CE/CZ 4064 Security Management Risk Analysis and Assessments CE/CZ 4064: Security Management, © 2014, Anwitaman DATTA Risk management CE/CZ 4064: Security Management, © 2014, Anwitaman DATTA Dilemmas of Information Security How much resource for which? Prevent Detect Respond Dilemmas of Information Security Complacency If no major security incidents happened recently, why bother? How do you justify a budget for security? Dilemmas of Information Security Security at all cost!! But, there is “no perfect security” How do we know what is good enough? Security is priceless Dilemmas of Information Security The fallacy of relative privation Is being better than the competition good enough? Dilemmas of Information Security Or is it to follow “Best practices”? Lowest common denominator Dilemmas of Information Security Standards compliant? compliance out of compulsion Sounds like a burden, but is there any value? Dilemmas of Information Security Everything has a price Blakley et al. (2001) rationalize that since is priceless information security concerns Security the protection of business-critical or sensitive information and related IT systems and infrastructure, failures of information security will trigger adverse events, resulting in losses or damages that will exert negative impacts on a business. Information security must be a risk managementOr, discipline that is it? manages risks by considering their costs and/or impacts on a business. In other words, “information security is information risk management” Dilemmas of Information Security Recognizing the wisdom of the “no perfect security” principle and the need to prioritize and decide resource allocations within a limited security budget, a risk management approach seems logical and has been widely proposed for managing information security. OSCAR WILDE Risk analysis CE/CZ 4064: Security Management, © 2014, Anwitaman DATTA Risk analysis Many methodologies (but trying to broadly investigate): What needs to be protected? Who/What are the threats and vulnerabilities? What are the implications if they were damaged or lost? What is the value to the organization? What can be done to minimize exposure to the loss or damage? Source: http://www.sans.org/reading-room/whitepapers/auditing/overview-threat-risk-assessment-76 Risk analysis Desired outcome: Recommendations that maximize the protection of confidentiality, integrity and availability while still providing functionality and usability Note: Instead of the CIA-triad, the scope of protection may be expanded to other desirable security attributes. Source: http://www.sans.org/reading-room/whitepapers/auditing/overview-threat-risk-assessment-76 Risk analysis Process: Scope What is it for? What all is to be investigated? The network, the databases, the web service, system boundary, … Who is it for? CFO needs to know different things than what the CISO or the network administrator needs to know … Source: http://www.sans.org/reading-room/whitepapers/auditing/overview-threat-risk-assessment-76 Risk analysis Process: Data Collection processes and policies in place which softwares/patches are being used repository of known vulnerabilities (for the products being used) … Source: http://www.sans.org/reading-room/whitepapers/auditing/overview-threat-risk-assessment-76 Risk analysis Process: Vulnerability analysis determine current exposures e.g., not the latest patches penetration testing (e.g., using standard tools) With/without knowledge of the internals Source: http://www.sans.org/reading-room/whitepapers/auditing/overview-threat-risk-assessment-76 Risk analysis Process: Vulnerability analysis a x e le p m Source: http://www.sans.org/reading-room/whitepapers/auditing/overview-threat-risk-assessment-76 Risk analysis Process: Vulnerability analysis a x e le p m Source: http://www.sans.org/reading-room/whitepapers/auditing/overview-threat-risk-assessment-76 Risk analysis Process: Threat analysis exa le p m Source: http://www.sans.org/reading-room/whitepapers/auditing/overview-threat-risk-assessment-76 Risk analysis Process: Risk identification and analysis of acceptable risks Risk analysis Process: Analysis of acceptable risks Sources: http://blog.securestate.com/acceptance-is-the-first-step/ http://executive-education.insead.edu/ressources_edp/library/ckfinder/userfiles/images/executive_education/ssss.png Qualitative risk analysis Different (relative) levels of the risks’ probabilities and impacts be defined. Definitions of probability levels and impact levels are tailored to the individual settings. Note: We already did a similar exercise for the vulnerability analysis Sources: http://m.engineering.queensu.ca/Outreach/EngineeringStudents/files/PMBOK3rdEnglish.pdf Qualitative risk analysis Other aspects Risk urgency Collaterals and interdependencies Sources: http://m.engineering.queensu.ca/Outreach/EngineeringStudents/files/PMBOK3rdEnglish.pdf What is it really worth? Quantitative risk analysis Difficult to make improvements in security without proper financial analyses to justify the budget Quantitative risk analysis attempts to assign independently objective monetary values to the components of the risk assessment and to the assessment of the potential loss Sources: http://www.sans.org/reading-room/whitepapers/auditing/quantitative-risk-analysis-step-by-step-849 Quantitative risk analysis Advantages (if done “correctly”) More objectivity in its assessment Analysis is often derived from some