Reactions to Westlake RMF draft PERSONAL comment by Mikey O’Connor Table of Contents (based on deliverables in the RFI) • • • • • Description of the components of the risk management framework (e.g. risk assessment, risk planning, delivery of standards/tools/techniques, risk and activity monitoring, etc.). Description of the roles, responsibilities, authority and accountability associated with each component of the framework – who is responsible for delivering what, and on what schedule Description of the scope boundaries of the DNS security risk management function of ICANN (the organization) Description of the risk model to be used, assumptions and constraints that will be applied and information sources that will be developed. An assessment of the ability of ICANN (the organization and the community) to deliver the risk- management tasks as described, including the gaps that would need to be filled and recommendations as to how to fill those gaps. (Such an assessment may need to be revisited on a periodic basis after the DNS security risk management framework has been put into operation.) Deliverable #1: Description of the components of the risk management framework ! ! ! ! ! ! ! ! · C o n t r o lla b le R is k s ! ! • ! At!any!point!in!time,!different!parts!of!ICANN!may!be!at!different!levels!of! maturity.!! ISO!31000!Risk!management!process! (Refer!Appendix!1!for!a!detailed!explanation!of!each!step)! · ) IC A N N S t r a t e g ic R is k sC O M M U N IT Y G L O B A L IN T E R N E T C O M M U N IT Y Kaplan/Mikes R is k a s s e s s m e n t R is k id e n tifi c a tio n R is k a n a ly s is ! R is k e v a lu a tio n • next!two!pages,!the!greatest!benefits!of!risk!management!are!gained!at!the! integrated!level.! M o n ito r in g a n d r e v ie w C o m m u n ic a tio n a n d c o n s u lta tio n E x t e r n a lE v e n t s IC A N N ICANN!should!assess!its!current!level!of!risk!management!maturity!and!then! develop!a!plan!to!improve!maturity,!since,!as!described!in!the!matrix!on!the! E s ta b lis h in g th e c o n te x t • ! Risk#Management#Maturity#Model Maturity Integrated Managed • Repeatable Ini*al R is k tr e a tm e n t e!institutional!risks!are!inherent!to!all!organisations!…! ! !!! Ad#Hoc 1000!defines!risk!as!‘the!effect!of!uncertainty!on!objectives.’!As!commentators! ! ding!Kaplan!and!Mikes!have!noted,!risk!management!is!not!a!natural!process:!it! ISO 31000 Time ! The!table!below!describes!the!purpose!of!each!of!the!documents!and!who!is! directly!counter!to!the!positive,!‘can!do’!culture!of!achievement!and!success! responsible!for!endorsing!them.! many!organisations!foster.!The!essence!of!risk!management!by!contrast!is!about! ! ifying!and!assessing!what!could!go!wrong,!or!could!deflect!an!organization!from! SEI Capability Maturity • ving!its!goals.!As!a!result,!an!organisation’s!culture,!resulting!from!the!! tures,!processes,!accepted!behaviours!and!incentives!that!evolve!over!many! ! !may!actively!discourage!or!hinder!(whether!consciously!or!subconsciously)! ! ementation!of!effective!risk!management.! ICANN!DNS!RMF!draft!v1.2.docx! !2012!report,!“Roads!to!Ruin”,!the!British!Association!for!Risk!and!Insurance! ICANN!DNS!RMF!draft!v1.2.docx! 21! ©2013!Westlake!Governance! 26! ©2013!Westlake!Governance! agement!Professionals!(Airmic)!has!analysed!the!origins!and!impact!of!many! orate!crises!over!the!last!decade.!The!report!identifies!seven!key!risk!areas!that! !DNS!RMF!draft!v1.2.docx! 3!Westlake!Governance! • 11! • Have these methodologies ever been successfully combined in this way before? If so, where? Where are the points of integration between the proposed methodologies? Is the DNS a business? Should we be presuming that business-oriented command and control methods will work in the case of the DNS? Is Kaplan/Mikes, a business risk management proposal outlined in the HBR and underpinned by their “Balanced Scorecard” business planning methodology, appropriate to evaluate DNS risk? Do the advantages of ISO 31000 (also a business risk mgmt. methodology) offset the licensing issues that will arise if ICANN wishes to distribute a tailored version of this proprietary methodology for use by the community? Has the SEI systems maturity model ever been successfully applied to a technical risk management function before? How does ICANN avoid becoming dependent on external vendors for developing and maintaining this hybrid (largely proprietary) methodology? ! ment%MapDeliverable #2: Description of roles, responsibilities, authority and accountability Process Controllable Risks A s s e s s T r e a t E v