14
INF3510 Information Security University of Oslo Spring 2014 Lecture 3 Risk Management Business Continuity Management University of Oslo, spring 2014 Audun Jøsang What is risk ? Threat agent Vulnerability Likelihood of threat / incident Impact on asset of threat / incident Risk Audun Jøsang 2 L03 - INF3510, UiO spring 2014 Threats Vulnerabilities Assets Risk Motivation Capacity What is risk management? “IS risk management analyses what can happen and what the possible consequences can be, before deciding what should be done and when, to reduce risk to an acceptable level.” ISO 27005 “Risk management consists of coordinated activities to direct and control an organization with regard to risk.” ISO31000 , ISO/IEC 27002 Audun Jøsang 3 L03 - INF3510, UiO spring 2014 Risk Management – ISMS integration Audun Jøsang L03 - INF3510, UiO spring 2014 4 Plan Operate Evaluate Improve IS Risk Management ISMS

What is risk ? Risk Management – ISMS integration Audun … · Risk Management – ISMS integration Plan Operate Audun Jøsang L03 - INF3510, UiO spring 2014 4 ... ISO 31000 Risk

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

INF3

510

Info

rmat

ion

Sec

urity

Uni

vers

ity o

f Osl

oS

prin

g 20

14

Lect

ure

3R

isk

Man

agem

ent

Bus

ines

s C

ontin

uity

Man

agem

ent

Uni

vers

ity o

f Osl

o, s

prin

g 20

14A

udun

Jøsa

ng

Wha

t is

risk

?

Thre

at a

gent

Vuln

erab

ility

Like

lihoo

d of

th

reat

/ in

cide

ntIm

pact

on

asse

t of

thre

at /

inci

dent

Ris

k

Aud

un J

øsan

g2

L03

-IN

F351

0, U

iO s

prin

g 2

014

Thre

ats

Vuln

erab

ilitie

s

Ass

ets

Ris

k

•M

otiv

atio

n•

Cap

acity

Wha

t is

risk

man

agem

ent?

•“IS

risk

man

agem

ent a

naly

ses

wha

t can

hap

pen

and

wha

t the

pos

sibl

e co

nseq

uenc

es c

an b

e,

befo

re d

ecid

ing

wha

t sho

uld

be d

one

and

whe

n,

to re

duce

risk

to a

n ac

cept

able

leve

l.”–

ISO

270

05

•“R

isk

man

agem

ent c

onsi

sts

of c

oord

inat

ed

activ

ities

to d

irect

and

con

trol a

n or

gani

zatio

n w

ith re

gard

to ri

sk.”

–IS

O31

000

, IS

O/IE

C 2

7002

Aud

un J

øsan

g3

L03

-IN

F351

0, U

iO s

prin

g 2

014

Ris

k M

anag

emen

t –IS

MS

inte

grat

ion

Aud

un J

øsan

gL0

3 -I

NF3

510,

UiO

spr

ing

201

44

Plan

Ope

rate

Eva

luat

e

Impr

ove

IS R

isk

Man

agem

ent

ISM

S

Ris

k M

anag

emen

t sta

ndar

ds

•IS

O 2

7005

Info

rmat

ion

Sec

urity

Ris

k M

anag

emen

t•

ISO

310

00 R

isk

Man

agem

ent

•N

IST

SP

800-

39 M

anag

ing

Info

rmat

ion

Sec

urity

Ris

k•

NIS

T S

P80

0-30

Gui

de fo

r Con

duct

ing

Ris

k A

sses

smen

t–

form

erly

cal

led

“Ris

k M

anag

emen

t Gui

de fo

r In

form

atio

n Te

chno

logy

Sys

tem

s”•

NS

583

1 S

amfu

nnss

ikke

rhet

–Be

skyt

tels

e m

ot ti

lsik

tede

nske

de h

andl

inge

r –R

isik

ohån

dter

ing

•N

S 5

832

Sam

funn

ssik

kerh

et –

Besk

ytte

lse

mot

tils

ikte

de

uøns

kede

han

dlin

ger –

Ris

ikoa

naly

se

Aud

un J

øsan

g5

L03

-IN

F351

0, U

iO s

prin

g 2

014

L03

-IN

F351

0, U

iO s

prin

g 2

014

6

Bas

is fo

r ass

essi

ng ri

sk

•Kn

ow th

e as

sets

: ide

ntify

, exa

min

e, a

nd u

nder

stan

d th

e in

form

atio

n an

d sy

stem

s cu

rren

tly in

pla

ce

•Kn

ow th

e en

emy:

iden

tify,

exa

min

e, a

nd u

nder

stan

d th

reat

s fa

cing

the

orga

niza

tion

•Kn

ow th

e lo

sses

you

r org

anis

atio

n ca

n to

lera

te.

•Kn

ow re

spon

sibi

lity

of e

ach

stak

ehol

ders

with

in a

n or

gani

zatio

n to

man

age

risks

that

are

enc

ount

ered

Aud

un J

øsan

g

Aud

un J

øsan

gL0

3 -I

NF3

510,

UiO

spr

ing

201

47

Pro

porti

onal

ity p

rinci

ple

How

muc

h sh

ould

I sp

end

on s

ecur

ing

?

Why

??

How

muc

h sh

ould

I sp

end

on

secu

ring

my

repu

tatio

n ?

•Th

e P

ropo

rtion

ality

Prin

cipl

e:–

Appl

y a

set o

f con

trols

(ph

ysic

al, t

echn

ical

and

ad

min

istra

tive

cont

rols

) tha

t mat

ch th

e pe

rcei

ved

risk

to,

and

valu

e of

, an

orga

nisa

tion’

s in

form

atio

n as

sets

Pro

blem

s of

mea

surin

g ris

kB

usin

esse

s no

rmal

ly w

ish

to m

easu

re ri

sk in

mon

ey, b

ut

alm

ost i

mpo

ssib

le to

do

this

–Va

luat

ion

of a

sset

s•

Valu

e of

dat

a, h

ard

to a

sses

s•

Valu

e of

goo

dwill

and

cus

tom

er c

onfid

ence

, ver

y va

gue

–Li

kelih

ood

of th

reat

s•

Past

eve

nts

not a

lway

s re

leva

nt fo

r fut

ure

prob

abili

ties

–Th

e na

ture

of f

utur

e at

tack

s is

unp

redi

ctab

le–

The

actio

ns o

f fut

ure

atta

cker

s ar

e un

pred

icta

ble

–M

easu

rem

ent o

f ben

efit

from

sec

urity

con

trol

•Pr

oble

ms

with

the

diffe

renc

e of

two

appr

oxim

ate

quan

titie

s–

Est

imat

ion

of p

ast a

nd p

rese

nt ri

sk

Aud

un J

øsan

gL0

3 -I

NF3

510,

UiO

spr

ing

201

48

L03

-IN

F351

0, U

iO s

prin

g 2

014

9

Rol

es in

volv

ed in

risk

man

agem

ent

•M

anag

emen

t, us

ers,

and

info

rmat

ion

tech

nolo

gy m

ust

all w

ork

toge

ther

–As

set o

wne

rs m

ust p

artic

ipat

e in

dev

elop

ing

inve

ntor

y lis

ts

–U

sers

and

exp

erts

mus

t ass

ist i

n id

entif

ying

thre

ats

and

vuln

erab

ilitie

s, a

nd in

det

erm

inin

g lik

elih

oods

–R

isk

man

agem

ent e

xper

ts m

ust g

uide

sta

keho

lder

s th

roug

h th

e ris

k as

sess

men

t pro

cess

–Se

curit

y ex

perts

mus

t ass

ist i

n se

lect

ing

cont

rols

–M

anag

emen

t mus

t rev

iew

risk

man

agem

ent p

roce

ss a

nd

appr

ove

cont

rols

Aud

un J

øsan

g

Ris

k m

anag

emen

t pro

cess

ISO

270

05

Aud

un J

øsan

gL0

3 -I

NF3

510,

UiO

spr

ing

201

410

Con

text

Est

ablis

hmen

t

Ris

k A

sses

smen

t

Ris

k Tr

eatm

ent P

lan

Acc

epte

d R

esid

ual R

isk

Ris

k de

cisi

on p

oint

1:

Ass

mt.

satis

fact

ory?

