Risk Management Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA 16802 chu@ist.psu.edu IST 515 Objectives This module will familiarize you with the following: • The basic terminology used in risk management • The role and importance of risk management practices. • The identification of asset, threat, and vulnerability. • Risk assessment methodologies. • Risk assessment process. • Risk management principles. • Controls to identify, rate, and reduce the risk to specific information assets. Readings • Tipton, H. and Henry, K. (Eds.), Official (ISC)2 Guide to the CISSP CBK, Auerbach, 2007. Domain 1 (Required). • Stoneburner, G., Goguen, A. and Feringa, A., “Risk Management Guide for Information Technology Systems,” NIST SP 800-30, July 2002. (Required) • Stine, K., Kissel, R., Barker, W. C., Fahlsing, J. and Gulick, J., “Guide for Mapping Types of Information and Information Systems to Security Categories,” NIST SP 800-60, August 2008. • Wikipedia, “Failure Mode and Effects Analysis,” http://en.wikipedia.org/wiki/Failure_mode_and_effects_analysis • Marquis, H., “Ten Steps to Do It Yourself CRAMM,” 2006. http://www.itsmsolutions.com/newsletters/DITYvol2iss8.htm Readings - Examples • Tan, D., “Quantitative Risk Analysis Step-By-Step,” SANS Institute, 2002. • R. Marchany, “Conducting a Risk Analysis,” in Mark Luker and Rodney Petersen (Eds), Computer and Network Security in Higher Education, Chapter 3, EDUCAUSE. (STAR Project). • H. P. In, Y.-G. Kim, T. Lee, C.-J. Moon, Y. J., and I. Kim, "A Security Risk Analysis Model for Information Systems," D.-K. Baik (Ed.): AsiaSim 2004, LNAI 3398, Springer, pp. 505–513, 2005. (Quantitative Method) Essential Terminologies Vulnerability: A flaw or weakness in a system security procedures, design, implementation, or internal controls that could be exercised and result in a security breach or a violation of the system’s security policy. Threat: The potential for a threat-source to exercise (accidentally trigger or intentionally exploit) a specific vulnerability. Threat-Source: Either (1) intent and method targeted at the intentional exploitation of a vulnerability or (2) a situation and method that may accidentally trigger a vulnerability. Elements of Risk Management Risk Assessment Risk Management Safeguards Assets Data Facilities Hardware Software Vulnerability Risk Threat Safeguards Vulnerability (NIST-SP-800-12) • • • • Risk avoidance. Risk transfer. Risk mitigation. Risk acceptance. Essential Terminologies Risk: The possibility of loss (American Heritage Dictionary). The net negative impact of the exercise of a vulnerability, considering both the probability and the impact of occurrence (NIST SP 800-30). A function of the likelihood of a given threat-source’s exercising a particular potential vulnerability, and the resulting impact of the adverse event on the organization. Risk Management: The technique or profession of assessing, minimizing, and preventing accidental loss to a business, as through the use of insurance, safety measures (Random House Dictionary). Reduces risks by defining and controlling threats and vulnerabilities ((ISC)2). The process of identifying risk, assessing risk, and taking steps to reduce risk to an acceptable level (NIST SP 800-30). Examples of Critical Assets People and skills Goodwill Intellectual Property Hardware/Software Data Documentation Supplies Physical plant Money Logical Asset Value Physical Asset Common Computer Threats Errors and omissions. Fraud and theft. Employee sabotage. Loss of physical and infrastructure support. Malicious hackers. Industrial espionage. Malicious code. Threats to personal privacy. Insider threats. Common Threat Sources Natural Threats. Floods, earthquakes, tornadoes, landslides, avalanches, electrical storms, and other such events. Human Threats. Malicious outsider or insider, terrorist, spy political, human intervention. Environmental Threats. Long-term power failure, pollution, chemicals, liquid leakage. Technical Threats. Hardware/software failure, malicious code, unauthorized use. Physical Threats. Closed-circuit TV failure, perimeter defense failure. Operational Threats. Automated or manual process. Human Threats Threat-Source Motivation Threat Actions • Hacker • Cracker • Challenge • Ego • Rebellion • • • • Hacking