Information Systems Risk Analysis and Management Spyros Kokolakis University of the Aegean IPICS 2005, Chios, 18-29 July 2005 Much about technology… • Information and Communication Technologies Security – – – – – – – – – Networks Wireless Databases Internet Smart cards Keys Cryptography Intrusion detection ….. Real world… IS or ICT Security? • Information and Communication Technologies Security – Confidentiality, Integrity, Availability etc. • Information System – An Information System comprises five interdependent elements: hardware, software, data, procedures, and people. These elements interact for the purpose of processing data and delivering information. – An IS exists to serve an enterprise or organization and, consequently, it may only be studied in the context of the organization it serves. Information Systems overview How to fit security in the picture • Having people as part of the system we can forget any simple solutions. • IS security has no strict definition • Security is a kind of …feeling – “Are you secure?” or “Do you feel secure?” What’s the right question? Example: Airport security List of possible measures 1. Scissors etc. not allowed 2. ID check (photo ID must be presented) 3. Only the person named on the ticket can travel 4. X-rays 5. Lighters are not allowed anywhere in the airport (…it’s time to quit smoking) 6. Biometrics 7. Boot your laptop to see if it has a battery 8. Lock the captain’s cabin 9. Armed guards on board 10. Interview all passengers before boarding In such a complex environment… • Total security is out of the question – People’s behaviour is unpredictable – We cannot account for all possible threats and we cannot detect all vulnerabilities. – Security costs money; and also time, people and other resources. • So, what shall we do? Risk analysis & management • We need to employ methods that will allow us to measure the risk associated with the operation of an IS, in order to take measures analogous to the level of risk. • We need risk analysis and management methods What is Risk and how to measure it • Risk is determined by the following factors – Assets (A) – Impact (I) – Threats (T) – Vulnerabilities (V) R= f(A, I, T, V) Assets, Impacts, Threats & Vulnerabilities • Assets; what needs protection • Business impact is the outcome of a failure to protect the assets of the IS. • Threat is any action or event that may cause damage to an Information System. • Vulnerability is a characteristic of the IS that may allow a threat to succeed. Conceptualisation of IS Sec Risk analysis & management Risk management methods • There are more than 100 methods – CRAMM – MARION – SBA – OCTAVE SBA (Security By Analysis) • Developed in Sweden in the early ’80s • Very popular in Sweden and other Scandinavian countries • Focus on people – People involved in every day operations have a better chance to identify problems • A set of methods – SBA check – SBA scenario CRAMM • CCTA Risk Analysis and Management Method • Developed in the UK in the late ’80s • Used in many countries; it has been applied in many hundreds of cases • It includes a ‘countermeasures library’ CRAMM overview • Stage 1: Initiation and asset valuation – Model the IS; Valuate the assets; Management review • Stage 2: Risk assessment – Identify threats; Assess threats and vulnerabilities; Calculate risks; Management review • Stage 3: Risk management – Select countermeasures; Prioritise countermeasures and schedule implementation; Obtain management approval; Monitor Octave ® Operationally Critical Threat, Asset, and Vulnerability Evaluation® What is OCTAVE? • A comprehensive, repeatable methodology for identifying risks in networked systems through organizational self-assessment. • Helps organizations apply information security risk management to secure their existing information infrastructure and to protect their critical information assets. Goal of OCTAVE • Plan how to apply good security practices to address organizational and technical vulnerabilities that could impact critical assets – Two versions: One for large organisations (> 300 employees) and one for small organisations • Organizational issues – Policies or security practices • Technical issues – Technology infrastructure Information Security Risk Management Framework Mind the gap • Security Practices Gaps Result From an Organizational Communication Gap Octave is the bridge • OCTAVE is an Organizational Approach to Security Risk Management The process OCTAVE Analysis Team An interdisciplinary team (4-6) consisting of • business or mission-related staff • information technology staff Phase 1 – Organizational View • Data gathering of the organizational perspectives on – assets – threats to the assets – security requirements of the assets – current protection strategy practices – organizational vulnerabilities • The perspectives will come from – senior managers – operational area managers (including IT) – staff (from the operational areas and IT) Phase 1 Questions • What are your organization’s critical information-related assets? • What is important about each critical asset? • Who or what threatens each critical asset? • What is your organization currently doing