Dec 23 • Jane Wison

Commensurate Protection: Balancing Security with Risk

Discover the principle of Commensurate Protection, ensuring security measures are proportional to risk. Learn how to apply this foundational concept in modern security engineering.

Commensurate Protection: Ensuring Security Proportional to Risk

In the world of security engineering, no single solution fits all problems. Each system component and its protections must be tailored to the specific risks it faces. This is where the principle of Commensurate Protection comes into play. Rooted in NIST’s SP 800-160, this design principle is about ensuring the strength and type of protection align proportionally with the potential consequences of failure.

Whether you’re a tech-savvy professional managing critical infrastructure or crafting secure systems, understanding and applying this principle is vital. Let’s delve deeper into Commensurate Protection, exploring its role, practical applications, and importance in modern security practices.


What is Commensurate Protection?

At its core, Commensurate Protection ensures that the security measures applied to a system element are proportional to the potential adverse effects of its failure. In other words, the higher the risk or trust associated with an element, the stronger and more effective the protection must be.

This principle ensures systems are "as secure as reasonably practicable," tailored to the organization’s mission, operations, and assets.

Key Elements of Commensurate Protection:

  1. Risk Assessment: Identify the most significant adverse effects that could result from the failure of each system element.
  2. Tailored Safeguards: Apply protections—whether intrinsic (self-protection), architectural, or external—proportional to the assessed risk.
  3. Design Independence: The protection requirements remain consistent regardless of architectural choices (e.g., centralized vs. distributed systems).
  4. Increased Assurance: As the risk increases, so must the confidence in the effectiveness of the protections.
    Trade secret litigation and arriving at a definition of 'commensurate'  security measures - World Trademark Review

Why Does It Matter?

The consequences of a system element failure can vary widely—from minor inconvenience to catastrophic outcomes. For example, in critical infrastructure systems, even a small vulnerability can have national or global implications.

Consider these scenarios:

  • Healthcare Systems: A failure in a patient data system could lead to life-threatening errors. The protection here must be robust and fail-safe.
  • Banking Systems: A breach in transaction processing could lead to massive financial losses and erosion of customer trust.
  • National Defense: Weaknesses in communication systems could compromise security at the highest levels.

In these cases, applying Commensurate Protection ensures that safeguards are neither excessive (wasting resources) nor insufficient (exposing vulnerabilities).


Practical Applications

1. Self-Protection Measures

Some systems protect themselves through encryption, authentication, and intrusion detection. For example, a database storing highly sensitive information should include built-in encryption mechanisms to safeguard its content even if external defenses are breached.

2. System Architecture Protections

The system's overall design can add layers of protection. For instance, implementing redundancy in critical systems ensures functionality even if one element fails.

3. External Protections

Protections can also be provided by other elements within the ecosystem. For example, a firewall may protect servers, or a physical access control system may secure the hardware itself.

4. Proportional Escalation

As the stakes rise, so should the defenses. For example, while a basic e-commerce website may rely on standard HTTPS for transactions, a government system transmitting classified data might require multi-factor authentication and secure VPNs.


Related Principle: Commensurate Rigor

Confidence in a system’s security relies on rigorous verification and validation. The principle of Commensurate Rigor complements Commensurate Protection by emphasizing the need for assurance mechanisms that align with the criticality of the element being protected.


Examples of Effective Application

  1. Avoiding Overprotection: A public blog site does not require the same level of encryption or redundancy as an online banking portal. Overprotecting such a low-risk system wastes resources.
  2. Meeting Critical Needs: A nuclear power plant control system must have protections commensurate with the catastrophic risks associated with its failure.
  3. Incremental Safeguards: A graduated response to threats—starting with the least invasive measures and escalating as needed—ensures effective resource use while maintaining security.

How to Implement Commensurate Protection

  1. Identify System Elements: Break down the system into individual components and functions.
  2. Conduct Risk Analysis: Determine the worst-case consequences of failure for each component.
  3. Define Protection Needs: Establish the required level of protection based on the identified risks.
  4. Implement Safeguards: Apply self-protection, architectural measures, or external protections.
  5. Test for Assurance: Validate the effectiveness of these measures under various scenarios.

Challenges and Considerations

  • Balancing Costs and Benefits: Implementing excessive protections can strain resources, while underprotecting critical elements leaves systems vulnerable.
  • Adapting to Complexity: In highly interconnected systems, assessing individual risks and ensuring proportional safeguards can be challenging.
  • Evolving Threat Landscape: Protections must adapt as threats become more sophisticated.

Conclusion

The principle of Commensurate Protection serves as a cornerstone of modern security engineering. By aligning the strength and type of safeguards with the risks and potential consequences, organizations can achieve optimal resource use while maintaining robust defenses.

In an era where systems are increasingly complex and interconnected, this principle is more relevant than ever. It provides a structured approach to risk management, ensuring that security measures are both effective and efficient.

Let’s eliminate the “national blind spot” by embedding proportional security in every aspect of system design.