Risk Management

advertisement
Security Risk Management
Risk Management
Risk Identification
Identify & Prioritize Assets
Identify & Prioritize Threats
Identify Vulnerabilities
between Assets and Threats
(Vulnerability Analysis)
Risk Assessment
Calculate Relative Risk
of Each Vulnerability
Risk Control
Cost-Benefit Analysis
Avoid
Control
Transfer
Mitigate
Accept
Security Risk Management
Risk Assessment: ‘spotting’ the most significant
vulnerabilities in the sea of potential vulnerabilities
vulnerability
that carries
most risk
Risk Analysis: Is a sec. risk worth a sec. control?!
Quantitative,
Qualitative,
Relative
Risk Analysis
Qualitative vs. Quantitative Analysis
• Qualitative Risk – scenario based approach - uses
Analysis
labels & relative values (high/low)
rather than numbers; blends in
experience & personal judgment
• Quantitative Risk – predicts level of monetary loss
Analysis
for each threat, and monetary
benefit of controlling the treat

each element is quantified and
entered into equations, e.g.:





asset value
threat frequency
severity of vulnerability
damage impact
safeguard cost …
Qualitative vs. Quantitative Analysis
Qualitative Analysis
pros
cons
Quantitative Analysis
• Requires simple (or no)
calculations.
• Considers hands-on opinions
of individuals who know the
process best.
• Easier to automate and
evaluate.
• Very useful in performance
tracking - provide credible
cost/benefit analysis.
• Assessment and results are
subjective.
• Complex calculations – may
not be understood by all.
• Does not enable dollar
cost/benefit discussion.
• Very detailed information
about environment need to
be gathered.
• Difficult to track
performance.
Qualitative vs. Quantitative Analysis
“Quantitative risk measurement is the standard way of measuring risk
in many fields, such as finance and insurance, but it is not commonly
used to measure risk in information systems. Two of the reasons
claimed for this are:
1) the difficulties in identifying and assigning a value to assets, and
2) the lack of statistical information that would make it possible to
determine frequency.
Thus, most of the risk assessment tools that are used today for
information systems are measurements of qualitative risk.”
http://www.sans.org/reading_room/whitepapers/auditing/
introduction-information-system-risk-management_1204
Qualitative Analysis
• Challenges of – define likelihood and impact
Qualitative
values in a manner that would
Analysis
allow the same scale to be used
across multiple risk assessments
Example: Sample ‘likelihood of threat’ definitions
Other possibilities:
1) uniform distribution – same % at/for all levels
2) 5 levels of likelihood: very low, low, moderate, very high, high
Qualitative Analysis (cont.)
Example: Sample ‘impact’ definitions
Example: Sample ‘risk determination’ matrix
http://www.sans.org/reading_room/whitepapers/auditing/introductioninformation-system-risk-management_1204
Quantitative Analysis
• Cost-Benefit – aka economic feasibility study Analysis
quantitative decision-making
process that:



determines the loss in value if
the asset remained unprotected
determines the cost of protecting
an asset
helps prioritize actions and
spending on security …
Company should not spend more
to protect an asset than the asset is worth!
Quantitative Analysis (cont.)
• Asset Value (AV) – includes the following:



cost of buying/developing
hardware, software, service
cost of installing, maintaining,
upgrading hardware, software,
service
cost to train and re-train
personnel
• Exposure – percentage loss that would occur
from a given vulnerability being
Factor (EF)
exploited by a given threat
Quantitative Analysis (cont.)
• Single Loss – most likely loss (in value) from
Expectancy
an attack
(SLE)
SLE = AV * EF
Example: A Web-site’s SLE due to a DDoS Attack
Estimated value of a Web-site: AV = $ 1,000,000.
A DDoS on the site would result in 10% losses of the site value
(EF=0.1).
SLE for the site: AV * EF = $ 100,000.
Would it be worth investing in anti-DDoS system that
costs $100,000 a year?
Quantitative Analysis (cont.)
• Annualized Rate – indicates how often an attack
of Occurrence
is expected to successfully
(ARO)
occur in a year

