Cyber Readiness Report
Cyber Readiness Report
Emai: KiPillay@dtps.gov.za
www.dtps.gov.za
2017
Cybersecurity Readiness
Contents
4 Executive Summary 12
5 About the Respondents 14
5.1 Sector Types: The main sectors 14
5.2 Size of Organisations 15
6 Results 16
6.1 Cybersecurity Strategy/Plan 17
6.2 Governance 21
6.3 Standards 27
6.4 Sector CSIRT Establishment 29
6.5 Awareness 31
6.6 Vulnerabilities and Risk Assessment 36
6.7 Incident Management and Business Continuity 42
7 Critical Findings 49
8 Conclusion 51
9 Bibliography 52
Appendix A Data collection protocol 53
Appendix B Sector-CSIRTS 54
10 Abbreviations 59
11 List of Contributors 60
However, the growth of the information society is accompanied by new and serious
threats. While technological introduces greater variety and convenience into our
lives, it also opens more and more avenues for people to be targeted by cyber
criminals. International and domestic cyber criminals increasingly view businesses
and private individuals as attractive targets for a range of cybercrime.
Attacks against information infrastructure and Internet services have already taken
place, while online fraud and hacking attacks are just some examples of computer-
related crimes that are committed on a large scale every day. The financial damage
caused by cybercrime is reported to be enormous.
This ‘digital paradox’ means that while governments and organisations can offer
more services, more quickly, than ever before, yet at the same time cybercrime has
become a powerful countervailing force that’s limiting that potential.
The issue of cybersecurity is high on the agenda of many African governments, with
many on the continent increasingly mindful of the shared public private responsibility
for cybersecurity, and of the need to mobilise both public and private organisations
within a multi-stakeholder model. A growing number of African countries have
established - or are in the process of establishing - an enabling policy and legislative
environment for cybersecurity.
The South African government’s response to the issue of cybersecurity has been
promulgation of the National Cybersecurity Policy Framework (NCPF) in 2012,
which is aimed at a coherent and integrated Cybersecurity approach to address
Cybersecurity threats. The NCPF has also given rise to the Cybercrimes and
Cybersecurity Bill, which is currently before Parliament, and which will bring South
Africa in line with international laws dealing with cybercrime.
- Notably, 42% of respondents reported that the number of incidents had not
increased compared to previous years. This shows a positive trend if cyber
incidents are decreasing and shows that controls and measures may be
helping to curb an increase in attacks.
page 6
The Department through the Cybersecurity Hub has also developed a national Cybersecurity
Awareness Portal which will be the repository for all Awareness material and the main
conduit for the dissemination of Cybersecurity Awareness programs and information. The
Awareness Portal will be kept current with content via relationships with the private sector
with organisations such as the South African Banking Risk Information Centre (SABRIC) having
agreed to partner on rolling out programs via the Portal.
The Department, in line with international initiatives, has adopted October as National
Cyber Security Awareness Month, which is an annual campaign to raise awareness about
cybersecurity. The campaign further seeks to:
The Cybersecurity Hub is one of the national Computer Security Incident Response Teams
(CSIRTs) mandated by the country’s National Cybersecurity Policy Framework (NCPF), under
the Department of Telecommunications and Postal Services (DTPS),One of the mandates
of the Hub is to co-ordinate attack information and provide support for cyber incidents.
This initiative of surveying the current state of cyber readiness in certain sectors of the
country is aimed at determining the current levels of cybersecurity resiliency, planning
and contingency. The main objective of this survey is to report on the current level of
governance, threat, awareness and incident response capability.
The Cybersecurity Readiness Survey assesses whether critical business functions and
infrastructure can remain operational and be minimally affected by unplanned or malicious
interruptions.
In this, the first instalment of the Cybersecurity Readiness Survey, we begin the process of
looking at the current state of cyber readiness in South Africa. It is important to identify
the current state of cyber readiness and establish a baseline of current cyber readiness
capability. A valuable contribution made by the survey are the details on current cyber
readiness capabilities, skills and areas of concern.
