DETAILED RISK ASSESSMENT REPORT Executive Summary During the period May 22, 2015 to June 8, 2015 a detailed inventory of information assets and an information security risk assessment were performed in Company ABC. ABC is an information Technology and Service Consulting organization specializing providing its customers with inclusive technology solutions, including, software licenses, hardware products and IT services. The register creation and risk assessment identified a number of average risk items that should be addressed by the management. DETAILED ASSESSMENT 1. Introduction 1.1 Purpose The aim of carrying out the asset registration and the risk assessment was to identify risks and susceptible elements of Security Operations Centre’s (SOC) Information Security Management System (ISMS). Firstly, a risk register was drawn to allow the assessment team take scope of all the information assets at ABC Company. Components in the SOC department were analysed in order to determine the level of security each boosted. Following that, this assessment will be used to come up with a risk mitigation and treatment plan for each affected asset and their respective department. Several items in the centre stood out as high risk. These are database indexes, stored procedures and general administration style. 1.2. Scope of this risk assessment Page 1 SOC’s information Security Management System is composed of several components. The tables are used for data storage. This data regards SOC’s employees’ personally identifiable information such as names, training needs, certifications, appraisal performance metrics, reward scheme points. Indexes in the SOC are used to make the process of data retrieval quicker. The indexes have unique values for their unique keys. Views are used to create pre built queries and canned controls to allow the administrators and SOC system developers quickly avoid tabulated data getting complicated at the relationship level. Stored Procedures are programs developed by SOC engineers using Oracle’s PL/SQL to loop through records faster and more efficiently. The Procedures allow the administrator conduct if-then logic, traverse record by record and call special built in functions to aid in complex database calculations. Triggers are orders executed when important events for instance update of metrics records is done or a deletion of a record is made. The scope of the risk assessment includes all the above elements. Additional components are stateless firewalls that currently exist, web applications and operating systems (Windows 7 Enterprise/ OS). All these form part of the scope for analysing risk in the SOC database and the entire department. 2. Risk Assessment Approach 2.1 Participants Role Participant System owner ####### System custodian Jane Doe Page 2 Chief SOC Database administrator Jane Doe Security administrator John Doe Risk assessment team Author, author, author 2.2 Techniques used Technique Description Questionnaire The team customized the NIST questionnaire template from http://csrc.nist.gov/publications/nistpubs/index.html. Assessment Tools The team used nmap and AppScan to test security and system’s configurations. Vulnerability Sources Several vulnerability sources were utilized including the following: Microsoft Security Advisories (www.microsoft.com/security) NIST I-CAT vulnerability database (http://icat.nist.gov) Review of documentation SANS Top 20 (http://www.sans.org/top20/) The risk assessment team reviewed ISMS security policies, system documentation, network diagrams and operational manuals for each asset. Site visit The group carried out a site visit to the organisation Page 3 and reviewed the SOC system components while performing control tests. The team conducted interviews to certify Interviews information from other sources. Among those interviewed include SOC manager, SOC engineers and SOC database administrators. 2.3 Risk Model To determine the risk associated with each information asset in the organization, the assessment team used the following model: Risk rating =Current probability x Unit impact To calculate above, the risk rating was automated in an Excel function for each test asset. 2.3.1 Threat Probability Likelihood Definition Very likely considered to have chance of occurring every month (up to 100% probability) High considered to have chance of occurring once within the next two months or up to six times a year (up to 50% probability in next month) Moderate considered to have chance of occurring once within the next six months or up to twice a year (up to17% probability) Page 4 Low considered to have chance of occurring once within the next year or up to twice within two years (up to 8% probability) Very low considered to have a chance of occurring once within the next two years (up to 4% probability) 2.3.2 Unit Impact Impact Definition Critical (100%) Either: sustained or ongoing negative national media publicity; or financial loss or impact exceeding £1m for Unit; or majority of Unit affected for more than 1 month Major (80%) Either: one-off negative national media publicity; or financial loss or impact from £100k - £1m for Unit; or majority of Unit affected for up to 1 month Moderate (62%) Either: negative national media publicity likely but controllable; or financial loss or impact from £20k - £100k for