Risk Acceptance Request - University of Cincinnati

advertisement
Risk Level (filled in by UCIT OIS)
Department: Enrollment Management/Admissions
RAF# 0020
UCIT Office of Information Security (OIS)
University of Cincinnati
Mail Drop 0658
(513) 556-0803
Risk Acceptance Form (RAF) – Vulnerability Assessments
Name and title of Originator: John Smith, Title
Summary of Request:
Allow SNMP vulnerability dated 2-5-09 to exist on networked printer located at xx.xx.xxx used by the
department of …. . The vulnerability on this printer cannot be remediated.
Overview of Service Impacted:
This printer is a color printer.
Benefits of Accepting This Risk:
The department will be able to continue using the printer, which poses no additional replacement cost to
UC.
Summary of How Doing This Will Put UC at Risk:
(By putting the solution in place as is what Risk does this cause to UC? If there are known vulnerabilities left in place by implementing
this solution list them here.)




SNMP Guessable Community allows attacker to access printer software
Unauthorized access to printer
Could allow an attacker to change device configurations using a spoofed IP address
Could allow an attacker to sniff traffic that crosses the UC network using the printer as an entry point
Summary of Information Security Controls:
(Describe the technical and procedural controls implemented to address the vulnerabilities and risks above. How are you going to
Minimize or mitigate the risk this solution causes? If you are not putting any controls in place simply say “None”.
This is a locked room, access is limited. Printer is turned off at night. Printer is password protected.
Are Security controls documented? ( Y / N ) If so where can the documentation be found?
Admissions department SharePoint site under Standard Operating Procedures (for example)
UCIT OIS Form 40.b
Official Use Only
Version 6.0, 02/26/2013
After Controls what is the remaining Risk and what is the Risk Level:
(Describe the type and magnitude of remaining vulnerabilities and risks after controls have been implemented.)




Could allow an attacker to sniff traffic that crosses the UC network using the printer as an entry point
SNMP Guessable Community allows attacker to access printer software
Unauthorized access to printer
Could allow an attacker to change device configurations using a spoofed IP address
This part to be filled out by UCIT OIS: What is the assessed Risk Level Associated with this RAF?
Risk Acceptance Request:
The service, application or business owner is seeking a risk acceptance decision for the following
deployment scope and duration. If externally sourced, basic information on the contract is provided.
I have reviewed this Security Risk Summary content. I agree that the business benefit and outstanding risk
have been adequately identified and are documented accurately. My Director/VP is aware of this
request.
Signed by: (Actual signature here, not electronic), Service or Business Owner Signature Date:
Security Risk Decision Documentation:
(check decision, fill in relevant information and sign.)
 No. I find the residual risk greater than the potential business benefit. This risk acceptance request is
denied.
 Yes, with reduced Scope. I accept responsibility for the outstanding risk related to the deployment
provided use is reduced and limited per comments below:
 Yes for temporary period while controls are improved. I accept responsibility for the outstanding
risks related to the deployment and use of this application or service; however, I find the current level
of control inadequate. I would like work to begin to improve controls as noted below.
List Scope and timing constraints and/or Controls requested:
 Unqualified Yes. I understand and accept responsibility for the outstanding risk related to the
deployment and use of this application or service for the requested scope and timeframe. I find the
current controls adequate, additional controls need not be applied.
Date of Next Review:
UCIT OIS Form 40.b
To be filled In by OIS (at least annual)
Official Use Only
Version 6.0, 02/26/2013
Information Security risks to the business and potential benefits were clearly explained.
Signed by:
Signature Date:
Name:
Bo Vykhovanyuk
Title:
Assistant Vice President___________________
Department: UCIT Office of Information Security
Due to the potential risk and/or business impact related to this request I have deemed that this risk needs
to be reviewed and approved or denied by a University Executive officer (CIO or President).
 Yes this Risk needs further review.
 No, this Risk needs no further review.
Due to the potential risk and/or business impact related to this request I have deemed that this risk needs
to be reviewed and approved or denied by a University Executive officer (CIO or President).
 Yes this Risk needs further review.
 No, this Risk needs no further review.
 Yes, this Risk can be accepted.
 No, this Risk cannot be accepted.
Signed by:
Signature Date:
(Print) Name: Nelson Vincent, EdD
Title: CIO and Associate Dean
Department: UCIT
 Yes, this Risk can be accepted.
 No, this Risk cannot be accepted.
Signed by:
Signature Date:
(Print) Name: Beverly Davenport
Title: Sr. Vice President and Provost__
Department: Office of the Senior Vice President for Academic Affairs & Provost
UCIT OIS Form 40.b
Official Use Only
Version 6.0, 02/26/2013
Appendix A
Terms







Acceptable risk - A term used to describe the minimum acceptable risk that an organization is
willing to take.
Countermeasure or safeguards - Controls, processes, procedures, or security systems that help to
mitigate potential risk.
Exposure - When an asset is vulnerable to damage or losses from a threat.
Exposure factor - A value calculated by determining the percentage of loss to a specific asset
because of a specific threat.
Residual risk - The risk that remains after security controls and security countermeasures have
been implemented.
Risk management - The process of reducing risk to assets by identifying and eliminating threats
through the deployment of security controls and security countermeasures.
Risk analysis - The process of identifying the severity of potential risks, identifying vulnerabilities,
and assigning a priority to each. This may be done in preparation for the implementation of
security countermeasures designed to mitigate high-priority risks.
Criticality Matrix
Most Critical
Highest level of
sensitivity
Critical
Moderate level of
sensitivity
Legal Requirements
Protection of data is
required by law (e.g.,
HIPAA and FERPA data
elements and other
personal identifying
information protected
by law)
The institution has a
contractual obligation to
protect the data (e.g.,
bibliographic citation
data, bulk licensed
software)
Reputation Risk
High
Medium
Other Institutional
Risks
Information that
provides access to
resources, physical or
virtual
Smaller subsets of
Most Critical data
from a school, large
part of a school, or
department
Data Examples








UCIT OIS Form 40.b
Medical
Student
Prospective
student
Personnel
Donor or
prospect
Financial
Contracts
Physical plant



Official Use Only
Information
resources with
access to Most
Critical data
Research detail
or results that
are not Most
Critical
Library
transactions
Least Critical
Very low, but still
requiring some protection
Low




Campus maps
Personal
directory data
(e.g., contact
information)
E-mail
Institutionally
published public
data
Version 6.0, 02/26/2013


detail
Credit card
numbers
Certain
management
information


(e.g., catalog,
circulation,
acquisitions)
Financial
transactions
that do not
include Most
Critical data
(e.g., telephone
billing)
Very small
subsets of Most
Critical data
The Risk Matrix
To determine the degree of urgency attached to a given situation, refer to this table.
Impact
The Risk Matrix
High
High
Probability Medium
Low
Medium Low
A
B
C
A
B
C
B
C
C
Risk Assessment
The UCIT Office of Information Security will assist with Risk Assessment upon request.
UCIT OIS Form 40.b
Official Use Only
Version 6.0, 02/26/2013
Download