing its expertise and acting as a cohesive element among the various functional areas of the organization. Furthermore, aside from the aforementioned aspect, which pertains exclusively to the set of steps/tasks delineated in the CyberTOMP proposal, the Wide-Scope CyberSOC must also undertake the activities typically associated with a traditional CyberSOC. These activities may encompass actions within the realms of identify, protect, detect, respond, and recover approaches, as is customary.
3.3. Assessing the Wide-Scope CyberSOC Effect on the Deployment of Holistic Cybersecurity
- Grasping the holistic nature of cybersecurity and the extensive spectrum of potential, applicable cybersecurity actions;
- Recognizing the responsibilities associated with each functional area and appreciating the critical importance of collective engagement in achieving the highest cybersecurity standards;
- Understanding the imperative need for proportional cybersecurity measures, aligned with the criticality of assets;
- Acknowledging that various approaches can be employed to attain the same objectives, thus enabling the distribution of cybersecurity efforts and resources throughout the organization to foster collaborative equilibrium.
4. Results and Discussion
- The generalization process in our research was built upon the presence of common features and circumstances identified in the global literature pertaining to public sector organizations, along with the parallel existence of these same insights within the public organization participating in our study. This alignment allowed us to establish a connection that led us to recognize that the insights from our case study are applicable to other public organizations worldwide. To ensure the reliability of our approach, we deliberately selected a comprehensive array of research works for the analysis of current literature concerning public sector organizations. This approach was taken specifically to reduce the risk of selecting only a few sources that might not accurately represent these public organizations. Nonetheless, despite our efforts, there is a slight possibility that our selection of research works may have been influenced by unconscious bias;
- On the other hand, we have introduced a method to evaluate the effectiveness of our proposal, which we are currently applying to the participating organization in our study. The initial results appear promising, but they require extended assessment over time to thoroughly ascertain the model’s benefits. Furthermore, since this is a generalization based on a single case study, the only application thus far has been the one conducted as part of our research. Additional applications will offer valuable data to refine our proposal if necessary.
5. Conclusions and Future Work
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Appendix A
NIST Function | NIST Category | Unified Expected Outcome | IG1 | IG2 | IG3 | Main Area ID | Knowledge Requirement: “The Wide-Scope CyberSOC must be Skilled to Help Cross-Functional Teams in…” |
---|---|---|---|---|---|---|---|
Identify | ID.AM | CSC-1.1 | √ | √ | √ | FA7 | Establishing and maintaining a detailed enterprise asset inventory with the potential to store or process data. |
Identify | ID.AM | CSC-12.4 | √ | √ | FA10 | Establishing and maintaining architecture diagrams. | |
Identify | ID.AM | CSC-14.1 | √ | √ | √ | FA3 | Establishing and maintaining a security awareness program. |
Identify | ID.AM | CSC-2.2 | √ | √ | √ | FA8 | Ensuring that only authorized, supported software is used. |
Identify | ID.AM | CSC-3.1 | √ | √ | √ | FA5 | Establishing and maintaining a process for data management |
Identify | ID.AM | CSC-3.2 | √ | √ | √ | FA10 | Establishing and maintaining a data inventory. |
Identify | ID.AM | CSC-3.6 | √ | √ | √ | FA10 | Identifying data on end-user devices that has encryption requirements. |
Identify | ID.AM | CSC-3.7 | √ | √ | FA9 | Establishing and maintaining a data classification scheme | |
Identify | ID.AM | ID.AM-1 | √ | √ | √ | FA7 | Establishing and maintaining detailed inventory of physical devices and systems. |
Identify | ID.AM | ID.AM-2 | √ | √ | √ | FA8 | Inventorying all software platforms and applications within the organization. |
Identify | ID.AM | ID.AM-3 | √ | √ | FA8 | Mapping organizational communication and data flows. | |
Identify | ID.BE | 9D-1 | √ | √ | FA7 | Analyzing the business environment to determine potential ways of deterring attacks. | |
Identify | ID.BE | ID.BE-1 | √ | FA6 | Identifying and communicating the organization’s role in the supply chain. | ||
Identify | ID.BE | ID.BE-2 | √ | FA6 | Identifying and communicating the organization’s place in critical infrastructure and its industry sector. | ||
Identify | ID.BE | ID.BE-3 | √ | FA5 | Establishing and communicating priorities for organizational mission, objectives, and activities. | ||
Identify | ID.BE | ID.BE-4 | √ | FA5 | Establishing dependencies and critical functions for delivery of critical services. | ||
Identify | ID.BE | ID.BE-5 | √ | FA5 | Establishing resilience requirements to support delivery of critical services for all operating states. | ||
Identify | ID.GV | CSC-17.4 | √ | √ | FA5 | Establishing, maintaining an incident response process. | |
Identify | ID.GV | ID.GV-1 | √ | √ | √ | FA5 | Establishing and communicating organizational cybersecurity policy. |
Identify | ID.GV | ID.GV-2 | √ | √ | FA9 | Coordinating and aligning cybersecurity roles and responsibilities with internal roles and external partners. | |
Identify | ID.GV | ID.GV-3 | √ | FA5 | Understanding and managing legal and regulatory requirements regarding cybersecurity. | ||
Identify | ID.GV | ID.GV-4 | √ | FA5 | Ensuring governance and risk management processes address cybersecurity risks. | ||
Identify | ID.RA | 9D-1 | √ | √ | FA7 | Ensuring that the organization understands the risk of vulnerabilities and the necessity of deterring their exploitation. | |
Identify | ID.RA | CSC-18.2 | √ | √ | FA7 | Conducting periodic external penetration tests in order to enhance understanding of cyber risks. | |
