23
Week 7 – Risk Treatment Plan MSC CYBER SECURITY CMP7062 Informa?on Risk Management 2015/16 Esther Palomar Apr. 5th 2016 1

MSC$CYBERSECURITY$$ … · Week$7$–Risk$TreatmentPlan$ MSC$CYBERSECURITY$$ CMP7062$Informaon$Risk$Management 2015/16 Esther$Palomar$ Apr.$5th$2016$ 1

  • Upload
    others

  • View
    8

  • Download
    0

Embed Size (px)

Citation preview

Page 1: MSC$CYBERSECURITY$$ … · Week$7$–Risk$TreatmentPlan$ MSC$CYBERSECURITY$$ CMP7062$Informaon$Risk$Management 2015/16 Esther$Palomar$ Apr.$5th$2016$ 1

Week  7  –  Risk  Treatment  Plan  

MSC  CYBER  SECURITY    CMP7062  Informa?on  Risk  Management  

2015/16  Esther  Palomar  

Apr.  5th  2016   1  

Page 2: MSC$CYBERSECURITY$$ … · Week$7$–Risk$TreatmentPlan$ MSC$CYBERSECURITY$$ CMP7062$Informaon$Risk$Management 2015/16 Esther$Palomar$ Apr.$5th$2016$ 1

ISO/IEC  27005    

Apr.  5th  2016   2  

Page 3: MSC$CYBERSECURITY$$ … · Week$7$–Risk$TreatmentPlan$ MSC$CYBERSECURITY$$ CMP7062$Informaon$Risk$Management 2015/16 Esther$Palomar$ Apr.$5th$2016$ 1

Apr.  5th  2016   3  

Page 4: MSC$CYBERSECURITY$$ … · Week$7$–Risk$TreatmentPlan$ MSC$CYBERSECURITY$$ CMP7062$Informaon$Risk$Management 2015/16 Esther$Palomar$ Apr.$5th$2016$ 1

Informa?on  Risk  Treatment  Plan    

Apr.  5th  2016   4  

Page 5: MSC$CYBERSECURITY$$ … · Week$7$–Risk$TreatmentPlan$ MSC$CYBERSECURITY$$ CMP7062$Informaon$Risk$Management 2015/16 Esther$Palomar$ Apr.$5th$2016$ 1

Risk  treatment  op?ons:  Risk  Reduc?on/Modifica?on  

•  Controls  (measures,  e.g.,  usually  the  introduc?on  of  a  technology,  process,  procedure  or  employee  training)  are  implemented  to  reduce  the  risk.  

•  It  generally  affects  the  vulnerability.  •  ISO/IEC  27002  proposes  a  set  of  controls.  •  Constraints  for  risk  reduc?on  exist  –  Time,  financial,  technical,  etc…  

Apr.  5th  2016   5  

Page 6: MSC$CYBERSECURITY$$ … · Week$7$–Risk$TreatmentPlan$ MSC$CYBERSECURITY$$ CMP7062$Informaon$Risk$Management 2015/16 Esther$Palomar$ Apr.$5th$2016$ 1

A  non-­‐exhaus?ve  list  suggested  in  the  ISO/IEC  27002  

•  Labelling  of  all  media  based  on  how  they  are  classified.  •  Access  restric?ons.  •  A  con?nually  updated  list  of  those  authorised  to  receive  informa?on.  

•  Data  entry  and  output  valida?on  controls.      •  Data  protec?on  prior  to  publica?on  or  transmission.  •  Media  storage  and  periodical  review  of  publica?on  and  distribu?on  lists.  

•  Etc…  

Apr.  5th  2016   6  

Page 7: MSC$CYBERSECURITY$$ … · Week$7$–Risk$TreatmentPlan$ MSC$CYBERSECURITY$$ CMP7062$Informaon$Risk$Management 2015/16 Esther$Palomar$ Apr.$5th$2016$ 1

Directly  reducing  risk  using  a  knowledge  base  

•  Risk  scenario  knowledge  base  in  which  per?nent  security  measures  are  referenced  for  each  scenario.  

