TRA-1 Harmonized Threat and Risk Assessment Methodology Appendix G-1 - TRA Worksheet TRA Phase – Process – Activity Preparation Phase Establish TRA Project Mandate Determine the Scope of Assessment o Planning Factors Purpose of the Assessment Stage of Development Risk Environment Some Practical Considerations Select TRA Team o Team Size o Team Qualifications o Core Team Members o Other Resources Draft TRA Work Plan Asset Identification and Valuation Phase Identify Assets within the Scope of Assessment o Tangible Assets o Intangible Assets o Personnel o Services o Asset Listing Assess Injuries o Injury Table (Table 1 below) Assign Asset Values o Practical Application Confidentiality Availability Integrity Multiple Values o Other Issues Variable Asset Values Aggregation and Inference Asset Valuation Conventions Compile Asset Valuation Table/Statement of Sensitivity Threat Assessment Phase Identify Threats o Threat Classes Deliberate Threats Accidental Threats Natural Hazards o Sources of Threat Data o Data Collection Techniques o Threat Listing Assess the Likelihood of Occurrence (Table 2 below) Assess the Gravity (Table 3 below) Assign Threat Levels (Table 4 below) Compile and Prioritize Threat Assessment Table Appendix G-1 TRA Worksheet G1-1 Reference Page No. Annex A, Section 3 Annex A, Section 4 o Section 4.2 Section 4.2.2 Section 4.2.3 Section 4.2.4 Section 4.2.5 Annex A, Section 5 o Section 5.2 o Section 5.3 o Section 5.4 o Section 5.5 Annex A, Section 6 (Appendix A-6) A-3 A-4 A-4 A-4 A-6 A-7 A-7 A-8 A-8 A-9 A-9 A-11 A-13 Annex B, Section 2 (Appendix B-1) o Section 2.2 o Section 2.3 o Section 2.4 o Section 2.5 o Section 2.9 (Appendix B-2) Annex B, Section 3 o Section 3.3 (Appendix B-4) Annex B, Section 4 o Section 4.2 Section 4.2.2 Section 4.2.3 Section 4.2.4 Section 4.2.6 o Section 4.3 Section 4.3.2 Section 4.3.3 Section 4.3.4 Annex B, Section 5 (Appendix B-5) B-2 B-2 B-2 B-3 B-3 B-5 B-6 B-8 B-10 B-11 B-11 B-11 B-12 B-13 B-13 B-13 B-14 B-15 B-15 Annex C, Section 2 o Section 2.2 Section 2.2.2 Section 2.2.3 Section 2.2.4 o Section 2.3 (Appendix C-1) o Section 2.4 o Section 2.5 (Appendix C-2) Annex C, Section 3 (Appendix C-3) Annex C, Section 4 (Appendix C-3) Annex C, Section 5 (Appendix C-3) Annex C, Section 6 (Appendix C-4) C-1 C-2 C-2 C-2 C-2 C-3 C-3 C-4 C-11 C-13 C-14 C-17 2007-10-23 TRA-1 Harmonized Threat and Risk Assessment Methodology Risk Assessment Phase – Vulnerability Assessment Identify Existing and Proposed Safeguards Assess Their Effectiveness Determine Remaining Vulnerabilities o Sources of Vulnerability Data o Data Collection Techniques o Vulnerability Listing Assess Their Impact o Probability of Compromise (Table 5 below) o Severity of Outcome (Table 6 below) Assign Vulnerability Levels (Table 7 below) Compile and Prioritize Vulnerability Assessment Table Risk Assessment Phase – Calculation of Residual Risk Compute Residual Risks o Basic Risk Calculation (Table 8 below) o Risk Levels (Table 9 below) Compile Prioritized List of Assessed Residual Risks Recommendation Phase Identify Unacceptable Residual Risks o Risk Ranges (Table 9 below) Select Potential Safeguards o Safeguard Effectiveness Identify Costs o Direct Costs o Indirect Costs/Benefits o Cost Effectiveness Assess Projected Residual Risks Prepare Final TRA Report Annex D, Section 2 Annex D, Section 3 Annex D, Section 4 o Section 4.3 (Appendix D-1) o Section 4.4 o Section 4.5 (Appendix D-2) Annex D, Section 5 (Appendix D-3) o Section 5.2 o Section 5.3 Annex D, Section 6 Annex D, Section 7 (Appendix D-4) D-1 D-2 D-5 D-10 D-11 D-11 D-13 D-13 D-15 D-17 D-20 Annex E, Section 2 o Section 2.2 o Section 2.3 (Appendix E-1) Annex E, Section 3 (Appendix E-2) E-1 E-1 E-2 E-4 Annex F, Section 2 o Section 2.3 Annex F, Section 3 (Appendix F-2) o Section 3.3 (Appendix F-3) Annex F, Section 4 o Section 4.2 o Section 4.3 o Section 4.4 (Appendix F-4) Annex F, Section 5 (Appendix F-5) Annex F, Section 6 (Appendix F-6) F-1 F-2 F-4 F-6 F-9 F-9 F-10 F-11 F-13 F-13 Asset Identification and Valuation Phase Level of Injury Very High High Medium Low Very Low Table 1: Graduated Injury Table Injury to People Physical Psychological Widespread Loss of Life Widespread Trauma Potential Loss of Life Serious Stress/Trauma Injury/Illness Public Suspicion/Doubts Discomfort Minor Embarrassment Negligible Negligible Financial Impact > $1 billion > $10 million > $100 thousand > $1 thousand < $1 thousand Threat Assessment Phase Past Frequency Daily 1-10 Days 10-100 Days 100-1,000 Days 1,000-10,000 Days Over 10,000 Days Appendix G-1 TRA Worksheet Table 2: Threat Likelihood Table Remote Location but Similar Assets Same Location or Similar Assets Same Location but Different Assets High High High High High Medium Medium Low Low Very Low Very Low Very Low G1-2 Remote Location Other Assets High Medium Low Very Low Very Low Very Low 2007-10-23 TRA-1 Harmonized Threat and Risk Assessment Methodology Threat Assessment Phase (continued) Table 3: Threat Gravity Table Magnitude of Accidents or Natural Hazards Highly Destructive Extremely Grave Error Widespread Misuse Deliberate Threat Agent Capabilities Extensive Knowledge/Skill Extensive Resources Threat Impact or Gravity High Limited Knowledge/Skill Extensive Resources or Extensive Knowledge/Skill Limited Resources or Moderate Knowledge/Skill Moderate Resources Moderately Destructive Serious Error Significant Misuse Medium Limited Knowledge/Skill Limited Resources Modestly Destructive Minor Error Limited Misuse Low Threat Impact High Medium Low Table 4: Threat Levels Table Threat Likelihood Very Low Low Medium Low Medium High Very Low Low Medium Very Low Very Low Low High Very High High Medium Risk Assessment Phase – Vulnerability Assessment Table 5: Vulnerability Impact on Probability of Compromise (Prevention) Safeguard Effectiveness No Safeguard Safeguard Largely Ineffective Probability of Compromise > 75% Safeguard Moderately Effective Probability of Compromise 25-75% Safeguard Very Effective Probability of Compromise < 25% (Safeguard Performs Only Detection, Response or Recovery Functions) Appendix G-1 TRA Worksheet Associated Vulnerabilities Easily Exploited Needs Little Knowledge/Skill/Resources Assets Highly Accessible Assets Very Complex/Fragile/Portable Employees Ill-Informed/Poorly Trained Not Easily Exploited Needs Some Knowledge/Skill/Resources Assets Moderately Accessible Assets Fairly Complex/Fragile/Portable Moderate Employee Awareness/Training Difficult to Exploit Needs Extensive Knowledge/Skill/Resources Assets Highly Accessible Assets Very Simple/Robust/Static Employees Well-Informed/Trained G1-3 Probability of Compromise High Medium Low (Not Applicable) 2007-10-23 TRA-1 Harmonized Threat and Risk Assessment Methodology Risk Assessment Phase – Vulnerability Assessment (continued) Table 6: Vulnerability Impact on Severity of the Outcome (Detection, Response or Recovery) Severity of Safeguard Effectiveness Associated Vulnerabilities Outcome Unlikely to Detect Compromise No Safeguard Damage Difficult to Contain Safeguards Largely Ineffective Prolonged Recovery Times/Poor Service Levels High Assets Exposed to Extensive Injury Assets Very Complex/Fragile Employees Ill-Informed/Poorly Trained Compromise Probably Detected Over Time Damage Partially Contained Safeguard Moderately Effective Moderate Recovery Times/Service Levels Medium Assets Exposed to Moderate Injury Assets Fairly Complex/Fragile Moderate Employee Awareness/Training Compromise Almost Certainly Detected Quickly Safeguard Very Effective Damage Tightly Contained Assets Exposed to Limited Injury Low Quick and Complete Recovery (Safeguard Performs Only (Not Applicable) Assets Very Simple/Robust a Prevention Function) Employees Well-Informed/Trained Table 7: Vulnerability Assessment Vulnerability Impact on Severity of Vulnerability Impact on Probability of Compromise (Prevention) the Outcome(Detection, Response & Recovery ) Low (N/A) Medium High Medium High Very High High Low Medium High Medium Very Low Low Medium Low (N/A) Risk Assessment Phase – Calculation of Residual Risk Table 8: Numeric Scores for Asset Value, Threat and Vulnerability Levels Asset Value, Threat and Very Low Low Medium High Vulnerability Levels Scores for Risk Computation Basic Risk Score Risk Level Number of Outcomes in Range Risk Acceptability 1 2 3 Table 9: Risk Levels and Ranges 1-4 5-12 15-32 Very Low Low Medium Very High 4 5 36-75 High 80-125 Very High 13 34 43 28 7 Definitely Acceptable Probably Acceptable Possibly Acceptable Probably Unacceptable Definitely Unacceptable Notes: 1. The TRA Worksheet lists all successive processes and activities within each phase of a TRA project. 2. Copies of all tables required to assess asset values, threat and vulnerability levels, and residual risks are included in the same logical sequence for ease of use. 3. This worksheet with copies of the Asset Valuation Table/Statement of Sensitivity (Appendix B-5), Threat Assessment Table (Appendix C-4), Vulnerability Assessment Table (Appendix D-4), List of Assessed Residual Risks (Appendix E-2) and Recommendations Table (Appendix (F-5) form the basic toolkit to complete a TRA. Appendix G-1 TRA Worksheet G1-4 2007-10-23