if an attack occurs once
every 2 years ⇒ ARO = 0.5
• Annualized Loss – overall loss incurred by an
Expectancy
attack (i.e. by exploiting a
(ALE)
vulnerability) in each year
ALE = ARO * SLE
Quantitative Analysis (cont.)
Example: Determining ARO, SLE, ALE
http://www.pearsonhighered.com/assets/hip/us/hip_us_pearsonhighered/
samplechapter/078973446X.pdf
Quantitative Analysis (cont.)
Example: Determining ALE to Occur from Risks
http://www.windowsecurity.com/articles/Risk_Assessment_and_Threat_Identification.html
A widget manufacturer has installed new network servers,
changing its network from P2P, to client/server-based network.
The network consists of 200 users who make an average of
$20 an hour, working on 100 workstations.
Previously, none of the workstations involved in the network
had an anti-virus software installed on the machines. This was
because there was no connection to the Internet and the
workstations did not have USB/disk drives or Internet
connectivity, so the risk of viruses was deemed minimal.
One of the new servers provides a broadband connection to
the Internet, which employees can now use to send and receive
email, and surf the Internet.
Quantitative Analysis (cont.)
Example: Determining ALE to Occur from Risks (cont.)
•
•
•
200 employees
100 workstations
$20 hour
One of the managers read in a
trade magazine that other widget
companies have reported an annual
75% chance of viruses infecting their
network after installing T1 lines,
and it may take up to 3 hours to
restore the system.
A vendor will sell licensed copies of
antivirus software for all servers
and the 100 workstations at a cost
of $4,700 per year.
The company has asked you to determine the annual loss that
can be expected from viruses, and determine if it is beneficial in
terms of cost to purchase licensed copies of anti-virus software.
Quantitative Analysis (cont.)
Example: Determining ALE to Occur from Risks (cont.)
Based on the provided data:
ARO = 0.8
SLE = 200 user * ($ 20 / user-hour)
* 3 hours = $ 12,000
ALE = SLE * ARO = $ 9,000
Because the ALE is $9,000, and the cost of the software that will
minimize this risk is $4,700 per year, this means the company
would save $4,300 per year by purchasing the software ($9,000
- $4,700 = $4,300).
Quantitative Analysis (cont.)
• Cost-Benefit Analysis – expresses cost benefit
of a safeguard – i.e.,
Formula
determines whether a
particular control is worth
its cost
GROSS risk reduction benefit
NRRB = [ALE(prior) - ALE(post)] – ACS
NET risk reduction benefit

ALE(prior) – ALE before implementing control

ALE(post) – ALE after implementing control

ACS – annual cost of safeguard
Quantitative Analysis (cont.)
Example: Cost-Benefit Analysis
ALE
GRRB
gross risk
reduction
benefit
ALE(prior)
before
safeguards
NRRB
net risk
reduction
benefit
ACS
annual. cost
of safeguards
ALE(post)
after
safeguards
Time
Only NRRB>0 justifies the use of safeguard(s)!
Quantitative Analysis (cont.)
Example: Determining NRRB
Your organization has decide to centralize anti-virus support
on a server which automatically updates virus signatures on
user’s PCs .
When calculating risk due to viruses, the annualized loss expect.
(ALE) is $145,000. The cost of this anti-virus countermeasure in
a year is estimated to be $24,000, but it will lower the ALE to
$65,000.
Is this a cost-effective countermeasure? Why or why not?
ALE (prior) = $145 k
ALE (post) = $65 k
ACS = $24 k
NRRB = ALE (prior) – ALE (post) – ACS = $145 k - $65 k - $24 k
= $56 k, so there are positive benefits of this solution
Quantitative Analysis (cont.)
Example: Cert. Info. Sys. Sec. Prof. (CISSP) Exam
ALE (prior) = AV*EF*ARO = $106 *0.1*0.2 = $20,000
ALE (post) = $0 (best case scenario - safeguard 100% eff.)
ACS = ?
For NRRB ≥ 0, safeguard of up to $20,000 acceptable.
Quantitative Analysis (cont.)
Example: Cost-benefit analysis in case of
100% effective safeguard
ALE
NRRB
net risk
reduction
benefit
ACS
annual. cost
of safeguards
ALE(prior)
before
safeguards
ALE(post)
after
safeguards
Time
Other Feasibility Measures
• Cost-benefit analysis determines whether a
security control measure is feasible economically.
• Other ‘measures of feasibility’, when evaluating
a security control, include:
• Organizational – examines how well a proposed
Feasibility
security control will contribute
to organization’s strategic
objectives