Ris

k de

cisi

on p

oint

2:

Trea

tmt.

satis

fact

ory?

•Ris

k id

entif

icat

ion

•Ris

k es

timat

ion

•Ris

k ev

alua

tion

•Com

mun

icat

ion

•Org

anis

atio

n•A

ppro

ach

•Sco

pe•R

isk

crite

ria

•Ris

k re

duct

ion

•Ris

k tra

nsfe

r•R

isk

rete

ntio

n•R

isk

avoi

danc

e•C

omm

unic

atio

nY

NN

Y

Impl

emen

t ris

k tre

atm

ent p

lan

•Ris

k co

mm

unic

atio

n

Info

rmat

ion

secu

rity

stra

tegy

L03

-IN

F351

0, U

iO s

prin

g 2

014

11

Ass

et V

alua

tion

and

Prio

ritiz

atio

n •

Que

stio

ns h

elp

deve

lop

crite

ria fo

r ass

et v

alua

tion

•W

hich

info

rmat

ion

asse

t:–

is m

ost c

ritic

al to

org

aniz

atio

n’s

succ

ess?

gene

rate

s th

e m

ost r

even

ue/p

rofit

abilit

y?

–w

ould

be

mos

t exp

ensi

ve to

repl

ace

or p

rote

ct?

–w

ould

be

the

emba

rrass

ing

or c

ause

liab

ility

if re

veal

ed?

•Pr

iorit

izat

ion

–C

reat

e w

eigh

ting

for e

ach

cate

gory

–C

alcu

late

rela

tive

impo

rtanc

e of

eac

h as

set

–Li

st th

e as

sets

in o

rder

of i

mpo

rtanc

e us

ing

a w

eigh

ted

fact

or

anal

ysis

wor

kshe

etA

udun

Jøs

ang

L03

-IN

F351

0, U

iO s

prin

g 2

014

12

Thre

at id

entif

icat

ion

•R

ealis

tic th

reat

s ne

ed to

be

desc

ribed

; uni

mpo

rtant

th

reat

s ar

e se

t asi

de

•Th

reat

ass

essm

ent:

–W

hich

thre

ats

pres

ent d

ange

r to

asse

ts?

–W

hich

thre

ats

repr

esen

t the

mos

t dan

ger t

o in

form

atio

n?

–H

ow m

uch

wou

ld it

cos

t to

reco

ver f

rom

atta

ck?

–W

hich

thre

at a

re m

ost e

xpen

sive

to p

reve

nt?

Aud

un J

øsan

g

Thre

at M

odel

ling

•At

tack

er-c

entri

c–

Star

ts fr

om a

ttack

ers,

eva

luat

es th

eir g

oals

, and

how

they

mig

ht

achi

eve

them

thro

ugh

atta

ck tr

ee. U

sual

ly s

tarts

from

ent

ry

poin

ts o

r atta

cker

act

ion.

•Sy

stem

-cen

tric

(aka

. SW

-, de

sign

-, ar

chite

ctur

e-ce

ntric

) –

Star

ts fr

om m

odel

of s

yste

m, a

nd a

ttem

pts

to fo

llow

mod

el

dyna

mic

s an

d lo

gic,

look

ing

for t

ypes

of a

ttack

s ag

ains

t eac

h el

emen

t of t

he m

odel

. Thi

s ap

proa

ch is

e.g

. use

d fo

r thr

eat

mod

elin

g in

Mic

roso

ft's

Sec

urity

Dev

elop

men

t Life

cycl

e.

•As

set-c

entri

c–

Star

ts fr

om a

sset

s en

trust

ed to

a s

yste

m, s

uch

as a

col

lect

ion

of

sens

itive

per

sona

l inf

orm

atio

n, a

nd a

ttem

pts

to id

entif

y ho

w

secu

rity

brea

ches

of C

IA p

rope

rties

can

hap

pen.

Aud

un J

øsan

gL0

3 -I

NF3

510,

UiO

spr

ing

201

413

Atta

cker

-cen

tric

atta

ck tr

ee e

xam

ple

Aud

un J

øsan

gL0

3 -I

NF3

510,

UiO

spr

ing

201

414

G0:

Atta

cker

wan

ts u

ser

acco

unt d

ata

Lege

nd:

G0:

Mai

n go

al

AN

D (c

onju

nctiv

e)O

R (d

isju

nctiv

e)al

l sub

goal

s ne

eded

any

subg

oal n

eede

d

Pro

babi

lity

of a

ttack

suc

cess

: p(G

0) =

1-(1

-p(G

1))�(

1-(p

(G4)

p(G

5)))�(1

-p(G

3))

G1:

SQ

L in

ject

ion

thro

ugh

web

G2:

Impe

rson

ate

logi

nG3:

Atta

ck u

ser c

lient

with

XSS

(cro

ss s

ite s

crip

t)

G4:

Get

logi

n Id

sG5:

Find

pas

swor

ds

Sys

tem

-cen

tric

thre

at m

odel

ling

exam

ple

Aud

un J

øsan

gL0

3 -I

NF3

510,

UiO

spr

ing

201

415

Fron

t end

Web

ser

ver

Back

end

app.

logi

cM

ySQ

Lda

taba

seIn

tern

et

Use

r may

not

hav

e lo

gged

off

on

shar

ed c

ompu

ter

SQ

L in

ject

ion

Una

utho

rized

acc

ess

Traf

ficin

terc

eptio

n

Impl

emen

t tim

eout

Impl

emen

t en

cryp

tion

Pas

swor

d po

licy

Valid

ate

inpu

t

Con

trols

Ass

et-c

entri

c th

reat

mod

ellin

g ex

ampl

e

Aud

un J

øsan

gL0

3 -I

NF3

510,

UiO

spr

ing

201

416

Cus

tom

er

base

Com

pany

re

puta

tion

HW

and

SW

Dat

a C

IALe

gal

com

plia

nce

Dis

clos

ure

of u

ser d

ata

DO

S a

ttack

Mis

use

of

user

dat

a

Pene

tratio

n of

ser

vers

L03

-IN

F351

0, U

iO s

prin

g 2

014

17

Vul

nera

bilit

y Id

entif

icat

ion

•Sp

ecifi

c av

enue

s th

reat

age

nts

can

expl

oit t

o at

tack

an

info

rmat

ion

asse

t are

cal

led

vuln

erab

ilitie

s•

Exam

ine

how

eac

h in

cide

nt/th

reat

cou

ld b

e pe

rpet

rate

d an

d lis

t org

aniz

atio

n’s

asse

ts a

nd v

ulne

rabi

litie

s•

Proc

ess

wor

ks b

est w

hen

peop

le w

ith d

iver

se

back

grou

nds

with

in o

rgan

izat

ion

wor

k ite

rativ

ely

in a

se

ries

of b

rain

stor

min

g se

ssio

ns•

At e

nd o

f ris

k id

entif

icat

ion

proc

ess,

list

of a

sset

s an

d th

eir v

ulne

rabi

litie

s is

ach

ieve

d

Aud

un J

øsan

g

Iden

tifyi

ng s

peci

fic ri

sks

•A

valid

com

bina

tions

of t

hrea

t, vu

lner

abilit

y an

d as

set i

mpa

ct

repr

esen

ts a

sin

gle

spec

ific

risk

•Al

l rel

evan

t spe

cific

risk

s sh

ould

be

iden

tifie

dA

udun

Jøs

ang

L03

-IN

F351

0, U

iO s

prin

g 2

014

18

Vuln

erab

ilitie

s

•Wea

k pa

ssw

ords

•Poo

r aw

aren

ess

•No

inpu

t val

idat

ion

•Out

date

d an

tiviru

s

•Wea

k ci

pher

s

•Sho

rt cr

ypto

key

s

•Poo

r usa

bilit

y

•…

Ass

et im

pact

s

•Del

eted

file

s

•Dam

aged

file

s

•Dam

aged

repu

tatio

n

•Sto

len

files

-se

nsiti

vity

leve

ls 1

,2,3

•Inte

rcep

ted

traffi

c

•Fal

se tr

ansa

ctio

n

•…

Thre

ats

/ inc

iden

ts

•Pas

swor

d co

mpr

omis

e

•SQ

L in

ject

ion

•Log

ical

bom

b in

SW

•Tro

jan

infe

cts

clie

nts

•Cry

ptan

alys

is o

f cip

her

•Bru

te fo

rce

atta

ck

•Soc

ial e

ngin

eerin

g

•…..

Est

imat

ing

risk

leve

ls

Type

s of

ana

lysi

s •

Qua

litat

ive

–U

ses

desc

riptiv

e sc

ales

. E

xam

ple:

•Im

pact

leve

l:M

inor

, mod

erat

e, m

ajor

, cat

astro

phic

•Li

kelih

ood:

Rar

e, u

nlik

ely,

pos

sibl

e, li

kely

, alm

ost c

erta

in•

Sem

i-qua

ntita

tive

–Q

ualit

ativ

e sc

ales

ass

igne

d nu

mer

ical

val

ues

–C

an b

e us

ed in

form

ulae

for p

riorit

izat

ion

(with

cau

tion)

•Q

uant

itativ

e–

Use

num

eric

al v

alue

s fo

r bot

h co

nseq

uenc

e (e

.g. $

$$)a

ndlik

elih

ood

(e.g

. pro

babi

lity

valu

e)

Aud

un J

øsan

g19

L03

-IN

F351

0, U

iO s

prin

g 2

014

Qua

litat

ive

likel

ihoo

d sc

ale

Like

lihoo

dD

escr

iptio

n

Hig

hIs

exp

ecte

d to

occ

ur in

mos

t con

ditio

ns

(1 o

r mor

e tim

es p

er y

ear)

.

Med

ium

The

even

t will

pro

babl

y ha

ppen

in m

ost

cond

ition

s (e

very

2 y

ears

).

Low

The

even

t sho

uld

happ

en a

t som

e tim

e(e

very

5 y

ears

).

Unl

ikel

yTh

e ev

ent c

ould

hap

pen

at s

ome

time

(eve

ry 1

0ye

ars)

.

Increasing Likelihood

Aud

un J

øsan

g20

L03

-IN

F351

0, U

iO s

prin

g 2

014

Qua

litat

ive

impa

ct le

vel s

cale

Impa

ct

Leve

l

Des

crip

tion

Maj

or

Maj

or p

robl

ems

wou

ld o

ccur

and

thre

aten

th

e pr

ovis

ion

of im

porta

nt p

roce

sses

resu

lting

insi

gnifi

cant

fina

ncia

l los

s.

Mod

erat

e Se

rvic

esw

ould

con

tinue

,but

wou

ldne

ed

to b

ere

view

ed o

r cha

nged

.

Min

orE

ffect

iven

ess

of s

ervi

ces

wou

ld b

e th

reat

ened

but

dea

lt w

ith.

Insi

gnifi

cant

Dea

lt w

ith a

s a

part

of ro

utin

e op

erat

ions

.

