APT Survey Report
APT Survey Report
STUDY RESULTS
Advanced Persistent
Threat Awareness
Study Results
Advanced persistent threat (APT) has been a term
used frequently during security threat discussion;
however, confusion exists as to what an APT is
and how to manage the risk associated with it.
Although the study reveals that a large number
of respondents feel that APTs are important and
have the ability to impact national security and
economic stability, the study also demonstrates
that the controls being used to defend against
APT might not be sufficient to adequately protect
enterprise networks.
Sponsored By
ISACA
With more than 100,000 constituents ISACA continually updates and
in 180 countries, ISACA (www.isaca.org) expands the practical guidance
is a leading global provider of and product family based on the 3701 Algonquin Road, Suite 1010
knowledge, certifications, community, COBIT framework. COBIT helps Rolling Meadows, IL 60008 USA
advocacy and education on IT professionals and enterprise Phone: +1.847.253.1545
information systems (IS) assurance leaders fulfill their IT governance
Fax: +1.847.253.1443
and security, enterprise governance and management responsibilities,
and management of IT, and IT-related particularly in the areas of assurance, Email: info@isaca.org
risk and compliance. Founded in 1969, security, risk and control, and deliver
www.isaca.org
the nonprofit, independent ISACA value to the business.
hosts international conferences,
publishes the ISACA Journal, and Disclaimer Provide feedback:
develops international IS auditing ISACA has designed and created www.isaca.org/cybersecurity
and control standards, which help Advanced Persistent Threat Participate in the ISACA Knowledge
its constituents ensure trust in, and Awareness Study Results (the Center:
value from, information systems. It Work) primarily as an educational www.isaca.org/knowledge-center
also advances and attests IT skills resource for those interested in Follow ISACA on Twitter:
and knowledge through the globally APT. The Work should not be www.twitter.com/ISACANews
respected Certified Information considered inclusive of all proper
Join ISACA on LinkedIn:
Systems Auditor (CISA), Certified information, procedures and tests www.linkd.in/ISACAOfficial
Information Security Manager or exclusive of other information,
(CISM ), Certified in the Governance procedures and tests that are
Like ISACA on Facebook:
www.facebook.com/ISACAHQ
of Enterprise IT (CGEIT) and reasonably directed to obtaining
Certified in Risk and Information the same results. In determining
Systems Control TM (CRISCTM) the propriety of any specific
designations. information, procedure or test,
security, governance and assurance
professionals should apply their
own professional judgment to the
specific circumstances presented by
the particular systems or information
technology environment.
2013 ISACA. All rights reserved. No part of this publication may be used, copied, reproduced, modified, distributed, displayed, stored in a retrieval
system or transmitted in any form by any means (electronic, mechanical, photocopying, recording or otherwise) without the prior written authorization of
ISACA. Reproduction and use of all or portions of this publication are permitted solely for academic, internal and noncommercial use and for consulting/
advisory engagements, and must include full attribution of the materials source. No other right or permission is granted with respect to this work.
Jo Stewart-Rattray,
CISA, CISM, CGEIT, CRISC, CSEPS, BRM
Holdich, Australia, Director
Figure 07
Enterprise Ability to
Deal With APT Attack 11
Figure 08
C orrelation Between Likelihood of
and Preparedness for an APT Attack 12
Figure 09
Technical Controls Used to
Protect Against APT Attacks 13
Figure 10
C orrelation Between Likelihood of APT
Attack and Use of Technical Controls 14
Figure 11
Correlation Between Familiarity With APTs
and Update of Third-party Agreements 15
Figure 12
C orrelation Between Likelihood of APT
Attack and Executive Involvement 16
Figure 13
C orrelation Between Likelihood of APT
Attack and Executive Actions Taken 17
Figure 14
Adjustment of Incident
Response Plans 17
Figure 15
Increase in
Awareness Training 18
Demographics
APT Awareness
Direct APT Experience
Security Controls, Processes and Responses
APT Impact on Policies and Practices
1 N ational Institute of Standards and Technology (NIST), Special Publication 800-39, Managing Information Security
Risk, Organization, Mission, and Information System View, USA, 2011
Description of 01
FIGURE
Industry
the Population
Distribution
WITHIN WHICH OF THE FOLLOWING INDUSTRIES
Because the studys purpose was to measure ARE YOU EMPLOYED?
information security characteristics such as Technology Service/Consulting
knowledge of APTs, knowledge of internal
controls, internal incidents, policy adherence Financial Banking
and management support, the study surveyed
those who deal with those issues every Government/ Military/ National/ State/ Local
day: professionals with information security
responsibilities. The studys purposive global Telecommunications/ Communication
sample included those who hold ISACAs
CISM credential and information security Manufacturing/ Engineering
02
The majority of respondents reside in
FIGURE
38
Asia Latin
(457) or the financial services/banking industry (340) % 8% America
Europe / Africa
32%
North America
Perspectives 03
FIGURE
Familiarity
With APTs
on APT HOW FAMILIAR ARE YOU WITH APTS?