irrefutable facts Offers direct projection of cost/benefit of proposal More powerful selling tool to management less prone to arouse disagreements during management review Can be fine-tuned to meet the needs of specific situations and customised for specific industries Sources: http://www.sans.org/reading-room/whitepapers/auditing/quantitative-risk-analysis-step-by-step-849 Example BuyAnyTime Inc. is an online retailer, gearing up for Christmas sale - and for the increased traffic at its site for a period of one month (30 days), it expects the following: Average 100 transactions a minute Average $10 profit per transaction Current system avg downtime of 30 minutes per day An upgrade will cost $800,000 and reduce downtime to 5 minutes per day Is it worth it? Example 30 minutes downtime Cost to business = $ 30*30*10*100 = $ 900,000 vs 5 minutes downtime Cost to business = $ (5*30*10*100 + 800,000) = $ 950,000 Example BuyAnyTime Inc. does a consumer survey to conclude, that in fact, if they have more than 10 minutes downtime per day, their reputation will suffer, leading to 2% customer attrition. Reevaluate the decision? Assume reduction in the volume of transactions to be proportional to the quantum of customer attrition. Example 30 minutes downtime vs 5 minutes downtime Cost to business = $ 30*30*10*100 = $ 900,000 Reevaluated cost to business = $ (30*30*10*100) + $(1410*30*10*2) = $ 1,746,000 Cost to business = $ (5*30*10*100 + 800,000) = $ 950,000 Quantitative risk analysis Need to take into account Different risk countermeasure strategies will have different payback or cash flow scenarios. One time investment (infrastructure upgrade) vs. recurrent costs (regular penetration tests by security consultant) Long term benefits vs. time-limited benefits Secondary effects (e.g., reputation as an “asset”) Annualized Loss Expectancy The monetary loss expected in one year due to a risk where ALE: Annualized Loss Expectancy ARO: Annual Rate of Occurrence SLE: Single Loss Expectancy Annualized Loss Expectancy The monetary loss expected in one year due to a risk ARO: Annual Rate of Occurrence How often does a specific loss event from a particular risk occur? Annualized Loss Expectancy The monetary loss expected in one year due to a risk SLE: Single Loss Expectancy The monetary loss expected from the occurrence of a risk once, on an asset. The exposure factor is represented in the impact of the risk over the asset, or percentage of asset lost. ALE example A company has 10000 employees. Personal information and emails for these employees are stored in a distributed manner over ten machines, each storing 1000 distinct (nonintersecting) records. Whenever one of these employees fall victim to a phishing attack, the whole machine (where the victim’s records are stored) is compromised. The IT department claims that the Single Loss Expectancy from such an incident is 5000$. What is the valuation of the whole asset according to the IT department? If 18 people fall victim to phishing spread over a year, what is the annualised loss expectancy? Annualized Loss Expectancy Many “shortcomings” If all 18 people fall victim to phishing together, what is the annualised loss expectancy? Depends on the actual number of machines affected. (level of abstraction may not capture things precisely) Combining the two risk components - asset value and the probability of loss together “simplifies” things (which is sometimes good), but this simplification also means distinguishing high-frequency, low-impact events from low frequency, high-impact events based on a single number is no longer possible. Annualized Loss Expectancy Many “shortcomings” Say, the cost estimated by the IT department was based on the cost to restore data. But now if an employee sues the company because his/her personal data was not properly protected (say under a new “Personal Data Protection Act”), then what? May not be possible/easy to “correctly” value the asset Objectivity is subjective Annualized Loss Expectancy Many “shortcomings” ARO: Annual Rate of Occurrence May not be easy to predict/may have high variance AV and EF: Asset valuation and Exposure factor May not be easy to quantify and can be subjective, the person assessing the risk may have to define it … Hybrid approach Risk assessment is not a precise science A hybrid of qualitative and quantitative approaches All models are wrong, but some are useful. - George Box Identifying & Prioritizing CE/CZ 4064: Security Management, © 2014, Anwitaman DATTA Penetration testing Goal oriented Can a specific security attribute be violated? Deliverable: A report of how security was breached in order to reach the agreed-upon goal Recommend remedy Source: http://danielmiessler.com/writing/vulnerability_assessment_penetration_test/ Vulnerability Assessment Exploratory: Identification and prioritization of vulnerabilities In terms of severity It terms of likelihood of occurrence Fault tree analysis Fault tree analysis (FTA) is a top down, deductive failure analysis in which an undesired state of a system is analyzed using Boolean logic to combine a series of lower-level events. a x e le p m key-logger password cracked phishing hardware stolen not deployed password guessed ineffective two-factor authorization unauthorized access to email Note: FTA is a general purpose technique used for system reliability and safety engineering, risk assessment eLearning task: Read http://en.wikipedia.org/wiki/Fault_tree_analysis