Apr.  5th  2016   7  

Page 8: MSC$CYBERSECURITY$$ … · Week$7$–Risk$TreatmentPlan$ MSC$CYBERSECURITY$$ CMP7062$Informaon$Risk$Management 2015/16 Esther$Palomar$ Apr.$5th$2016$ 1

Direct  risk  reduc?on  by  the  ac?vity/project/process  manager  

•  When  circumstances  in  which  risk  may  occur  are  completely  defined.  

•  Directly  manage  the  solu?on  to  be  implemented.  

•  Economical.  •  Decision  could  be  to  simply  modify  the  process.  

Apr.  5th  2016   8  

Page 9: MSC$CYBERSECURITY$$ … · Week$7$–Risk$TreatmentPlan$ MSC$CYBERSECURITY$$ CMP7062$Informaon$Risk$Management 2015/16 Esther$Palomar$ Apr.$5th$2016$ 1

Indirect  treatment  of  cri?cal  risks  

•  When  risks  are  defined  based  on  threats  and  vulnerabili?es.  – Reduce  vulnerabili?es.  

•  Two-­‐ways  links  to  global/theme-­‐based  security  policies,  or  security  opera?onal  manual.  

Apr.  5th  2016   9  

Page 10: MSC$CYBERSECURITY$$ … · Week$7$–Risk$TreatmentPlan$ MSC$CYBERSECURITY$$ CMP7062$Informaon$Risk$Management 2015/16 Esther$Palomar$ Apr.$5th$2016$ 1

Risk  treatment  op?ons:  Risk  reten?on    

•  Risk  is  accepted.  – Nothing  is  done  to  reduce  it.  

•  Generally  when  risk  level  is  less  than  risk  acceptance  value.  

Apr.  5th  2016   10  

Page 11: MSC$CYBERSECURITY$$ … · Week$7$–Risk$TreatmentPlan$ MSC$CYBERSECURITY$$ CMP7062$Informaon$Risk$Management 2015/16 Esther$Palomar$ Apr.$5th$2016$ 1

Risk  treatment  op?ons:  Risk  avoidance    

•  Risk  is  refused:  – “business”  func?on  cancelled.  

•  Generally  if  the  risk  is  too  high  and  that  no  “cost-­‐effec?ve”  solu?on  is  found.  

Apr.  5th  2016   11  

Page 12: MSC$CYBERSECURITY$$ … · Week$7$–Risk$TreatmentPlan$ MSC$CYBERSECURITY$$ CMP7062$Informaon$Risk$Management 2015/16 Esther$Palomar$ Apr.$5th$2016$ 1

Risk  treatment  op?ons:  Risk  transfer/sharing    

•  Risk  is  transferred  or  shared  with  third  party:  –  Outsourcing.  –  Acquisi?on  of  insurance.  

•  Generally  for  high  impact  risks  with  low  occurrence.  •  Can  create  other  risks  or  modify  exis?ng  risks.  •  Transfer  the  responsibility  to  manage  the  risk  but  not  the  liability  of  an  impact.  

Apr.  5th  2016   12  

Page 13: MSC$CYBERSECURITY$$ … · Week$7$–Risk$TreatmentPlan$ MSC$CYBERSECURITY$$ CMP7062$Informaon$Risk$Management 2015/16 Esther$Palomar$ Apr.$5th$2016$ 1

Risk  treatment  plan  •  The  idea  of  the  Risk  Treatment  Plan  is  essen?ally  to  

document  how  your  organiza?on  intends  to  “treat”  iden?fied  risks,  where  “treatment”  means  reduce,  avoid,  accept  or  transfer.  

•  You  could  set  this  up  as  a  table  or  matrix,  since  many  risks  will  require  some  combina?on  of  treatments  and,  in  virtually  all  cases,  “accept  residual  risk”  is  a  necessary  evil:  

Apr.  5th  2016   13  

Page 14: MSC$CYBERSECURITY$$ … · Week$7$–Risk$TreatmentPlan$ MSC$CYBERSECURITY$$ CMP7062$Informaon$Risk$Management 2015/16 Esther$Palomar$ Apr.$5th$2016$ 1

An  organiza?on  generally  has  a  responsibility  to  assure  that  risks  are  within  acceptable  limits.  This  first  requires  defining  acceptance  limits  and  then  applying  mi?ga?on  un?l  remaining  (or  ‘residual’)  risk  is  within  those  acceptance  limits.  The  mi?ga?ons  can  take  many  forms.  

