Managing Risk Security Planning Susan Lincke

advertisement
Managing Risk
Security Planning
Susan Lincke
Security Planning: An Applied Approach | 6/21/2016 | 2
Objectives
Students should be able to:
Define risk management process: risk management, risk assessment, risk analysis, risk
appetite, risk treatment, accept residual risk
Define treat risk terms: risk acceptance/risk retention, risk avoidance, risk
mitigation/risk reduction, risk transference
Describe threat types: natural, unintentional, intentional, intentional (non-physical)
Define threat agent types: hacker/crackers, criminals, terrorists, industry spies, insiders
Describe risk analysis strategies: qualitative, quantitative
Define vulnerability, SLE, ARO, ALE, due diligence, due care
Security Planning: An Applied Approach | 6/21/2016 | 3
How Much to Invest in Security?
How much is too much?
Firewall
Intrusion Detection/Prevention
Guard
Biometrics
Virtual Private Network
Encrypted Data & Transmission
Card Readers
Policies & Procedures
Audit & Control Testing
How much is too little?
Hacker attack
Internal Fraud
Loss of Confidentiality
Stolen data
Loss of Reputation
Loss of Business
Penalties
Legal liability
Theft & Misappropriation
Antivirus / Spyware
Wireless Security
Security is a Balancing Act between Security Costs & Losses
Security Planning: An Applied Approach | 6/21/2016 | 4
Risk Management
Structure
Internal Factors
External Factors
Risk Mgmt Strategies are determined by both internal & external factors
Risk Tolerance or Appetite: The level of risk that management is comfortable with
Security Planning: An Applied Approach | 6/21/2016 | 5
Risk Appetite
Do you operate your computer with or without antivirus
software?
Do you have antispyware?
Do you open emails with forwarded attachments from friends or
follow questionable web links?
Have you ever given your bank account information to a foreign
emailer to make $$$?
What is your risk appetite?
If liberal, is it due to risk acceptance or ignorance?
Companies too have risk appetites, decided after evaluating risk
Security Planning: An Applied Approach | 6/21/2016 | 6
Risk Management Process
Security Planning: An Applied Approach | 6/21/2016 | 7
Continuous Risk Mgmt Process
Risk
Appetite
Risks change with time as
business & environment changes
Controls degrade over time
and are subject to failure
Countermeasures may open
new risks
Identify &
Assess Risks
Develop Risk
Mgmt Plan
Proactive
Monitoring
Implement Risk
Mgmt Plan
Security Planning: An Applied Approach | 6/21/2016 | 8
Risk Assessment Overview
Five Steps include:
1.Assign Values to Assets:
Where are the Crown Jewels?
2.Determine Loss due to Threats & Vulnerabilities
Confidentiality, Integrity, Availability
3.Estimate Likelihood of Exploitation
Weekly, monthly, 1 year, 10 years?
4.Compute Expected Loss
Loss = Downtime + Recovery + Liability + Replacement
Risk Exposure = ProbabilityOfVulnerability * $Loss
5.Treat Risk
Reduce, Transfer, Avoid or Accept Risk
Risk Leverage = (Risk exposure before reduction) – (risk exposure after
reduction) / (cost of risk reduction)
Security Planning: An Applied Approach | 6/21/2016 | 9
Step 1:
Determine Value of Assets
Identify & Determine Value of Assets (Crown Jewels):
Assets include:
• IT-Related: Information/data, hardware, software, services, documents,
personnel
• Other: Buildings, inventory, cash, reputation, sales opportunities
What is the value of this asset to the company?
How much of our income can we attribute to this asset?
How much would it cost to recover this?
How much liability would we be subject to if the asset were
compromised?
Helpful websites: www.attrition.org
Security Planning: An Applied Approach | 6/21/2016 | 10
Determine Cost of Assets
Costs
Tangible $
Sales
Risk:
Product A
Risk:
Product B
Product C
Risk:
Intangible: High/Med/Low
Replacement Cost=
Cost of loss of integrity=
Cost of loss of availability=
Cost of loss of confidentiality=
Replacement Cost=
Cost of loss of integrity=
Cost of loss of availability=
Cost of loss of confidentiality=
Replacement Cost=
Cost of loss of integrity=
Cost of loss of availability=
Cost of loss of confidentiality=
Security Planning: An Applied Approach | 6/21/2016 | 11
Matrix of Loss Scenario
(taken from CISM Exhibit 2.16)
Size
of
Loss
Repu- Lawtation suit
Loss
Fines/
Reg.