Increasing Impact

Aud

un J

øsan

g21

L03

-IN

F351

0, U

iO s

prin

g 2

014

Qua

litat

ive

risk

estim

atio

n -e

xam

ple

Likelihood

Impa

ct le

vel

Ris

k le

vel

(0) I

nsig

nific

ant

(1) M

inor

(2) M

oder

ate

(3) M

ajor

(3) H

igh

(3) M

(4) H

(5) V

H(6

) E

(2) M

ediu

m(2

) L(3

) M(4

) H(5

) VH

(1) L

ow(1

) VL

(2) L

(3) M

(4) H

(0) U

nlik

ely

(0) N

(1) V

L(2

) L(3

) M

Qua

litat

ive

risk

leve

ls:A

ddlik

elih

ood

& im

pact

leve

l

Aud

un J

øsan

g22

Lege

ndE:

ext

rem

e ris

k; im

med

iate

act

ion

requ

ired

(V)H

: (ve

ry) h

igh

risk;

sen

ior m

anag

emen

t atte

ntio

n ne

eded

M: m

oder

ate

risk;

man

agem

ent r

espo

nsib

ility

mus

t be

spec

ified

(V)L

: (ve

ry) l

ow ri

sk; m

anag

e by

rout

ine

proc

edur

esN

: Neg

ligib

le ri

sk;T

o be

igno

red

Sem

i-qua

ntita

tive

risk

estim

atio

n -e

xam

ple

Impa

ct le

vel

Ris

k Le

vel

(0) N

il(1

) Ins

ign.

(2) M

inor

(3) M

oder

ate

(4) M

ajor

(4) H

igh

(0) N

il(4

) M(8

) H(1

2) V

H(1

6) E

(3) M

ediu

m(0

) Nil

(3) L

(6) M

+(9

) H+

(12)

VH

(2) L

ow(0

) Nil

(2) V

L(4

) M(6

) M+

(8) H

(1) U

nlik

ely

(0) N

il(1

) Neg

(2) V

L(3

) L(4

) M

(0) N

ever

(0) N

il(0

) Nil

(0) N

il(0

) Nil

(0) N

il

Sem

i-qua

ntita

tive

risk

leve

ls:M

ultip

lylik

elih

ood

& im

pact

leve

l

Aud

un J

øsan

g23

Like

lihoo

d

M: m

oder

ate;

Spe

cify

resp

onsi

bililt

yE:

ext

rem

e; Im

med

iate

act

ion

requ

ired

L: lo

w; M

anag

e by

rout

ine

proc

edur

esVH

: ver

y hi

gh; P

riorit

y ac

tion

actio

nVL

: ver

y lo

w; M

anag

e by

rout

ine

H+:

hig

h +;

Man

agem

ent a

ttent

ion

Neg

: Neg

ligib

le;T

o be

igno

red

H: h

igh;

Man

agem

ent

atte

ntio

nN

il: N

il;N

o ris

k ex

ists

M+:

mod

erat

e +;

Spe

cifu

resp

onsi

b

Qua

ntita

tive

risk

estim

atio

n ex

ampl

e

Exa

mpl

e qu

antit

ativ

e ris

k an

alys

is m

etho

d•

Qua

ntita

tive

para

met

ers

–As

set V

alue

(AV

)•

Estim

ated

tota

l val

ue o

f ass

et–

Expo

sure

Fac

tor (

EF)

•Pe

rcen

tage

of a

sset

loss

cau

sed

by th

reat

occ

urre

nce

–S

ingl

e Lo

ss E

xpec

tanc

y (S

LE)

•SL

E =

AV

�EF

–An

nual

ized

Rat

e of

Occ

urre

nce

(AR

O)

•Es

timat

ed fr

eque

ncy

a th

reat

will

occ

ur w

ithin

a y

ear

–An

nual

ised

Los

s E

xpec

tanc

y (A

LE)

•AL

E =

SLE

�A

RO

Aud

un J

øsan

g24

L03

-IN

F351

0, U

iO s

prin

g 2

014

Qua

ntita

tive

risk

estim

atio

n ex

ampl

e

Exa

mpl

e qu

antit

ativ

e ris

k an

alys

is•

Ris

k de

scrip

tion

–As

set:

Pub

lic im

age

(and

trus

t)–

Thre

at: D

efac

ing

web

site

thro

ugh

intru

sion

–Im

pact

: Los

s of

imag

e•

Para

met

er e

stim

ates

–A

V(p

ublic

imag

e) =

$1,

000,

000

–EF

(pub

lic im

age

affe

cted

by

defa

cing

) = 0

.05

–SL

E =

AV

�E

F =

$50,

000

–AR

O(d

efac

ing)