Unit; or part of Unit affected on on-going basis Minor (25%) Either: negative publicity limited to Unit; or financial loss or impact from £1k £20k for Unit; or small part of Unit affected on on-going basis Insignificant (1%) Either: negative publicity limited to part of Unit; or financial loss or impact up to £1k for Unit; or individuals within Unit affected for very short period Page 5 Following the tabulation, risk rating was determined as follows: Unit Impact Threat Insignificant Minor Moderate Major Critical Probability (1%) (25%) (62%) (80%) (100%) Low Risk Medium Risk High Risk High Risk High Risk 100%x1%=1% 100%x25%=25% 100%x62%=62% 100%x80%=80% 100%x100%=100% High Low Risk Medium Risk Medium Risk Medium Risk Medium Risk (50%) 50%x1%=0.5% 50%x25%=12.5% 50%x62%=31% 50%x80%=40% 50%x100%=50% Moderate Low Risk Low Risk Medium Risk Medium Risk Medium Risk (17%) 17%x1%=0.2% 17%x25%=4.3% 17%x62%=10.5% 17%x80%=13.6% 17%x100%=17% Medium Low Risk Low Risk Low Risk Low Risk Low Risk (8%) 8%x1%=0.1% 8%x25%=2% 8%x62%=5% 8%x80%=6.4% 8%x100%=8% Low Low Risk Low Risk Low Risk Low Risk Low Risk (4%) 4%x1%=0.04% 4%x25%=1% 4%x62%=2.5% 4%x80%=3.2% 4%x100%=4% Very Likely (100%) Risk Scale: Low (1 to 10); Medium (>10 to 50); High (>50 to 100) 3.0 System Characterisation 3.1 Technology Components Component Description Applications In house developed server pages, using Oracle XE Database Oracle XE Operating System Windows 7 Enterprise OS Page 6 Protocols Open DataBase Connectivity for Communications (ODBC) among the SOC databases. 3.2 Data used by Information assets Data Non physical information Description Includes o forms o processes o databases including names addresses recruitment documentation Photograph Ethnicity Serial umbers tags Information on physical asset and hardware Includes o Biometric devices o Multifactor o Wired and wireless corporate network o Encrypted USBs o Encryptors o Storage devices Software Include o Standard applications Include o Managerial secure room o Secure computer with a hardened OS and disable disk and flash drives o Cellular signal blocker o Motion and camera detectors o Access control facilities Visitors badge Fingerprint scanners Pulse scanner Secure key cabinets o Grid and alternative power sources o Fire suppressants including Argon gas Dry sprinkler Fire doors Services data Page 7 o o o Personally identifiable information o o o o o o o Carefully located data buildings Includes Database on all employees Name Address (current and previous) Phone Number Database of SOC employees All communication assets such as fax and mobile phones Archived information Contingent arrangements Archives Disaster mitigation strategies Configuration databases 3.3 Flow diagram The diagram below illustrates the information security management system components as information assets in the SOC section of ABC that relates and interacts in the intra-organization sphere. The SOC database is the central information asset in the Security Operations Centre department. The databases may be considered as an entire back end service from the entire organization’s point of view. PERSONALL Y IDENTIFIABLE INFORMATION SECURITY OPERATIONS CENTRE’S DATABASE FINANCIAL RECORDS JOB DESCCRPTION AND SPECFICATION DEVEOPLMENTA AND TRAINING PROGRAM Page 8 BACK OFFICE: DATABASE ADMIN BACK OFFICE: DATABASE AADMIN PERFORMANCE METRICS 4. Vulnerability Statement The team identified the following likely liabilities: Vulnerability Description Confidentiality With a bit of technical knowledge, non cleared employees/ staff working at the Security Operations Centre with an ill motive may be able to eavesdrop on sensitive information they are not cleared for Non repudiation The front end hubs at the SOC have weak passwords. Attackers could exploit this weakness and issue ill instructions to unwary network users by usurping the role of network managers. Authentication The SOC database cross check employed is lacking. The only check existent is password authentication. No biometric devices, tokens and usernames are used to ascertain the administrators’ credentials Data availability Data served by the communication assets that support the SOC databases is not available in a secure manner. Malicious people with descriptors may be able to wiretap and eaves drop both confidential and non confidential communications since the current level of encryption is outdated Data integrity Data bases at SOC have non encrypted data due to their separation from the public network, data integrity and system information may be Page 9 compromised by infection of viruses or malicious scripts. The viruses may the buffer flow vulnerability. These may be then used to spy or commit industrial espionage Data Leaks While the SOC databases is not connected to any public network, internet based threats are still posed. The network interface of the databases may be compromised by hackers if they manage to capture this traffic. Theft Disgruntled insiders are likely to steal archived information for profit, revenge or for money. This more so happens where the archives aren’t encrypted. Hopscotch Were the records in the database to fall in the hands of a cyber criminal, hopscotch may be committed where the perpetrator digs deep by playing the game of leverage for bigger attacks until he/she reaches the database’s back-end