Awareness
The survey results reveal that 25.1 percent of
respondents are very familiar with APTs, with
a total of 96.2 percent expressing that they
29%
are at least somewhat familiar (figure 03).
Somewhat
Familiar
4%
Not At All
Familiar
04
While this degree of familiarity with APTs is
Comparison of
FIGURE
a positive indicator, it appears to be negated APTs and
by the 53.4 percent response indicating that Traditional Threats
survey participants do not believe APTs differ
from traditional threats (figure 04). DO YOU BELIEVE THAT APTS ARE SIMILAR OR
UNIQUE TO HISTORICAL THREATS?
This finding is troubling because it implies that
confusion does exist regarding the nature of an
APT and its difference from a traditional threat. 54%
Similar
If security professionals do not understand
the differences between the threat classes,
they will find it difficult to properly identify,
defend against and respond to an APT. With 46%
Unique
93.9 percent of respondents report that they
believe that APTs represent a credible threat
to national security and economic stability, the
importance of having a clear understanding of
what they are is self-evident.
05
Highest Enterprise
FIGURE
06
Direct APT Experience Enterprise Perceived
FIGURE
While the respondents have identified the risk Likelihood of
scenarios of a successful APT attack, most
Becoming APT Target
have not yet had to deal with the actuality of HOW LIKELY DO YOU FEEL THAT YOUR ORGANIZATION
an attack. Only 21.6 percent of respondents WILL BE THE TARGET OF AN APT?
reported having been subject to an APT attack.
Of those, 26.2 percent were employed in the
technology services and consulting field,
followed by 22.7 percent working in financial
35%
45%
services. Additionally, those who had been
subject to attack were asked if they were Not Very Likely
able to identify the source of the attack; 65.4
Likely
percent answered affirmatively.
Although only 21.6 percent of respondents
reported that their enterprise has already been 18% Very
Likely
victimized by an APT, roughly three times
that number63.0 percentbelieve that it is 2% Not At
All Likely
only a matter of time before their enterprise is
targeted. (figure 06)
07
Enterprise Ability
63%
FIGURE
STOP A
SUCCESSFUL
ATTACK
08
Security Controls, Correlation Between
FIGURE
Processes and Responses Likelihood of and Preparedness
for an APT Attack
As noted previously, the majority of
respondents believe they are well positioned CORRELATION BETWEEN LIKELIHOOD OF AND
to identify, respond to and stop an APT attack. PREPAREDNESS FOR AN APT ATTACK.
What controls and countermeasures are
How likely do you feel that your organization
needed to ensure that this is true? will be the target of an APT?
09
Technology Technical Controls
FIGURE
Respondents are leveraging a variety of Used to Protect
preventive and detective technical controls Against APT Attacks
as well as education, training and policy to
help reduce the likelihood of a successful WHICH SPECIFIC CONTROLS IS YOUR
breach. A very high percentage of those ENTERPRISE USING TO PROTECT SENSITIVE
surveyed responded that they are using DATA FROM APT ATTACKS?
antivirus and anti-malware and/or traditional
network perimeter technologies to thwart IPS - signature / abnormal event
detection and prevention based controls
APTs, but much lower scores were seen for
critical controls for mobile devices, remote
access technologies (RATs), and logging/event Anti-Virus, Anti Malware
correlation (figure 09).
10
In the incident management section, a Correlation Between Likelihood
FIGURE
correlation was demonstrated between of APT Attack and Use of
perceived likelihood of APT attack and degree Technical Controls
of preparation to deal with the attack. A
similar alignment is reflected here, in that the WHICH SPECIFIC CONTROLS ARE YOUR
enterprises that are perceived to be a likely ENTERPRISE USING TO PROTECT SENSITIVE
or very likely target of APT seem to be using DATA FROM APT ATTACKS?
more technical controls than those that do not
classify themselves as likely targets for the Mobile
Anti-Malware
threat class (figure 10). Controls
11
APT Impact on Correlation Between Familiarity
FIGURE
Policies and Practices With APTs and Update of
Third-party Agreements
The threat of APT attack calls for many
defensive approaches, among them technical HAS YOUR ENTERPRISE CHANGED THE LANGUAGE IN
controls, changes in human resource SERVICE LEVEL AGREEMENTS WITH THIRD PARTIES
awareness training and updates to third-party TO ACCOMMODATE FOR APTS?
agreements. Another consideration examined
in the survey is the effect of APT threats on the
policies in the enterprise and the practices and
attitudes from executive management toward YES
cybersecurity initiatives.
