Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Compliance

Without Handcuffs: Creating A Culture of Compliance

Over the years, I have met with hundreds of security teams. One of the most common complaints, that comes up in meetings with companies of all sizes and across all industries, is that security teams feel helpless to enforce the policies they put in place. Multiple security officers have described it as feeling like “cops without handcuffs.” Upon flagging serious incidents of rogue IT staff and acceptable use violations, I’ve been met with shrugs instead of surprise.

Over the years, I have met with hundreds of security teams. One of the most common complaints, that comes up in meetings with companies of all sizes and across all industries, is that security teams feel helpless to enforce the policies they put in place. Multiple security officers have described it as feeling like “cops without handcuffs.” Upon flagging serious incidents of rogue IT staff and acceptable use violations, I’ve been met with shrugs instead of surprise.

Security policies exist for a reason, but unenforced they’re not valuable to anyone – updating them takes time and resources away from already strained teams and arbitrary rules don’t make employees happier or more productive. Given the challenges to enforcement, what role do these policies play in a security team’s toolkit? And what needs to change to make security teams able and willing to enforce policies?

Why Bother? 

Widely accepted as a best practice amongst cyber security professionals, internal security policies are a critical element of a strategic and proactive cyber security program. Employees not on the security or IT teams possess limited knowledge of the cyber security challenges facing corporations and the risks their actions may pose to the company. Educating employees about these risks and challenges is a fairly easy way for an organization to minimize its risk profile.

Policies don’t prevent mistakes. We can’t expect a document or quarterly security training to change everyone’s bad habits or prevent employees from ever falling for a phishing attack. However, by limiting what applications employees can use, laying out protocols for connecting to non-corporate Wi-Fi networks, and instructing employees on the potential risks of rogue USB devices, companies can reduce the number of employees involved in these behaviors, thereby reducing the risks created by these activities.

Complacency and Complexity

At this point, it seems many employees are complacent and don’t fear breaking policies, specifically because they aren’t enforced. As increasingly fewer people follow restrictions and regulations, it becomes too complicated or costly to enforce them. On the flip side, it’s possible that it could be security teams who are complacent when it comes to enforcement. A set of policies might be put in place to appease executives or board members, but an IT team not supportive of the initiative could have no actual intention of implementing them. 

Another possibility is that inconsistencies in enforcement create a situation where no enforcement seems like a better decision. Imagine a situation where one employee was written up for using a non-approved cloud storage platform, but he/she knows that numerous other employees are also using it and aren’t being punished. This would serve only to create resentment towards the security team and would do little to dissuade the employee from using non-approved software and services in the future.

Advertisement. Scroll to continue reading.

Finally, it could be the complexity of modern networks posing a challenge. Most employees have multiple corporate devices, Cloud and SaaS applications create more areas of the network that need monitoring, and BYOD further expands the attack surface. While not impossible, it may be too challenging and complex for security teams to enforce these policies on top of their other responsibilities and without affecting business productivity.

A Shared Responsibility Model 

One of the greatest successes of effective policies and effective security teams is that they make security a company-wide responsibility. Security teams need the ability to enforce policies when necessary, but they also can’t spend all their time chasing down employees breaking the rules. That’s why it’s critical to do two things: ensure you have a way to easily monitor employee activity, and shift responsibility for the company’s security into the hands of every employee and team.

You can’t enforce what you’re not aware of, and while some might raise concerns over privacy, there are sophisticated security tools that can provide visibility into employee activity without raising privacy concerns. Tools are able to identify suspicious activity without diving into the contents of emails or documents, but instead by mapping out normal behavior for every employee. Visibility can help ensure that policies are enforced equally, would enable quick, autonomous action when policies are being broken, and can ensure that senior staff, whose actions can have the largest impacts, are also held accountable.

One CISO that I recently spoke with told me that the biggest benefit of gaining visibility into his network was the open lines of communication it had created between employees and his security team. He said now employees know that someone on the security team is monitoring their network behavior. Upon breaking policy, they’ll expect to get an email from his team explaining the risks and asking for their support in the future. He described it as helping him to create a “culture of compliance” within his organization.

As a company begins to enforce security policies and hold employees responsible, the policies that once may have seemed meaningless will start to be valued and respected. Over time, holding people responsible will lead individuals to see how their actions impact the security of the organization and come to consider themselves responsible for the security of the company. This is the larger success, leading to not just fewer policy violations, but to an overall more secure organization.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...