Identify | ID.RA | CSC-18.5 | √ | FA7 | Conducting periodic internal penetration tests in order to enhance understanding of cyber risks. | ||
Identify | ID.RA | CSC-3.7 | √ | √ | FA9 | Assessing the current validity of the data classification scheme in relation to existing risks. | |
Identify | ID.RA | ID.RA-1 | √ | √ | √ | FA7 | Identifying and documenting assets vulnerabilities. |
Identify | ID.RA | ID.RA-2 | √ | FA4 | Ensuring cyber threat intelligence is received from information sharing forums and sources. | ||
Identify | ID.RA | ID.RA-3 | √ | FA4 | Identifying and document threats, both internal and external. | ||
Identify | ID.RA | ID.RA-4 | √ | FA6 | Identifying potential business impacts and likelihoods. | ||
Identify | ID.RA | ID.RA-6 | √ | FA6 | Identifying and prioritizing risk responses. | ||
Identify | ID.RM | 9D-8 | √ | √ | FA2 | Comprehending the potential risks that necessitate redirecting attackers to alternative targets. | |
Identify | ID.RM | ID.RM-1 | √ | FA6 | Ensuring risk management processes are established, managed, and agreed to by organizational stakeholders. | ||
Identify | ID.RM | ID.RM-2 | √ | FA6 | Determining and clearly expressing organizational risk tolerance. | ||
Identify | ID.RM | ID.RM-3 | √ | FA6 | Informing the organization’s risk tolerance by its role in critical infrastructure and sector specific risk analysis. | ||
Identify | ID.SC | ID.SC-1 | √ | √ | FA5 | Identifying, establishing, assessing, and managing cyber supply chain risk management processes. | |
Identify | ID.SC | ID.SC-2 | √ | √ | √ | FA5 | Identifying, prioritizing, and assessing third party partners of information systems, components, and services, using a cybersecurity supply chain risk assessment process. |
Identify | ID.SC | ID.SC-3 | √ | √ | FA9 | Ensuring contracts with suppliers and third-party are designed to meet the goals of an organization’s cybersecurity program and cybersecurity supply chain management plan. | |
Identify | ID.SC | ID.SC-4 | √ | FA6 | Auditing, testing, and evaluating suppliers and third-party partners to confirm they are meeting their contractual obligations. | ||
Identify | ID.SC | ID.SC-5 | √ | √ | √ | FA9 | Conducting response and recovery planning and testing with suppliers and third-party providers. |
Protect | PR.AC | CSC-12.5 | √ | √ | FA10 | Centralizing network authentication, authorization, and auditing. | |
Protect | PR.AC | CSC-12.6 | √ | √ | FA10 | Employing secure network management and communication protocols. | |
Protect | PR.AC | CSC-13.4 | √ | √ | FA10 | Conducting traffic filtering between network segments | |
Protect | PR.AC | CSC-4.7 | √ | √ | √ | FA10 | Managing default accounts on enterprise assets and software. |
Protect | PR.AC | CSC-5.2 | √ | √ | √ | FA10 | Using unique passwords for all enterprise assets. |
Protect | PR.AC | CSC-5.6 | √ | √ | FA10 | Centralizing account management. | |
Protect | PR.AC | CSC-6.8 | √ | FA10 | Deploying and maintaining Role-Based Access Control (RBAC) | ||
Protect | PR.AC | PR.AC-1 | √ | √ | √ | FA10 | Ensuring identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users, and processes. |
Protect | PR.AC | PR.AC-2 | √ | FA7 | Ensuring physical access to assets is managed and protected. | ||
Protect | PR.AC | PR.AC-3 | √ | √ | √ | FA10 | Ensuring remote access is managed. |
Protect | PR.AC | PR.AC-4 | √ | √ | √ | FA10 | Ensuring access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties. |
Protect | PR.AC | PR.AC-5 | √ | √ | √ | FA10 | Ensuring network integrity is protected. |
Protect | PR.AC | PR.AC-6 | √ | FA10 | Ensuring identities are proofed and bound to credentials and asserted in interactions. | ||
Protect | PR.AC | PR.AC-7 | √ | √ | √ | FA10 | Ensuring users, devices, and other assets are authenticated commensurate with the risk of the transaction. |
Protect | PR.AT | CSC-14.9 | √ | √ | FA3 | Conducting role-specific security awareness and skills training. | |
Protect | PR.AT | CSC-15.4 | √ | √ | FA5 | Ensuring service provider contracts include security requirements. | |
Protect | PR.AT | PR.AT-1 | √ | √ | √ | FA3 | Ensuring all users are informed and trained. |
Protect | PR.AT | PR.AT-2 | √ | √ | FA3 | Ensuring privileged users understand their roles and responsibilities. | |
Protect | PR.DS | 9D-6 | √ | FA8 | Dispersing protective measures throughout the payload to safeguard the data. | ||
Protect | PR.DS | CSC-3.4 | √ | √ | √ | FA10 | Enforcing data retention in accordance with the risk strategy. |
Protect | PR.DS | PR.DS-1 | √ | √ | FA10 | Ensuring data-at-rest is protected. | |
Protect | PR.DS | PR.DS-2 | √ | √ | FA10 | Ensuring data-in-transit is protected. | |
Protect | PR.DS | PR.DS-3 | √ | √ | √ | FA10 | Ensuring assets are formally managed throughout removal, transfers, and disposition. |
Protect | PR.DS | PR.DS-4 | √ | FA10 | Adjusting capacity to ensure availability is maintained. | ||
Protect | PR.DS | PR.DS-5 | √ | FA10 | Ensuring protections against data leaks are implemented. | ||
Protect | PR.DS | PR.DS-6 | √ | √ | FA10 | Ensuring integrity checking mechanisms are used to verify software, firmware, and information integrity. | |
Protect | PR.DS | PR.DS-7 | √ | √ | FA10 | Ensuring the development and testing environment(s) are separate from the production environment. | |
Protect | PR.DS | PR.DS-8 | √ | FA10 | Ensuring integrity checking mechanisms are used to verify hardware integrity. | ||
Protect | PR.IP | 9D-3 | √ | √ | FA2 | Enhancing the difficulty of accessing the protected information beyond the attacker’s skills. | |
Protect | PR.IP | 9D-5 | √ | √ | FA2 | Investigating the threat in depth in order to prevent access to protected information using a multi-layered approach. | |
Protect | PR.IP | 9D-8 | √ | √ | FA2 | Implementing measures to divert attackers in order to protect the information. | |
Protect | PR.IP | 9D-9 | √ | √ | √ | FA2 | Implementing measures in depth that become increasingly challenging and less visible as they approach the asset. |
Protect | PR.IP | CSC-11.1 | √ | √ | √ | FA10 | Establishing and maintaining a process for data recovery. |
Protect | PR.IP | CSC-16.1 | √ | √ | FA8 | Establishing and maintaining a secure application development process. | |