e.g. a firewall might be a good
security safeguard, but may prevent
effective flow of multimedia data
Other Feasibility Measures (cont.)
• Behavioral – examines user’s and management’s
Feasibility
acceptance and support of a
proposed security control


e.g. if users do not accept a new policy /
technology / program, it will inevitably fail
most common methods for obtaining
user acceptance are:
 communication – affected parties must
know the purpose and benefits of the
proposed change
 education – affected parties must be
educated on how to work under the new
constraints
 involvement – affected parties must be
given a chance to express what they want
and what they will tolerate from the system
Other Feasibility Measures (cont.)
• Technical – determine whether organization has
Feasibility or can acquire technology and/or
necessary technical expertise to
implement and support a control

e.g. a firewall may require special software
hardware support / installation on all
computers
• Political – determines what can and cannot be
Feasibility done based on consensus and
relationships between different
departments …

IT and Info. Sec. department might have
to compete for same resources
Relative Analysis
• Rather than using quantitative or qualitative
risk analysis measures, an organization may
resort to relative risk analysis of a control,
including:
• Benchmarking – study practices used in other
organizations that obtain results
you would like to duplicate
• Due Care or – implement a minimum level of
Due Diligence
security

failure to maintain a standard of due
care can open an organization to legal
liability – especially important if dealing
with customer data
Relative Assessment (cont.)
• Best Practices – implement entire set of security
controls as recommended for your
industry / general public

‘best practices’ according to Microsoft:
 use antivirus software
 use strong passwords
 verify your software security setting
 update product security
 build personal firewalls
 back up early and often
 protect against power surges and losses
• Gold Standard – implement controls beyond best
practices – for those that strive to
be ‘the best of the best’
Risk Assessment Methodologies
• Risk Assessment – set of procedures & activities
Methodology
that structure risk assessment
process


each methodology may be suitable
(only) for certain situations and
industries
because of various needs and
various situations, a variety of
risk assessment methodologies
(tools) have been developed:
 OCTAVE
 FAIR
 Microsoft Risk Management Approach
 ISO Standard for Sec. Risk Management
Risk Assessment Methodologies (cont.)
• OCTAVE – Operationally Critical Threat, Asset, and
Vulnerability Evaluation - developed by
a research team from Carnegie Mellon


suite of tools, techniques and methods
uses a 3-phase approach to assemble a
comprehensive picture of information
security needs of an enterprise
 Phase 1: Build Asset-Based Threat Profile
Key areas of expertise within organization are examined,
through a set of workshops with staff, to identify:
*
*
*
*
*
important information assets
threats to those assets
security requirements of assets
current protection strategies
weaknesses in organizational policies and practice
Risk Assessment Methodologies (cont.)
• OCTAVE (cont.)
 Phase 2: Identify Infrastructure Vulnerabilities
Key operational components of IT infrastructure are
examined for technical vulnerabilities.
Possible types of vulnerabilities:
* design vulnerabilities
* implementation vulnerability
* configuration vulnerability
Tools that can be used during this phase:
* file integrity checkers
* virus scanners
* system scanners
* network scanners / mappers
Network/system should assessed from outside
enterprise, inside enterprise, and from individual
subsystems within enterprise
Risk Assessment Methodologies (cont.)
• OCTAVE (cont.)
 Phase 3: Develop Security Strategy and Plans
Information generated in Phases 1 & 2 are analyzed to:
1) identify and evaluate risks based on their impact
2) develop protection strategy and mitigation plans
OCTAVE uses qualitative approach to evaluate risks
as well as to evaluate their impact.
http://www.proceedings2006.imcsit.org/pliks/160.pdf
Risk Assessment Methodologies (cont.)
• OCTAVE (cont.)