South Africa’s response to the issue of Cybersecurity is premised on the NCPF, which was
passed in 2012. The NCPF provides the over-arching framework and strategy within which
an emerging legislative and regulatory framework will be established.
The NCPF provides a broad framework and specifically mandates the establishment of
multiple national CSIRTs, including the Cybersecurity Hub under the DTPS, which has a
mandate to coordinate and promote cybersecurity measures within the private sector and
civil society. The Cybersecurity Hub works closely with the other national CSIRTs.
Part of the mandate of the Cybersecurity Hub is to determine the cybersecurity posture of the
country, conduct readiness exercises and provide guidance and best practice guidelines.
We believe that these initiatives are best achieved by projects that are rooted in empirical
research. With this in mind, the Cybersecurity Hub, together with its research partner, the CSIR,
conducted a nation-wide Cybersecurity readiness survey that sought to gather information
on strategic initiatives related to cybersecurity in South African organisations. The survey
gathered information on, inter alia:
• Potential cybersecurity vulnerabilities and risks that have been identified in organisations;
• The capability of organisations to respond to, and recover from a cybersecurity related
attack.
1
Data has been rounded during the analysis and the interpretation phase.
• Cybersecurity Strategy/Plan
• Governance
• Standards
• Cybersecurity Awareness
The report commences with an Executive Summary that provides the most pertinent
findings.1
The sectors in which the respondents worked was as follows: government and defence
– 31%; banking and finance – 29%; higher education and research – 19%; IT and
telecommunications – 20%. See Figure 1.
It is worth noting that for small to medium organisations, organisational size does not
significantly affect the readiness of an organisation for cybersecurity. It is when the
organisation becomes large that the readiness of the cybersecurity organisation becomes
impacted. An increase in the number of cyber security experts within an organisation is
needed to protect a large organisation.
Plans and strategies require regular review, in order to ensure that they stay relevant and
that cognisance is taken of emerging trends impacting organisations. (See Figure 4).
Many organisations may not have a CISO and therefore the cybersecurity strategy/plan
tends to be led by the CIO.
The need for a separate C-suite for security helps prioritise the security of business
information, infrastructure and systems. Many companies have a CIO and a CTO, but not a
Chief Information Security Officer (CISO). A dedicated CISO serves as a dedicated security
specialist who has deeper knowledge of the threat landscape, defensive approaches and
insight into risk mitigation.
The main role of a CISO is to help assess threats and present this information to C-suite
members, as input to critical decisions that have to be made for the organisation. As a
specialised role, a CISO possesses expert cybersecurity skills that can be weaved into an
organisation’s operation.
The majority of respondents reported that their organisations do not have a separate budget
for cybersecurity (67%); 10% were uncertain whether their organisation had a separate
budget for cybersecurity. (See Figure 10).
Typically, separate budgets may not be allocated to cybersecurity, but may form part of
an over-arching capability such as IT (as indicated in Section 6.2.5).
More than half the respondents answered CIO (52%) in response to the question on where
the cybersecurity function reports within the organisation; 13% answered CEO; 13% said
Other. See Figure 12.
The ISO 27001 family of standards consists of best practices and recommendations for
information security management and risk management through security controls in an
overall information security management system (ISMS). It is very wide in scope and covers
various aspects, including confidentiality, privacy and technical aspects of cybersecurity.
ISO 271001 is applicable to organisations of different sizes and domains. The standard was
compiled by the International Organisation for Standardisation (ISO) and more specifically
the ISO/IEC JTC1 (Joint Technical Committee) SC27 (Sub-committee 27).
The National Institute of Technology and Standards (NIST) is another popular set of standards
to which many international companies aim to conform. It consists of a cybersecurity
framework that was created in a collaborative effort between government and industry.
This framework entails standard, guidelines and practices aimed at protecting critical
infrastructure to manage cyber risk.