= 2

–AL

E =

SLE

�A

RO

= $

100,

000

•Ju

stifi

es s

pend

ing

up to

$10

0,00

0 p.

a. o

n co

ntro

ls

Aud

un J

øsan

g25

L03

-IN

F351

0, U

iO s

prin

g 2

014

Eva

luat

e ris

ks

•C

ompa

re–

the

leve

l of r

isk

foun

d du

ring

risk

anal

ysis

with

the

esta

blis

hed

risk

crite

ria–

NO

TE: C

onsi

der a

naly

sis

and

crite

ria o

n sa

me

basi

s -

qual

itativ

e or

qua

ntita

tive

•O

utpu

t: pr

iorit

ized

list

of r

isks

for f

urth

er a

ctio

n–

Ris

ks in

low

or a

ccep

tabl

e ris

k ca

tego

ries,

may

be

acce

pted

w

ithou

t fur

ther

trea

tmen

t

Aud

un J

øsan

g26

L03

-IN

F351

0, U

iO s

prin

g 2

014

Ris

k lis

ting

and

rank

ing

Aud

un J

øsan

gL0

3 -I

NF3

510,

UiO

spr

ing

201

427

Inci

dent

/ Th

reat

Exis

ting

cont

rols

&

vuln

erab

ilitie

s As

set i

mpa

ctIm

pact

le

vel

Like

lihoo

d de

scrip

tion

Like

lihoo

dR

isk

leve

l

Com

prom

ise

of u

ser

pass

wor

d

No

cont

rol o

r en

forc

emen

t of

pass

wor

d st

reng

th

Del

eted

file

s,

brea

ch o

f co

nfid

entia

lity

and

inte

grity

MO

DE

RAT

EW

ill h

appe

n to

1

of 5

0 us

ers

ever

y ye

ar

MED

IUM

HIG

H

Viru

s in

fect

ion

on c

lient

sVi

rus

filte

r dis

able

d on

man

y cl

ient

sC

ompr

omis

e of

cl

ient

sM

OD

ER

ATE

Will

hap

pen

to

1 in

100

clie

nts

ever

y ye

ar

HIG

HEX

TREM

E

Web

ser

ver

hack

ing

and

defa

cing

IDS

, fire

wal

l, da

ily

patc

hing

, but

zer

o da

y ex

ploi

ts e

xist

Rep

utat

ion

MIN

OR

Cou

ld h

appe

n on

ce e

very

ye

ar

LOW

LOW

Logi

cal b

omb

plan

ted

by

insi

der

No

revi

ew o

f sou

rce

code

that

goe

s in

to

prod

uctio

n.

Bre

ach

of

inte

grity

or l

oss

of d

ata

MA

JOR

Cou

ld h

appe

n on

ce e

very

10

year

s

UN

LIK

ELY

MO

DE

R

ATE

Ris

k ra

nkin

g co

mpl

exity

•N

ot e

asy

to p

riorit

ize

risks

of s

ame

leve

l but

with

diff

eren

t im

pact

leve

ls a

nd li

kelih

ood

Aud

un J

øsan

gL0

3 -I

NF3

510,

UiO

spr

ing

201

428

Inci

dent

/ Th

reat

Exis

ting

cont

rols

&

vuln

erab

ilitie

s As

set i

mpa

ctIm

pact

le

vel

Like

lihoo

d de

scrip

tion

Like

lihoo

dR

isk

leve

l

Rou

ter

Com

prom

ise

Pas

swor

d on

lyIn

trusi

on a

nd

disr

uptio

nM

OD

ER

ATE

Man

y tim

es

per y

ear

HIG

HH

IGH

Phy

sica

l D

estru

ctio

n of

D

ata

Cen

tre

Non

e (n

ot a

ddre

ssed

in

BC

P)