Attack trees Conceptual diagrams showing how an asset, or target, might be attacked, possibly qualifying an attack in multiple dimensions Motivation: e.g., Opportunistic versus motivated Access: e.g., insider attack/external hack/… Skills and resources of attacker: uses ready-made rootkit, crafts customized attacks, has money for special equipment … Risk-aversion: Will send phishing mail, but won’t pick pocket … Note: Attack trees are closely related to, but not the same as fault trees, see http://en.wikipedia.org/wiki/ Attack_tree for more discussions Attack trees Represent the attacks and countermeasures as a tree structure Root node is the goal of the attack Complex systems will have many targets (modeled as separate roots) Leaf nodes are the attacks Source: https://www.schneier.com/paper-attacktrees-ddj-ft.html Attack trees Two kinds of intermediate nodes “Or” nodes: different ways to achieve same goal “And” nodes: multiple steps required together to achieve a goal (And) is indicated explicitly Attack trees Breaking into house pick pocket lost from office desk key logger password cracked password guessed phishing hardware stolen not deployed AND exa le p m 2FA ineffective unauthorized access to email Attack trees Breaking into house pick pocket lost from office desk password cracked p2 p3 ?? password guessed phishing hardware stolen not deployed AND e Qualified with additional attributes, e.g., probability p1 le key logger p xam 2FA ineffective unauthorized access to email Attack trees Qualified with additional attributes, e.g., time 3 months le key logger p m a x e 20 hours 1 day pick pocket 1 day lost not possible from office desk not possible 2 months password guessed phishing hardware stolen not deployed not applicable AND Breaking into house password cracked 2FA ineffective unauthorized access to email Attack trees device cost-effective layered defence Its possible to combine multiple qualifiers (e.g., time, money, probability) Can be used to identify the “preferred” attack vectors. Can be made as detailed as possible, but also, templates of attack sub-trees can be reused Event tree analysis Event tree analysis (ETA) is a forward, bottom up, logical modeling technique for both success and failure that explores responses through a single initiating event and lays a path for assessing probabilities of the outcomes and overall system analysis a x e successful phishing attacked yes to obtain login credential le p m 2FA ineffective no unauthorized access to email unauthorized access to email keylogger infected password cracked unauthorized access to email NO unauthorized access to email NO unauthorized access to email Note: ETA is also a general purpose technique, and allows probabilistic risk assessment eLearning task: Read http://en.wikipedia.org/wiki/Event_tree_analysis Probabilistic risk assessment Event tree can be used for probabilistic risk assessment a x e le p m eLearning task: Read http://en.wikipedia.org/wiki/Probabilistic_risk_assessment Failure mode and effects analysis (FMEA) FMEA is an inductive reasoning (forward logic) single point of failure analysis to review as many components, assemblies, and subsystems as possible to identify failure modes, and their causes and effects Each failure mode gets a numeric score that quantifies: likelihood (probability) that the failure will occur likelihood that the failure will not be detected the amount of harm or damage the failure mode may cause to a person or to equipment (severity) Note: FMEA originated from the literature of reliability analysis, but is used in ISO 27k eLearning task: Read http://en.wikipedia.org/wiki/Failure_mode_and_effects_analysis FMEA Risk Priority Number (RPN) RPN=sev*prob*det eLearning task: Understand www.iso27001security.com/ISO27k_FMEA_spreadsheet.xlsx exa le p m k from 27 O IS FMEA in ISO27k Source: www.iso27001security.com/ISO27k_FMEA_spreadsheet.xlsx FMEA in ISO27k FMEA in ISO27k The only constant is change Risk analysis needs to be “current” ISCM Information security continuous monitoring (ISCM) is defined as maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions. NIST publication SP800-137 (statutory under FISMA) “continuous” frequent Frequency determined by criticality of issues Source: http://csrc.nist.gov/publications/nistpubs/800-137/SP800-137-Final.pdf ISCM Tier 1 risk management activities address highlevel information security governance policy as it relates to risk to the organization as a whole, to its core missions, and to its business functions. ISCM Tier 2 criteria for continuous monitoring of information security are defined by how core mission/business processes are prioritized with respect to the overall goals and objectives of the organization, the types of information needed to successfully execute the stated mission/business processes, and the organization-wide information security program strategy. ISCM ISCM activities at Tier 3 address risk management from an information system perspective. These activities include ensuring that all system-level security controls (technical, operational, and management controls) are implemented correctly, operate as intended, produce the desired outcome with respect to meeting the security requirements for the system, and continue to be effective over time. Wrap-up: Risk Assessment No perfect security Limited resources Identify and prioritize risks Consequences and costs Different approaches to explore There’s no marauder’s map!!