Loss
Market
Loss
Exp.
Yearly
Loss
Hacker steals customer
data; publicly blackmails
company
1-10K
Recor
ds
$1M$20M
$1M$10M
$1M$35M
$1M$5M
$10M
Employee steals strategic
plan; sells data to
competitor
3-year Min.
Min.
Min.
$20M $2M
Backup tapes and Cust.
data found in garbage;
makes front-page news
10M
Recor
ds
$20M
$20M
$10M
$5M
$200K
Contractor steals employee
data; sells data to hackers
10K
Recor
ds
$5M
$10M
Min.
Min.
$200K
Security Planning: An Applied Approach | 6/21/2016 | 12
Step 1:
Determine Value of Assets
Asset
Name
$ Value
Direct Loss:
Replacemen
t
$ Value
Consequential
Financial Loss
Registration $10,000
Server
Breach Not.
Law=$804,000
Registration loss per
day =$16,000
Forensic help =
$100,000
Grades
Server
Lawsuit = $1 million
FERPA = $1 million
Forensic help =
$100,000
$10,000
Work
book
Confidentiality, Integrity,
and Availability
Notes
Affects: Confidentiality,
Availability.
Conf=> Breach Notification
Law
=>Possible FERPA Violation
=>Forensic Help
Availability=> Loss of
Registrations
Affects: Confidentiality,
Integrity.
Integrity => Student Lawsuit
Confidentiality => FERPA
violation
Both => Forensic help
Security Planning: An Applied Approach | 6/21/2016 | 13
Consequential Financial Loss Calculations
Consequential
Financial Loss
Total
Loss
Lost business for one
day (1D)
Breach not. law
1D=
$16,000
$804,000
Lawsuit
Forensic Help
$1 Million
$100,000
FERPA
$1 Million
Calculations or Notes
Registration = $0-500,000 per day in
income (avg. $16,000)
Breach Not. Law Mailings=
$201 x 4000 Students =$804,000
Student lawsuit may result as a liability.
Professional forensic/security help will be
necessary to investigate extent of attack
and rid system of hacker
Violation of FERPA regulation can lead
to loss of government aid, assumes
negligence.
Security Planning: An Applied Approach | 6/21/2016 | 14
Statistics from Ponemon Data Breach
Study 2014
sponsored by IBM
Category
Data breach
cost – total
Data breach
cost –
components
Breach Type
Malicious or criminal attack (44% of
breaches)
Employee error (31% of breaches)
System glitch (25% of breaches)
Average
Indirect costs: Internal employee time
and abnormal churn of customers
External expenses: forensic expertise,
legal advice, victim identity protection
services
Avg. cost per
compromised record
$246
$160
$171
$201
$134
$67
Security Planning: An Applied Approach | 6/21/2016 | 15
More 2014 Ponemon Statistics
Prob of Breach
Communications
Consumer
Education
Energy
Financial
Health care
Hospitality
Industry
Media
Pharmaceutical
Public sector
Research
Retail
Services
Technology
Transportation
15.6%
19.9%
21.1%
7.5%
17.1%
19.2%
19.5%
9.0%
19.7%
16.9%
23.8%
11.5%
22.7%
19.8%
18.9%
13.5%
Cost per record
219
196
259
237
236
316
93
204
183
209
172
73
125
223
181
286
Churn rate
1.2
2.6
2.0
4.0
7.1
5.3
2.9
3.6
1.9
3.8
0.1
0.7
1.4
4.2
6.3
5.5
Security Planning: An Applied Approach | 6/21/2016 | 16
Step 2: Determine Loss
Due to Threats
Human Threats
Physical Threats
Natural: Flood, fire, cyclones,
hail/snow, plagues and earthquakes
Ethical/Criminal: Fraud, espionage,
hacking, social engineering, identity theft,
malware, vandalism, denial of service
Unintentional: Fire, water, building
damage/collapse, loss of utility
services and equipment failure
External Environmental: industry
competition, contract failure, or changes
in market, politics, regulation or tech.
