33
Alaa Mubaied [email protected]

Alaa Mubaied [email protected]. Introduction Organizations must design and create safe environments in which business processes and procedures can

Embed Size (px)

Citation preview

Page 1: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can

Alaa [email protected]

Page 2: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can

IntroductionOrganizations must design and create safe

environments in which business processes and procedures can function.

Risk managementprocess of identifying and controlling risks facing an

organization.

Risk identificationprocess of examining the current information technology

security situation in the organization.

Risk controlapplying controls to reduce risks to an organization’s data

and information systems.

Page 3: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can

An Overview of Risk ManagementKnow your organisation

identify, examine, and understand the information and systems currently in place

Know the enemyidentify, examine, and understand threats facing

the organization

Information security, management and users, and information technology all must work together to manage risks that are encountered

Page 4: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can

Role of Risk ManagementRisk management involves identifying, classifying,

and prioritizing assets in the organization.A threat assessment process involves identifying

and quantifying the risks facing each asset.Components of risk identification

PeopleProceduresDataSoftwareHardware

Page 5: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can

Questions to ask!- What are the resources that need protecting?

- What is the value of those resources, monetary or otherwise?

- What are the all the possible threats that those resources face?

- What is the likelihood of those threats being realized?

- What would be the impact of those threats if they were realized?

Page 6: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can

Components of Risk ManagementRisk identification & assessment

Identifying risks and assessing their potential impacts.

Risk controlPrioritizing, implementing, and maintaining an

acceptable level of risk.Risk evaluation

Continuous appraisal of the risk management process.

Page 7: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can

Components of Risk Management

Page 8: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can
Page 9: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can

Components of Risk Identification

Page 10: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can

Asset IdentificationWhat are the resources or assets that need protecting?

Identification of assets includes all elements of an organization’s system i.e. people, procedures, data and information, software, hardware, networking, etc.

Peopleposition name/number/ID; security clearance level; special

skillsProcedures

description; intended purpose; what elements it is tied to; storage location for reference & update

Dataclassification; owner/creator/ manager; data structure size;

data structure used; online/offline; location; backup procedures

Page 11: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can

Asset Identification - contInformation

Needs of organization and preferences/needs of the security and information technology communities

Hardware Asset name; IP address; MAC address; element type; serial

number; manufacturer name; model/part number; software version; physical or logical location; controlling entity

Software assets Proprietary programs, company bespoke software

Network assets Network components, monitoring tools, etc

Page 12: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can

Information Asset ValuationWhat is the value of those resources/assets,

monetary or otherwise? Loss of confidentiality, integrity, completeness

or availability

Which information asset:Is most critical to organization’s success? Generates the most revenue/profitability? Would be most expensive to replace or protect? Would be the most embarrassing or cause

greatest liability if revealed?

Page 13: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can

Threat AssessmentIdentify which threats

present danger to assetsrepresent the most danger to informationrequires greatest expenditure to preventsources that might be applicable to the system

How much would it cost to recover from attack?

Intentional threats reside in the motivations of humans to undertake potentially harmful activities

Unintentional threats are benign instances

Page 14: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can

Threats to Information Security

Page 15: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can

Vulnerability IdentificationVulnerabilities are the specific avenues which threat

agents can exploit to attack an information asset Identify flaws and weaknesses that could possibly be

exploited because of the threatsBehavioral and attitudinal vulnerabilitiesMisinterpretationsCoding problemsPhysical vulnerabilities

At end of this risk identification process, a list of assets and their vulnerabilities is achieved

Page 16: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can
Page 17: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can

Risk AssessmentRisk assessment evaluates the relative risk

for each vulnerabilityAssigns a risk rating or score to each

information assetThe goal at this point: create a method for

evaluating the relative risk of each listed vulnerability

Page 18: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can

LikelihoodThe probability that a specific vulnerability will

be the object of a successful attackAssign numeric value: number between 0.1 (low)

and 1.0 (high), or a number between 1 and 100Zero not used since vulnerabilities with zero

likelihood are removed from asset/vulnerability list

Use a selected rating model consistentlyUse external references for values that have been

reviewed/adjusted for your circumstances

Page 19: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can

Risk DeterminationRisk EQUALS

Likelihood of vulnerability occurrence TIMES value (or impact)MINUS percentage risk already controlledPLUS an element of uncertainty

Page 20: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can

Documenting the ResultsFinal summary comprised in ranked vulnerability risk worksheet which detailsassetasset impact vulnerabilityvulnerability likelihoodrisk-rating factor

Working document for next step in risk management process: assessing and controlling risk

Page 21: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can

Ranked Vulnerability Risk Worksheet

Page 22: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can
Page 23: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can

Risk Control Strategies- Responses to risk

Accept it and do nothing.Reduce it with security measures.Avoid it completely by withdrawing from an

activity.

- Must choose a strategies to control each identified risk:AcceptMitigateDefend TransferTerminate

Page 24: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can

DefendAttempts to prevent exploitation of the vulnerability

Preferred approach

Accomplished by countering threatsremoving asset vulnerabilities limiting asset accessadding protective safeguards

Three common methods of risk avoidanceApplication of policyTraining and educationApplying technology

Page 25: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can

Transfer

Control approach that attempts to shift risk to other assets, processes, or organizations

If lacking, organization should hire individuals/firms that provide security management and administration expertise

Organization may then transfer risk associated with management of complex systems to another organization experienced in dealing with those risks

Page 26: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can

Mitigate

Attempts to reduce impact of vulnerability exploitation through planning and preparation. Incident response plan (IRP): define the actions

to take while incident is in progress .Disaster recovery plan (DRP): most common

mitigation procedure.Business continuity plan (BCP): encompasses

continuation of business activities if catastrophic event occurs.

Page 27: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can

Accept

Doing nothing to protect a vulnerability and accepting the outcome of its exploitation

Valid only when the particular function, service, information, or asset does not justify cost of protection

Page 28: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can

TerminateDirects the organization to avoid those business activities that introduce uncontrollable risks

May seek an alternate mechanism to meet customer needs

Page 29: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can

Risk Management IssuesOrganization must define level of risk it can accept.

Risk appetite defines quantity and nature of risk that

organizations are willing to accept as trade-offs between perfect security and unlimited accessibility.

Residual riskrisk that has not been completely removed, shifted,

or planned for.

Page 30: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can

Residual risk

Page 31: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can

Risk Control Practices- Convince budget authorities to spend up to value of asset to protect from identified threat.

- Final control choice may be balance of controls providing greatest value to as many asset-threat pairs as possible.

- Organizations looking to implement controls that don’t involve such complex, inexact, and dynamic calculations.

Page 32: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can

SummaryRisk identification formal process of examining and documenting risk in

information systems

Risk controlprocess of taking carefully reasoned steps to ensure the

confidentiality, integrity, and availability of components of an information system

Risk identificationA risk management strategy enables identification,

classification, and prioritization of organization’s information assets

Residual riskrisk remaining to the information asset even after the

existing control is applied

Page 33: Alaa Mubaied alaa.mubaied@owasp.com. Introduction Organizations must design and create safe environments in which business processes and procedures can

Questions?