Protect | PR.IP | CSC-16.14 | √ | FA4 | Undertaking comprehensive threat modelling. | ||
Protect | PR.IP | CSC-18.4 | √ | FA7 | Validating the security measures deployed to protect information following each penetration test. | ||
Protect | PR.IP | CSC-2.5 | √ | √ | FA5 | Creating an allow list of authorized software in order to protect information. | |
Protect | PR.IP | CSC-2.6 | √ | √ | FA5 | Creating an allow list of authorized libraries in order to protect information. | |
Protect | PR.IP | CSC-2.7 | √ | FA5 | Creating an allow list of authorized scripts in order to protect information. | ||
Protect | PR.IP | CSC-4.3 | √ | √ | √ | FA10 | Configuring automatic session locking on enterprise assets to protect the information. |
Protect | PR.IP | PR.IP-1 | √ | √ | √ | FA5 | Ensuring a baseline configuration of information technology/industrial control systems is created and maintained incorporating security principles. |
Protect | PR.IP | PR.IP-10 | √ | √ | FA5 | Ensuring response and recovery plans are tested. | |
Protect | PR.IP | PR.IP-11 | √ | √ | √ | FA11 | Incorporating cybersecurity into human resources practices for information handling. |
Protect | PR.IP | PR.IP-12 | √ | √ | FA7 | Developing and implementing a vulnerability management plan. | |
Protect | PR.IP | PR.IP-2 | √ | √ | FA10 | Implementing a system development life cycle to manage systems. | |
Protect | PR.IP | PR.IP-3 | √ | FA5 | Designing a configuration change control process. | ||
Protect | PR.IP | PR.IP-4 | √ | √ | √ | FA10 | Ensuring backups of information are conducted, maintained, and tested. |
Protect | PR.IP | PR.IP-5 | √ | FA5 | Ensuring policy and regulations regarding the physical operating environment for organizational assets are met. | ||
Protect | PR.IP | PR.IP-6 | √ | √ | √ | FA10 | Ensuring data is destroyed according to policy. |
Protect | PR.IP | PR.IP-7 | √ | √ | FA5 | Ensuring protection processes are improved. | |
Protect | PR.IP | PR.IP-8 | √ | FA2 | Ensuring effectiveness of protection technologies is shared. | ||
Protect | PR.IP | PR.IP-9 | √ | √ | √ | FA5 | Ensuring response plans and recovery plans are in place and managed. |
Protect | PR.MA | 9D-5 | √ | √ | FA2 | Conducting maintenance activities on all layers of the asset. | |
Protect | PR.MA | 9D-9 | √ | √ | FA2 | Carrying out maintenance tasks to ensure depth of defense. | |
Protect | PR.MA | CSC-12.1 | √ | √ | √ | FA10 | Carrying out maintenance to ensure the network infrastructure is up to date. |
Protect | PR.MA | CSC-12.3 | √ | √ | FA10 | Managing the network infrastructure with a security-oriented approach. | |
Protect | PR.MA | CSC-13.5 | √ | √ | FA10 | Carrying out maintenance actions to ensure assets remotely connecting to enterprise resources comply with the organization’s requirements. | |
Protect | PR.MA | CSC-16.13 | √ | FA2 | Performing root cause analysis on security vulnerabilities. | ||
Protect | PR.MA | CSC-18.3 | √ | √ | FA10 | Remediating penetration test findings. | |
Protect | PR.MA | CSC-4.2 | √ | √ | √ | FA5 | Carrying out tasks to securely configure the network infrastructure in accordance with established processes. |
Protect | PR.MA | CSC-4.6 | √ | √ | √ | FA10 | Carrying out security maintenance tasks on enterprise assets and software. |
Protect | PR.MA | CSC-4.8 | √ | √ | FA10 | Uninstalling or disabling unnecessary services on enterprise assets and software. | |
Protect | PR.MA | CSC-4.9 | √ | √ | FA10 | Configuring trusted DNS servers on enterprise assets. | |
Protect | PR.MA | CSC-7.3 | √ | √ | √ | FA10 | Performing automated operating system patch management. |
Protect | PR.MA | CSC-8.1 | √ | √ | √ | FA5 | Establishing and maintaining an audit log management process. |
Protect | PR.MA | CSC-8.10 | √ | √ | FA10 | Retaining audit logs. | |
Protect | PR.MA | CSC-8.3 | √ | √ | √ | FA10 | Ensuring adequate audit log storage. |
Protect | PR.MA | CSC-8.9 | √ | √ | FA10 | Centralizing audit log collection and retention. | |
Protect | PR.MA | PR.MA-1 | √ | FA10 | Ensuring maintenance and repair of organizational assets are performed and logged, with approved and controlled tools. | ||
Protect | PR.PT | 9D-4 | √ | √ | FA2 | Implementing differentiated protections to address each threat specifically. | |
Protect | PR.PT | 9D-7 | √ | FA2 | Employing decoys to distract attackers. | ||
Protect | PR.PT | CSC-4.12 | √ | FA10 | Separating enterprise workspaces on mobile end-user devices | ||
Protect | PR.PT | CSC-4.4 | √ | √ | √ | FA10 | Implementing and managing a firewall on servers |
Protect | PR.PT | CSC-4.5 | √ | √ | √ | FA10 | Implementing and managing a firewall on end-user devices |
Protect | PR.PT | CSC-9.5 | √ | √ | FA10 | Implementing DMARC. | |
Protect | PR.PT | PR.PT-1 | √ | √ | √ | FA10 | Ensuring audit/log records are determined, documented, implemented, and reviewed in accordance with policy. |
Protect | PR.PT | PR.PT-2 | √ | √ | √ | FA10 | Ensuring removable media is protected and its use restricted according to policy. |
Protect | PR.PT | PR.PT-3 | √ | FA10 | Ensuring the principle of least functionality is incorporated by configuring systems to provide only essential capabilities. | ||
Protect | PR.PT | PR.PT-4 | √ | FA10 | Ensuring communications and control networks are protected. | ||
Protect | PR.PT | PR.PT-5 | √ | √ | √ | FA10 | Ensuring mechanisms are implemented to achieve resilience requirements in normal and adverse situations. |
Detect | DA.AE | CSC-8.12 | √ | FA10 | Collecting service provider logs to detect anomalies. | ||
Detect | DA.AE | DE.AE-1 | √ | √ | FA10 | Establishing and maintaining a baseline of operations and expected data flows for users and systems. | |
Detect | DA.AE | DE.AE-2 | √ | √ | FA2 | Analyzing detected events to understand attack targets and methods. | |
Detect | DA.AE | DE.AE-3 | √ | √ | √ | FA2 | Collecting and correlating event data correlated from multiple sources and sensors. |
Detect | DA.AE | DE.AE-4 | √ | FA2 | Determining impact of events. | ||
Detect | DA.AE | DE.AE-5 | √ | FA2 | Establishing incident alert thresholds. | ||
Detect | DE.CM | CSC-13.1 | √ | √ | FA2 | Centralizing security event alerting | |
