Chapter 2 - McGraw Hill Higher Education

Information Assurance for the Enterprise: A Roadmap to Information Security, by Schou and Shoemaker
Chapter 2
Assessing Risk
McGraw-Hill/Irwin
Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Objectives
Elements of risk assessment
 Role and purpose of risk assessment in
information assurance
 Fundamentals of performing a risk assessment
 Audit process to identify and track risks

2-2
Information
Information assurance process is founded on
the ability to anticipate and manage risk
 Risk – possibility that a threat is capable of
exploiting a known weakness or vulnerability
 Risk assessment – operational process by
which risks are identified and characterized


2-3
Explicit, repeatable process, which is well
understood and followed continuously by all
responsible parties
Risk – An Overview

Risk assessments help decision makers
understand:
The things that could go wrong
 How likely they are to occur
 The consequences if it were to happen

2-4
Knowing Where You Stand

Understanding threats


Once all the information has been identified, the
next logical step is to itemize the risks
Identifying risks versus managing them

Risk assessments
• Preventative measures
• Reactive measures

Risk management
• Maintains the effectiveness of measures once they
have been put in place
• Operational security
2-5
Knowing Where You Stand

Providing useful answers
What is the certainty of the risk?
 What is the anticipated impact?


Shaping the response
Probability of occurrence
 Estimate of the consequences


Priorities: matching resources against potential
harm
Maximize operational deployment and resource
use
 Identifying risks with the greatest probability of
occurrence, causing the greatest degree of harm

2-6
Knowing Where You Stand

Methodology: ensuring confidence in
assessment

Built around tangible evidence:
•
•
•
•

Conducting interviews
Documenting observations
Auditing system logs
Examining other relevant records
Scope: making overall assessment process
efficient

Defined precisely and limited to a particular
problem
• Threat picture – basis for deciding how each threat will
be addressed
2-7
Knowing Where You Stand

Ensuring continuity: tracking evolving threats

Maintaining continuous knowledge of three
critical factors:
• Existence and interrelationships among all of the
organization’s information assets
• Specific threat to each asset
• Precise business, financial, and technological issues
associated with each threat
2-8
Making Threats Visible

Risk Classification
Risk identification
 Risk estimation

• Both entail assessment of risks to an entity
• Both tend to be more qualitative than quantitative
• Both result in plausible evidence to support decision
making about the response
2-9
Making Threats Visible

2-10
Relationship between identification and
estimation
Gap Analysis

A standard approach to identifying risk

2-11
Identification of gaps between ideal practice and
the current operation
Gap Analysis

Four major universal standards
ISO 27000 series
 NIST 800-18 (NIST SP 800-37)
 GASSP
 COBIT

2-12
Risk Identification

A range-finding activity
Simplest form of risk classification
 Identify potentially harmful risks

• Gap analysis

Document characteristics of every vulnerability
• Itemize a list of threats that would be able to exploit it

2-13
Track latent threats that could exploit a known
vulnerability
Risk Estimation

A data-driven process

Measure and quantitatively describe each
potential risk
• Assets affected
• Potential duration of the threat
• Severity of adverse impact
Provides substantive data that will serve as the
basis for the risk analysis
 Determines the probability and impact of
identified threats
 Provides data for the analysis and decision
making

2-14
Strategy Formulation

Deciding about the response

ROI
• Identify the adverse impact of threat in terms of cost
• Ensure that the countermeasure does not cost more
than the harm that the threat could cause

Trade-offs
• Likelihood of occurrence
• Frequency of occurrence
• Unit cost for each occurrence
2-15
Strategy Formulation

Making a practical decision
• Annualized Loss Exposure (ALE) = Annual Cost of
Deployment − (Annual Rate of Occurrence × Cost per
Occurrence)

Certainty factors – assuring credibility
• Express degree of certainty of the estimate as a level
of confidence from 0 to 100 percent

Documenting outcomes
• Risk mitigation report specifies:
• Steps selected for each risk
• Countermeasures that will be implemented
• Parties responsible for accomplishing each task
2-16
Security Solution

Deploying countermeasures


2-17
Operational security analysis: in-depth analysis
Implementation stage puts the response in place
Security Solution

Risk analysis
Task – understand precisely the implications of
the threat picture
 Goal – refine further to a point that can be acted
on by decision makers
 Specify a minimum degree of protection to
assess the risk-tolerance


Assigning priorities
Understanding the cost/benefit situation
 Making a risk-mitigation decision

• To reduce the severity or effect of a known risk
• To ensure recovery through a risk transfer
2-18
Security Solution

Asset valuation methods include:






2-19
Applied information economics – assigns a standard unit
of measure (usually financial) to variables
The balanced scorecard – associates organizational
performance with information value using global factors
Economic value added – assigns value by subtracting
costs from any value returned
Economic values sourced – assigns value four ways:
increased revenue, improved productivity, decreased
cycle time, or decreased risk
Portfolio management – considerations like size, age,
performance, and risk determine the value of each item
Real option valuation – constantly considers the value of
each information item over time in order to determine
what the asset contributes
Security Solution: Sample Approach

2-20
The balanced scorecard
Security Solution

Ensuring confidence

The value of a standard method
• Organization will have data to support decisions about
which item to secure and in what order
• Organization will be able to increase its predictive
accuracy and thus sharpen its security control
2-21
Operational Risk Assessment

Continuing periodic assessments of risks
because the security situation is changing
Assures the validity of the strategy and
countermeasures on a periodic basis
 The report is passed on to the people
responsible for maintaining the operational
security and assurance system
 Provides explicit implementation advice about
changes that must be made to countermeasures