The SANS Institute also serves as a resource for the security community to aid with the
development and implementation of security policies and guidelines for cybersecurity.
SANS is well-known for its training capability, but also provides support for cybersecurity
implementation and guidance.
Systems, networks and devices all connect with each other and have become shared
resources. It is also important that all employees use IT infrastructure safely and security
systems to prevent falling victim to a scam. In order to promote good cyber behaviour,
employees should be made aware of current and emerging threats, weaknesses and
risks. Cyber security awareness can play an important role in informing and educating
employees about cyber dangers.
Once the foundation of cybersecurity awareness has been established with beginner
training, employees can also benefit from more progressive training. A good mix of training
that consists of beginner, intermediate and more advanced concepts will help employees
learn the basics about cybersecurity, and also arm them with strong skills to help defend
against more complex cyber-attacks.
The selection of training providers may be affected by the budget. Using in-house training
providers may be more cost-effective than sourcing an external vendor. The development
of cyber awareness programmes will then have to be done by the in-house training partner.
Critical asset identification is necessary in order to ascertain which assets are vital for the
functioning of the organisation. It can also aid with threat identification and risk mitigation.
As part of a cybersecurity strategy or plan, it is important to understand what needs to be
protected. Through the identification of critical assets, an organisation can determine the
impact on its functionality should the confidentially, integrity or availability of these assets
be affected.
Just over one-third of organisations (36%) are carrying out risk assessments annually. 20%
of organisations are doing a risk assessment more than once a year. 14% are doing a
risk assessment periodically, but not every year; another 14% are not sure of when a risk
assessment is carried out. In 4% of organisations, a risk assessment is not formally done and
5% are assessing at other intervals (like monthly). See Figure 22.
Skills shortages and a lack of core cybersecurity competencies are critical obstacles in
managing cybersecurity effectively in an organisation. Cybersecurity professionals need to
be trained and upskilled in order to deal with the growing requirement for specialists who
can apply cybersecurity across an organisation.
In addition, the general staff population may be lacking in basic cyber awareness. This
lack of cyber awareness contributes strongly to some of the issues organisations face with
regard to cybersecurity. Phishing attacks, malware, social engineering and ransomware
attacks can all be reduced if users are made aware of how these common attack vectors
are distributed.
With targeted malicious emails, users can be tricked into revealing sensitive information
or clicking on malicious links that may infect machines. Attackers can gain access to an
organisation’s sensitive networks, data and resources through cleverly crafted emails that
entice users to click on a link, which then activates malicious capabilities.
Another danger to systems and networks is ransomware in which data is encrypted and
held hostage until a substantial financial sum is paid over. Data and systems can remain
inaccessible until the fee is paid. Critical data could be affected.
These forms of computer network exploitation are concerning, as users can be tricked into
performing actions that may reveal sensitive information or make critical data inaccessible.
The organisation is at risk of inadvertent information disclosure or data theft.
Employees pose a bigger threat than criminals from outside the organisation. Insiders may
try to abuse systems and information for fraudulent uses, theft and personal gain. Insiders
have the advantage of being in close proximity to the systems and data and may not
need to hack into an organisation’s network. Organisations may find it harder to protect
their systems as insiders already have legitimate access to the organisation’s information
and assets.
Organisations need to ensure that they plan and prepare for a serious incident or disaster, to
ensure they are able to restore systems to an operational state within a reasonable amount
of time. Recovery and restoration of critical systems forms an essential component of
business continuity plans. Contingency planning ensures that an organisation can effectively
cope with major incidents or disasters, whether they are foreseen or not. Business continuity
may also include some risk management, governance and compliance aspects. Through
risk assessment, organisations can formerly identify potential interruptions to operations
and plan for contingency measures. A business continuity plan may incorporate essential
business processes and details of systems that are operationally required.
The majority of respondents (64%) indicated that their organisations would be able to
respond to threats. 23% were uncertain about their organisation’s ability to respond to
threats. See Figure 27.