Apr.  5th  2016   14  

Page 15: MSC$CYBERSECURITY$$ … · Week$7$–Risk$TreatmentPlan$ MSC$CYBERSECURITY$$ CMP7062$Informaon$Risk$Management 2015/16 Esther$Palomar$ Apr.$5th$2016$ 1

Risk  acceptance  

•  Risks  effec?vely  treated.  –  Review  of  the  risk  treatment.  –  Valida?on  of  selected  solu?ons.  –  Selec?on  of  residual  risks.  

•  Residual  risks:  –  Accep?ng  a  number  of  risks  that  can  consider  itself  unable  to  deal,  or  are  acceptable  to  the  organiza?on.  

–  Residual  risk  is  the  risk  le*  over  a*er  you’ve  implemented  a  risk  treatment  decision.  It’s  the  risk  remaining  a*er  you’ve  done  one  of  the  following:  accepted  the  risk,  avoided  the    risk,  transferred  the  risk,  or  reduced  the  risk.  

Apr.  5th  2016   15  

Page 16: MSC$CYBERSECURITY$$ … · Week$7$–Risk$TreatmentPlan$ MSC$CYBERSECURITY$$ CMP7062$Informaon$Risk$Management 2015/16 Esther$Palomar$ Apr.$5th$2016$ 1

Residual  risks  

•  The  purpose  of  residual  risks  is  to  find  out  whether  the  planned  treatment  is  sufficient  –  the  ques?on  is,  how  would  you  know  what  is  sufficient?  This  is  where  the  concept  of  acceptable  level  of  risks  comes  into  play  –  it  is  nothing  else  but  deciding  how  much  ‘risk  appe?te’  an  organiza?on  has  –  each  organiza?on  has  to  decide  what  is  appropriate  for  its  circumstances  (and  for  its  budget).    

•  Top  management  needs  to  know  which  risks  their  company  will  face  even  aker  various  mi?ga?on  methods  have  been  applied.    

Apr.  5th  2016   16  

Page 17: MSC$CYBERSECURITY$$ … · Week$7$–Risk$TreatmentPlan$ MSC$CYBERSECURITY$$ CMP7062$Informaon$Risk$Management 2015/16 Esther$Palomar$ Apr.$5th$2016$ 1

Apply  any  changes  to  residual  risk  status  

•  Once  you  find  out  what  residual  risks  are,  what  do  you  do  with  them?  Three  op?ons:  –  If  the  level  of  risks  is  below  the  acceptable  level  of  risk,  then  you  do  nothing  –  the  management  needs  to  formally  accept  those  risks.  

–  If  the  level  of  risks  is  above  the  acceptable  level  of  risk,  then  you  need  to  find  out  some  new  (and  beler)  ways  to  mi?gate  those  risks  –  that  also  means  you’ll  need  to  reassess  the  residual  risks.  

–  If  the  level  of  risks  is  above  the  acceptable  level  of  risk,  and  the  costs  of  decreasing  such  risks  would  be  higher  than  the  impact  itself,  than  you  need  to  propose  to  the  management  to  accept  these  high  risks.  

•  Upda?ng  an  organiza?on's  risk  assessment  to  reflect  changes  if  upgrades  to  security  controls,  hardware  and  sokware  are  major  due  to  residual  risk.  

Apr.  5th  2016   17  

Page 18: MSC$CYBERSECURITY$$ … · Week$7$–Risk$TreatmentPlan$ MSC$CYBERSECURITY$$ CMP7062$Informaon$Risk$Management 2015/16 Esther$Palomar$ Apr.$5th$2016$ 1

Evalua?on  of  residual  risk  

•  You  should  deem  residual  risks  "high"  if  security  controls  for  the  ini?al  risks  are  weak;  "moderate"  if  security  controls  for  "high"  ini?al  risks  are  adequate,  or  security  controls  for  the  low  ini?al  risks  are  weak;  and  "low"  if  security  controls  for  the  high,  medium  or  low  ini?al  risks  are  strong,  or  if  security  controls  for  the  medium-­‐  or  low-­‐  rated  ini?al  risks  are  adequate.  