Intentional: Fire, water, theft and
vandalism
Internal: management error, IT
complexity, organization immaturity,
accidental data loss, mistakes, software
defects, incompetence and poor risk
evaluation
Security Planning: An Applied Approach | 6/21/2016 | 17
Threat Agent Types
Hackers/
Crackers
Criminals
Challenge, rebellion
Financial gain,
Disclosure,
destruction of info.
Spying, destruction,
revenge, extortion
Unauthorized
access
Fraud, computer
crimes
Terrorists/
Hostile Intel.
Service
Industry Spies Competitive
advantage
DOS, info warfare
Insiders
Fraud/ theft,
malware, abuse
Opportunity, personal
issues
Info theft, econ.
exploitation
Security Planning: An Applied Approach | 6/21/2016 | 18
Step 2: Determine Threats
Due to Vulnerabilities
System
Vulnerabilities
Behavioral:
Disgruntled employee,
uncontrolled processes,
poor network design,
improperly configured
equipment
Misinterpretation:
Poorly-defined
procedures,
employee error,
Insufficient staff,
Inadequate mgmt,
Inadequate compliance
enforcement
Coding
Problems:
Security ignorance,
poorly-defined
requirements,
defective software,
unprotected
communication
Physical
Vulnerabilities:
Fire, flood,
negligence, theft,
kicked terminals,
no redundancy
Security Planning: An Applied Approach | 6/21/2016 | 19
Step 3: Estimate Likelihood of
Exploitation
Best sources:
Past experience
National & international standards & guidelines: NIPC,
OIG, FedCIRC, mass media
Specialists and expert advice
Economic, engineering, or other models
Market research & analysis
Experiments & prototypes
If no good numbers emerge, estimates can be used, if
management is notified of guesswork
Security Planning: An Applied Approach | 6/21/2016 | 20
Category
Who: Internal
Incidents (14%)
Who: External
Incidents (92%)
Malware (40%)
Hacking (52%)
Social (29%)
Misuse (13%)
Physical (35%)
Error (2%)
Error (67%)
(VERIS Study)
Specific Threats
Cashier, waiter, bank teller (financial)
End user (mix: finance and espionage)
System admin (mainly espionage)
Organized crime (financial)
State-affiliated (espionage)
Activist, Former Employee
Spyware (keystroke loggers, form grabbers)
Backdoor (secret computer access)
Small-Medium
Org.
60%
13%
4%
57%
20%
<3%
86%
51%
Large
Businesses
14%
24%
31%
49%
24%
<2%
55%
82%
Stealing data (mainly for spying)
Password copying or guessing
54%
88%
73%
74%
Remote control (botnet, backdoor)
36%
62%
71%
43%
52%
54%
74%
Not avail.
Not avail.
82%
87%
22%
4%
95%
Not avail.
Not avail.
Phishing (email 79%, in person 13%)
Privilege Abuse
Unapproved hardware
Embezzlement
Tampering (ATM, PoS device)
Misconfigurations (violations of policy)
Media confidentiality (loss of media) (29%),
user confidentiality (20%), user availability
(18%)
Security Planning: An Applied Approach | 6/21/2016 | 21
Threats by Industry
Adapted: Verizon 2014 Data Breach Investigations Report
40% or Higher
Accommodation
Administrative
Construction
Education
Entertainment
Finance
Healthcare
Information
Management
PoS Intrusion-75%
Misc. error-43%
20-39%
Insider Misuse-27%
Crimeware-33%
Misc. error-20%
10-19%
5-10%
DoS-10%
Theft/Loss-12%
Insider Misuse-13%
Theft/Loss-13%
Cyber Espionage-13%
Web App Attack-19%
Theft/Loss-15%
Insider Misuse-8%
Web App Attack-8%
PoS Intrusion-7%
Misc. Error-7%
DoS-32%
Misc. Error-12%
Web App Attack-22% Insider Misuse-10%
Web App Attack-27%
Payment Card
Skimmer-22%
DoS-26%
Insider Misuse-15%
Theft/Loss-46%
Misc. Error-12%
Web App Attack-41% Crimeware-31%
Web App Attack-11%
DoS-44%
Payment Card Skimmer11%
Cyber Espionage-11%
Insider Misuse-8%
Crimeware-6%
DoS-6%
PoS Intrusion-7%
Theft/Loss-7%
Insider Misuse-7%
Misc. Error-5%