a lu a te Id e n tify R is k ( b r a in s to r m in g ) C o n tr o l la b le ? Y A n a ly s e -L ik e lih o o d -Im p a c to n A C I N S e le c tO p tio n s -A v o id -M itig a te -A c c e p t -T r a n s fe r M o n ito r Im p le m e n t -T e c h n ic a l m itig a tio n s -R u le s a n d p r o to c o ls R e v ie w T o E x te r n a l E v e n ts O O L I O O O L L L D N S R A G P P P P S S A C /R S S A C C C C C IC A N N C o m m u n ity C C C C C C IC A N N s ta ff C D N S C o m m u n ity As req ui red IC A N N b o a r d O I P Rumsfeld: known knowns Kaplan/Mikes: preventable risks Risks that are considered as Class I and are caused by employees' unauthorized, illegal unethical, or inappropriate actions. In general, management knows the actions it wants employees to avoid (the "known knowns") and has specific management tools and processes to deter or prevent them from occurring. Ideally, companies want to drive the probability of Class I risks to zero. • • – – – • L e g e n d :O v e r s e eL e a dP a r tic ip a teC o n s u lt Im p le m e n t Rumsfeld: unknown unknowns Kaplan/Mikes: external risks External Events A s s e s s T r e a t A n a ly s e Id e n tify R is k ( b r a in s to r m in g ) C o n tr o l la b le ? a rg a m in g N -W -S c e n a r io p la n n in g E v a lu a te -L ik e lih o o d -Im p a c to n A C I S e le c tO p tio n s -M itig a te im p a c t -A c c e p t Im p le m e n t -D e fe n c e a c tio n s -B e h a v io u r c h a n g e R e v ie w O O O O O IC A N N s ta ff L I L L L D N S R A G P P P P S S A C /R S S A C C C C C IC A N N C o m m u n ity C C C C D N S C o m m u n ity C C C As r eq ui r e d T o C o n tr o lla b le R is k s IC A N N b o a r d O I P L e g e n d :O v e r s e eL e a dP a r tic ip a teC o n s u lt Im p le m e n t • Strategic Risks T r e a t A n a ly s e -E x p e r tp a n e l E v a lu a te -L ik e lih o o d -Im p a c to n A C I O p tio n s -A b a n d o n -M o d ify -M itig a te -T r a n s fe r IC A N N b o a r d O O O L IC A N N s ta ff L L L P D N S R A G P P P P S S A C /R S S A C C C C C IC A N N C o m m u n ity C C C C D N S C o m m u n ity C C C L e g e n d :O v e r s e eL e a dP a r tic ip a teC o n s u lt Im p le m e n t M o n ito r Im p le m e n t -S to p -M o d ify -P ilo t -C o m m u n ic a te As r eq u i r ed A s s e s s Id e n tifyR is k ( p a r to f Id e n tifyR is k b u s in e s s ( b r a in s to r m in g ) c h a n g e p r o p o s a l) Class III risks arise from events outside the company and its strategy and thus are beyond the company's direct influence or control. Managers cannot estimate their likelihood and, in many cases, are not even aware of such events (the "unknown unknowns") or that they could jeopardize the company's strategy and survival. Managing • Class III risks requires a process of "risk envisionment" in which managers rely less on quantitative risk management and more on their experience, intuition and imagination to create new mental models about future scenarios and strategic uncertainties. Once Class III risks have been envisioned, managers can brainstorm about how to enhance organizational resilience to withstand the most consequential of them.. ! Y M o n ito r R e s id u a lr is k s -C la s s ify : E x te r n a l/ C o n tr o lla b le -M a n a g e O I P Rumsfeld: known unknowns Kaplan/Mikes: strategy risks Class II risks arise primarily from strategic execution. Organizations voluntarily take on Class II risks so that they can generate high returns from their strategies. Managers can identify Class II risk events (they are "known unknowns") and can generally influence both their likelihood and impact. While managers have some ability to reduce the likelihood and impact of Class II risks, they cannot eliminate the probability of their occurrence. Despite management's efforts, some residual risks always remain. Definitions are from Kaplan/Mikes HBR piece Note the assumptions that underpin this model. • There is a single organization, it can make and execute strategy on its own, it has control over resources, employees, etc. Are those assumptions true in the case of ICANN and the DNS? The treatment of “strategy risk” seems malformed. E.g., the biggest strategic change to ICANN, the “new gTLDs” strategy, came through the GNSO – and is driven by business strategies of external entities, not ICANN. What is the relationship between GNSO “picket fence” policy and this approach? Kaplan/Rumsfeld treat “external” risk as the most difficult to manage. Westlake’s examples of this are largely technical, but aren’t the geo-political “split the