Detect | DE.CM | CSC-13.5 | √ | √ | FA10 | Monitoring access control for assets remotely connecting to enterprise resources. | |
Detect | DE.CM | CSC-3.14 | √ | FA10 | Logging access to sensitive data. | ||
Detect | DE.CM | DE.CM-1 | √ | √ | FA2 | Ensuring the network is monitored to detect potential cybersecurity events. | |
Detect | DE.CM | DE.CM-2 | √ | FA1 | Ensuring the physical environment is monitored to detect potential cybersecurity events. | ||
Detect | DE.CM | DE.CM-3 | √ | FA10 | Ensuring personnel activity is monitored to detect potential cybersecurity events. | ||
Detect | DE.CM | DE.CM-4 | √ | √ | √ | FA2 | Detecting malicious code. |
Detect | DE.CM | DE.CM-5 | √ | FA2 | Detecting unauthorized mobile code. | ||
Detect | DE.CM | DE.CM-6 | √ | FA2 | Monitoring external service provider activity to detect potential cybersecurity events. | ||
Detect | DE.CM | DE.CM-7 | √ | √ | √ | FA2 | Monitoring for unauthorized personnel, connections, devices, and software. |
Detect | DE.CM | DE.CM-8 | √ | √ | FA7 | Conducting periodic vulnerability scans | |
Detect | DE.DP | CSC-17.1 | √ | √ | √ | FA5 | Designating personnel, including key and backup, to manage incident handling. |
Detect | DE.DP | CSC-17.4 | √ | √ | FA5 | Testing the incident response process to ensure it includes awareness of anomalous events. | |
Detect | DE.DP | CSC-17.5 | √ | √ | FA5 | Assigning key cross-functional roles and responsibilities in relation to incident response. | |
Detect | DE.DP | DE.DP-2 | √ | FA2 | Ensuring detection activities comply with all applicable requirements. | ||
Detect | DE.DP | DE.DP-3 | √ | FA10 | Testing detection processes. | ||
Detect | DE.DP | DE.DP-5 | √ | FA5 | Continuously improving detection processes. | ||
Respond | RS.AN | CSC-17.9 | √ | FA5 | Establishing and maintaining security incident thresholds to ensure effective response. | ||
Respond | RS.AN | RS.AN-1 | √ | √ | FA2 | Ensuring notifications from detection systems are investigated. | |
Respond | RS.AN | RS.AN-2 | √ | FA2 | Ensuring the impact of the incident is understood. | ||
Respond | RS.AN | RS.AN-3 | √ | FA2 | Ensuring forensics are performed. | ||
Respond | RS.AN | RS.AN-5 | √ | √ | FA5 | Ensuring processes are established to receive, analyze, and respond to vulnerabilities disclosed to the organization from internal and external sources. | |
Respond | RS.CO | CSC-17.4 | √ | √ | √ | FA5 | Communicating the incident response process. |
Respond | RS.CO | CSC-17.5 | √ | √ | FA5 | Communicating key cross-functional roles and responsibilities in relation to incident response. | |
Respond | RS.CO | RS.CO-5 | √ | FA4 | Ensuring voluntary information sharing occurs with external stakeholders to achieve broader cybersecurity situational awareness. | ||
Respond | RS.IM | RS.IM-1 | √ | √ | FA5 | Ensuring response plans incorporate lessons learned. | |
Respond | RS.IM | RS.IM-2 | √ | √ | FA5 | Response strategies are updated. | |
Respond | RS.MI | CSC-1.2 | √ | √ | √ | FA10 | Ensuring that a process is in place to address unauthorized assets. |
Respond | RS.MI | CSC-4.10 | √ | √ | FA10 | Enforcing remote wipe capability on portable end-user devices | |
Respond | RS.MI | CSC-7.7 | √ | √ | FA10 | Remediating detected vulnerabilities and weakness. | |
Respond | RS.MI | RS.MI-1 | √ | FA2 | Containing incidents. | ||
Respond | RS.MI | RS.MI-2 | √ | FA2 | Mitigating incidents. | ||
Respond | RS.MI | RS.MI-3 | √ | FA2 | Mitigating newly identified vulnerabilities or documenting them as accepted risks. | ||
Respond | RS.RP | CSC-17.6 | √ | √ | FA5 | Defining mechanisms for communicating during incident response. | |
Respond | RS.RP | RS.RP-1 | √ | FA2 | Ensuring a response plan is executed during or after an incident. | ||
Recover | RC.CO | RC.CO-1 | √ | FA12 | Managing public relations. | ||
Recover | RC.CO | RC.CO-2 | √ | FA12 | Repairing the reputation after an incident. | ||
Recover | RC.CO | RC.CO-3 | √ | FA12 | Communicating recovery activities to internal and external stakeholders as well as executive and management teams. | ||
Recover | RC.IM | RC.IM-1 | √ | FA5 | Ensuring recovery plans incorporate lessons learned. | ||
Recover | RC.IM | RC.IM-2 | √ | FA5 | Ensuring recovery strategies are updated. | ||
Recover | RC.RP | RC.RP-1 | √ | FA2 | Ensuring a recovery plan is executed during or after a cybersecurity incident. |
References
- Domínguez-Dorado, M.; Carmona-Murillo, J.; Cortés-Polo, D.; Rodríguez-Pérez, F.J. CyberTOMP: A Novel Systematic Framework to Manage Asset-Focused Cybersecurity From Tactical and Operational Levels. IEEE Access 2022, 10, 122454–122485. [Google Scholar] [CrossRef]
- von Solms, R.; van Niekerk, J. From information security to cyber security. Comput. Secur. 2013, 38, 97–102. [Google Scholar] [CrossRef]
- Reid, R.; van Niekerk, J. From information security to cyber security cultures. In Proceedings of the Information Security for South Africa, Johannesburg, South Africa, 13–14 August 2014. [Google Scholar]
- Furnell, S. The cybersecurity workforce and skills. Comput. Secur. 2012, 100, 102080. [Google Scholar] [CrossRef]
- De Zan, T. Mitigating the Cyber Security Skills Shortage: The Influence of National Skills Competitions on Cyber Security Interest. Ph.D. Thesis, Department of Education and Centre for Doctoral Training in Cyber Security, Linacre College, University of Oxford, Oxford, UK, 2021. [Google Scholar]
- Reeder, F.; Alan, P. What Works in Finding Elite Cybersecurity Talent: Promising Practices for Chief Information Officers; CIO.org: Newport, UK, 2021. [Google Scholar]
- DeCrosta, J. Bridging the Gap: An Exploration of the Quantitative and Qualitative Factors Influencing the Cybersecurity Workforce Shortage. Ph.D. Thesis, Utica College, Utica, NY, USA, 2021. [Google Scholar]
- Shava, E.; Hofisi, C. Challenges and Opportunities for Public Administration in the Fourth Industrial Revolution. Afr. J. Public Aff. 2017, 9, 203–215. [Google Scholar]
- Ngwenyama, O.; Henriksen, H.Z.; Hardt, D. Public management challenges in the digital risk society: A Critical Analysis of the Public Debate on Implementation of the Danish NemID. Eur. J. Inf. Syst. 2023, 32, 108–126. [Google Scholar] [CrossRef]