PoS Intrusion-9%
DoS-9%
Insider Misuse-6%
Theft/Loss-6%
Misc. Error-6%
Security Planning: An Applied Approach | 6/21/2016 | 22
Manufacturing
Mining
Cyber Espionage-30%
DoS-24%
Cyber-Espionage- Insider Misuse-25%
40%
Trade
DoS-37%
Cyber Espionage-29%
Misc. Error-34%
Insider Misuse-24%
Crimeware-21%
Insider Misuse-37%
Misc. Error-20%
DoS-33%
PoS Intrusion-31%
Web App Attack-30%
Transportation
Cyber-Espionage-24%
Utilities
Web App Attack-38%
Crimeware-31%
Professional
Public
Real Estate
Retail
Web App Attack-14% Crimeware-9%
Insider Misuse-8%
Misc. Error-5%
Theft/Loss-10%
Crimeware-5%
Payment Card Skimmer-5%
DoS-5%
Web App Attack-9%
Insider Misuse-6%
Theft/Loss-19%
Theft/Loss-13%
Crimeware-7%
Web App Attack-10%
Web App Attack-10% Payment Card Skimmer-6%
Crimeware-9%
Misc. Error-9%
PoS Intrusion-6%
Insider Misuse-6%
Theft/Loss-6%
Insider Misuse-16% Theft/Loss-7%
Web App Attack-15% Misc Error-6%
Crimeware-15%
Payment Card Skimmer-5%
DoS-14%
Cyber Espionage-7%
Security Planning: An Applied Approach | 6/21/2016 | 23
Step 4: Compute Expected Loss Risk
Analysis Strategies
Qualitative: Prioritizes risks so that highest risks can be
addressed first
• Based on judgment, intuition, and experience
• May factor in reputation, goodwill, nontangibles
Quantitative: Measures approximate cost of impact in financial
terms
Semiquantitative: Combination of Qualitative & Quantitative
techniques
Security Planning: An Applied Approach | 6/21/2016 | 24
Step 4: Compute Loss Using
Qualitative Analysis
Qualitative Analysis is used:
• As a preliminary look at risk
• With non-tangibles, such as reputation, image -> market share,
share value
• When there is insufficient information to perform a more
quantified analysis
Security Planning: An Applied Approach | 6/21/2016 | 25
Vulnerability Assessment
Quadrant Map
Snow emergency
Intruder
Work
book
Threat
(Probability)
Hacker/Criminal
Malware
Disgruntled Employee
Vulnerability
(Severity)
Flood
Spy
Fire
Terrorist
Security Planning: An Applied Approach | 6/21/2016 | 26
Step 4: Compute Loss Using
Semi-Quantitative Analysis
1.
2.
3.
4.
5.
Impact
Insignificant: No meaningful
impact
Minor: Impacts a small part
of the business, < $1M
Major: Impacts company
brand, >$1M
Material: Requires external
reporting, >$200M
Catastrophic: Failure or
downsizing of company
Likelihood
1. Rare
2. Unlikely: Not seen within
the last 5 years
3. Moderate: Occurred in last
5 years, but not in last year
4. Likely: Occurred in last year
5. Frequent: Occurs on a
regular basis
Risk = Impact * Likelihood
Security Planning: An Applied Approach | 6/21/2016 | 27
SemiQuantitative Impact Matrix
Catastrophic
(5)
Impact
Material
(4)
Major
(3)
Minor
(2)
Insignificant
(1)
Rare(1)
Unlikely(2)
Moderate(3)
Likelihood
Likely (4)
Frequent(5)
Security Planning: An Applied Approach | 6/21/2016 | 28
Step 4: Compute Loss Using
Quantitative Analysis
Single Loss Expectancy (SLE): The cost to the organization if one
threat occurs once
Eg. Stolen laptop=
Replacement cost +
Cost of installation of special software and data
Assumes no liability
SLE = Asset Value (AV) x Exposure Factor (EF)
With Stolen Laptop EF > 1.0
Annualized Rate of Occurrence (ARO): Probability or frequency
of the threat occurring in one year
If a fire occurs once every 25 years, ARO=1/25
Annual Loss Expectancy (ALE): The annual expected financial
loss to an asset, resulting from a specific threat
ALE = SLE x ARO
Security Planning: An Applied Approach | 6/21/2016 | 29
Risk Assessment Using Quantitative
Analysis
Quantitative:
Cost of HIPAA accident with insufficient protections
SLE = $50K + (1 year in jail:) $100K = $150K
