Qualys has analyzed QualysGuard Policy Compliance (PC) data from more than five million scans performed by organizations worldwide to help enterprises understand key trends as they plan their compliance strategies.
Information from this research will aid organizations in their compliance project planning, i.e. the most used controls, the pass/fail ratio for key controls and how often the controls are checked, so they can stay abreast of key trends and best practices in compliance.
As regulatory compliance pressure mounts and the trend towards continuous monitoring increases, enterprise security teams are adapting and are using solutions like QualysGuard PC to automate General Computer Controls (GCC) to adopt a broad and proactive auditing approach. The use of such solutions provides enterprises with the ability to move from a sampling, point in time approach to 100% coverage with near real-time results while reducing costs.
Key data and trends from this data include:
- A large number of devices scanned – more than half of the scan target – are out of support. Companies are depending on a large number of computer technologies, especially operating systems that are no longer supported by their manufacturers through standard support. Examples include Windows 2000, Windows 2003, Windows XP, RHEL, AIX 5, Solaris 8 and Solaris 9. Windows 2003 Server and Windows XP account for the vast majority of technologies under extended support, which will end in July 2015 and April 2014, respectively.
- Newer computer technologies have a higher rate of passing compliance, confirming the general trend of higher security for newer technologies also on the compliance side.
- Companies with more frequent compliance scans have a higher rate of passing scans. This trend confirms recent findings in the area of Continuous Monitoring, where organizations that monitor more frequently also show accelerated improvements.
- Passwords are high on controls lists. Thirteen out of the top 20 controls are password-related. At the same time, top failing controls are password related.
“This data from over five million scans released by Qualys provides a glimpse into the state of policy compliance across companies worldwide, highlighting some simple ways that organizations can improve their security efforts,” said Scott Crawford, research director for EMA. “For example, the data highlights the need to establish processes for managing key controls such as settings for accounts, passwords, audits and databases. It also shows how regular, automated scans can highlight where and how organizations can more efficiently target remediation, attain compliance objectives and lower their IT security risk.”