•  Your  next  step  is  to  iden?fy  applied  security  controls  and  any  resul?ng  residual  risk.    –  Replacing  security  controls  that  have  become  out-­‐dated  or  are  no  longer  available.  

Apr.  5th  2016   18  

Page 19: MSC$CYBERSECURITY$$ … · Week$7$–Risk$TreatmentPlan$ MSC$CYBERSECURITY$$ CMP7062$Informaon$Risk$Management 2015/16 Esther$Palomar$ Apr.$5th$2016$ 1

Security  controls  •  Preventa>ve   security   controls,  which   are   designed   to  avoid   informa?on   disclosures   or   altera?on   of   GRC-­‐  sensi?ve   informa?on.   Examples   of   preventa?ve  security   controls   include   mul?-­‐modal   biometric  authen?ca?on,   clustered   servers,   encryp?on,   nested  firewalls   to  block  unauthorized  networks,  and  policies  to  prohibit  unauthorized  network  connec?ons.  

•  Detec>ve   security   controls,   which   iden?fy  unauthorized  or  undesired  ac?vi?es  aker  an  event  has  occurred.   Examples   include   intrusion   detec?on  systems,   automated   log   monitoring,   system   audits,  virus  scanners  and  file-­‐integrity  checkers.  

Apr.  5th  2016   19  

Page 20: MSC$CYBERSECURITY$$ … · Week$7$–Risk$TreatmentPlan$ MSC$CYBERSECURITY$$ CMP7062$Informaon$Risk$Management 2015/16 Esther$Palomar$ Apr.$5th$2016$ 1

Security  controls  •  Correc>ve  security  controls,  which  respond  to  and  recover  

from   an   incident,   as   well   as   prevent   future   occurrences.  They   also   limit   further   damage   from  an   alack.   Correc?ve  security   controls   include   incident   response   systems,  procedures   to   remove   a   virus   from   the   infected   system,  and  updated  firewall  rules  to  block  an  alacking  IP  address.  

Apr.  5th  2016   20  

Page 21: MSC$CYBERSECURITY$$ … · Week$7$–Risk$TreatmentPlan$ MSC$CYBERSECURITY$$ CMP7062$Informaon$Risk$Management 2015/16 Esther$Palomar$ Apr.$5th$2016$ 1

Security  controls  

•  Recovery-­‐focused   security   controls,   which   return   the  system   to   produc?on   mode   aker   an   incident.   One  example   is   using   a   backup   tape   to   restore   data   aker  disk  failure.  

•  Direc>ve   security   controls,  which   outline   ac?ons   that  should   be   taken   to   protect   sensi?ve   informa?on.  Examples  include  policies,  procedures  and  guidelines.  

•  Deterrent   security  controls,  which  discourage  security  viola?ons.  One  example   is  a  policy  sta?ng   that  access  to   servers   is   monitored   in   an   alempt   to   discourage  unauthorized  access.  

Apr.  5th  2016   21  

Page 22: MSC$CYBERSECURITY$$ … · Week$7$–Risk$TreatmentPlan$ MSC$CYBERSECURITY$$ CMP7062$Informaon$Risk$Management 2015/16 Esther$Palomar$ Apr.$5th$2016$ 1

Next…  

Apr.  5th  2016   22  

Page 23: MSC$CYBERSECURITY$$ … · Week$7$–Risk$TreatmentPlan$ MSC$CYBERSECURITY$$ CMP7062$Informaon$Risk$Management 2015/16 Esther$Palomar$ Apr.$5th$2016$ 1

References  

•  BS  ISO/IEC  27005:2008  •  For  more  informa?on  about  the  risk  management  process  read  ISO  27001  risk  assessment  &  treatment  –  6  basic  steps.  

•  ISO/IEC  Guide  73:2002,  Risk  management  –  Vocabulary-­‐  Guidelines  for  use  in  standards  

   

Apr.  5th  2016   23