Plus loss of reputation…
Estimate of Time = 10 years or less = 0.1
Annualized Loss Expectancy (ALE)= $150K x .1 =$15K
Security Planning: An Applied Approach | 6/21/2016 | 30
Annualized Loss Expectancy
Asset
Value->
1 Yr
5 Yrs
10 Yrs
20 Yrs
$1K
$10K
$100K
$1M
1K
200
100
50
10K
2K
1K
1K
100K
20K
10K
5K
1000K
200K
100K
50K
Asset Costs $10K
Risk of Loss 20% per Year
Over 5 years, average loss = $10K
Spend up to $2K each year to prevent loss
Security Planning: An Applied Approach | 6/21/2016 | 31
Quantitative
Risk
Asset
Threat
Work
book
Single Loss
Expectancy (SLE)
Registra- System or
tion
Disk Failure
Server
System failure: $10,000
Registration x 2 days:
$32,000
Registra- Hacker
tion
penetration
Server
Breach Not. Law: $804,000
Forensic help: $100,000
Registration x 2days:
$32,000
Lawsuit: $1 million
FERPA: $1 million
Forensic help: $100,000
Loss of Reputation =
Grades
Server
Hacker
penetration
Annualized
Rate of
Occurrence
(ARO)
0.2
(5 years)
Annual Loss
Expectancy
(ALE)
$8,400
0.20
(5 years)
$936,000x.2
=$187,200
0.05
(20 years)
$2110,000x
0.05
=$105,500
Security Planning: An Applied Approach | 6/21/2016 | 32
Step 5: Treat Risk
Risk Acceptance: Handle attack when necessary
E.g.: Comet hits
Ignore risk if risk exposure is negligible
Risk Avoidance: Stop doing risky behavior
E.g.: Do not use Social Security Numbers
Risk Mitigation: Implement control to minimize vulnerability
E.g. Purchase & configure a firewall
Risk Transference: Pay someone to assume risk for you
E.g., Buy malpractice insurance (doctor)
While financial impact can be transferred, legal responsibility
cannot
Risk Planning: Implement a set of controls
Security Planning: An Applied Approach | 6/21/2016 | 33
Security Planning: An Applied Approach | 6/21/2016 | 34
Controls & Countermeasures
Cost of control should never exceed the expected loss assuming
no control
Countermeasure = Targeted Control
• Aimed at a specific threat or vulnerability
• Problem: Firewall cannot process packets fast enough due to IP
packet attacks
• Solution: Add border router to eliminate invalid accesses
Security Planning: An Applied Approach | 6/21/2016 | 35
Analysis of Risk vs. Controls
Workbook
Risk
Stolen Faculty
Laptop
Registration
System or
Disk Failure
Registration
Hacker
Penetration
ALE Score
$2K
$10,000
(FERPA)
$8,400
$176,800
Control
Encryption
RAID
(Redundant
disks)
Unified Threat
Mgmt
Firewall
Cost of
Control
$60
$750
Cost of Some Controls is shown in Case Study Appendix
$1K
Security Planning: An Applied Approach | 6/21/2016 | 36
Extra Step:
Step 6: Risk Monitoring
Stolen Laptop
In investigation
$2k, legal issues
HIPAA Incident
Response
Procedure being defined –
incident response
$200K
Cost overruns
Internal audit investigation
$400K
HIPAA: Physical
security
Training occurred
$200K
Security Dashboard, Heat chart or Stoplight Chart
Report to Mgmt status of security
• Metrics showing current performance
• Outstanding issues
• Newly arising issues
• How handled – when resolution is expected
Security Planning: An Applied Approach | 6/21/2016 | 37
Training
Training shall cover:
Importance of following policies & procedures
Clean desk policy
Incident or emergency response
Authentication & access control
Privacy and confidentiality
Recognizing and reporting security incidents
Recognizing and dealing with social engineering
Security Planning: An Applied Approach | 6/21/2016 | 38
Security Control Baselines & Metrics
Baseline: A measurement of
performance
Metrics are regularly and
consistently measured,
quantifiable, inexpensively
collected
Leads to subsequent
performance evaluation
E.g. How many viruses is help
desk reporting?
