Security Risk Management

advertisement
CSE 4482
Computer Security Management:
Assessment and Forensics
Security
Risk Management
Instructor: N. Vlajic,
Fall 2013
Required reading:
Management of Information Security (MIS), by Whitman & Mattord
Chapter 8
Chapter 9
Learning Objectives
Upon completion of this material, you should be
able to:
•
Define risk management and its role in an organization.
•
Use risk management techniques to identify and
prioritize risk factors for information assets.
•
Asses risk based on the likelihood of adverse events and
the effect on information assets when events occur.
•
Document the results of risk identification.
A true story …
A company suffered a catastrophic
loss one night when its office burned
to the ground.
As the employees gathered around
the charred remains the next morning,
the president asked the secretary if
she had been performing the daily computer backups. To his
relief she replied that yes, each day before she went home she
backed up all of the financial information, invoices, orders ...
The president then asked the secretary to retrieve the backup
so they could begin to determine their current financial status.
“Well”, the secretary said, “I guess I cannot do that. You see, I
put those backups in the desk drawer next to the computer in
the office.”
M. Ciampa, “Security+ Guide to Network Sec. Fundamentals”, 3rd Edition, pp. 303
Introduction
“Investing in stocks carries a risk …”
“Bad hand hygiene carries a risk …”
“Car speeding carries a risk …”
“An outdate anti-virus software carries a risk …”
Introduction (cont.)
• Risk – likelihood that a chosen action or activity
(including the choice of inaction) will lead to a
loss (un undesired outcome)
• Risk Management – identification, assessment,
and prioritization of risks followed by coordinated
use of resources to monitor, control or minimize
the impact of risk-related events or to maximize
the gains.


examples: finances, industrial processes, public health
and safety, insurance, etc.
one of the key responsibilities of every manager within
an organization
http://en.wikipedia.org/wiki/Risk_management
Risk in Information Security
• Risks in Info. Security – risks which arise from
an organization’s use of info. technology (IT)

related concepts: asset, vulnerability, threat
http://csrc.nist.gov/publications/nistpubs/800-12/800-12-html/chapter7.html
Risk in Information Security (cont.)
• Asset – anything that needs to be protected because
it has value and contributes to the successful
achievement of the organization’s objectives
• Threat – any circumstance or event with the potential
to cause harm to an asset and result in harm
to organization
• Vulnerability – the weakness in an asset that can
be exploited by threat
• Risk – probability of a threat acting upon a
vulnerability causing harm to an asset
Risk in Information Security (cont.)
• Asset, Threat, Vulnerability & Risk in Info. Sec.
http://en.wikipedia.org/wiki/File:2010-T10-ArchitectureDiagram.png
Risk in Information Security (cont.)
• Interplay between Risk & other Info. Sec. Concepts
http://blog.patriot-tech.com/
Security Risk Management
• Security Risk Management – process of identifying
vulnerabilities in an organization’s info. system
and taking steps to protect the CIA of all of its
components.

Identify
the
Risk Areas
two major sub-processes:
Risk Identification &
Assessment
Risk Control (Mitigation)
Re-evaluate
the Risks
Risk
Management
Cycle
Implement Risk
Management
Actions
Assess the
Risks
Develop Risk
Management
Plan
11
Security Risk Management
Risk Management
Risk Identification
Identify & Prioritize Assets
Identify & Prioritize Threats
Identify Vulnerabilities
between Assets and Threats
(Vulnerability Analysis)
Risk Assessment
Calculate Relative Risk
of Each Vulnerability
Risk Control
Cost-Benefit Analysis
Avoid
Control
Transfer
Mitigate
Accept
Risk Identification
Risk Identification
• Components of Risk Identification
Whitman, Principles of Information Security, pp. 122
Risk Identification (cont.)
Risk Identification:
Asset Inventory
Risk Identification: Asset Inventory
• Risk identification begins with identification of
information assets, including:

No prejudging of asset values should be done at this stage
– values are assigned later!
Risk Identification: Asset Inventory (cont.)
• Identifying Hardware, Software and Networking
Assets


