Risk Assessment, Acceptance and Exception with a Process View ISACA Charlotte Chapter September Event Information Security, IT Governance & Risk Management Shawn Swartout Leviathan Security Group Agenda Assessment • Risk assessment drivers • Developing an assessment framework that fits your size & complexity • Integrating your risk assessment Response • Acceptance • Ownership and accountability Monitoring • Exception handling Shawn Swartout 2 Shawn Swartout 3 Risk Assessment External Drivers HIPAA EXAMPLES A covered entity must, in accordance with §164.306: (1)(i) Standard: Security management process. Implement policies and procedures to prevent, detect, contain, and correct security violations. (ii) Implementation specifications: (A) Risk analysis (Required). Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the covered entity. Federal Financial Institutions Examination Council (FFIEC) Risk Management of Remote Deposit Capture (RDC) Risk Management: Risk Assessment Prior to implementing RDC, senior management should identify and assess the legal, compliance, reputation, and operational risks associated with the new system. Shawn Swartout 4 Risk Assessment Internal Drivers EXAMPLES How Risk Management Can Turn into Competitive Advantage http://scholarworks.umb.edu/cgi/viewcontent.cgi?article=1006&context=management_wp Shawn Swartout 5 Shawn Swartout 6 Assessment NIST Guide SP800-30 rev 1 includes: A taxonomy of threat sources, threat events, vulnerabilities, and inputs to your assessment of likelihood and impact calculations. Source: http://csrc.nist.gov/publications/nistpubs/800-30-rev1/sp800_30_r1.pdf Shawn Swartout 7 Food for Thought Alex Hutton RVAsec 2013: KEYNOTE: Towards A Modern Approach To Risk Management http://www.youtube.com/watch?v=icN40I3JJLY Jet engine x peanut butter = shiny! How awesome is your bridge? – Wind has no motivation – Rain does not evade defenses – If system is faulty by design… reinforcement addresses only symptoms “What our standards bodies do is typically do is enable us to justify our perspective by manipulating the inputs into a completely false model” –Alex Hutton http://newschoolsecurity.com/2011/04/what-is-risk-again/ Shawn Swartout 8 Assessment Inherent risk – controls = residual risk Lets at least agree on this for the moment Shawn Swartout 9 Assessment Develop an assessment framework that fits your size & complexity Shawn Swartout 10 Factor Analysis of Information Risk (FAIR) Complexity Level: Moderate FAIR provides : • A taxonomy of the factors that make up information risk and a set of standard definitions for our terms. • A method for measuring the factors that drive information risk, including threat event frequency, vulnerability, and loss. • A computational engine that derives risk by mathematically simulating the relationships between the measured factors. • A simulation model that allows us to apply the taxonomy, measurement http://riskmanagementinsight.com/media/documents/FAIR_Introduction.pdf Shawn Swartout 11 Factor Analysis of Information Risk (FAIR) Assumptions about key aspects of the risk environment can seriously weaken the overall analysis. Example: Bald Tire Scenario As you proceed through each of the steps within the scenario below, ask yourself how much risk is associated with what’s being described. • Picture in your mind a bald car tire. How much risk is there? • Next, imagine that the bald tire is tied to a rope hanging from a tree branch. How much risk is there? • Next, imagine that the rope is frayed about halfway through. How much risk is there? • Finally, imagine that the tire swing is suspended over an 80-foot cliff. How much risk is there? Shawn Swartout 12 Factor Analysis of Information Risk (FAIR) Example: Bald Tire Scenario Risk Level – Low Most people believe the risk is ‘High’ at the last stage of the Bald Tire scenario. The answer, however, is that there is very little probability of significant loss given the scenario exactly as described. Who cares if an empty, old bald tire falls to the rocks below? Shawn Swartout 13 Binary Risk Analysis Complexity Level: Easy Binary Risk Assessment provides : • A tool that provides risk analysis based exclusively on yes or no responses to ten questions, a binary response. By forcing the tool user to choose one of two mutually exclusive answers the tool ensures speed and simplicity in its approach. http://riskmanagementinsight.com/media/documents/FAIR_Introduction.pdf Shawn Swartout 14 Binary Risk Analysis The central tenant to this tool Risk analysis is based exclusively on yes or no responses to ten questions, a binary response. https://binary.protect.io/BRA_draft1.1.pdf Shawn Swartout 15 Integrating your Assessment • • • • Organizational changes Product selection New service offering System development life cycle (SDLC) – Requirements definition stage – Development/Acquisition stage Others? Shawn Swartout 16 Risk Response Shawn Swartout 17 Risk Response Risk response (as described in) NIST Special Publication 800-39, organizations: – analyze different courses of action – conduct cost-benefit analyses – examine the interactions/dependencies among risk mitigation approaches – address schedule and performance issues Shawn Swartout 18 Risk Response • The methods available to mitigate risk – application of appropriate controls – acceptance of that risk – transference of that risk (e.g. insurance) – avoidance (e.g. product selection) Shawn Swartout 19 Risk Treatment Plan SAMPLE Asset(s) Container(s) Vulnerability Risk Risk Treatment Status Customer non-public personal data. Backup tapes for File server data, File Server Data unencrypted at rest Medium Encrypt file server files and back-up tapes. Completion: MM/DD/YY Owner: CISO Pending On-hold Complete A Risk Treatment Plan (RTP) is used to identify each information asset flagged in the Risk Assessment report that has an unacceptable level of risk and shall state the method of treatment intended to mitigate that risk. Shawn Swartout 20 Risk Response • Ownership and accountability – – – – – – – Application owners/custodians Business owners Compliance Legal Audit Audit Committee Board of Directors Shawn Swartout Show me the Risk! 21 Monitoring Risk Shawn Swartout 22 Monitoring Risk Risk exception handling • Exception often involves non-compliance with policies and standards (BUT THEY’RE OK!) – Easily identified if policy requirements are clearly articulated • Ownership and accountability – Owner of the policy? Does materiality impact ownership? • Review cycle – Consider aligning with policy reviews Shawn Swartout 23 Take away Risk – The probable • Risk is not a thing. We can’t frequency and probable magnitude of see it, touch it, or measure it future loss directly. • It’s derived from the combination of threat event frequency, vulnerability, and asset value and liability characteristics. Your organizations ability to “manage risk” may be exploited as a market differentiator. Shawn Swartout 24 Questions & Comments Contact information: Shawn Swartout, CISSP, CISM, CAMS Sr. Security Risk Management Consultant Leviathan Security Group shawn.swartout@leviathansecurity.com Mobile: (509) 995-1083 http://www.leviathansecurity.com Changing the face of information security and risk management. Leviathan Security Group provides integrated Risk Management and Information Security solutions for our clients rather than patches, point fixes, or checking off little boxes with red ink pens. Our fortune one-hundred clients and governments rely on us to understand and mitigate their risks. We help them take the next steps in their evolution and help them maintain their stellar reputations. Shawn Swartout 25