Characteristics of OCTAVE:
 Self-directed.
A small team of organization’s personnel (analyst team)
manages the process and analyzes all information.
 Multidisciplinary Analyst Team.
OCTAVE requires that analyst team comprises representatives
from both the mission-related and IT areas of organization.
 Workshop-Based Approach.
Workshop-based approach for gathering information and
making decisions is used. Analyst team members are primary
workshop facilitators.
 Catalogs of Information.
In all three phases, OCTAVE benchmarks organization against
catalogs of information: catalog of practices, threat profile,
catalog of vulnerabilities.
Risk Assessment Methodologies (cont.)
• FAIR – Factor Analysis of Information Risk, by J. Jones


framework that aims to help organizations
understand, analyze & measure information
risk (the why and the how)
key components of FAIR framework:
 Taxonomy of factors that make up information risk.
(provides precise def. of asset, threat, vulnerability, risk)
 Methods for measuring factors that derive info. risk.
(measures of threat event frequency, vulnerability, loss)
 Computational model for math. calculation of risk.
 Simulation model that combines the above to build
and analyze risk scenarios of any size or complexity.

can be used to strengthen risk analysis
processes like OCTAVE
Risk Assessment Methodologies (cont.)
• FAIR Analysis Steps:

Identify Scenario Components
1. identify the asset in risk
2. identify the threat to community under consideration

Evaluate Loss Event Frequency (LEF)
3.
4.
5.
6.
7.

estimate the probable threat event frequency (TEF)
estimate the threat capability (TCap)
estimate control strength
derive vulnerability (Vuln)
derive loss event frequency (LEF)
Evaluate Probable Loss Magnitude (PLM)
8. estimate worst-case loss
9. estimate probable loss

Derive and Articulate Risk
10. derive and articulate risk
Risk Assessment Methodologies (cont.)
• FAIR Analysis Characteristics:

Quantitative – risk expressed in quantitative terms

Probabilistic – accounts for uncertainty

Intuitive – clear and ‘easy to follow’ logic/approach

Flexible – can be applied to any level of abstraction

Compatible with widely used security standards


Agnostic – can be applied to other (non-information)
security disciplines
Familiar to Management – communicates in terms
that are familiar and meaningful to management

Approved and reviewed by experts

Sophisticated – applies sophisticated scientific principles
Risk Assessment Methodologies (cont.)
Example: FAIR Risk Factoring
The probable
frequency, within a
given timeframe,
that a treat agent
will act against
an asset.
=
The probable
frequency, within a
given timeframe, that
a treat agent will
come into contact
with an asset.
X
The probability that a
treat agent will act
against an asset once
contact occurs.
Microsoft’s 10 Immutable Laws of Security
http://technet.microsoft.com/en-us/library/cc722487.aspx
Law #1: If a bad guy can persuade you to run his program
on your computer, it's not your computer anymore!
Law #2: If a bad guy can alter the operating system on
your computer, it's not your computer anymore!
Law #3: If a bad guy has unrestricted physical access to
your computer, it's not your computer anymore!
Law #4: If you allow a bad guy to upload programs to
your website, it's not your website any more!
Law #5: Weak passwords trump strong security.
Microsoft’s 10 Immutable Laws of Security (cont.)
Law #6: A computer is only as secure as the
administrator is trustworthy.
Law #7: Encrypted data is only as secure as the
decryption key.
Law #8: An out of date virus scanner is only marginally
better than no virus scanner at all.
Law #9: Absolute anonymity isn't practical, in real life
or on the Web.
Law #10: Technology is not a panacea.
Download