- Nizich, M. Preparing the Cybersecurity Workforce of Tomorrow. In The Cybersecurity Workforce of Tomorrow (The Future of Work); Emerald Group Publishing Limited: Bingley, UK, 2023; pp. 117–146. [Google Scholar]
- Lee, G.R.; Lee, S.; Malatesta, D.; Fernández, S. Outsourcing and Organizational Performance: The Employee Perspective. Am. Rev. Public Adm. 2019, 49, 973–986. [Google Scholar] [CrossRef]
- Onwubiko, C.; Ouazzane, K. Challenges towards Building an effective Cyber Security Operations Centre. Int. J. Cyber Situational Aware. 2019, 4, 11–39. [Google Scholar] [CrossRef]
- Schatz, D.; Bashroush, R.; Wall, J. Towards a More Representative Defifinition of Cyber Security. J. Digit. Forensics Secur. Law 2017, 12, 53–74. [Google Scholar]
- Ghelani, D. Cyber Security, Cyber Threats, Implications and Future. Am. J. Sci. Eng. Technol. 2022, 3, 12–19. [Google Scholar]
- Sulistyowati, D.; Handayani, F.; Suryanto, Y. Comparative Analysis and Design of Cybersecurity Maturity Assessment Methodology Using NIST CSF, COBIT, ISO/IEC 27002 and PCI DSS. Int. J. Inform. Vis. 2020, 4, 225–230. [Google Scholar] [CrossRef]
- Srinivas, J.; Das, A.K.; Kumar, N. Government regulations in cyber security: Framework, standards and recommendations. Future Gener. Comput. Syst. 2019, 92, 178–188. [Google Scholar] [CrossRef]
- Soomro, Z.A.; Shah, M.H.; Ahmed, J. Information security management needs more holistic approach: A literature review. Int. J. Inf. Manag. 2016, 36, 215–225. [Google Scholar] [CrossRef]
- Atoum, I.; Otoom, A.; Ali, A.A. A holistic cyber security implementation framework. Inf. Manag. Comput. Secur. 2014, 22, 251–264. [Google Scholar] [CrossRef]
- van Kranenburg, R.; Le Gars, G. The Cybersecurity Aspects of New Entities Need a Cybernetic, Holistic Perspective. Int. J. Cyber Forensic Adv. Threat Investig. 2021, 1, 2. [Google Scholar] [CrossRef]
- Del-Real, C.; Díaz-Fernández, A.M. Understanding the plural landscape of cybersecurity governance in Spain: A matter of capital exchange. Int. Cybersecur. Law Rev. 2022, 3, 313–343. [Google Scholar] [CrossRef]
- Oruj, Z. Cyber security: Contemporary cyber threats and national strategies. Distance Educ. Ukr. Innov. Norm.-Leg. Pedagog. Asp. 2023, 1, 100–116. [Google Scholar]
- Sharikov, P. Contemporary Cybersecurity Challenges. In The Implications of Emerging Technologies in the Euro-Atlantic Space; Palgrave Macmillan: Cham, Switzerland; Basel, Switzerland, 2023; pp. 143–157. [Google Scholar]
- Cavelty, M.D.; Smeets, M. Regulatory cybersecurity governance in the making: The formation of ENISA and its struggle for epistemic authority. J. Eur. Public Policy 2023, 30, 1330–1352. [Google Scholar] [CrossRef]
- Kosseff, J. Upgrading Cybersecurity Law. Houst. Law Rev. Forthcom. 2023, 1–33. [Google Scholar] [CrossRef]
- Creemers, R. The Chinese Conception of Cybersecurity: A Conceptual, Institutional and Regulatory Genealogy. J. Contemp. China 2023, 1–16. [Google Scholar] [CrossRef]
- Mijwil, M.M.; Filali, Y.; Aljanabi, M.; Bounabi, M.; Al-Shahwani, H. The Purpose of Cybersecurity Governance in the Digital Transformation of Public Services and Protecting the Digital Environment. Mesopotamian J. Cybersecur. 2023, 2023, 1–6. [Google Scholar]
- Abazi, B. Establishing the National Cybersecurity (Resilience) Ecosystem. IFAC-PapersOnLine 2022, 55, 42–47. [Google Scholar] [CrossRef]
- ENISA. ENISA Threat Landscape 2022; European Union Agency for Cybersecurity: Heraclión, Greece, 2022.
- Hinkley, S. Technology in the Public Sector and the Future of Government Work; UC Berkeley Labor Center: Berkeley, CA, USA, 2022. [Google Scholar]
- Norris, D.F.; Mateczun, L.K.; Forno, R.F. What the Literature Says About Local Government Cybersecurity. In Cybersecurity and Local Government; Wiley Data and Cybersecurity: Hoboken, NJ, USA, 2022; pp. 47–66. [Google Scholar]
- CCN-CERT. Ciberamenazas y Tendencias: Eidición 2022; Centro Criptológico Nacional: Madrid, Spain, 2022. [Google Scholar]
- Farrand, B.; Carrapico, H. Digital sovereignty and taking back control: From regulatory capitalism to regulatory mercantilism in EU cybersecurity. Eur. Sefcurity 2022, 31, 435–453. [Google Scholar] [CrossRef]
- Al Mehairi, A.; Zgheib, R.; Abdellatif, T.M.; Conchon, E. Cyber Security Strategies While Safeguarding Information Systems in Public/Private Sectors. In Electronic Governance with Emerging Technologies, Proceedings of the EGETC 2022, Tampico, Mexico, 12–14 September 2022; Communications in Computer and Information Science; Springer: Cham, Switzerland, 2022; pp. 49–63. [Google Scholar]
- Blondin, D.; Boin, A. Cooperation in the Face of Transboundary Crisis: A Framework for Analysis. Perspect. Public Manag. Gov. 2020, 3, 197–209. [Google Scholar] [CrossRef]
- Domínguez-Dorado, M.; Cortés-Polo, D.; Carmona-Murillo, J.; Rodríguez-Pérez, F.J.; Galeano-Brajones, J. Fast, Lightweight, and Efficient Cybersecurity Optimization for Tactical–Operational Management. Appl. Sci. 2023, 13, 6327. [Google Scholar] [CrossRef]
- Quinn, S.; Ivy, N.; Barrett, M.; Feldman, L.; Topper, D.; Witte, G.; Gardner, R.K. Using Business Impact Analysis to Inform Risk Prioritization and Response; NIST Interagency Report NIST IR 8286D; NIST: Gaithersburg, MD, USA, 2022. [Google Scholar]
- Ozkan, B.Y.; van Lingen, S.; Spruit, M. The Cybersecurity Focus Area Maturity (CYSFAM) Model. J. Cybersecur. Priv. 2021, 1, 119–139. [Google Scholar] [CrossRef]
- Rajan, R.; Rana, N.P.; Parameswar, N.; Dhir, S.; Sushil; Dwivedi, Y.K.K. Developing a modified total interpretive structural model (M-TISM) for organizational strategic cybersecurity management. Technol. Forecast. Soc. Change 2021, 170, 120872. [Google Scholar] [CrossRef]
- Axon, L.; Erola, A.; van Rensburg, A.J.; Nurse, J.R.C.; Goldsmith, M.; Creese, S. Practitioners’ Views on Cybersecurity Control Adoption and Effectiveness. In Proceedings of the ARES 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, 17–20 August 2021; ACM ICPS. ACM: New York, NY, USA, 2021; pp. 1–10. [Google Scholar]
- Antunes, M.; Maximiano, M.; Gomes, R.; Pinto, D. Information Security and Cybersecurity Management: A Case Study with SMEs in Portugal. J. Cybersecur. Priv. 2021, 1, 219–238. [Google Scholar] [CrossRef]