Can be done automatically (using specialized software)
or manually.
Needs certain planning – e.g. which attributes of each
asset should be tracked, such as:
 name – tip: naming should not convey critical info to potential attackers
 asset tag – unique number assigned during acquisition process
 IP address
 MAC address
 software version
 serial number
 manufacturer name
 manufacturer model or part number
Risk Identification: Asset Inventory (cont.)
Example: Network Asset Tracker
http://www.misutilities.com/
http://www.misutilities.com/network-asset-tracker/howtouse.html
Risk Identification: Asset Inventory (cont.)
• Identifying People, Procedures and Data Assets


Not as readily identifiable as other assets – require that
experience and judgment be used.
Possible attributes:
 people – avoid personal names, as they may change, use:
∗ position name
∗ position number/ID
∗ computer/network access privileges
 procedures
∗ description
∗ intended purpose
∗ software/hardware/networking elements to which it is tied
∗ location of reference-document, …
 data
∗ owner
∗ creator
∗ manager
∗ location, …
Risk Identification:
Asset Ranking / Prioritization
Risk Identification: Asset Ranking
• Assets should be ranked so that most valuable
assets get highest priority when managing risks

Questions to consider when determining asset value /
rank:
1) Which info. asset is most critical to overall success
of organization?
Example: Amazon’s ranking assets
Amazon’s network consists of regular desktops and web servers.
Web servers that advertise company’s products and receive orders
24/7 - critical.
Desktops used by customer service department – not so critical.
Risk Identification: Asset Ranking (cont.)
2) Which info. asset generates most revenue?
3) Which info. asset generates highest profitability?
Example: Amazon’s ranking assets
At Amazon.com, some servers support book sales (resulting
in highest revenue), while others support sales of beauty
products (resulting in highest profit).
4) Which info. asset is most expensive to replace?
5) Which info. asset’s loss or compromise would be
most embarrassing or cause greatest liability?
Risk Identification: Asset Ranking (cont.)
Example: Weighted asset ranking (NIST SP 800-30)
Not all asset ranking questions/categories may be equally
important to the company.
A weighting scheme could be used to account for this …
Data asset / information
transmitted:
Each criteria is assigned a weight (0 – 100), must total 100!
Each asset is
assigned a
score (0.1-1.0)
for each critical
factor.
Risk Identification:
Threat Identification
& Prioritization
Risk Identification: Threat Identification
• Any organization faces a wide variety of threats.
• To keep risk management ‘manageable’ …
 realistic threats must be identified and further investigated,
while unimportant threats should be set aside
Example: CSI/FBI survey of types of threats/attacks
Risk Identification: Threat Identification (cont.)
• Threat Modeling/Assessment – practice of building
an abstract model of how an attack may proceed
and cause damage

Attacker-centric – starts from attackers, evaluates their
motivations and goals, and how they might achieve them
through attack tree.
http://www.uio.no/studier/emner/matnat/ifi/INF3510/v12/learningdocs/INF3510-2012-L03.pdf
Risk Identification: Threat Identification (cont.)
• Threat Modeling/Assessment

System-centric – starts from model of system, and
attempts to follow model dynamics and logic, looking
for types of attacks against each element of the model.
http://www.uio.no/studier/emner/matnat/ifi/INF3510/v12/learningdocs/INF3510-2012-L03.pdf
Risk Identification: Threat Identification (cont.)
• Threat Modeling/Assessment

Asset-centric – starts from assets entrusted to a system,
such as a collection of sensitive personal information, and
attempts to identify how CIA security breaches can happen.
http://www.uio.no/studier/emner/matnat/ifi/INF3510/v12/learningdocs/INF3510-2012-L03.pdf
Risk Identification: Threat Prioritization
• Questions used to prioritize threats:

Which threats present a danger to organization’s
assets in its current environment? ( ‘pre-step’ )
 Goal: reduce the risk management’s scope and cost.
 Examine each category from CSI/FBI list, or as identified through
threat assessment process, and eliminate any that do not apply to your
organization.