90
80
70
Stolen Laptop
Virus/Worm
% Misuse
60
50
40
30
20
10
0
Year 1 Year 2 Year 3 Year 4
(Company data - Not real)
Security Planning: An Applied Approach | 6/21/2016 | 39
Risk Management
Risk Management is aligned with business strategy & direction
Risk mgmt must be a joint effort between all key business units & IS
Business-Driven (not Technology-Driven)
Steering Committee:
• Sets risk management priorities
• Define Risk management objectives to
achieve business strategy
Security Planning: An Applied Approach | 6/21/2016 | 40
Risk Management Roles
Governance & Sr Mgmt:
Info. Security Mgr
Allocate resources, assess
Develops, collaborates, and
& use risk assessment results manages IS risk mgmt process
Business Managers
(Process Owners)
Make difficult decisions
relating to priority to
achieve business goals
System / Info Owners
Responsible to ensure
controls in place to
address CIA.
Sign off on changes
Chief Info Officer
IT planning, budget,
performance incl. risk
IT Security Practitioners
Implement security requirem
into IT systems: network,
system, DB, app, admin.
Security Trainers
Develop appropriate
training materials, including
risk assessment, to
educate end users.
Security Planning: An Applied Approach | 6/21/2016 | 41
Due Diligence
Due Diligence = Did careful risk assessment (RA)
Due Care = Implemented recommended controls from RA
Liability minimized if reasonable precautions taken
Senior Mgmt Support
Security Planning: An Applied Approach | 6/21/2016 | 42
Three Ethical Risk Cases
1. On eve of doomed Challenger space shuttle launch, an
executive told another: “Take off your engineering hat and put
on your management hat.”
2. In Bhopal, India, a chemical leak killed approx. 3000 people,
settlement was < 1/2 Exxon Valdez oil spill’s settlement.
•
Human life = projected income (low in developing nations)
3. The Three Mile Island nuclear disaster was a ‘success’ because
no lives were lost
•
Public acceptance of nuclear technologies eroded due to the
environmental problems and the proven threat
It is easy to underestimate the cost of others’ lives, when your
life is not impacted.
Security Planning: An Applied Approach | 6/21/2016 | 43
Question
Risk Assessment includes:
1. The steps: risk analysis, risk treatment, risk acceptance, and
risk monitoring
2. Answers the question: What risks are we prone to, and what
is the financial costs of these risks?
3. Assesses controls after implementation
4. The identification, financial analysis, and prioritization of
risks, and evaluation of controls
Security Planning: An Applied Approach | 6/21/2016 | 44
Question
Risk Management includes:
1. The steps: risk analysis, risk treatment, risk acceptance, and
risk monitoring
2. Answers the question: What risks are we prone to, and what
is the financial costs of these risks?
3. Assesses controls after implementation
4. The identification, financial analysis, and prioritization of
risks, and evaluation of controls
Security Planning: An Applied Approach | 6/21/2016 | 45
Question
The FIRST step in Security Risk Assessment is:
1. Determine threats and vulnerabilities
2. Determine values of key assets
3. Estimate likelihood of exploitation
4. Analyze existing controls
Security Planning: An Applied Approach | 6/21/2016 | 46
Question
Single Loss Expectancy refers to:
1. The probability that an attack will occur in one year
2. The duration of time where a loss is expected to occur (e.g.,
one month, one year, one decade)
3. The cost when the risk occurs to the asset once
4. The average cost of loss of this asset per year
Security Planning: An Applied Approach | 6/21/2016 | 47
Question
1.
2.
3.
4.
The role(s) responsible for deciding whether risks should be
accepted, transferred, or mitigated is:
The Chief Information Officer
The Chief Risk Officer
The Chief Information Security Officer
Enterprise governance and senior business management
Security Planning: An Applied Approach | 6/21/2016 | 48
Question
1.
2.
3.
4.
Which of these risks is best measured using a
qualitative process?
Temporary power outage in an office building
Loss of consumer confidence due to a
malfunctioning website
Theft of an employee’s laptop while traveling
Disruption of supply deliveries due to flooding
Security Planning: An Applied Approach | 6/21/2016 | 49
Question
1.