to protect its critical assets? • What weaknesses in policy and practice currently exist in your organization? Asset • Something of value to the organization that includes one or more of the following: – – – – information systems services and applications people • Critical when there will be a large adverse impact to the organization if – the asset is disclosed to unauthorized people. – the asset is modified without authorization. – the asset is lost or destroyed. – access to the asset is interrupted. Asset protection requirements • Prioritize the qualities of an asset that are important to the organization: – confidentiality – integrity – availability • Example for availability: Internet access should be provided 24x7x365, 97% of the time. Threat • An indication of a potential undesirable event involving a critical asset • Examples – A disappointed student could set a fire. – A virus could interrupt access to the university network. – An operator may set the firewall to deny all access without noticing Threat Properties • Critical Asset • Actor (human, system, other) • Motive (deliberate or accidental) – human actor only • Access (network or physical) – human actor only • Outcome – Disclosure or viewing of sensitive information – Modification of important or sensitive information – Destruction or loss of important information, hardware, or software – Interruption of access to important information, software, applications, or services Asset-based risk profile Phase 2 – Technology View • Identify technology vulnerabilities that provide opportunities for impacting critical assets Methods / Tools • You can use a variety of methods and tools: – Interviews with people – Documentation analysis – Network scanners – Log analysers – Vulnerability assessment tools – etc. Phase 2 Questions • How do people access each critical asset? • What infrastructure components are related to each critical asset? • What technological weaknesses expose your critical assets to threats? Phase 3 – Risk Analysis – Establish the risks to the organization’s critical assets. – Define mitigation plans to protect the critical assets. – Characterize the organization’s protection strategy. – Identify the next steps to take after the evaluation to ensure progress is made. Impact Evaluation Criteria • Define the organization’s tolerance for risk. • Standard areas of impact considered include: – reputation/customer confidence – life/health of customers – productivity – fines/legal penalties – financial – other Expression of Risk • A risk is expressed using – a threat scenario (a branch on a threat tree) – the resulting impact on the organization Example • Viruses can interrupt staff members from accessing the network. They will not prepare their lectures on time. • Impact value: medium Threat scenario disclosure modification loss/destruction interruption High Low deliberate disclosure modification loss/destruction interruption Medium High High Low accidental disclosure modification loss/destruction interruption deliberate disclosure modification loss/destruction interruption accidental inside asset network outside asset access actor motive outcome Medium High High Low impact Phase 3 Questions • What is the potential impact on your organization due to each threat? What are your organization’s risks? • Which are the highest priority risks to your organization? • What policies and practices does your organization need to address? • What actions can your organization take to mitigate its highest priority risks? • Which technological weaknesses need to be addressed immediately? Outputs of Octave Protection Strategy Defines organizational direction Mitigation Plan Plans designed to reduce risk Action List Near-term action items Protection Strategy • Structured around the catalog of practices and addresses the following areas: – – – – – – – – – Security Awareness and Training Security Strategy Security Management Security Policies and Regulations Collaborative Security Management Contingency Planning/Disaster Recovery Physical Security Information Technology Security Staff Security Mitigation Plan • Defines the activities required to remove or reduce unacceptable risk to a critical asset. • Focus is on activities to – recognize or detect threats when they occur – resist or prevent threats from occurring – recover from threats if they occur • Mitigations that cross many critical assets might be more cost effective as protection strategies OCTAVE-S • Defines a more structured method for evaluating risks in small (less than 100 employees) or simple organizations – requires less security expertise in analysis team – requires analysis team to have a full, or nearly full, understanding of the organization and what is important – uses “fill-in-the-blank” as opposed to “essay” style • Will also be defined with procedures, guidance, worksheets, information catalogs, and training OCTAVE Information • Visit http://www.cert.org/octave – Introduction to the OCTAVE Approach – OCTAVE Method Implementation Guide – OCTAVE-S (version 0.9) • Book: Managing Information Security Risks: The OCTAVE Approach by Christopher Alberts and Audrey Dorofee from Addison-Wesley.