Data-driven cyber: empowering government security with focused insights from data

Recently, the NCSC has intensified its focus on data-driven cyber strategies (DDC). Our primary aim is to promote the implementation of an evidence-based approach to cyber security decisions, both in our guidance to external organizations and in our internal security measures.

We recognize that enterprise-level cyber security is increasingly complex, leading many teams to hesitate in embracing an additional ‘data layer’ out of fear of being overwhelmed. Through this blog post, we seek to illustrate how concentrating on manageable, actionable insights can empower teams to adopt data-driven cyber security effectively.

Our example illustrates a partnership between two departments within the NCSC:

  • The Vulnerability Reporting Service (VRS)
  • The Data Campaigns and Mission Analytics (DCMA) team

The Vulnerability Management Team spearheads the NCSC’s efforts to address vulnerabilities, while the DCMA team utilizes their data science and analysis skills to furnish the NCSC Government Team with vital evidence-based security insights.

Small Actionable Insights Propel Action

Numerous government teams, including the VRS, collect and oversee extensive amounts of valuable data. They face the challenge of effectively analyzing this data amidst the belief that generating useful insights necessitates a complete transformation of current workflows.

This belief is rooted in the misconception that deploying DDC entails integrating all data into a sophisticated ‘master formula’ to derive hidden insights and stories. However, it is crucial to view DDC as a tool for generating ‘small yet actionable insights’ that can enhance decision-making, especially at the outset. This simpler and focused strategy can yield substantial benefits.

Vulnerability Avoidability Assessment

In the scenario involving the VRS, we took that approach by starting with the available data sets and focusing on a single insight that could foster a significant evidence-based security dialogue.

To achieve this, we developed the Vulnerability Avoidability Assessment (VAA), an analysis that utilizes two internal data sources and one external source to assess the proportion of vulnerability reports stemming from outdated software. The data sources included:

  • The total number of vulnerability reports received by VRS
  • The number of reports identifying outdated software as a reason
  • A public vulnerability disclosure database

This analysis was created with the understanding that patch management is a vulnerable area that can be addressed, and examining the relationship between patch management and the vulnerabilities reported through the VRS would provide a basis for discussions on how to potentially avert or reduce these vulnerabilities.

Our Analysis

We obtained a deeper understanding of the repercussions of unpatched software on government systems by comparing the number of vulnerability reports linked to outdated software with data from an open-source database. This database provided estimates on how long these vulnerabilities had been publicly accessible and when corresponding patches became available.

By applying this methodology, we defined an ‘avoidable vulnerability’ as one that has been publicly known for a significant duration, to the point where a responsible organization would be expected to have implemented the necessary updates and patches.

Our examination of data from 2022 unveiled that each month, the VRS received a significant number of reports corresponding to software that was not updated. This ranged from 1.6% to a peak of 30.7% of vulnerabilities in a single month throughout the year.

Table 1. Total Number of Outdated Software Reports Compared to All Vulnerability Reports Received in 2022.
Month (2022) Total Vulnerability Reports Reports of Unpatched Software Proportion of Avoidable Vulnerabilities (%)
Jan 64 3 4.7
Feb 58 9 15.5
Mar 128 36 28.1
Apr 101 31 30.7
May 92 15 16.3
Jun 141 34 24.1
Jul 65 0 0
Aug 81 8 9.9
Sep 58 4 6.9
Oct 62 1 1.6
Nov 88 8 9.1
Dec 97 7 7.2

We also explored the duration for which software vulnerabilities remained unpatched before being exploited. Referring to NCSC guidance, which advises that all updates for high-risk vulnerabilities should be applied within 14 days (NCSC Cyber Essentials guidance on ‘Security Update Management’, Page 13), we adopted a 30-day threshold as a uniform timeline for applying patches, irrespective of their severity. By categorizing the durations into these segments, we discovered that 70% of outdated software vulnerabilities reported to the VRS were due to unpatched software for over 30 days.

Data-driven analysis chart
Chart 1. Illustrates the duration a vulnerability remained in the public domain.

This newfound understanding empowered the VRS team to engage in evidence-based discussions with stakeholders about their patch management strategies. By providing data insights, we could advocate for meaningful reductions in the number of vulnerability reports received by the VRS related to government systems.

Conclusions

The journey towards adopting DDC has underscored the significant value of leveraging data for evidence-based security decisions. The collaboration between the VRS and the DCMA team exemplifies how data-driven insights can guide decision-making. Organizations must understand that embracing DDC does not necessitate a full systems overhaul, but rather the capacity to focus on deriving small yet actionable insights that can influence behaviors and governance.

Joshua L
Data Scientist, NCSC

Based on an article from ncsc.gov.uk: https://www.ncsc.gov.uk/blog-post/data-driven-cyber-empowering-security-focused-insights

Leave a Reply

Your email address will not be published. Required fields are marked *

Back To Top