2.
3.
4.
The risk that is assumed after implementing controls
is known as:
Accepted Risk
Annualized Loss Expectancy
Quantitative risk
Residual risk
Security Planning: An Applied Approach | 6/21/2016 | 50
Question
1.
2.
3.
4.
The primary purpose of risk management is to:
Eliminate all risk
Find the most cost-effective controls
Reduce risk to an acceptable level
Determine budget for residual risk
Security Planning: An Applied Approach | 6/21/2016 | 51
Question
1.
2.
3.
4.
Due Diligence ensures that
An organization has exercised the best possible security
practices according to best practices
An organization has exercised acceptably reasonable security
practices addressing all major security areas
An organization has implemented risk management and
established the necessary controls
An organization has allocated a Chief Information Security
Officer who is responsible for securing the organization’s
information assets
Security Planning: An Applied Approach | 6/21/2016 | 52
Question
1.
2.
3.
4.
ALE is:
The average cost of loss of this asset, for a single incident
An estimate using quantitative risk management of the
frequency of asset loss due to a threat
An estimate using qualitative risk management of the priority
of the vulnerability
ALE = SLE x ARO
Security Planning: An Applied Approach | 6/21/2016 | 53
Financial Aspects – Larger Organizations
ADVANCED
Input
Security Planning: An Applied Approach | 6/21/2016 | 54
Hardware, software
Company history
Intelligence agency
data: NIPC, OIG
Audit &
test results
Current and Planned
Controls
Threat motivation/
capacity
Business Impact
Analysis
Data Criticality &
Sensitivity analysis
Likelihood of threat
exploitation
Magnitude of impact
Plan for risk
NIST Risk
Assessment
Methodology
Activity
System Characterization
Identify Threats
Output
System boundary
System functions
System/data criticality
System/data sensitivity
Identify Vulnerabilities
List of threats
& vulnerabilities
Analyze Controls
List of current &
planned controls
Determine Likelihood
Likelihood Rating
Analyze Impact
Impact Rating
Determine Risk
Documented Risks
Recommend Controls
Recommended Controls
Document Results
Risk Assessment
Report
Security Planning: An Applied Approach | 6/21/2016 | 55
Metrics & Baselines
Previous history help s to generate an accurate likelihood
A well-selected set of metrics or statistics are:
• Quantifiable
• collected periodically
• preferably automated
Example metric: The number of viruses the help desk reports per
month
Baseline: a measurement of performance at a particular point in
time.
Metrics (consistently measured) enables:
• observe changes in the metrics over time,
• discover trends for future risk analysis,
• measure the effectiveness of controls.
Security Planning: An Applied Approach | 6/21/2016 | 56
Layered Risk Management
Process of Assessment
Perform Risk Analysis at all Levels
At each level, risk assessment should be
Consistent with higher levels and related
risk assessments
Scoped to cohesively focus on selected
area
Consider details associated with the scope
or project (e.g., specific software
development project)
Generate a Risk Assessment Report as
final output
• report ensures that security controls
were tested and pass inspection
Certify product or area for use
Strategic
Tactical
Operational
• Organizational
Level
• Business Process
• Business Project
• IS Project
• Operational
Security Planning: An Applied Approach | 6/21/2016 | 57
Cost-Benefit Analysis
Security Planning: An Applied Approach | 6/21/2016 | 58
Internal Rate of Return
Security Planning: An Applied Approach | 6/21/2016 | 59
Example: Purchase Encryption Software
Net Present Value
Calculation
Year $ Value Present
Value
0 – 3500
-3500
1
1000
909.09
2
1000
826.45
3
1000
751.31
4
1000
683.01
5
1000
620.92
Total 1500
290.78
Explanation
Encryption software costs
• $35 per license
• 100 laptops with confidential
data
• Cost = 3500
Estimated savings for 5 years:
• $1000 per year
• SCBA = -3500 + 5*1000 = 1500
• Discounted interest = 10%.
• NPV = $290.78
• IRR = 13.2%.
Security Planning: An Applied Approach | 6/21/2016 | 60
Summary
1.
2.
3.
4.
5.