Social engineering System intrusion, break-ins Unauthorized system access • Computer criminal • Destruction of information • Illegal information disclosure • Monetary gain • Unauthorized data alteration • • • • • Computer crime Fraudulent act Information bribery Spoofing System intrusion • • • • • • • • • Bomb/Terrorism Information warfare System attack System penetration System tampering • Terrorist Blackmail Destruction Exploitation Revenge Threat-Source • Industrial espionage • Insider Motivation • Competitive advantage • Economic espionage • • • • • • Curiosity Ego Intelligence Monetary gain Revenge Unintentional errors and omissions Threat Actions • • • • • • Economic exploitation Information theft Intrusion on personal privacy Social engineering System penetration Unauthorized system access • Assault on an employee • Blackmail • Browsing of proprietary information • Computer abuse • Fraud and theft • Information bribery • Input of falsified, corrupted data • Interception • Malicious code • Sale of personal information • System bugs • System intrusion • System sabotage • Unauthorized system access Vulnerabilities • Flaw or weakness in system that can be exploited to violate system integrity. – Security Procedures – Design – Implementation • Threats trigger vulnerabilities: – Accidental – Malicious Vulnerability Sources Previous risk assessment document of the IT system assessed. Audit reports, system anomaly reports, security review reports, and system test and evaluation reports. Vulnerability lists such as NIST I-CAT vulnerability database (http://icat.nist.gov) Security advisors. Vendor advisories. Commercial computer/incident/emergency response teams and post list (e.g., SecurityFocus.com) Information Assurance Vulnerability Alert and bulletins for military systems. System software security analyses. Vulnerability/Threat Pairs Vulnerability Terminated employee’s system ID are not removed from the system Company firewall allows inbound telnet and guest ID enabled on XYZ server The vendor has identified flaws in the security design of the system Threat-Source Threat Action Terminated employees Dialing into the company’s network and assessing company proprietary data Unauthorized users Using telnet to XYZ server and browsing system files with the guest ID Unauthorized users Obtaining unauthorized access to sensitive system files based on known system vulnerabilities Data center uses water sprinklers to suppress fire; tarpaulins to protect Fire, negligent persons hardware and equipment from water damage are not in place Water sprinklers being turned on in the data center Types of Risk Analysis • Quantitative: – Assigns real numbers to costs of safeguards and damage – Annual loss exposure (ALE) – Probability of event occurring – Can be unreliable/inaccurate • Qualitative: – Judges an organization’s risk to threats – Based on judgment, intuition, and experience – Ranks the seriousness of the threats for the sensitivity of the asserts – Subjective, lacks hard numbers to justify return on investment Process of Quantitative Analysis • Seek initial management approval. • Establish a risk assessment team. • Review information currently available within the organization. • Estimate the loss – SLE (Single Loss Expectancy ) SLE = asset value (in $) × exposure factor (loss in successful threat exploit, as %) • Calculate the Annualized Rate of Occurrence (ARO) - how often a threat will be successful in exploiting a vulnerability over the period of a year (or Likelihood of Exploitation) • Calculate the Annualized Loss Expectancy (ALE): ALE = ARO × SLE Example of Quantitative Analysis • Risk = Risk-impact x Risk-Probability – Loss of car: risk-impact is cost to replace car, e.g. $10,000 – Probability of car loss: 0.10 – Risk = 10,000 x 0.10 = 1,000 • General measured per year – Annual Loss Exposure (ALE) Elements of Security Risks Classification of Assets, Threats and Vulnerabilities Asset Threat Vulnerability 1. Information/Data 1. Human/Non-human 2. Documents 2. Network/Physical Documents, Personnel, 3. Hardware 3.Technical/Environment Regulation 4. Software 4. Inside/Outside 5. Human Resource 5. Accidental/Deliberate 6. Circumstances 1. Administering 2. Physical Circumstances or Facilities 3. Technical Hardware, Software, Communication/ Network Example of Risk Analysis Logic of Risk Analysis • RISK = Loss * Probability • Loss means the decline of asset value when an asset is exposed to some vulnerabilities. • Probability means the probability of threatoccurrence from the corresponding vulnerabilities. • Total Risk of AM3 = 100 x (0.8 x 0.5 + 0.9 x 0.7 + 0.6 x 0.4) / 3 = 100 x 1.27 / 3 = 42.3 The effectiveness of Risk Mitigation Methods Mitigation Method Vulnerability Model Vaccine Smart Card Firewall VM1 (unprotected major communication facilities) 0.2 0.6 0.1* VM2 (unfit network management) 0.6 0.5 0.5 VM3 (unprotected storage devices) 0.3 0.2 0.1 Mitigation Effect • Applying a risk mitigation method to some vulnerabilities can reduce the rate of not only one vulnerability but also several related vulnerabilities simultaneously. • We can get the rate of risk reduction effectively with considering which vulnerabilities can be affected by selecting some risk mitigation methods. • Risk reduction after applying firewall = 100 * (0.1 * 0.5 + 0.5 * 0.7 + 0.1 * 0.4) / 3 = 100 * 0.44 / 3 = 14.7 Risk Analysis • What kind of threats can be reduced? • What are residual risks if the risk mitigations are applied? • What is the ROI of each risk mitigation? • ROI = Benefit / Cost • Benefit = (initial risk) - (residual risk after the risk mitigation method is applied) • Total Cost = Acquisition Cost + Operation Cost + Business Opportunity Cost Process of Qualitative Assessment • • • • Seek management approval to conduct analysis. Form a risk assessment team. Request related documents. Setup interviews with organizational members to identify vulnerabilities, threats and countermeasures. • Analyze the data. Matching the threat to a vulnerability, matching threats to assets, determining how likely the threat is to exploit the vulnerability, determining the impact to the organization in the event an exploit is successful and matching current and planned countermeasures (that is, protection) to the threat–vulnerability pair. • Calculate risk. • Recommend countermeasures and calculate residual risk. Likelihood Definitions Likelihood Level Likelihood Definition High The threat-source is highly motivated and sufficiently capable, and controls to prevent the vulnerability from being exercised are ineffective. Medium Low The threat-source is motivated and capable, but controls are in place that may impede successful exercise of the vulnerability. The threat-source lacks motivation or capability, or controls are in place to prevent, or at least significantly impede, the vulnerability from being exercised. Magnitude of Impact Definitions Magnitude of Impact High Medium Low Impact Definition Exercise of the vulnerability (1) may result in the highly costly loss of major tangible assets or resources; (2) may significantly violate, harm, or impede an organization’s mission, reputation, or interest; or (3) may result in human death or serious injury. Exercise of the vulnerability (1) may result in the costly loss of tangible assets or resources; (2) may violate, harm, or impede an organization’s mission, reputation, or interest; or (3) may result in human injury. Exercise of the vulnerability (1) may result in the loss of some tangible assets or resources or (2) may noticeably affect an organization’s mission, reputation, or interest. Risk-Level Matrix Threat Likelihood Impact Low (10) Medium (50) High (100) High (1.0) Low 10 x 1.0 = 10 Medium 50 x 1.0 = 50 High 100 x 1.0 = 100 Medium (0.5) Low 10 x 0.5 = 5 Medium 50 x 0.5 = 25 Medium 100 x 0.5 = 50 Low (0.1) Low 10 x 0.1 = 1 Low 50 x 0.1 =5 Low 100 x 0.1 = 10 Risk Scale and Necessary Actions Risk Level Risk Description and Necessary Actions High If an observation or finding is evaluated as a high risk, there is a strong need for corrective measures. An existing system may continue to operate, but a corrective action plan must be put in place as soon as possible. Medium If an observation is rated as medium risk, corrective actions are needed and a plan must be developed to incorporate these actions within a reasonable period of time. Low If an observation is described as low risk, the system’s DAA must determine whether corrective actions are still required or decide to accept the risk. Example of Risk Scales Likelihood Impact 5. Extreme 