Vendor Management
Vendor management is an important factor
for protecting outsourced data. Therefore, the
survey examined the ongoing relationship with NO
third parties to see if enterprises are adjusting
contract language or service level agreements
(SLAs) to ensure to ensure that third parties have
0% 20% 40% 60% 80% 100%
practiced due diligence to protect themselves
from APTs and to require financial restitution in VERY FAMILIAR NOT VERY FAMILIAR
the event that despite controls they are breached FAMILIAR NOT AT ALL FAMILIAR
resulting in damage to the customer.
12
Executive Involvement Correlation Between
FIGURE
Given the increased attention APTs have Likelihood of APT Attack
received in recent years, it might be expected and Executive Involvement
that executives would be becoming more
involved in cybersecurity activities. The survey DO YOU BELIEVE THAT EXECUTIVE MANAGEMENT
respondents were asked to indicate whether WITHIN YOUR ENTERPRISE IS BECOMING MORE
they noted a change in executive activity within INVOLVED WITH CYBERSECURITY ACTIVITIES AS A
their enterprise. In a similar fashion to other RESULT OF RECENT, VISIBLE APT ATTACKS?
findings in the study, there was a correlation
between the perceived likelihood of the
enterprise being an APT target and the level of
executive involvement, with more likely targets YES
reflecting increased executive involvement
and less likely targets showing less executive
engagement (figure 12).
13
However, when the responses are filtered Correlation Between Likelihood
FIGURE
according to the likelihood of the enterprise of APT Attack and Executive
being targeted by APTs, the numbers shift Actions Taken
(figure 13).
IF YES, WHAT ACTIONS ARE THEY TAKING?
It is interesting that the highest incidences of
increased security budgets are occurring in not
only the enterprises that find it very likely that Increased
they will be targeted by APTs, but also in those Security
Budgets
who find it not at all likely. Likewise, increased
policy enforcement is occurring at a similar rate
in enterprises that find it not very likely to be
Increased
targets (65.9 percent) as in enterprises that find Visible Support
it very likely (65.8 percent). from Executive
Leadership
14
survey indicates that many respondents have Adjustment
FIGURE
YES
NO
15
Regrettably, the same consideration is not Correlation Between Perceived
FIGURE
being given to user awareness training. Overall, Livelihood of APT Attack and
67.3 percent of respondents report that they Increase in Awareness Training
have not increased awareness training relative
to APTs. The percentages improve slightly for HAS YOUR ENTERPRISE INCREASED SECURITY
enterprises that are considered very likely TRAINING AS A RESULT OF APTS?
or likely targets of an APT, but even in these
cases, less than half are increasing awareness
training (figure 15).
YES
67% OF RESPONDENTS
REPORT THAT THEY
HAVE NOT INCREASED AWARENESS
TRAINING RELATIVE TO APTs. NO
Conclusions
The survey demonstrated many understanding of what APTs are and network segregation and perhaps
positive findings. The participating how to defend against them. This an increased focus on email security
security professionals seem is demonstrated by the number of and user education could be
to be practicing good security respondents who label themselves beneficial. Additionally, the lack of
management by utilizing a risk-based as at least familiar with APTs (67.6 consideration being given to third
approach to managing APTs within percent) as compared to those parties is troubling. Enterprises must
their enterprise. who feel that APTs are similar to be sure that the data they outsource
This is shown throughout the traditional threats (53.4 percent). are protectedeven if the provider
research, as enterprises that itself experiences an APT attack.
Additional data show that the market
considered themselves more likely
has not really changed the ways
to experience an APT seem to have
in which it protects against APTs. Finally, 79.1 percent of
adopted a layered approach to
The technical controls most often respondents noted that there
managing their enterprise security.
identified as being used to prevent
In almost all cases, the higher the is a lack of guidance in the
against APTs are network perimeter
perceived likelihood of becoming
a target, the more consideration
technologies such as firewalls and market focused on APT. As
access lists within routers, as well part of its continual effort to
is being given to APTs in terms of
as anti-malware and antivirus.
technology, awareness training, serve its members and other
While these controls are proficient
vendor management, incident
management and increased attention
for defending against traditional constituents, ISACA is creating
attacks, they are probably not as a series of products to address
from executives. This activity and
suited for preventing APTs. This is
corresponding effort are excellent for challenges in cybersecurity,
true for a number of reasons: APTs
information protection.
exploit zero-day threats, which are one component of which will
However, APTs are new to the often unknown vulnerabilities, and
concentrate on APTs.
market. They are different from many APTs enter the enterprise
traditional threats and need to be through well-designed spear
considered as a different class of phishing attacks. This indicates
threat. There is still a gap in the that additional controls - such as