Which threats represent the most danger … ?
 Goal: provide a rough assessment of each threat’s potential impact
given current level of organization’s preparedness.
 ‘Danger’ might be a measured of:
1) severity, i.e. overall damage that the threat could create
2) probability of the threat attacking this particular organization
Risk Identification: Threat Prioritization (cont.)
• Other questions used to assess/prioritize threats:


How much would it cost to recover from a successful
attack?
Which threats would require greatest expenditure
to prevent?
• Threat ranking can be quantitative or qualitative.
• Once threats are prioritized, each asset should be
reviewed against each threat to create a specific
list of vulnerabilities.
Risk Identification:
Vulnerability Analysis
Vulnerability Analysis
• Vulnerability – flaw or weakness in an info. asset,
its design, control or security
procedure that can be exploited
accidentally or deliberately


sheer existence of a vulnerability does
not mean harm WILL be caused – threat
agent is required
vulnerabilities are characterized by the
level of tech. skill required to exploit them
 vulnerability that is easy to exploit is often
a high-danger vulnerability
Asset
Vulnerability
Threat
Vulnerability Analysis (cont.)
Example: Vulnerability assessment of critical files
people open
suspicious e-mail
attachments
[procedural / control
weakness]
Deliberate
Software
Attack –
Virus Attack
antivirus software not
up-to-date &
file copying off
USBs allowed
desktop (files)
Asset
[procedural / control
weakness]
Vulnerability
Threat
Vulnerability Analysis (cont.)
Example: Vulnerability assessment of critical files
NIC can support datarates of up to 50 Mbps
[design weakness]
DDoS
Attack
CPU ‘freezes’ at
10,000 packets/sec
server
Asset
[design/implementation
flaw]
Vulnerability
Threat
Vulnerability Analysis (cont.)
Example: Vulnerability assessment of a router
temperature control in
router/server room is
not adequate ⇒ router
overheats and
shuts downs
[control weakness,
design flaw]
net. administrator
allows access to
unauthor. user ⇒
unauthor. user uploads a
virus, router crashes
router
[control / procedural
weakness]
Asset
Vulnerability
Act of Human
Error or
Failure
Threat
Vulnerability Analysis (cont.)
Example: Vulnerability assessment of a DMZ router
Asset !!!
http://technet.microsoft.com/enus/library/cc723507.aspx#XSLTsection123
121120120
Vulnerability Analysis (cont.)
• TVA Worksheet – at the end of risk identification
procedure, organization should
derive threats-vulnerabilitiesassets (TVA) worksheet


this worksheet is a starting point for
risk assessment phase
TVA worksheet combines prioritized
lists of assets and threats
 prioritized list of assets is placed along
x-axis, with most important assets on
the left
 prioritized list of threats is placed along
y-axis, with most dangerous threats at
the top
 resulting grid enables a simplistic
vulnerability assessment
Vulnerability Analysis (cont.)
If one or more vulnerabilities exist between T1 and A1, they can be categorized as:
T1V1A1 – Vulnerability 1 that exists between Threat 1 and Asset 1
T1V2A1 – Vulnerability 2 that exists between Threat 1 and Asset 1, …
If intersection
between T2 and
A2 has no
vulnerability,
the risk
assessment team
simply crosses
out that box.
Risk Assessment
Risk Assessment
• Summary of Vulnerability Analysis
Act of human error or failure
People
Procedure
Data
Software
Hardware
Networking
Deliberate act of trespass
cause
damage
(loss)
flaw or
weakness
in asset’s
exploit
design,
implementation,
control or
security procedure
Deliberate act of extortion
Deliberate act of sabotage
Deliberate software attacks
Technical software failures
Technical hardware failures
Forces of nature
Etc.
Vulnerability
Asset
Threat
Risk Assessment (cont.)
• Risk Assessment – provides relative numerical
risk ratings (scores) to each
specific vulnerability
 in risk management, it is not the
presence of a vulnerability that really
matters, but the associated risk!
• (Security) Risk – quantifies: 1) possibility that a
threat successfully acts upon a vulnerability and
2) how severe the consequences would be
R=P*V


P = probability of risk-event occurrence
V = value lost / cost to organization
Risk Assessment (cont.)
Weighted score
indicating the
relative
importance
(associated
loss) of the
given asset.
Should be used
if concrete
$ amounts are
not available.
Risk Assessment (cont.)
• Extended Risk Formula v.1.
R = Pa ⋅ P s ⋅ V
P