2-22
Establishment

Planning for operational risk assessment
Establishing a standard schedule for the
performance of each assessment
 Defined process for problem reporting and
corrective action

2-23
Establishment

Judging performance – importance of standard criteria

Allows to judge with certainty, at any time, for any
countermeasure, whether:
• That control is performing as desired
• It continues to achieve its purpose


Implementing the operational risk assessment process


2-24
The data is used to monitor and ensure the effectiveness
of its information assurance scheme
Ensures that adequate resources are available to support
the assessment activities
Plan should specify the means or criteria that will be used
to determine whether the goals of the process are met
Establishment

Standard measurement

Plans for risk assessment should ensure that
each assessment produces consistent data
• Interprets the degree of risk exposure, as well as the
types of countermeasures that have to be deployed
• Provides an understanding of the precise nature of the
threats and the required response
2-25
Audit

2-26
Assures the integrity of the security solution
from the pervasive influence of process entropy
Audit
Follow-up audit – if a previous audit indicates
the requirement of a follow-up
 Internal audit – conducted within the
organization
 Security audits – to verify compliance with a
specified requirement
 Contractual audit – to determine whether a
specific situation, or deliverable, meets a
customer’s contractual requirements

2-27
Audit

Information assurance audits
Completeness and correctness of the policies
that guide the process
 Execution of the procedures to carry out the
process
 Capability of the management


Aims of an audit
Identify noncompliances (nonconformances),
with particular, specified audit criteria
 Certification, the basis for the audit is a general
standard, or model that is typically specified by a
third party

2-28
Audit

Ensuring continuity

The audit framework specific to information
assurance:
•
•
•
•
•
2-29
Software integrity and controls
Hardware integrity and controls
Database integrity and controls
Compliance with contracts and procedures
Event and incident logs
Audit

Audit and accountability


Control objectives – focused behaviors with
observable outcomes
Committing: establishing the audit process
Normally established by contracts or regulation
 Parties have to agree on specific audit criteria,
scope, procedures, and entry and exit criteria
 Results must be documented and provided
 Responsibility of the party who requests the audit
to define its overall purpose

2-30
Managing the Audit Process

An audit manager is appointed to:
Ensure the audit process is managed separately
and is independent
 Supervise, monitor, and evaluate the activities of
the audit team
 Plan and schedule audit activities
 Assume responsibility for the audit reporting
process
 Control the follow-up procedures

2-31
Managing the Audit Process

2-32
Auditing report process
Managing the Audit Process

Audit planning
Requires the organization to confirm that the
necessary resources are in place
 Types of participants in an audit process:

•
•
•
•
2-33
Auditee – The organization being audited
Lead auditor – The chief auditor
Auditor – The audit team
Client – The organization that engaged the auditors
Details of Execution

Performing the audit – activity at each stage
revolves around either preparing or reviewing
audit documentation
Preparation of working documents from each
audit
 Preparation, validation, and distribution of the
audit forms and checklists

• A good checklist is a key success factor in IA audits

Records generated are kept in event logs
• Automatically maintained by the system and
essentially invisible to users
2-34
Details of Execution

Structure of the overall process requires that:
• Records have to be audited using consistent
methodology and a set level of rigor
• Outcomes and conclusions have to be integrated and
appropriately supported in the body of audit findings
• Audit evidence is typically collected by:
•
•
•
•
•
•
•
2-35
Interviewing personnel
Reading documents
Reviewing operational manuals
Studying operational records
Analyzing operating data
Observing routine activities
Examining routine environmental conditions
Authenticating Audit Evidence

2-36
Evidence obtained must be authenticated
Authenticating Audit Evidence

Critical success factors that must be considered:
Confidentiality – specifically with respect to audit
findings
 Impartiality – all findings are supported by
unambiguous evidence
 High degree of competence
 Discussion with senior managers on findings,
observations, conclusions, and nonconformities
for finalization

2-37
Preparing the Audit Report

The final report will contain statements outlining:
The purpose and scope of the audit
 The audited organization
 Audit targets
 Applicable control structures and standards
 Evaluation criteria
 Observation list classified by major and minor
findings
 The timing of follow-up activities

2-38
Importance of Validation

Actual reporting is a multi-stage activity built
around an iterative communication process
between the auditor and the auditee’s
management and staff

Much of audit is a matter of expert opinion, it is
important to ensure that the perspective is
correct
• Test inferences with the people who do the work
• Validate perspectives by discussing them with
participants
2-39
Certification and Accreditation

Federal Governments use of audit
Documents that can be used to identify and
accept the residual risk – a product-oriented
approach
 Comprehensive evaluation of the technical and
non-technical security features
 Outcome of a C&A process is in the form of a
recommendation that the system should be
accredited as secure, provisionally accredited, or
not accredited

2-40
Certification and Accreditation

Certification covers the following areas:
•
•
•
•
•
•

Physical
Personnel
Administrative
Information
Information systems
Communications
Advantage of using this type of process:
Relies on defined steps that bring responsible
participants together to implement uniform C&A
practice
 Practice is applicable throughout the life cycle of
the system

2-41
Example of C&A Process

The Federal Government’s DITSCAP

There are four phases to a DITSCAP evaluation:
• Phase 1: Definition – agreement on mission,
requirements, scope, audit schedule, level of effort,
and resource commitment
• Phase 2: Verification – certifiers determine the
system’s compliance with SSAA requirements
• Phase 3: Validation – compliance with the SSAA
requirements
• Phase 4: Post Accreditation – review configuration and
security management
2-42
Example of C&A Process

2-43
At minimum, the SSAA should contain the
following information: