What is Risk Management?

advertisement
1
What is Risk Management?
Who uses Risk Management?
How is Risk Management used?
2
What is Risk Management?
Risk Management is the name given to a
logical and systematic method of
identifying, analysing, treating and
monitoring the risks involved in any activity
or process.
3
What is Risk Management?
Risk Management is a methodology
that helps managers make best use of
their available resources
4
Who uses Risk Management?
Risk Management practices
are widely used in public and
the private sectors, covering
a wide range of activities or
operations.
These include:
• Finance and
Investment
• Insurance
• Health Care
• Public
Institutions
• Governments
5
Who uses Risk Management?
 Effective Risk Management
is a recognised and valued skill.
 Educational institutions have formal study
courses and award degrees in Risk
Management.
 The Risk Management process is well
established. (International RM process
standards.)
6
Who uses Risk Management?
Risk Management is
now an integral part of business
planning.
7
How is Risk Management used?
The Risk Management
process steps are a
generic guide for
any organisation,
regardless of the
type of business, activity
or function.
There are
7
steps
in the RM
process
8
The basic process steps are:
Establish the context
Identify the risks
Analyse the risks
Evaluate the risks
Treat the risks
9
‘Risk’ is dynamic and subject to constant change,
so the process includes continuing:
Monitoring and review
and
Communication & consultation
10
Risk Management in Information Security Project
 Risk management: process of identifying and
controlling risks facing an organization
 Risk identification: process of examining an
organization’s current information technology
security situation
 Risk assessment: assign a risk rating to each asset
 Risk control: applying controls to reduce risks to an
organizations data and information systems
11
Risk Identification
Steps:





Plan and organize the process
Categorize system components
Inventory and categorize assets
Identify threats
Specify vulnerable assets
14
Risk Identification
 Risk identification begins with the
process of self-examination
 Managers
 identify the organization’s
information assets
 classify them into useful groups
 prioritize them by their overall
importance
15
Creating an Inventory of Information Assets
 Identify information assets, including people, procedures,
data and information, software, hardware, and networking
elements
 Should be done without pre-judging value of each asset
 Values will be assigned later in the process
16
Table 4-1 - Categorizing Components
17
Suggested Attributes for Hardware,
Software, and Network Assets
 When deciding which attributes to track for each information
asset, consider the following list of potential attributes:











Name
IP address
MAC address
Asset type
Serial number
Manufacturer name
Manufacturer’s model or part number
Software version, update revision, or FCO number
Physical location
Logical location
Controlling entity
19
Suggested Attributes for
People, Procedures, and Data Assets
 People




Position name/number/ID
Supervisor name/number/ID
Security clearance level
Special skills
 Procedures





Description
Intended purpose
Software/hardware/networking elements to which it is tied
Location where it is stored for reference
Location where it is stored for update purposes
21
Suggested Attributes for People,
Procedures, and Data Assets
 Data
 Classification
 Owner/creator/manager
 Size of data structure
 Data structure used
 Online or offline
 Location
 Backup procedures
22
Classifying and Categorizing Assets
 Once initial inventory is assembled, determine whether its
asset categories are meaningful
 Inventory should also reflect sensitivity and security priority
assigned to each information asset
 A classification scheme categorizes these information assets
based on their sensitivity and security needs
23
Classifying and Categorizing Assets
(Continued)
 Each of these categories designates level of
protection needed for a particular information asset
 Some asset types, such as personnel, may require an
alternative classification scheme that would identify
the clearance needed to use the asset type
 Classification categories must be comprehensive
and mutually exclusive
24
Management of
Classified Information Assets
 Managing an information asset includes considering
the storage, distribution, portability, and destruction
of that information asset
 Information asset that has a classification
designation other than unclassified or public:
 Must be clearly marked as such
 Must be available only to authorized individuals
26
Management of
Classified Information Assets
 To maintain confidentiality of classified documents,
managers can implement a clean desk policy
 When copies of classified information are no longer
valuable or too many copies exist, care should be
taken to destroy them properly to discourage
dumpster diving
27
Military Data Classification Cover Sheets
28
29
Assessing Values for Information Assets
 As each information asset is identified, categorized, and
classified, assign a relative value
 Relative values are comparative judgments made to ensure
that the most valuable information assets are given the
highest priority, for example:
 Which information asset is the most critical to the success of
the organization?
 Which information asset generates the most revenue?
 Which information asset generates the highest profitability?
 Which information asset is the most expensive to replace?
 Which information asset is the most expensive to protect?
 Which information asset’s loss or compromise would be the
most embarrassing or cause the greatest liability?
30
Listing Assets in Order of Importance
 The final step in the asset identification process is to
list the assets in order of importance
 Can be achieved by using a weighted factor analysis
sheet
31
Table 4-2 – Example Weighted Factor
Analysis
32
Threat Identification
 Each threat presents a unique challenge to
information security
 Must be handled with specific controls that directly
address particular threat and threat agent’s attack
strategy
 Before threats can be assessed in risk identification
process, each threat must be further examined to
determine its potential to affect targeted information
asset
 In general, referred to as threat assessment
33
Threats to Information Security
34
Weighted Ranking of Threat-Driven
Expenditures
Top Threat-Driven Expenses
Deliberate software attacks
Acts of human error or failure
Technical software failures or errors
Technical hardware failures or errors
Quality-of-service deviations from service providers
Deliberate acts of espionage or trespass
Deliberate acts of theft
Deliberate acts of sabotage or vandalism
Technological obsolescence
Forces of nature
Compromises to intellectual property
Deliberate acts of information extortion
Rating
12.7
7.6
7.0
6.0
4.9
4.7
4.1
4.0
3.3
3.0
2.2
1.0
35
Vulnerability Assessment
 Once you have identified the information assets of the
organization and documented some threat assessment
criteria, you can begin to review every information asset for
each threat
 Leads to creation of list of vulnerabilities that remain potential
risks to organization
 Vulnerabilities are specific avenues that threat agents can
exploit to attack an information asset
 At the end of the risk identification process, a list of assets
and their vulnerabilities has been developed
 This list serves as starting point for next step in the risk
management process—risk assessment
36
Risk Assessment
 The goal at this point is to create a method to
evaluate relative risk of each listed vulnerability
37
Risk Assessment
Steps:





Assign value to attack on assets
Assess likelihood of attack on vulnerabilities
Calculate relative risk factor to assets
Review possible controls
Document findings
38
Risk Estimate Factors
Risk is
The likelihood of the occurrence of a vulnerability
Multiplied by
The value of the information asset
Minus
The percentage of risk mitigated by current controls
Plus
The uncertainty of current knowledge of the vulnerability
39
Likelihood
 Likelihood is the overall rating - often a numerical
value on a defined scale (such as 0.1 – 1.0) - of the
probability that a specific vulnerability will be
exploited
 Why no 0.0?
 Can also use a weighted score, i.e. 1-100, low-medhigh, etc
40
Valuation of Information Assets
 Assign weighted scores for value of each asset;
actual number used can vary with needs of
organization
 Can use the one from Risk Identification with some
refinement if necessary
41
Percentage of Risk
Mitigated by Current Controls
 If a vulnerability is fully managed by an existing
control, it can be set aside
 If it is partially controlled, estimate what percentage
of the vulnerability has been controlled
42
Uncertainty
 It is not possible to know everything about every
vulnerability
 The degree to which a current control can reduce
risk is also subject to estimation error
 Uncertainty is an estimate made by the manager
using judgment and experience
43
Risk Determination Example
 Asset A has a value of 20 and has one vulnerability,
which has a likelihood of 1.0 with no current controls
 Your assumptions and data are 75% accurate
 Asset B has a value of 90 and has two vulnerabilities
 Vulnerability #2 has a likelihood of 0.4 with a current
control that addresses 50% of its risk
 Vulnerability # 3 has a likelihood of 0.1 with no
current controls
 Your assumptions and data are 80% accurate
44
Risk Determination Example
 Resulting ranked list of risk ratings for the three
vulnerabilities is as follows:
 Asset A: Vulnerability 1 rated as 25 = (20 × 1.0) –
0% + 25%
 Asset B: Vulnerability 2 rated as 25.2= (90 × 0.4) –
50% + 20%
 Asset B: Vulnerability 3 rated as 10.8 = (90 × 0.1) –
0 % + 20%
45
Identify Possible Controls
 For each threat and its associated vulnerabilities that have
risk of being exploited, create a preliminary list of control
ideas
 Three general categories of controls exist:
 Policies
 Programs
 Education, training, and awareness programs.
 Technical controls
46
Documenting the Results
of Risk Assessment
 The goal of the risk management process:
 Identify information assets and their vulnerabilities
 Rank them according to the need for protection
 In preparing this list, wealth of factual information
about the assets and the threats they face is collected
 Also, information about the controls that are already
in place is collected
 The final summarized document is the ranked
vulnerability risk worksheet
47
Ranked Vulnerability Risk Worksheet
What’s the assumption made in this worksheet?
48
Documenting the Results of Risk
Assessment (Continued)
 By the end of risk assessment, you should have
three deliverables
 Information asset classification worksheet
 Weighted factor analysis worksheet
 Ranked vulnerability risk worksheet
49
Risk Control
Introduction
 The primary goal of risk control is to reduce risk to
an acceptable level
 What level is acceptable?
 It is impossible to design and deploy a totally riskfree environment
 Risk control is often achieved by applying
safeguards
 Safeguard: anything that removes a vulnerability or
protects against one or more specific threats.
51
52
Risk Control Strategies
 An organization must choose one of four basic
strategies to control risks :
 Avoidance: applying safeguards that eliminate or
reduce the remaining uncontrolled risks for the
vulnerability
 Transference: shifting the risk to other areas or to
outside entities
 Mitigation: reducing the impact should the
vulnerability be exploited
 Acceptance: understanding the consequences and
accept the risk without control or mitigation
53
Avoidance
 Avoidance is the risk control strategy that attempts
to prevent the exploitation of the vulnerability
 Avoidance is accomplished through:
 Application of policy
 Application of training and education
 Countering threats
 Implementation of technical security controls and
safeguards
54
Transference
 Transference is the control approach that attempts to
shift the risk to other assets, other processes, or
other organizations
 May be accomplished by
 Rethinking how services are offered
 Revising deployment models
 Outsourcing to other organizations
 Purchasing insurance
 Implementing service contracts with providers
55
Mitigation
 Reduce risk
 by means of planning and preparation, the damage
caused by the exploitation of vulnerability
 This approach includes three types of plans:
 Disaster recovery plan (DRP)
 Incident response plan (IRP)
 Business continuity plan (BCP)
 Mitigation depends upon the ability to detect and
respond to an attack as quickly as possible
56
Summaries of Mitigation Plans
57
Acceptance
 Acceptance of risk is the choice to do nothing to protect an
information asset and to accept the outcome from any
resulting exploitation.
 It also means that management has agreed to accept the
consequences and the loss if the risk is realized.
58
Acceptance (Continued)
 Only valid use of acceptance strategy occurs when organization
has:
 Determined level of risk to information asset
 Assessed probability of attack and likelihood of a successful
exploitation of vulnerability
 Approximated ARO of the exploit
 Estimated potential loss from attacks
 Performed a thorough cost benefit analysis
 Evaluated controls using each appropriate type of feasibility
 Decided that the particular asset did not justify the cost of protection
 Usually require a sign-off letter.
59
Risk Handling Action Points
60
Evaluation, Assessment, And
Maintenance Of Risk Controls
 Once a control strategy has been selected and
implemented
 Effectiveness of controls should be monitored and
measured on an ongoing basis to determine its
effectiveness
 Accuracy of estimated risk that will remain after all
planned controls are in place
61
The Risk Control Cycle
62
Feasibility Studies and Cost Benefit
Analysis
 Before deciding on the strategy for a specific
vulnerability, all readily accessible information about
the consequences of the vulnerability must be explored
―What are the advantages of implementing a control as
opposed to the disadvantages of implementing the
control?‖
 Number of ways to determine advantage or
disadvantage of a specific control
 Primary means are based on the value of information
assets that control is designed to protect
63
Cost Benefit Analysis (CBA)
 Economic Feasibility: criterion most commonly
used when evaluating a project that implements
information security controls and safeguards
 A primary goal is to ensure that only cost-effective
safeguards are deployed.
 Organizations are urged to begin a cost benefit
analysis by evaluating
 Worth of the information assets to be protected
 Loss in value if those information assets are
compromised
64
Cost
 Just as it is difficult to determine the value of information, it
is difficult to determine the cost of safeguarding it
 Some of the items that affect the cost of a control or
safeguard include:
 Cost of purchase, development, and licensing
 Cost of implementation and customization
 Cost of annual operation, maintenance, administration, and so
on
 Cost of annual repairs and upgrades
 Productivity improvement or loss
 Changes to environment
 Cost of testing and evaluation
 Training fees
65
Benefit
 Benefit is the value to the organization of using
controls to prevent losses associated with a specific
vulnerability
 Usually determined by
 Valuing the information asset or assets exposed by
vulnerability
 Determining how much of that value is at risk and
how much risk there is for the asset
 Determining the annualized loss expectancy (ALE)
 Benefit is expressed as the reduction in ALE due to
implementation of the control/safeguard
66
Asset Valuation
 Asset valuation is the process of assigning financial
value or worth to each information asset
 Actual cost
 Non-monetary expenses
67
Asset Valuation (Cont’d)
68
SLE
 Single loss expectancy (SLE): the cost associated
with a single realized risk against specific asset
 Based on asset value and expected percentage of loss
that would occur from a particular attack:
SLE = asset value (AV) x exposure factor (EF)
Where EF = the percentage loss if a specific asset
were violated by a realized risk
 Example, if an asset is valued at $20,000, and it has an
EF of 45% for a specific threat, then the SLE of the
threat for that asset is _____.
 This information is usually estimated
69
ARO
 Annualized Rate of Occurrence: the expected
frequency with which a specific threat or risk will
occur within a single year
 Needs estimation
 Learn from history
 Guesswork
 Statistical analysis
70
ALE
 Annualized loss expectancy: the possible yearly cost
of all instances of a specific realized threat against a
specific asset
 ALE=SLE*ARO
71
The Cost Benefit Analysis (CBA)
Formula
 CBA determines whether or not a control alternative
is worth its associated cost
 CBAs may be calculated
 Before a control or safeguard is implemented to
determine if the control is worth implementing
OR
 After controls have been implemented and have been
functioning for a time:
CBA = ALE(prior) – ALE(post) – ACS
72
The Cost Benefit Analysis (CBA)
Formula
 ALE(prior to control) is the annualized loss
expectancy of the risk before the implementation of
the control
 ALE(post control) is the ALE examined after the
control has been in place for a period of time
 ACS is the annual cost of the safeguard
73
Example 1
 A computer is susceptible to hacker attack. If the
hacker attack were successful, it will cause a
financial loss of $5,000. Assume hacker attacks
happen once per six month. Calculate ARO, SLE,
and ALE
 A new firewall is installed on the computer, now the
hacker attack happens once every two years. The
financial loss is the same if the attack happens.
Calculate ARO, SLE, ALE
 The cost of the firewall is $6,000. (treat this as the
Annual Cost) Is this control (firewall) economically
feasible according to cost-benefit analysis
74
Example 2
 A company is considering install Intrusion
Detection system (IDS). Currently intrusion (hacker
attack) happens once every month on average. Each
time will cost about $10,000. The IDS will be able
to detect 90% of the intrusions. When an intrusion
is detected, the average financial loss due to that
intrusion will be reduced to $2,000. The cost for the
IDS is $50,000. Use CBA to decide whether the
IDS is economically feasible.
75
CBA discussion
 It is a daunting job to calculate EF, SLE, ARO, and
ALE for every asset and every threat/risk
 Usually a security control affects more than one
vulnerability
 Fortunately, there are quantitative risk assessment
tools available.
76
Other Feasibility Approaches
 Organizational feasibility analysis
 examines how well proposed information security
alternatives will contribute to operation of an organization
 Operational feasibility
 addresses user/management acceptance and support
 Technical feasibility
 examines whether or not the organization has or can
acquire the technology to implement and support the
alternatives
 Political feasibility
 defines what can and cannot occur based on the consensus
and relationships between the communities of interest
77
Benchmarking
 Benchmarking is an activity where organizations continuously
engage in self--study and compare themselves with the leaders in
their field so they can identify, adapt, and apply significantly
better practices.