root” risks in this category? Are these methods appropriate to address risks of that type? The descriptions of risk “treatment” and “monitoring” also presume a unified entity. In most cases, treatment and monitoring of DNS risk will be done by entities outside of ICANN. How will ICANN support that effort, if at all? It would be helpful to develop a “base” version of these processes and then highlight the very small proportion of the material that changes between the three cases. Deliverable #3: Description of the scope boundaries of the DNS security risk management function of ICANN (the organization) • • • • Source: DSSA The “scope boundaries” deliverable listed in the RFI is difficult to find in this draft – which section covers that material? If this is not yet complete, is the definition of those scope boundaries planned for a subsequent phase of the work? If so, what is the approach to arriving at agreement between the various participants? ICANN is part of a collaborative ecosystem of participants who collectively manage DNS risk. Which of those activities is ICANN: responsible for, a supporter of, a participant in, etc.? To what extent does this risk management framework entertain the idea of empowering the larger community of participants to help with facets of DNS risk management, and what role is envisioned for ICANN in that effort? Deliverable #4: Description of the risk model to be used, assumptions and constraints that will be applied and information sources that will be developed. In the context of… An Adversarial Threat Source (with capability, intent and targe ng) Security Controls OR A NonAdversarial Threat Source (with a range of effects) • Predisposing Condi ons (with varying pervasiveness) Could Ini ate A Threat Event Which could result in Adverse Impacts (planned and implemented) Vulnerabili es (ranging in severity) (with varying likelihood of ini a on) (with varying likelihood of impact) (with varying severity and range) Crea ng RISK to users and providers of the DNS – a combina on of the nature of the impact and the likelihood that its effects will be felt Source: DSSA • • Although Kaplan/Mikes disparage “checklist based” methodologies in their HBR article, ISO 31000 and other comparable methodologies (COBIT, NIST 800-30, etc.) are strongly (and similarly) structured in their analytic frameworks. One of the critical components of all of those methodologies is the series of choices that are made before detailed analysis is begun – this is called the “risk model” in some methodologies, and that was what I expected to see in this section of the report. The two DSSA documents on this page summarize roughly 20 tables the group tailored to address the DNS. Those customized tables all support a 1-page instrument that a risk management practitioner can use to quickly develop DNS risk scenarios. Are similar models and tools envisioned in this framework? Deliverable #5: An assessment of the ability of ICANN (the organization and the community) to deliver the risk- management tasks as described, including the gaps that would need to be filled and recommendations as to how to fill those gaps. • Source: Yahoo images • • • • • Was there any underlying analysis that was excluded from the report (perhaps for confidentiality reasons) that supports the conclusion that “the capacity of existing staff to assume additional risk management responsibilities or tasks is limited. Any significant new or expanded function is likely to require a new staff position.” Was there a determination of skills requirements, and staff capabilities in meeting those requirements (aka a skills matrix)? If so, could the framework (not the detailed assessments) be included in the report? Similarly, if there was a framework used to conduct a gap analysis, could it be included? What is the role of the community in DNS risk management, and what skills and capabilities are required and/or missing from that mix? The analysis concludes that more staff is required – is that due to a gap in skills, a gap in “bandwidth” or a combination of both? The section concludes with a statement that “a capability assessment be undertaken.” How does that differ from what was requested in the RFI for this project? Gather comments and feedback Beijing Toronto Refine and consolidate Launch the Risk Mgmt. function Align/Integrate DNSRMF and DSSA findings/methods/le adership Select DNS riskmanagement framework consultant and launch DNSRMF project Complete DNS riskmanagement framework Establish communitybased portion of RM launch project Launch