SQL- injection This may be perpetrated by hackers who inject applications with malicious code and scripts as strings which are later forwarded as instances to the SQL server to parse and execute. Sub-standard key SOC’s keys are currently stored on disk drives. Despite this being a management safe management systems policy, the security of the drives has to be checked to ensure that they do not fall to the wrong hands. Database SOC’s general database vulnerability was largely culminated by this inconsistencies general factor. This problem is more administrative and less tied to the technology of databases Page 10 5. Remediation 5.1 Threat Statement Threat Source Hacker Poor administration Threat Action Unauthorized system access Password cracking Virus infection Data leaking Trojan horses Worms Social engineering Database inconsistencies Poor keys management Insider(disgruntled, Malicious script poorly trained, or careless Bugs employee ) SQL injections Black mail Data theft Browsing personally identifiable information Eaves dropping Industrial espionage Spying Denial of service Competitor Joker Page 11 Hop scotching Data theft 5.2 Risk assessment results The mitigation actions above will hopefully ensure SOC employee’s personal and sensitive information secured. The framework will form a governance policy to ensure that the stored information is handled securely, effectively efficiently and legally. Consequently, SOC will avoid consequences of going against data protection legislation and policies which range from insignificant to illegal: o Penalties for breaking data safeguarding laws can be huge such that a company way incur a fine of up to £500,000 in each instance of breach alongside accompanying sanctions. o Individual SOC employees who may be guilty of information breaches may be exposed to disciplinary action and possible suspension or dismissal o The morale and confidence of employees for the whole organization may lessen. This could be a blow to ABCs reputation and would tarnish the image of the company in the society. Consequently, the image would take a longer time to rebuild than initially. Item Observation Threat Existing Likely source/vulnerability controls hood The outbound Eaves dropping/ Limited high communications industrial espionage corroboration Number 1 are not properly checks Page 12 Impact Very high Risk Recommended rating controls 80% Adopt modern encryption keys for all outbound encrypted 2 communication The databases SQL injections, Stateful support worming, viruses firewalls High high 62% Stateless firewalls since they are more applications have secure, faster and outdated firewall require less memory protection 3 The database’s Hackers/ crackers Passwords High High 62% Require the use of administrators’ must be at special characters database have least eight with at least two weak passwords characters roman numerals long 4 Poor Database none High High 62% Ensuring that administration inconsistencies, poor proposed database keys administrative security, policies consider all foreseeable scenarios of enabling database inconsistent such as different clearance levels as in various database record stacks 5 Data leaks Network threats from none High High 62% hackers and crackers TSL or SSL encrypted communication platform 6 Enterprise SQL injections none database High High 80% Guard web-facing database nodes with Page 13 protection Stateful firewalls and test all input variables for SQL-injection in development stage 6 Poor key Lost keys and back Cabinet filed management ups Disk drives High High 62% The keys be put in protected statecan to reduce attack vulnerability 5.3 Basic Requirements The landscape of threats is ever-changing and hence information assets require to be safe guarded proactively. To realize the recommended controls, Security Operations Centre may be guided by an approach that includes assessment, expanded policy base and ongoing operations improvement. The expanded policy base involves defining an ample set of asset security roles and responsibilities. This will tackle the human aspects contributing to weakness in the ISMS. In this regard there is need for the informational security system to be completely proactive rather than geared toward occurrence detection alone. Assessments involve gauging the databases performance in regards to information assets security and comparison with optimum database standards. These assessments should range from monthly reviews to facilitate optimal performance to critical needs that have monetary/ funding implications. Ongoing operations improvements are geared to the provision of protection and monitoring of database components and intra-organizational networks linked to them. As part of this encryptors are required for all data being transmitted into SOC network. Automating sour detection of bad actors can involve a heavy investment but potentially save ABC huge amounts of finances in the future. Page 14 References Microsoft (2014). Safety and Security Centre. Retrieved May, 25, 2015 from http://www.microsoft.com/security/default.aspx National Vulnerability Database (2015) NIST. Retrieved May, 25, 2015 from http://icat.nist.gov/ SANS (2015). Critical Security Controls for Effective Cyber Defense. Retrieved May, 25, 2015 from http://www.sans.org/critical-security-controls/ Page 15