36
Risk Management and Controlling Risk

Risk Management and Controlling Risk

  • Upload
    vivi

  • View
    63

  • Download
    0

Embed Size (px)

DESCRIPTION

Risk Management and Controlling Risk. Risk Control Strategies. Once ranked vulnerability risk worksheet complete, must choose one of four strategies to control each risk: Apply safeguards (avoidance) Transfer the risk (transference) Reduce impact (mitigation) - PowerPoint PPT Presentation

Citation preview

Page 1: Risk Management and Controlling Risk

Risk Management and Controlling Risk

Page 2: Risk Management and Controlling Risk

Risk Control Strategies

• Once ranked vulnerability risk worksheet complete, must choose one of four strategies to control each risk:

– Apply safeguards (avoidance)

– Transfer the risk (transference)

– Reduce impact (mitigation)

– Understand consequences and accept risk (acceptance)

Page 3: Risk Management and Controlling Risk

Avoidance• Attempts to prevent exploitation of the

vulnerability

• Preferred approach; accomplished through countering threats, removing asset vulnerabilities, limiting asset access, and adding protective safeguards

Page 4: Risk Management and Controlling Risk

Avoidance (continued)

• Three common methods of risk avoidance:

– Application of policy

– Training and education

– Applying technology

Page 5: Risk Management and Controlling Risk

Transference

• Control approach that attempts to shift risk to other assets, processes, or organizations

• If lacking, organization should hire individuals/firms thatprovide security management and administration expertise

• Organization may then transfer risk associated with management of complex systems to another organization experienced in dealing with those risks

Page 6: Risk Management and Controlling Risk

Mitigation

• Attempts to reduce impact of vulnerability exploitation through planning and preparation

• Approach includes three types of plans:

– Incident response plan (IRP)

– Disaster recovery plan (DRP)

– Business continuity plan (BCP)

Page 7: Risk Management and Controlling Risk

Mitigation (continued)

• DRP is most common mitigation procedure

• The actions to take while incident is in progress is defined in IRP

• BCP encompasses continuation of business activities if catastrophic event occurs

Page 8: Risk Management and Controlling Risk

Acceptance

• Doing nothing to protect a vulnerability and accepting the outcome of its exploitation

• Valid only when the particular function, service, information, or asset does not justify cost of protection

• Risk appetite describes the degree to which organization is willing to accept risk as trade-off to the expense of applying controls

Page 9: Risk Management and Controlling Risk

Selecting a Risk Control Strategy

• Level of threat and value of asset play major role in selection of strategy

• Rules of thumb on strategy selection can be applied:– When a vulnerability exists

– When a vulnerability can be exploited

– When attacker’s cost is less than potential gain

– When potential loss is substantial

Page 10: Risk Management and Controlling Risk

Figure 4- 8- Risk Handling Decision Points

Page 11: Risk Management and Controlling Risk
Page 12: Risk Management and Controlling Risk

Categories of Controls

• Controlling risk through avoidance, mitigation or transference accomplished by implementing controls

• Effective approach is to select controls by category:– Control function

– Architectural layer

– Strategy layer

– Information security principle

Page 13: Risk Management and Controlling Risk

Categories of Controls (continued)

• Control function: controls (safeguards) designed to defend systems are either preventive or detective

• Architectural layer: some controls apply to one or more layers of organization’s technical architecture

• Strategy layer: controls sometimes classified by risk control strategy (avoidance, mitigation, transference) in which they operate

Page 14: Risk Management and Controlling Risk

Characteristics of Secure Information

• Controls can be classified according to the characteristics of secure information they are intended to assure

• These characteristics include: confidentiality; integrity; availability; authentication; authorization; accountability; privacy

Page 15: Risk Management and Controlling Risk

Feasibility Studies

• Before deciding on strategy, all information about economic/non-economic consequences of vulnerability of information asset must be explored

• A number of ways exist to determine advantage of a specific control

Page 16: Risk Management and Controlling Risk

Cost Benefit Analysis (CBA)

• Most common approach for information security controls is economic feasibility of implementation

• CBA is begun by evaluating worth of assets to be protected and the loss in value if those assets are compromised

• The formal process to document this is called cost benefit analysis or economic feasibility study

Page 17: Risk Management and Controlling Risk

Cost Benefit Analysis (CBA) (continued)

• Items that impact cost of a control or safeguard include: cost of development; training fees; implementation cost; service costs; cost of maintenance

• Benefit is the value an organization realizes by using controls to prevent losses associated with a vulnerability

• Asset valuation is process of assigning financial value or worth to each information asset; there are many components to asset valuation

Page 18: Risk Management and Controlling Risk

Cost Benefit Analysis (CBA) (continued)

• Once worth of various assets is estimated, potential loss from exploitation of vulnerability is examined

• Process results in estimate of potential loss per risk

Page 19: Risk Management and Controlling Risk

Cost Benefit Analysis (CBA) (continued)

• Expected loss per risk stated in the following equation:

Annualized loss expectancy (ALE) equals Single loss expectancy (SLE) TIMES

Annualized rate of occurrence (ARO)

• SLE is equal to asset value times exposure factor (EF)

Page 20: Risk Management and Controlling Risk

The Cost Benefit Analysis (CBA) Formula

• CBA determines whether or not control alternative being evaluated is worth cost incurred to control vulnerability

• CBA most easily calculated using ALE from earlier assessments, before implementation of proposed control:

CBA = ALE(prior) – ALE(post) – ACS

Page 21: Risk Management and Controlling Risk

The Cost Benefit Analysis (CBA) Formula (continued)

• ALE(prior) is annualized loss expectancy of risk before implementation of control

• ALE(post) is estimated ALE based on control being in place for a period of time

• ACS is the annualized cost of the safeguard

Page 22: Risk Management and Controlling Risk

Benchmarking

• An alternative approach to risk management

• Benchmarking is process of seeking out and studying practices in other organizations that one’s own organization desires to duplicate

• One of two measures typically used to compare practices: – Metrics-based measures

– Process-based measures

Page 23: Risk Management and Controlling Risk

Benchmarking (continued)

• Standard of due care: when adopting levels of security for a legal defense, organization shows it has done what any prudent organization would do in similar circumstances

• Due diligence: demonstration that organization is diligent in ensuring that implemented standards continue to provide required level of protection

• Failure to support standard of due care or due diligence can leave organization open to legal liability

Page 24: Risk Management and Controlling Risk

Benchmarking (continued)

• Best business practices: security efforts that provide a superior level protection of information

• When considering best practices for adoption in an organization, consider:– Does organization resemble identified target

with best practice?

– Are resources at hand similar?

– Is organization in a similar threat environment?

Page 25: Risk Management and Controlling Risk

Problems with Applying Benchmarking and Best Practices

• Organizations don’t talk to each other (biggest problem)

• No two organizations are identical

• Best practices are a moving target

• Knowing what was going on in information security industry in recent years through benchmarking doesn’t necessarily prepare for what’s next

Page 26: Risk Management and Controlling Risk

Baselining

• Analysis of measures against established standards

• In information security, baselining is comparison of security activities and events against an organization’s future performance

• Useful when baselining to have a guide to the overall process

Page 27: Risk Management and Controlling Risk

Other Feasibility Studies

• Operational: examines how well proposed information security alternatives will contribute to organization’s efficiency, effectiveness, and overall operation

• Technical: examines whether or not organization has or can acquire the technology necessary to implement and support the control alternatives

• Political: defines what can/cannot occur based on consensus and relationships between communities of interest

Page 28: Risk Management and Controlling Risk

Risk Management Discussion Points

• Organizations must define level of risk it can live with

• Risk appetite: defines quantity and nature of risk that organizations are willing to accept as tradeoffs between perfect security and unlimited accessibility are weighed

• Residual risk: risk that has not been completely removed, shifted, or planned for

Page 29: Risk Management and Controlling Risk
Page 30: Risk Management and Controlling Risk

Documenting Results

• At minimum, each information asset-threat pair should have documented control strategy clearly identifying any remaining residual risk

• Another option: document outcome of control strategy for each information asset-vulnerability pair as an action plan

• Risk assessment may be documented in a topic-specific report

Page 31: Risk Management and Controlling Risk

Recommended Practices in Controlling Risk

• Convince budget authorities to spend up to value of asset to protect from identified threat

• Final control choice may be balance of controls providing greatest value to as many asset-threat pairs as possible

• Organizations looking to implement controls that don’t involve such complex, inexact and dynamic calculations

Page 32: Risk Management and Controlling Risk

Qualitative Measures

• Spectrum of steps described previously—performed with real numbers—known as a quantitative assessment

• Qualitative assessment: based on characteristics that do not use numerical measures

Page 33: Risk Management and Controlling Risk

Delphi Technique

• A technique for accurately estimating scales and values

• Process whereby a group of individuals rates or ranks a set of information

• Responses compiled and returned to group for another iteration

• Process continues until group is satisfied with result

Page 34: Risk Management and Controlling Risk

Summary

• Risk identification: formal process of examining and documenting risk present in information systems

• Risk control: process of taking carefully reasoned steps to ensure the confidentiality, integrity, and availability of components in organization’s information system

Page 35: Risk Management and Controlling Risk

Summary

• Risk identification

– A risk management strategy enables identification, classification, and prioritization of organization’s information assets

– Residual risk: risk that remains to the information asset even after the existing control is applied

Page 36: Risk Management and Controlling Risk

Summary

• Risk control: four strategies are used to control risks that result from vulnerabilities:

– Apply safeguards (avoidance)

– Transfer the risk (transference)

– Reduce impact (mitigation)

– Understand consequences and accept risk (acceptance)