- Preis, B.; Susskind, L. Municipal Cybersecurity: More Work Needs to be Done. Urban Aff. Rev. 2020, 58, 614–629. [Google Scholar] [CrossRef]
- Clark, M.; Espinosa, J.; Delone, W. Defending Organizational Assets: A Preliminary Framework for Cybersecurity Success and Knowledge Alignment. In Proceedings of the 53rd Hawaii International Conference on System Sciences, Maui, HI, USA, 7–10 January 2020; pp. 4283–4292. [Google Scholar]
- Phillips, R.; Tanner, B. Breaking down silos between business continuity and cyber security. J. Bus. Contin. Emerg. Plan. 2019, 12, 224–232. [Google Scholar]
- Kure, H.I.; Islam, S. Assets focus risk management framework for critical infrastructure cybersecurity risk management. IET Cyber-Phys. Syst. Theory Appl. 2019, 4, 332–340. [Google Scholar] [CrossRef]
- Rothrock, R.A.; Kaplan, J.; Van Der Oord, F. The Board’s Role in Managing Cybersecurity Risks. MIT Sloan Manag. Rev. 2018, 59, 12–15. [Google Scholar]
- Limba, T.; Plėta, T.; Agafonov, K.; Damkus, M. Cyber security management model for critical infrastructure. Entrep. Sustain. Issues 2017, 4, 559–573. [Google Scholar] [CrossRef]
- Breier, J.; Hudec, L. On Selecting Critical Security Controls. In Proceedings of the 2013 International Conference on Availability, Reliability and Security, Regensburg, Germany, 2–6 September 2013; IEEE: New York, NY, USA, 2013; pp. 1–7. [Google Scholar]
- Almoughem, K.A.B.M. The Future of Cybersecurity Workforce Development. Acad. J. Res. Sci. Publ. 2023, 4, 37–48. [Google Scholar] [CrossRef]
- Shah, A.; Ganesan, R.; Jajodia, S.; Cam, H.; Hutchinson, S. A Novel Team Formation Framework based on Performance in a Cybersecurity Operations Center. IEEE Trans. Serv. Comput. Early Access 2023, 16, 2359–2371. [Google Scholar] [CrossRef]
- Adetoye, B.; Fong, R.C.-W. Building a Resilient Cybersecurity Workforce: A Multidisciplinary Solution to the Problem of High Turnover of Cybersecurity Analysts. In Cybersecurity in the Age of Smart Societies; Springer: Cham, Switzerland, 2023; pp. 61–87. [Google Scholar]
- Balon, T.; Baggili, I. Cybercompetitions: A survey of competitions, tools, and systems to support cybersecurity education. Educ. Inf. Technol. 2023, 28, 11759–11791. [Google Scholar] [CrossRef]
- Nadua, F.-D.-L.; Escandor, L.; Bangayan, M.; Vigonte, F.; Abante, M.V. Identifying Incentives to Address Attrition in the Government Cybersecurity Workforce. 2023; pp. 1–21. Available online: https://ssrn.com/abstract=4382110 (accessed on 16 October 2023).
- Fisk, N.; Kelly, N.M.; Liebrock, L. Cybersecurity Communities of Practice: Strategies for Creating Gateways to Participation. Comput. Secur. 2023, 132, 103188. [Google Scholar] [CrossRef]
- Ashley, T.D.; Kwon, R.; Gourisetti, S.N.G.; Katsis, C.; Bonebrake, C.A.; Boyd, P.A. Gamification of Cybersecurity for Workforce Development in Critical Infrastructure. IEEE Access 2022, 10, 112487–112501. [Google Scholar] [CrossRef]
- Justice, C.; Sample, C.; Loo, S.M.; Ball, A.; Hampton, C. Future Needs of the Cybersecurity Workforce. In Proceedings of the 17th International Conference on Cyber Warfare and Security, Albany, NY, USA, 17–18 March 2022; Academic Conferences International Limited: South Oxfordshire, UK, 2022; Volume 17, pp. 81–91. [Google Scholar]
- Ahmad, N.; Laplante, P.A.; DeFranco, J.F.; Kassab, M. A Cybersecurity Educated Community. IEEE Trans. Emerg. Top. Comput. 2022, 10, 1456–1463. [Google Scholar] [CrossRef]
- Chowdhury, N.; Gkioulos, V. Cyber security training for critical infrastructure protection: A literature review. Comput. Sci. Rev. 2021, 40, 100361. [Google Scholar] [CrossRef]
- Noche, E.B. A Literature Review of Empirical Studies on Cyber Security Workforce Development. Asian J. Multidiscip. Stud. 2021, 4, 65–73. [Google Scholar]
- Hulatt, D.; Stavrou, E. The Development of a Multidisciplinary CybersecurityWorkforce: An Investigation. In Human Aspects of Information Security and Assurance, Proceedings of the 15th IFIP WG 11.12 International Symposium, HAISA 2021; Virtual, 7–9 July 2021, Springer: Cham, Switzerland, 2021; pp. 138–147. [Google Scholar]
- Kävrestad, J.; Nohlberg, M. Evaluation Strategies for Cybersecurity Training Methods: A Literature Review. In Human Aspects of Information Security and Assurance, Proceedings of the 15th IFIP WG 11.12 International Symposium, HAISA 2021; Virtual, 7–9 July 2021, Springer: Cham, Switzerland, 2021; pp. 102–112. [Google Scholar]
- Maurer, C.; Summer, M.; Mazzola, D.; Pearlson, K.; Jacks, T. The Cybersecurity Skills Survey: Response to the 2020 SIM IT Trends Study. In Proceedings of the SIGMIS-CPR’21: 2021 on Computers and People Research Conference, Virtual, 30 June 2021; ACM: Hamburg, Germany, 2021; pp. 35–37. [Google Scholar]
- Ahmad, K.C.A.; Desouza, S.B.; Manyard, H.N.; Baskerville, R.L. How integration of cyber security management and incident response enables organizational learning. J. Assoc. Inf. Sci. Technol. 2020, 71, 939–953. [Google Scholar] [CrossRef]
- McNulty, M.; Kettani, H. On Cybersecurity Education for Non-technical Learners. In Proceedings of the 2020 3rd International Conference on Information and Computer Technologies (ICICT), San Jose, CA, USA, 9–12 March 2020; IEEE: New York, NY, USA, 2020; pp. 413–416. [Google Scholar]
- Dahlström, C.; Nistotskaya, M.; Tyrberg, M. Outsourcing, bureaucratic personnel quality and citizen satisfaction with public services. Public Adm. 2018, 96, 218–233. [Google Scholar] [CrossRef]
- Affan, Y.; Lin, L.; Rubia, F.; Wang, J. Improving software security awareness using a serious game. IET Softw. Spec. Issue Gamification Persuas. Games Softw. 2019, 13, 159–169. [Google Scholar]
- Rubia, F.; Affan, Y.; Lin, L.; Wang, J. Strategies for counteracting social engineering attacks. Comput. Fraud. Secur. 2022, 2022, 15–19. [Google Scholar] [CrossRef]
- Aragão, J.P.S.; Fontana, M.E. Guidelines for public sector managers on assessing the impact of outsourcing on business continuity strategies: A Brazilian case. J. Glob. Oper. Strateg. Sourc. 2023, 16, 118–141. [Google Scholar] [CrossRef]
- Gowun, P.; Brunjes, B.M. Engaging Citizens in Government Contracting: A Theoretical Approach for the Role of Social Service Nonprofits. Perspect. Public Manag. Gov. 2022, 5, 317–329. [Google Scholar]