An organisation may be faced with many incidents that affect the confidentiality, integrity
or availability of systems, technology and infrastructure. To cater for impending events, an
organisation needs to test its incident response capability, in order to identify gaps, test
skills and processes, and determine how the organisation can best deal with a downtime
incident. System recovery, restoration and minimisation of damage form a key part of
incident response and the ability to carry out these critical functions should be tested
regularly.
Incident handling tries to ensure that a cyber incident is contained, and it can mean
the difference between complete recovery and total disaster. Organisations may be
able to respond to incidents, but how the incident is handled may determine whether the
organisation can recover and restore systems with minimal disruption and effect on the
organisation.
The majority of organisations were unable to assess whether they could continue with
business and resume operations without heavy losses. This indicates that many organisations
may not have a strong incident handling ability and require stronger planning and testing in
order to minimize the threat of system downtime and losses.
page 48
1
security threats. Without a sound cybersecurity plan/
strategy, the direction and main security approach of
an organisation will be lacking. Once a strategy has
been discussed, plans should be put into place for
implementation within a set time frame. If a strategy/
plan is not implemented, the organisation may fall
behind with best practices and current evolving
threats.
2
users and ICT security practitioners. This will help ensure
that more users are knowledgeable in different areas and
levels of cybersecurity. ICT security risks can be minimised
if more users are knowledgeable about best practices
and essential precautions. Many staff members lack basic
cybersecurity awareness. While beginner training is useful
for entry level workers, more advanced, intermediate and
hybrid training should also be provided to help educate
users about pertinent cyber risks and threats.
3
insufficient skills experts who can apply cybersecurity. In-
house skills and lack of cyber knowledge all contribute to
this growing issue. Organisations now need to grow the skill
levels of employees and develop cybersecurity knowledge
through training and certifications. The cybersecurity
competencies of cyber security experts and security
practitioners need to be improved in order to ensure
adoption of key security practices.
4
a more regular basis to ensure that key risks are identified
and mitigated. If organisations do not regularly carry out
risk assessments, they could potentially be faced with a
crisis with no form of disaster recovery of business continuity
plan. Risk assessments can help prepare an organisation
for adverse events in order to ensure continuation of
operations and minimal disruptions.
5
Organisations may not be able to recover from a cyber
incident and resume operations once more. More detailed
business continuity/disaster recovery plans need to be
developed and tested to ensure that company downtime
is minimised should disaster strike. It is imperative that
organisations assign responsibilities and develop processes
in order to deal with a crisis.
page 50
page 52
Letters were sent out from DTPS requesting participants’ assistance in completing the survey.
This would assist in data collection of this kind for the first time in South Africa. Prospective
respondents were then sent the survey link and requested to complete the survey on behalf
of their organisation. Organisations that could be classified under the target sectors were
invited to participate in the survey. The survey was run between 18/01/2017 and 05/09/2017.
Throughout the duration of the survey being open on FourEyes, the target organisations
were reminded about completing the survey.
The ASISA-CSIRT represent members at an industry level in interactions with the SA Government
and Regulators on issues relating to cyber security.
We wish to thank the following persons for the valued contribution to the the compilation of
this report:
1.
Dr Namosha Veerasamy: Council for Scientific and Industrial Research (CSIR)
2.
Ms Thulani Mashiane: Council for Scientific and Industrial Research (CSIR)
3.
Dr Jabu Mtsweni: Council for Scientific and Industrial Research (CSIR)
2017
A REPORT OF THE DEPARTMENT OF TELECOMMUNICATIONS AND POSTAL SERVICES page 63
The Department of Telecommunications and Postal Services
Postal Address
Private Bag X860, Pretoria, 0001
Physical Address
iParioli Office Park, 1166 Park Street, Hatfield, Pretoria, 0001
Contact Information
Tel: +27 12 427 8000 - Fax: +27 12 427 8110
www.dtps.gov.za