the project to establish the RM function and complete one “cycle” DSSA Joint effort What now? Obtain community feedback and incorporate those suggestions into the RM framework (focus/scope: ICANN the org) Public comment Determine whether separate DSSA risk-assessment effort is needed DNSRMF Revise report and obtain AC/SO endorsement (focus/scope: ICANN the community) ID roles – gaps & overlaps 8 Options for the DSSA • Clarify relationship to DNSRMF Stop Wait GO – Current: DSSA has broader DNS scope (all-DNS, vs ICANN-only), narrower deliverable scope (only assessment, not full RMF) – Options: Continue, narrow DNS scope, or broaden scope to include community-based RMF • Determine next step – Declare victory and wrap up – Restart and complete next cycle – Revise charter to include “open source” RMF for the broader DNS community Appendix NIST 800 – “open source” basis for community-based RMF NIST 800 Guide to Applying the Risk Management Framework http://csrc.nist.gov/publications/nistpubs/800-37-rev1/sp800-37-rev1-final.pdf Special Publication 800-37 Baseline: Overview Guide for Applying the Risk Management Framework to Federal Information Systems A Security Life Cycle Approach ________________________________________________________________________________________________ CHAPTER TWO THE FUNDAMENTALS 2.1 INTEGRATED ORGANIZATION-WIDE RISK MANAGEMENT Managing his chapter describes the basicinformation concepts associated withsystem-related managing information system- security risks is a complex, multifaceted undertaking that related security risks. These concepts include: (i) incorporating risk management requires the involvement the entirecoreorganization—from senior leaders providing the strategic vision principles and best practices into organizationwide strategic of planning considerations, missions and business processes, and supporting or ganizational information systems; (ii) and top-level goals and objectives for (iii) the organization, to mid-level leaders planning and managing integrating information security requirements into system development life cycle processes; establishing practical and meaningful boundaries for organizational information systems; and (iv) projects, to individuals onas the fronthybrid, lines allocating security controls to organizational information systems system-specific, or developing, implementing, and operating the systems common controls. supporting the organization’s core missions and business processes. Risk management can be viewed 2.1 INTEGRATED ORGANIZATION-WIDE RISK MANAGEMENT as a holistic activity that is fully integrated into every aspect of the organization. Figure 2-1 illustrates a Managing information system-related security risk s is a complex, multifaceted undertaking that requires the involvement of the entire organiza tion—from senior leaders providing the strategic three-tiered risk leaders management that addresses risk-related concerns at: (i) the organization vision and top-level goals and objective sapproach for the organization,to to mid-level planning a nd managing projects, to individuals on the front lines developing, implementing, and operating the level; (ii) thecoremission and processes. business process level; and (iii) the information system level.15 systems supporting the organization’s missions and business Risk m anagement MANAGING INFORMATION SYSTEM-RELATED SECURITY RISKS T • can be viewed as a holistic activity that i s fully integrated into every aspect of the organization. Figure 2-1 illustrates a three-tiered approach to risk management that addresses risk-related concerns at: (i) the organization level; (ii) the mission and business process level; and (iii) the information system level.15 - Multitier Organization-Wide Risk Management - Implemented by the Risk Executive (Function) - Tightly coupled to Enterprise Architecture TIER 1 and Information Security Architecture - System Development Life Cycle Focus ORGANIZATION (Governance) - Disciplined and Structured Process - Flexible and Agile Implementation TIER 2 MISSION / BUSINESS PROCESS (Information and Information Flows) STRATEGIC RISK STRATEGIC Cross-community collabora on Risk Scenario Topic List TACTICAL RISK TIER 3 INFORMATION SYSTEM (Environment of Operation) CORE Gaps in policy, management, or leadership splits the root FIGURE 2-1: TIERED RISK MANAGEMENT APPROACH 15 NIST Special Publication 800-39, Integrated Enterprise-Wide Risk Management: Organization, Mission, and Information System View (projected for publication in 2010), will provide guidance on the holistic