4. Very High 3. Medium 2. Low 1. Negligible 1 Rare 2 Unlikely 3 Moderate 4 Likely 5 Almost Certain Comments Because of the time constraint, I will not continue to cover the remaining slides. As you can see, there are more materials and examples that we can cover in a class lesson. If you are interested in the topic, please read the materials by yourself or consider to take an in-depth course like IST 564 or SRA 330. Both courses cover extensively on risk management. Assets and Their Priority Description of Asset Authentication-authorization services DNS name server Physical plant, environmental servers DNS name server (secondary) Network (routers, servers, modems, etc.) HR database server Payroll server Production control servers Client systems (Win95/NT, Macs) Database group “crash-and-burn” system Machine Name Priority+ host1.dept.edu C host2.dept.edu C host3.dept.edu C host4.dept.edu C host5.dept.edu C host6.dept.edu E host7.dept.edu E host8.dept.edu N host9.dept.edu N host10.dept.edu N + C, critical element; E, essential; N, normal STAR Project Definition of Priority • Critical: If the loss of its function would result in the university ceasing to function as a business entity. • Essential: The loss of asset would cripple the university’s capacity to function, but it could survive for a week or so without the asset. All effort would be made to restore the function within a week. • Normal: If the loss of asset resulted in some inconvenience. STAR Project Asset Weight Matrix to Prioritize IT Assets A/A Authenticationauthorization services DNS name server (primary) Physical plant, environmental Servers DNS name server (secondary) Network (routers, servers, modems, etc.) HR database server Total Votes DNS(p) Plant 9 9 4.5 9 5 9 0 9 5 2 9 4.5 9 5 0 DNS(s) Network 0 0 3.5 9 7 0 0 0 0 4 4 3.5 4 9 7.5 22 28.5 10.5 45 HR 0 19.5 STAR Project List of Controls for Critical Risks Risk Clear text Description Clear text data moving among our systems and networks Client system access control Control of access to distributed desktop client workstations Construction mistakes Service interruptions during construction, renovations Key person dependency Too few staff to cover critical responsibilities Natural disaster Flood, earthquake, fire, etc. Passwords Selection, security, number of passwords, etc. Physical security (IS internal) IS private space (machine room, wire closets, offices, etc.) Physical security (IS external) IS public space (laboratories, classrooms, library, etc.) Spoofing E-mail and IP address forgery or circumvention Data disclosure Inappropriate acquisition or release of university data System administration practices Adequacy of knowledge, skills, and procedures Operational policies Appropriate strategies, directions, and policies STAR Project Summary of Compliance Matrix IS Assets Site 1 Site 2 Site 3 Site 4 Unix Security Risks Overall OK System admin. practices OK OK Data disclosure Fail OK Caution Passwords OK Caution OK Key person dependency OK Fail Future Future Caution Caution OK Future Physical security STAR Project Risk Assessment Methodologies • NIST SP 800-30 and 800-66 (HIPAA). • OCTAVE (Operationally Critical Threat, Asset and Vulnerability Evaluation). Carnegie Mellon University. • FRAP (Facilitated Risk Analysis Process). Tom Peltier. • CRAMM (CCTA Risk Analysis and Management Method). • Spanning Tree Analysis. • Failure Modes and Effect Analysis. Risk Assessment Methodologies Method Source Feature Industry NIST SP 800-30; 800-66 NIST Qualitative Healthcare; HIPAA OCAVE Carnegie Mellon Univ. Software Institute Qualitative Software FRAP (Facilitated Risk Analysis Process) Tom Peltier, 2005 Qualitative General CRAMM (CCTA Risk Analysis and Management Method) Central Computing and Telecommunications Agency, 2007 Qualitative NATO; Unisys; RAC Spanning Tree Analysis (ISC)2 Information Systems Security Engineering Professional Quantitative FMEA (Failure Modes and Effect Analysis) US Military, 1940 Quantitative Hardware & software systems Aerospace; Automotive Risk Assessment Process -NIST System characterization. Vulnerability identification. Threat identification. Countermeasure identification. Likelihood determination. Impact determination. Risk determination. Additional countermeasures recommendations. Document