- Heikkilä, J.; Cordon, C. Outsourcing: A core or non-core strategic management decision? Brief. Entrep. Financ. 2022, 11, 183–193. [Google Scholar] [CrossRef]
- Pavelko, O.; Lazaryshyna, I.; Dukhnovska, L.; Sharova, S.; Oliinyk, T.; Donenko, I. Construction Development and Its Impact on the Construction Enterprises Financial Results. Stud. Appl. Econ. 2021, 39, 1–11. [Google Scholar] [CrossRef]
- Aragão, J.P.S.; Fontana, M.E. Outsourcing Strategies in Public Services under Budgetary Constraints: Analysing Perceptions of Public Managers. Public Organ. Rev. 2021, 22, 61–77. [Google Scholar] [CrossRef]
- Latif, M.N.A.; Aziz, N.A.A.; Hussin, N.S.N.; Aziz, Z.A. Cyber security in supply chain management: A systematic review. LogForum 2021, 17, 49–57. [Google Scholar] [CrossRef]
- Repetto, M.; Carrega, A.; Rapuzzi, R. An architecture to manage security operations for digital service chains. Future Gener. Comput. Syst. 2021, 115, 251–266. [Google Scholar] [CrossRef]
- Marco-Simó, J.M.; Pastor-Collado, J.A. IT Outsourcing in the Public Sector: A Descriptive Framework from a Literature Review. J. Glob. Inf. Technol. Manag. 2020, 23, 25–52. [Google Scholar] [CrossRef]
- van der Wal, Z. Being a Public Manager in Times of Crisis: The Art of Managing Stakeholders, Political Masters, and Collaborative Networks. Public Adm. Rev. 2020, 80, 759–764. [Google Scholar] [CrossRef] [PubMed]
- Rizwan, H.; Bhatti, S.N. Impacts of Outsourcing on Quality: A Case Study of an Electronics Sector. Bahria Univ. J. Manag. Technol. 2020, 2, 16–23. [Google Scholar]
- Bogoviz, A.V.; Berezhnoi, A.V.; Mezhov, I.S.S.; Titova, O.V.; Kryukova, O.G. Decision Making in Modern Business Systems by the Principles of Outsourcing. In Specifics of Decision Making in Modern Business Systems; Emerald Publishing Limited: Leeds, UK, 2019; pp. 141–148. [Google Scholar]
- Bloomfield, K.; Williams, T.; Bovis, C.; Merali, Y. Systemic risk in major public contracts. Int. J. Forecast. 2019, 35, 667–676. [Google Scholar] [CrossRef]
- Proscovia, S. The impact of new public management through outsourcing on the management of government information: The case of Sweden. Rec. Manag. J. 2019, 29, 134–151. [Google Scholar]
- Andersson, F.; Jordahl, H.; Josephson, J. Outsourcing Public Services: Contractibility, Cost, and Quality. CESifo Econ. Stud. 2019, 65, 349–372. [Google Scholar] [CrossRef]
- Soliño, A.S. Sustainability of Public Services: Is Outsourcing the Answer? Sustainability 2019, 11, 7231. [Google Scholar] [CrossRef]
- Lobao, L.; Gray, M.; Cox, K.; Kitson, M. The shrinking state? Understanding the assault on the public sector. Camb. J. Reg. Econ. Soc. 2018, 11, 389–408. [Google Scholar] [CrossRef]
- Aswini, K. Advantages and Disadvantages of Outsourcing. Shanlax Int. J. Commer. 2018, 6, 7–9. [Google Scholar]
- Pupion, P.-C. Research on Public Strategic Management requiring a new theoretical framework. Gest. Manag. Public 2018, 6, 6–13. [Google Scholar]
- Kekez, A.; Howlett, M.; Ramesh, M. Varieties of collaboration in public service delivery. Policy Des. Pract. 2018, 1, 243–252. [Google Scholar] [CrossRef]
- Johansson, T.; Siverbo, S. The relationship between supplier control and competition in public sector outsourcing. Financ. Account. Manag. Gov. Public Serv. Charities 2018, 34, 268–287. [Google Scholar] [CrossRef]
- Burnes, B.; Anastasiadis, A. Outsourcing: A public-private sector comparison. Supply Chain Manag. Int. J. 2016, 8, 355–366. [Google Scholar] [CrossRef]
- Tayauova, G. Advantages and disadvantages of outsourcing: Analysis of outsourcing practices of Kazakhstan banks. Procedia-Soc. Behav. Sci. 2012, 41, 188–195. [Google Scholar] [CrossRef]
- Schmid, A.U.; Knudsen, S.; Niehoff, T.; Schwietz, K. Planning Distributed Security Operations Centers in Multi-Cloud Landscapes A Systematic Approach, Generalized from A Case Study. Res. Sq. 2023, 1–18. [Google Scholar] [CrossRef]
- Saraiva, M.; Mateus-Coelho, N. CyberSoc Framework a Systematic Review of the State-of-Art. Procedia Comput. Sci. 2022, 204, 961–972. [Google Scholar] [CrossRef]
- Shutock, M.; Dietrich, G. Security Operations Centers: A Holistic View on Problems and Solutions. In Proceedings of the 55th Hawaii International Conference on System Sciences, Virtual, 4–7 January 2022. [Google Scholar]
- Georgiadou, A.; Mouzakitis, S.; Bounas, K.; Askounis, D. A Cyber-Security Culture Framework for Assessing Organization Readiness. J. Comput. Inf. Syst. 2022, 62, 452–462. [Google Scholar] [CrossRef]
- Dun, Y.T.; Razak, M.F.A.; Zolkiplib, M.F.; Bee, T.F.; Firdaus, A. Grasp on next generation security operation centre (NGSOC): Comparative study. Int. J. Nonlinear Anal. Appl. 2022, 12, 869–895. [Google Scholar]
- Nugraha, I. A Review on the Role of Modern SOC in Cybersecurity Operations. Int. J. Curr. Sci. Res. Rev. 2021, 4, 408–414. [Google Scholar] [CrossRef]
- Kokulu, F.B.; Soneji, A.; Bao, T.; Shoshitaishvili, Y.; Zhao, Z.; Doupé, A.; Ahn, G. Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues. In Proceedings of the CCS ’19: 2019 ACM SIGSAC Conference on Computer and Communications Security, London, UK, 11–15 November 2019; ACM: New York, NY, USA, 2019; pp. 1955–1970. [Google Scholar]
- Benzaghta, M.A.; Elwalda, A.; Mousa, M.M.; Erkan, I.; Rahman, M. SWOT analysis applications: An integrative literature review. J. Glob. Bus. Insights 2021, 6, 55–73. [Google Scholar] [CrossRef]
- Pasaribu, R.D.; Shalsabila, D.; Djatmiko, T. Revamping business strategy using Business Model Canvas (BMC), SWOT analysis, and TOWS matrix. Herit. Sustain. Dev. 2023, 5, 1–18. [Google Scholar] [CrossRef]
- Hattangadi, V. SWOT & TOWS are Effective Tools for Strategic Formulation. Eur. Econ. Lett. 2023, 13, 977–981. [Google Scholar]
- Wilson, K.S.; Kiy, M.A. Some Fundamental Cybersecurity Concepts. IEEE Access 2014, 2, 116–124. [Google Scholar] [CrossRef]
- CIS. CIS Critical Controls (R); Center for Internet Security: New York, NY, USA, 2021. [Google Scholar]
- NIST. Framework for Improving Critical Infrastructure Cybersecurity v1.1; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2018.