approach to risk management. GLUE LONG-TERM CHAPTER 2 Ecosystem-wide IMMEDIATE PAGE 5 “Regional” or “segment” focus EDGE Need: Need: Provider or organiza on-focused risk coordina on, fast models, tools, response support, direc on “Reduc ve” forces (security, risk-mi ga on, control through rules, etc.) splits the root Widespread natural disaster brings down the root or a major TLD A acks exploi ng technical vulnerabili es of the DNS bring down the root or a major TLD Inadvertent technical mishap brings down the root or a major TLD • Use NIST RMF (NIST 800-37) as the starting point for a RMF that is aware of and responsive to the multistakeholder DNS risk environment Tailor NIST framework (which also presumes a single organization) to reflect needs of multi-organization DNS collaboration TACTICAL DNS providers are at the forefront http://csrc.nist.gov/publications/nistpubs/800-37-rev1/sp800-37-rev1-final.pdf Baseline: Process Overview • Categorize the information system and the information processed, stored, and transmitted by that system based on an impact analysis.22 • Select an initial set of baseline security controls for the information system based on the security categorization; tailoring and supplementing the security control baseline as needed based on an organizational assessment of risk and local conditions.23 • Implement the security controls and describe how the controls are employed within the information system and its environment of operation. • Assess the security controls using appropriate assessment procedures to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system. • Authorize information system operation based on a determination of the risk to organizational operations and assets, individuals, other organizations, and the Nation resulting from the operation of the information system and the decision that this risk is acceptable. • Monitor the security controls in the information system on an ongoing basis including assessing control effectiveness, documenting changes to the system or its environment of operation, conducting security impact analyses of the associated changes, and reporting the security state of the system to designated organizational officials. http://csrc.nist.gov/publications/nistpubs/800-37-rev1/sp800-37-rev1-final.pdf Baseline: Roles and Responsibilities D.2 RISK EXECUTIVE (FUNCTION) The risk executive (function) is an individual or group within an organization that helps to ensure that: (i) risk-related considerations for individual information systems, to include authorization decisions, are viewed from an organization-wide perspective with regard to the overall strategic goals and objectives of the organization in carrying out its core missions and business functions; and (ii) managing information system-related security risks is consistent across the organization, reflects organizational risk tolerance, and is considered along with other types of risks in order to ensure mission/business success. The risk executive (function) coordinates with the senior leadership of an organization to: •Provide a comprehensive, organization-wide, holistic approach for addressing risk—an approach that provides a greater understanding of the integrated operations of the organization; •Develop a risk management strategy for the organization providing a strategic view of information security-related risks with regard to the organization as a whole;50 Special Publication 800-37 Guide for Applying the Risk Management Framework to Federal Information Systems A Security Life Cycle Approach ________________________________________________________________________________________________ •Facilitate the sharing of risk-related information among authorizing officials and other senior leaders within the organization; APPENDIX E •Provide oversight for all risk management-related activities across the organization (e.g., OFacceptance RMF TASKS security categorizations) to help ensure consistent andSUMMARY effective risk decisions; LISTING OF PRIMARY RESPONSIBILITIES AND SUPPORTING ROLES •Ensure that authorization decisions consider all factors necessary for mission and business success; RMF TASKS PRIMARY RESPONSIBILITY SUPPORTING ROLES •Provide an organization-wide forum to consider all sources of risk (including aggregated risk) to RMF Step 1: Categorize Information System organizational operations and assets, individuals, other organizations, and the Nation; Information System Owner Risk Executive (Function) TASK 1-1 officials to include •Promote cooperation and collaboration