Risk Assessment Process:
Assign Values to Assets:
Determine Loss due to Threats & Vulnerabilities
Estimate Likelihood of Exploitation
Compute Expected Loss
Treat Risk
Consider:
Financial Analysis
Real World Data: Professional versus Own Metrics
Ethical Impact
Continual Process
Coverage – Prioritized versus Complete
Jamie Ramon MD
Doctor
Chris Ramon RD
Dietician
Terry
Pat
Licensed
Software Consultant
Practicing Nurse
HEALTH FIRST CASE STUDY
Analyzing Risk
Security Planning: An Applied Approach | 6/21/2016 | 62
Step 1: Define Assets
Security Planning: An Applied Approach | 6/21/2016 | 63
Step 1: Define Assets
Consider Consequential Financial Loss
Asset Name
$ Value
$ Value
Direct Loss:
Consequential
Financial Loss
Replacement
Medical DB
Daily Operation (DO)
Medical Malpractice (M)
HIPAA Liability (H)
Notification Law Liability (NL)
Confidentiality, Integrity,
and Availability Notes
C? I? A?
Security Planning: An Applied Approach | 6/21/2016 | 64
Step 1: Define Assets
Consider Consequential Financial Loss
Asset Name
$ Value
$ Value
Direct Loss:
Consequential
Financial Loss
Replacement
Medical DB
DO+M_H+NL
Daily Operation (DO)
$
Medical Malpractice (M)
$
HIPAA Liability (H)
$
Notification Law Liability (NL)
$
Confidentiality, Integrity,
and Availability Notes
C IA
Security Planning: An Applied Approach | 6/21/2016 | 65
HIPAA Criminal Penalties
$ Penalty
Imprisonment
Up to $50K
Up to one
year
Up to
$100K
Up to
$500K
Up to 5
years
Up to 10
years
Offense
Wrongful disclosure of
individually identifiable health
information
…committed under false
pretenses
… with intent to sell, achieve
personal gain, or cause
malicious harm
Then consider bad press, state audit, state law penalties, civil lawsuits, lost claims, …
Security Planning: An Applied Approach | 6/21/2016 | 66
HITECH Act (2009)
Each
Violation
Max $ Per
Year
CE/BA exercised reasonable diligence
but did not learn about violation
$100-$50k
$1.5
Million
Violation is due to reasonable cause
$1k$50k
$1.5
Million
CE/BA demonstrated willful neglect but $10k-$50k
corrected violation
$1.5
Million
CE/BA demonstrated willful neglect and
took no corrective action
$1.5
Million
$50k
Penalties are prohibited if problem is corrected within 30 days and no willful neglect
Penalties pay for enforcement and redress for harm caused
Security Planning: An Applied Approach | 6/21/2016 | 67
Step 2: Estimate Potential Loss for Threats
Step 3: Estimate Likelihood of Exploitation
Normal threats: Threats common to all organizations
Inherent threats: Threats particular to your specific industry
Known vulnerabilities: Previous audit reports indicate
deficiencies.
Security Planning: An Applied Approach | 6/21/2016 | 68
Step 2: Estimate Potential Loss for Threats
Step 3: Estimate Likelihood of Exploitation
Slow Down Business
1 week
2
1 year
Temp. Shut Down Business
Threaten Business
Threat
(Probability)
Hacker/Criminal
Loss of Electricity
Snow Emergency
1
Malware
Pandemic
Failed Disk
Tornado/Wind Storm
Stolen Laptop
5 years
(.2)
Stolen Backup Tape(s)
10 years
(.1)
Vulnerability
(Severity)
Flood
20 years
(.05)
4
50 years
(.02)
Earthquake
Social Engineering
Intruder
Fire
3
Security Planning: An Applied Approach | 6/21/2016 | 69
Step 4: Compute Expected Loss
Step 5: Treat Risk
Step 4: Compute E(Loss)
ALE = SLE * ARO
Asset
Threat
Single Annualiz Annual
Loss
ed Rate
Loss
of
Expecta
Expecta
Occurre
ncy
ncy
nce
(ALE)
(SLE)
(ARO)
Step 5: Treat Risk
Risk Acceptance: Handle attack
when necessary
Risk Avoidance: Stop doing risky
behavior
Risk Mitigation: Implement
control to minimize vulnerability
Risk Transference: Pay
someone to assume risk for you
Risk Planning: Implement a set
of controls
Download