- NIST. Security and Privacy Controls for Information Systems and Organizations; SP 800-53 Rev. 5; NIST: Gaithersburg, MD, USA, 2020.
- Center for Internet Security. CIS Community Defense Model v2.0; Center for Internet Security: New York, NY, USA, 2021. [Google Scholar]
- Strom, B.E.; Applebaum, A.; Miller, D.P.; Nickels, K.C.; Pennington, A.G.; Thomas, C.B. MITRE ATT and CK(C): Design and Philosophy; Defense Technical Information Center: Fort Belvoir, VA, USA, 2018. [Google Scholar]
- Kwon, R.; Ashley, T.; Castleberry, J.; Mckenzie, P.; Gourisetti, S.N.G. Cyber Threat Dictionary Using MITRE ATT&CK Matrix and NIST Cybersecurity Framework Mapping. In Proceedings of the 2020 Resilience Week (RWS), Salt Lake City, UT, USA, 19–23 October 2020; IEEE: New York, NY, USA, 2020; pp. 106–112. [Google Scholar]
- Deng, S.; Guan, X.; Xu, J. The coopetition effect of learning-by-doing in outsourcing. Int. J. Prod. Res. 2021, 59, 516–541. [Google Scholar] [CrossRef]
- Hamburg, I. Interdisciplinary Training and Mentoring for Cyber Security in Companies. In Handbook of Research on Cyber Crime and Information Privacy; IGI Global: Hershey, PA, USA, 2021; pp. 356–371. [Google Scholar]
- Burrel, D.N. Assessing the value of executive leadership coaches for cybersecurity project managers. Int. J. Hum. Cap. Inf. Technol. Prof. 2019, 10, 20–32. [Google Scholar] [CrossRef]
- John, S.N.; Noma-Osaghae, E.; Oajide, F.; Okokpujie, K. Cybersecurity Education: The Skills Gap, Hurdle! In Innovations in Cybersecurity Education; Springer: Cham, Switzerland, 2020; pp. 361–376. [Google Scholar]
- Corradini, I. Training Methods. In Building a Cybersecurity Culture in Organizations; Studies in Systems, Decision and Control; Springer: Cham, Switzerland, 2020; Volume 284, pp. 115–133. [Google Scholar]
- Monzelo, P.; Nunes, S. The Role of the Chief Information Security Officer (CISO) in Organizations. In CAPSI 2019 Proceedings; CAPSI: Toronto, ON, Canada, 2019; pp. 1–14. [Google Scholar]
- Badhwar, R. See Something, Do Something! In The CISO’s Transformation; Springer: Cham, Switzerland, 2021; pp. 45–53. [Google Scholar]
Internal | Strengths | Weakness |
• Their personnel are highly skilled as managers; • Have much experience in outsourcing processes and can contract the required skilled service providers if needed; • Can provide long term stable employment; • They are not necessarily under the pressure of a profit goal but driven by the vocation of public utility. |
• Have difficulty to retain and develop the career of cybersecurity personnel; • Lack of personnel skilled in hands-on tasks; • Their teams are often composed by in-house and outsourced personnel; • They are silo-based organizations where cross-domain collaboration is difficult. | |
External | Opportunities | Threats |
• There is an increasing interest that public organizations enhance their cybersecurity capabilities; • Can partner with private sector organizations to leverage their expertise and technology to improve cybersecurity; • Those public organizations able to offer cyber-resilient services will be more valued; • More funding is available for public organization to modernize in terms of cybersecurity. |
• Private sector can attract potential employees more effectively; • Regulations hinder to contract the same service providers continuously; • The number of cyber criminals seeking to target public sector organizations is increasing; • Cyber threats are constantly evolving, and the public sector may struggle to keep up with the latest threats and technologies. This can lead to a reactive approach to cybersecurity rather than a proactive one. | |
Positive | Negative |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Domínguez-Dorado, M.; Rodríguez-Pérez, F.J.; Carmona-Murillo, J.; Cortés-Polo, D.; Calle-Cancho, J. Boosting Holistic Cybersecurity Awareness with Outsourced Wide-Scope CyberSOC: A Generalization from a Spanish Public Organization Study. Information 2023, 14, 586. https://doi.org/10.3390/info14110586
Domínguez-Dorado M, Rodríguez-Pérez FJ, Carmona-Murillo J, Cortés-Polo D, Calle-Cancho J. Boosting Holistic Cybersecurity Awareness with Outsourced Wide-Scope CyberSOC: A Generalization from a Spanish Public Organization Study. Information. 2023; 14(11):586. https://doi.org/10.3390/info14110586
Chicago/Turabian StyleDomínguez-Dorado, Manuel, Francisco J. Rodríguez-Pérez, Javier Carmona-Murillo, David Cortés-Polo, and Jesús Calle-Cancho. 2023. "Boosting Holistic Cybersecurity Awareness with Outsourced Wide-Scope CyberSOC: A Generalization from a Spanish Public Organization Study" Information 14, no. 11: 586. https://doi.org/10.3390/info14110586
APA StyleDomínguez-Dorado, M., Rodríguez-Pérez, F. J., Carmona-Murillo, J., Cortés-Polo, D., & Calle-Cancho, J. (2023). Boosting Holistic Cybersecurity Awareness with Outsourced Wide-Scope CyberSOC: A Generalization from a Spanish Public Organization Study. Information, 14(11), 586. https://doi.org/10.3390/info14110586