among authorizing authorization Information Owner/Steward Authorizing Official or Designated Security Categorization Representative actions requiring shared responsibility; Categorize the information system Chief Information Officer and document the results of the •Ensure that the shared responsibility for supporting organizational mission/business functions Senior Information Security Officer security categorization in the Information System Security Officer security plan. using external providers of information and services receives the needed visibility and is TASK 1-2 Information System Owner Authorizing Official or Designated elevated to the appropriate decision-making authorities; and Representative Information System Description Senior Information Security Officer •Identify the organizational risk posture based on the aggregated risk to information from the Describe the information system Information Owner/Steward (including system boundary) and Information System Security Officer operation and use of the information systems for which the the organization is responsible. document description in the security plan. The risk executive (function) presumes neither a specific organizational structure nor formal TASK 1-3 Information System Owner Information System Security Officer responsibility assigned to any one individual or group within the organization. The head of the Information System Registration agency/organization may choose to retain the risk executive or to delegate the Register the (function) information system with organizational function to another official or group (e.g., an executiveappropriate leadership council). The risk executive program/management offices. (function) has inherent U.S. Government authority and is assigned to government personnel RMF Step 2: Select Security Controls only. TASK 2-1 Common Control Identification Identify the security controls that are provided by the organization as common controls for organizational information systems and document the controls in a security plan (or equivalent document). TASK 2-2 Security Control Selection Select the security controls for the information system and document the controls in the security plan. Chief Information Officer or Senior Information Security Officer Information Security Architect Common Control Provider Risk Executive (Function) Authorizing Official or Designated Representative Information System Owner Information System Security Engineer Information Security Architect Information System Owner Authorizing Official or Designated Representative Information Owner/Steward Information System Security Officer Information System Security Engineer • Develop a community wide understanding and agreement as to “who does what” in DNS risk management http://csrc.nist.gov/publications/nistpubs/800-37-rev1/sp800-37-rev1-final.pdf Sample: Risk Monitoring G.1 MONITORING STRATEGY Organizations develop a strategy and implement a program for the continuous monitoring of security control effectiveness including the potential need to change or supplement the control set, taking into account any proposed/actual changes to the information system or its environment of operation. The monitoring program is integrated into the organization’s system development life cycle processes. A robust continuous monitoring program requires the active involvement of information system owners and common control providers, chief information officers, senior information security officers, and authorizing officials. The monitoring program allows an organization to: (i) track the security state of an information system on a continuous basis; and (ii) maintain the security authorization for the system over time in highly dynamic environments of operation with changing threats, vulnerabilities, technologies, and missions/business processes. An effective organization-wide continuous monitoring program includes: •Configuration management and control processes for organizational information systems; •Security impact analyses on proposed or actual changes to organizational information systems and environments of operation;84 •Assessment of selected security controls (including system-specific, hybrid, and common controls) based on the organization-defined continuous monitoring strategy;85 •Security status reporting to appropriate organizational officials;86 and •Active involvement by authorizing officials in the ongoing management of information •system-related security risks. http://csrc.nist.gov/publications/nistpubs/800-37-rev1/sp800-37-rev1-final.pdf