results. Input Risk Assessment Activities Output Hardware/software System interfaces Data & information People System mission 1. System Characterization • System boundary • System functions • Systems and data criticality • System and data sensitivity • History of attack • Data from intelligence agencies 2. Threat Identification • Threat statement • Reports from prior risk assessment • Audit comments • Security requirements • Security test results 3. Vulnerability Identification • List of potential vulnerabilities • • • • • • Current controls • Planned controls • • • • Threat-source motivation Threat capacity Nature of vulnerability Current controls 4. Control Analysis • List of current and planned controls 5. Likelihood Determination • Likelihood rating Input Risk Assessment Activities • Mission impact analysis • Asset criticality assessment • Data criticality • Data sensitivity 6. Impact Analysis • Likelihood of threat exploitation • Magnitude of impact • Adequacy of planned or current controls • Loss of integrity • Loss of availability • Loss of confidentiality Output • Impact rating 7. Risk Determination • Risk and associated risk levels 8. Control Recommendation • Recommended controls 9. Result Documentation • Risk assessment report Risk Mitigation Action Points Threat Source System Design Yes Vulnerable Yes Exploitable No No No Risk No Risk Risk Exists Attacker’s Cost < Gain No Accept Risk Yes Vulnerability to attack exists Loss Anticipated > Threshold No Accept Risk Yes & Unacceptable Risk How Risk Management Work? Risk Assessment Define Boundaries, Scope, and methodology Risk Mitigation Select Safeguard* Collect and Synthesize Data Interpret Results * There are many approaches to safeguard selection Accept Residual Risk Implement Control Risk Management Cycle From GAO/AIMD-99-139 Risk Management Principles Risk Avoidance. Is the practice of coming up with alternatives so that the risk in question is not realized. Risk Transfer. Is the practice of passing on the risk in question to another entity, such as an insurance company. Risk Mitigation. Is the practice of eliminating or significantly decreasing the level of risk presented. E.g., company can put countermeasure such as firewall, IDS etc. in place to deter malicious from accessing the highly sensitive information. Risk Acceptance. Is the practice of simply accepting certain risk (s), typically based on a business decision that may also weigh the cost versus the benefit of dealing with the risk in another way. Risk Mitigation Options Risk Assumption. To accept the potential risk and continue operating the IT system or to implement controls to lower the risk to an acceptable level. Risk Avoidance. To avoid the risk by eliminating the risk cause and/or consequence (e.g., forgo certain functions of the system or shut down the system when risks are identified) Risk Limitation. To limit the risk by implementing controls that minimize the adverse impact of a threat’s exercising a vulnerability (e.g., use of supporting, preventive, detective controls). Risk Planning. To manage risk by developing a risk mitigation plan that prioritizes, implements, and maintains controls. Research and Acknowledgment. To lower the risk of loss by acknowledging the vulnerability or flaw and researching controls to correct the vulnerability. Risk Transference. To transfer the risk by using other options to compensate for the loss, such as purchasing insurance. Risk Management Actions Likelihood Impact Low Significant Moderate Minor Considerable management required Risks may be worth accepting with monitoring Accept risks Medium High Must manage and monitor risks Extensive management essential Management effort worthwhile Management effort required Accept, but monitor risks Manage and monitor risks Controls • Mechanisms or procedures for mitigating vulnerabilities – Prevent – Detect – Recover • Understand cost and coverage of control • Controls follow vulnerability and threat analysis Risk Mitigation Strategy When vulnerability (or flaw, weakness) exists implement assurance techniques to reduce the likelihood of a vulnerability’s being exercised. When a vulnerability can be exercised apply layered protections, architectural designs, and administrative controls to minimize the risk of or prevent