 Benchmarking:
 Seeking out and studying practices of other organizations that
produce desired results
 Measuring differences between how organizations conduct business
 When benchmarking, an organization typically uses one of two
measures to compare practices:
 Metrics-based measures are comparisons based on numerical
standards
 Process-based measures are generally less focused on numbers and
are more strategic
78
Benchmarking Steps
 Self-assessment.
 Decide what to benchmark.
 Comparison.
 Decide who to benchmark.
 Analysis and Adaptation.
 Ask why you are getting your results and why others are
getting better results.
 Implementation.
 Think carefully about what enablers (e.g., resources, schedule
changes) are needed.
 Feedback.
 Carefully monitor and measure the results of your innovation
and recalibrate if necessary.
79
Benchmarking (Continued)
 In the field of information security, two categories
of benchmarks are used:
 Standards of due care and due diligence, and
 Best practices
80
Due Care and Due Diligence
 For legal reasons, an organization may be forced to
adopt a certain minimum level of security
 When organizations adopt levels of security for legal
defense, they may need to show that they have done
what any prudent organization would do in similar
circumstances
 Called standard of due care
 Due diligence is demonstration that organization is
persistent in ensuring implemented standards continue
to provide required level of protection
81
Best Business Practices
 Best business practices: security efforts that seek to
provide a superior level of performance
 Are among the best in the industry, balancing access
to information with adequate protection, while
maintaining a solid degree of fiscal responsibility
 Companies with best practices may not be the best
in every area
 May simply have established an extremely high
quality or successful security effort in one or more
area
 http://fasp.nist.gov
82
The Gold Standard
 Even the best business practices are not sufficient for
some organizations
 These organizations aspire to set the standard by
implementing the most protective, supportive, and yet
fiscally responsible standards they can
 The gold standard is a defining level of performance
that demonstrates a company’s industrial leadership,
quality, and concern for the protection of information
 Seeking the gold standard is a method of striving for
excellence
83
Applying Best Practices
 When considering best practices for adoption,
address the following questions:
 Does your organization resemble the organization that is
implementing the best practice under consideration?
 Is your organization in a similar industry?
 Does your organization face similar challenges?
 Is your organizational structure similar to the organization from
which you are modeling the best practices?
 Can your organization expend resources that are in line with the
requirements of the best practice?
 Is your organization in a similar threat environment as the one
cited in the best practice?
84
Problems with Benchmarking and Best
Practices
 Organizations don’t talk to each other
 No two organizations are identical
 Best practices are a moving target
 Simply knowing what was going on a few years ago
does not necessarily indicate what to do next
85
Baselining
 Baselining is the analysis of measures against
established standards
 In information security, baselining is the
comparison of security activities and events against
the organization’s future performance
 The information gathered for an organization’s first
risk assessment becomes the baseline for future
comparisons
86
Risk Appetite
 Risk appetite
 the quantity and nature of risk that organizations are
willing to accept, as they evaluate the trade-offs
between perfect security and unlimited accessibility
 Reasoned approach to risk is one that balances
expense against possible losses if exploited
87
Residual Risk
 When vulnerabilities have been controlled as much as
possible, there is often remaining risk that has not been
completely accounted for  residual risk
88
Residual Risk
 The significance of residual risk must be judged
within the context of an organization’s risk appetite
 The goal of information security is not to bring
residual risk to zero, but to bring it in line with an
organization’s risk appetite
89
Documenting Results
 When risk management program has been
completed, series of proposed controls are prepared
 Each justified by one or more feasibility or
rationalization approaches
 At minimum, each information asset-threat pair
should have a documented control strategy that
 Clearly identifies any residual risk remaining after
the proposed strategy has been executed
90
Documenting Results
 Some organizations document outcome of control
strategy for each information asset-threat pair in an
action plan
 Includes:
 Concrete tasks, each with accountability assigned to
an organizational unit or to an individual
91
Qualitative Measures
 Quantitative assessment performs asset valuation
with actual values or estimates
 An organization could determine that it cannot put
specific numbers on these values
 Organizations could use qualitative assessments
instead.
 More scenario based
 Rank threats on a scale to evaluate their risks, costs
and effects
92
Download