Pa = probability that an attack/threat (against a
vulnerability) takes place
Ps = probability that the attack successfully exploits
the vulnerability
V = value lost by exploiting the vulnerability
Vulnerability
Asset
Threat
Risk Assessment (cont.)
• Extended Risk Formula v.2.
R = Pa ⋅ (1-Pe) ⋅ V
Ps

Pe = probability that the system’s security measures
effectively protect against the attack
(reflection of system’s security effectiveness)
Ps
= probability
that the attack
is successfully
executed
Pe
= probability
that the attack
is NOT successfully
executed, i.e.
system defences are
effective
Risk Assessment (cont.)
• Extended Whitman’s Risk Formula *
R = P ⋅ V – CC [%] + UK [%]
LE = Loss Expectancy
(i.e. Potential Loss)




P = probability that certain vulnerability (affecting a
particular asset) get successfully exploited
V = value of information asset ∈ [1, 100]
CC = current control = percentage of risk already mitigated
by current control
UK = uncertainty of knowledge = uncertainty of current
knowledge of the vulnerability (i.e. overall risk)
* One of many risk models. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.211.7952
Risk Assessment (cont.)
• Extended Whitman’s Risk Formula (cont.)
R = P ⋅ V – CC ⋅ (P ⋅ V) + UK ⋅ (P ⋅ V) =
= P ⋅ V ⋅ [ 1 – CC + UK ]
Mathematically more sound expression!


CC = current control = fraction of risk already mitigated
by current control
UK = uncertainty of knowledge = fraction of risk that is
not fully known
Risk Assessment (cont.)
• Extended Whitman’s Risk Formula (cont.)
R = P * V – CC [%] + UK [%]
For many vulnerabilities respective
probabilities are known. E.g. the likelihood
that any given email will contain a virus or
worm and those get ‘activated’ by the user.
If a vulnerability is fully managed by an
existing control, it can be set aside.
(In this case, R≤0.)
It is not possible to know everything about a vulnerability,
respective threat, or how great an impact a successful attack
would have.
A factor that accounts for uncertainty of estimating the given
risk should always be added to the equation.
Risk Assessment (cont.)
Example: Risk determination
Asset A
Has a value of 50.
Has one vulnerability, with a likelihood of 1.0.
No current control for this vulnerability.
Your assumptions and data are 90% accurate.
P=1
A
V = 50
Asset B
Has a value of 100.
P = 0.5 P = 0.1
Has two vulnerabilities:
* vulnerability #2 with a likelihood of 0.5, and
a current control that addresses 50% of its risk;
B
* vulnerability #3 with a likelihood of 0.1 and
V = 100
no current controls.
Your assumptions and data are 80% accurate.
Which asset/vulnerability should be dealt with first ?!
Risk Assessment (cont.)
Example: Risk determination (cont.)
The resulting ranked list of risk ratings for the three
vulnerabilities is as follows:
Asset A:
Vulnerability 1 rated as 55 = (50×1.0) – 50*0 + 50*0.1
Asset B:
Vulnerability 2 rated as 35 = (100×0.5) – 50*0.5 + 50*0.2
Asset B:
Vulnerability 3 rated as 12 = (100×0.1) – 10*0 + 10*0.2
Risk Assessment (cont.)
• Documenting Results – 5 types of documents
Of Risk Assessment
ideally created
1) Information asset classification worksheet
2) Weighted asset worksheet
3) Weighted threat worksheet
4) TVA worksheet
5) Ranked vulnerability risk worksheet
 extension of TVA worksheet, showing only the assets
and relevant vulnerabilities
 assigns a risk-rating ranked value for each uncontrolled
asset-vulnerability pair
Risk Assessment (cont.)
A: vulnerable
assets
AI: weighted
asset value
V: each asset’s
vulnerability
VL: likelihood
of vulnerability
realization
AI x VL
Customer service email
has relatively low value
but represents most
pressing issue due to
high vulnerability
likelihood.
Risk Assessment (cont.)
• At the end of risk assessment process, the TVA
and/or ranked-vulnerability worksheets should
be used to develop a prioritized list of tasks.
Risk Assessment (cont.)
• Automated Risk Assessment Tools: SKYBOX
http://www.skyboxsecurity.com/resources/product-demos/product-demo-skyboxrisk-control-vulnerability-management
Risk Control
Risk Control Strategies
Once all vulnerabilities/risks are evaluated, the company has to decide
on the ‘course of action’ – often influenced by $$$ …
risk high, cost low
risk low, cost high
Computer Security, Stallings, pp. 487
Risk Control Strategies (cont.)
• Basic Strategies to Control Risks