this occurrence. When the attacker’s cost is less than the potential gain apply protections to decrease an attacker’s motivation by increasing the attacker’s cost (e.g., use of system controls such as limiting what a system user can access and do can significantly reduce an attacker’s gain). When loss is too great apply design principles, architectural designs, and technical and nontechnical protections to limit the extent of the attack, thereby reducing the potential for loss. Input • Risk levels from the risk assessment report • Risk assessment report Risk Mitigation Activities Output 1. Prioritize Actions • Actions ranking from high to low 2. Evaluate Recommended Control Options • List of possible controls • Feasibility • Effectiveness 3. Conduct Cost-Benefit Analysis • Impact of implementing • Impact of not implementing • Associated costs 4. Select Controls • Selected controls 5. Assign Responsibility • List of responsible persons • Risks and associated risk levels • Prioritized actions • Recommended controls • Selected planned controls • Responsible persons • Start date • Target completion date • Maintenance requirements 6. Develop Safeguard Implementation Plan 7. Implement Selected Controls • Cost-benefit analysis • Safeguard implementation plan • Residual risks Categories of Security Control Security controls, when used appropriately, can prevent, limit, or deter threat-source damage to an organization’s mission. An organization should consider technical, management, and operational security control, or a combination of such controls, to maximum the effectiveness of controls for their IT systems and organization. Technical Controls. These controls usually involve system architecture, engineering disciplines, and security packages with a mix of hardware, software, and firmware. Management Controls. These controls focus on the stipulation of information protection policy, guidelines, and standards. Operational Controls. These controls ensure that security procedures are properly enforced and implemented in accordance with the organization’s goals and mission. Framework of Technical Security Controls Transaction Privacy User or Process Authentication Nonrepudiation Authorization Audit Access Control Enforcement Proof of Wholeness Intrusion Detection and Containment Resource State Restore Protected Communications (Safe from disclosure, substitution, modifications & replay) Identification Cryptographic Key Management Security Administration System Protections (least privilege, object reuse, process separation) Prevent Detect, Recover Support Management Security Controls Preventive: Assign security responsibility. Develop and maintain system security plan. Implement personnel security controls such as separation of duties, least privilege, and user computer access registration and termination. Conduct security awareness and technical training. Detection: Implement personnel security controls such as personnel clearance, background investigations, rotation of duties. Conduct periodic review of security controls. Perform periodic system audits. Conduct ongoing risk management. Authorize IT systems to address and accept residual risk. Management Security Controls Recovery: Provide continuity of support and develop, test, and maintain the continuity of operations plan. Establish an incident response capability to prepare for, recognize, report, and respond to the incident and return the system to operational status. Operational Security Controls Preventive: Control data media access and disposal (e.g., physical access control, degaussing method) Limit external data distribution (e.g., use of labeling) Control software viruses Safeguard computing facility Secure wiring closets that house hubs and cables Provide backup capability Establish off-site storage procedures and security Protect laptops, personal computers (PC), workstations Protect IT assets from fire damage Provide emergency power source Control the humidity and temperature of the computing facility Detection: Provide physical security Ensure environmental security. Potential Projects • • • • Developing a risk management plan. A qualitative risk assessment approach to xxx A quantitative risk assessment approach to xxx A comparative analysis of risk assessment methods.