Avoidance
 do not proceed with the activity or system that creates this risk

Reduced Likelihood (Control)
 by implementing suitable controls, lower the chances of the
vulnerability being exploited

Transference
 share responsibility for the risk with a third party

Mitigation
 reduce impact should an attack still exploit the vulnerability

Acceptance
 understand consequences and acknowledge risks without
any attempt to control or mitigate
Risk Control Strategies (cont.)
• Avoidance – strategy that results in complete
abandonment of activities or
systems due to overly excessive risk


usually results in loss of convenience or
ability to preform some function that is
useful to the organization
the loss of this capacity is traded off
against the reduced risk profile
Recommended for vulnerabilities with
very high risk factor
that are very costly to fix.
Risk Control Strategies (cont.)
• Reduced – risk control strategy that attempts
Likelihood to prevent exploitation of vulnerability
by means of following techniques:

application of technology
 implementation of security controls and
safeguards, such as: anti-virus software,
firewall, secure HTTP and FTP servers, etc.

policy
 e.g. insisting on safe procedures

training and education
 change in technology and policy must be
coupled with employee’s training and education
Recommended for vulnerabilities with
high risk factor that are moderately costly to fix.
Risk Control Strategies (cont.)
• Transference – risk control strategy that attempts
to shift risk to other assets, other
processes or other organizations

if organization does not have adequate
security experience, hire individuals or
firms that provide expertise
 ‘stick to your knitting’!
 e.g., by hiring a Web consulting firm, risk
associated with domain name registration,
Web presence, Web service, … are passed
onto organization with more experience
Recommended for vulnerabilities with
high risk factor that are moderately costly to fix
if employing outside require expertise.
Risk Control Strategies (cont.)
• Mitigation – risk control strategy that attempts to
reduce the likelihood or impact caused
by a vulnerability – includes 3 plans:
(1)
(2)
(3)
Risk Control Strategies (cont.)
• Acceptance – strategy that assumes NO action
towards protecting an information
asset – instead, accept outcome …

should be used only after doing all of the
following
 assess the probability of attack and likelihood
of successful exploitation of a vulnerability
 approximate annual occurrence of such an
attack
steps
to be
discussed
 estimate potential loss that could result
from attacks
 perform a thorough cost-benefit analysis
assuming various protection techniques
 determine that particular asset did not
justify the cost of protection!
Risk Control Strategies (cont.)
How do we know whether risk control techniques
gave worked / are sufficient?!
Example: Risk tolerance vs. residual risk
Risk
Company’s
Risk Tolerance
Residual Risk
vulnerability risk
before controls
vulnerability risk
after controls
Time
Risk Control Strategies (cont.)
• Risk Tolerance – risk that organization is willing
to accept after implementing
risk-mitigation controls
• Residual Risk – risk that has not been completely
removed, reduced or planned for,
after (initial) risk-mitigation
controls have been employed


goal of information security is not to
bring residual risk to 0, but to bring
it in line with companies risk tolerance
risk-mitigation controls may (have
to) be reinforced until residual risk
falls within tolerance
Risk Control Strategies (cont.)
• Risk Handling – helps choose one among four
Decision Process risk control strategies
Is system
Is vulnerability
risk tolerance
Attacker not
likely to attack.
Initial estimated risk
below risk tolerance.
acceptance
Risk Control Strategies (cont.)
• Risk Control – after control has been selected &
Cycle
implemented, control should be
monitored and (if needed) adjusted
on an on-going basis
Risk Control Strategies (cont.)
• Four groups that bear responsibility for effective
management of security risks, each with unique
roles:




Information Security Management – group with
leadership role – most knowledgeable about causes of
security risks (security threats and attacks)
IT Community / Management – group that helps build
secure systems and ensure their safe operation
General Management – must ensure that sufficient
resources (money & personnel) are allocated to IT and
info. security groups to meet organizational security needs
Users – (when properly trained) group that plays critical
part in prevention, detection and defence against security
threats/attacks
Download