Ope

ratio

ns

Dis

rupt

ed fo

r on

e m

onth

MA

JOR

Cou

ld h

appe

n on

ce in

25

year

s

LOW

HIG

H

L03

-IN

F351

0, U

iO s

prin

g 2

014

29

Doc

umen

ting

the

resu

lts o

f ris

k as

sess

men

t•

Fina

l sum

mar

y co

mpr

ised

in ra

nked

vul

nera

bilit

y ris

k w

orks

heet

•W

orks

heet

det

ails

ass

et, a

sset

impa

ct, v

ulne

rabi

lity,

vu

lner

abilit

y lik

elih

ood,

and

risk

-ratin

g fa

ctor

•R

anke

d vu

lner

abilit

y ris

k w

orks

heet

is in

itial

wor

king

do

cum

ent f

or n

ext s

tep

in ri

sk m

anag

emen

t pro

cess

: as

sess

ing

and

cont

rollin

g ris

k

Aud

un J

øsan

g

Cos

t of r

educ

ing

risk

($)

Level of risk (risk value)

unec

onom

ic

use

judg

emen

t

impl

emen

t re

duct

ion

mea

sure

s

Ris

k tr

eatm

ent e

cono

my

?A

udun

Jøs

ang

30L0

3 -I

NF3

510,

UiO

spr

ing

201

4

L03

-IN

F351

0, U

iO s

prin

g 2

014

31

Ris

k C

ontro

l Stra

tegi

es

•O

nce

rank

ed v

ulne

rabi

lity

risk

wor

kshe

et c

ompl

ete,

m

ust c

hoos

e on

e of

four

stra

tegi

es to

con

trol e

ach

risk:

–R

educ

e/m

itiga

te ri

sk (s

ecur

ity a

nd m

itiga

tion

cont

rols

)

–Sh

are/

trans

fer r

isk

(out

sour

ce a

ctiv

ity th

at c

ause

s ris

k, o

r ins

ure)

–R

etai

n ris

k (u

nder

stan

d to

lera

te p

oten

tial

cons

eque

nces

)

–Av

oid

risk

(sto

p ac

tivity

that

cau

ses

risk)

Aud

un J

øsan

g

•Id

entif

y op

tions

for r

isk

treat

men

t by

seek

ing

oppo

rtuni

ties

that

mig

ht in

crea

se p

ositi

veou

tcom

es

with

out i

ncre

asin

g th

e ris

k.•

Opt

ions

incl

ude:

–A

ctiv

ely

seek

an

oppo

rtuni

ty fo

r cre

atin

g va

lue

and

prof

it–

Cha

nge

the

likel

ihoo

d of

opp

ortu

nity

to e

nhan

ce th

e lik

elih

ood

of b

enef

icia

l out

com

e–

Cha

nge

the

cons

eque

nces

to in

crea

se th

e ex

tent

of t

he g

ains

–Sh

arin

g th

e op

portu

nity

–R

etai

nth

e re

sidu

al o

ppor

tuni

ty

Trea

ting

risk

from

the

posi

tive

dim

ensi

on

Aud

un J

øsan

g32

L03

-IN

F351

0, U

iO s

prin

g 2

014

Bus

ines

s C

ontin

uity

Man

agem

ent

Out

line

–Bu

sine

ss C

ontin

uity

Pla

nnin

g–

Dis

aste

r Rec

over

y

Bus

ines

s co

ntin

uity

man

agem

ent

•P

roce

dure

s fo

r the

reco

very

of a

n or

gani

zatio

n's

faci

litie

s in

cas

e of

maj

or in

cide

nts

and

disa

ster

s,

so th

at th

e or

gani

zatio

n w

ill b

e ab

le to

eith

er

mai

ntai

n or

qui

ckly

resu

me

mis

sion

-crit

ical

func

tions

•BC

M s

tand

ards

–IS

O 2

7031

Gui

delin

es fo

r inf

orm

atio

n an

d co

mm

uni-

catio

ns te

chno

logy

read

ines

s fo

r bus

ines

s co

ntin

uity

–N

ISTS

P80

0-34

Con

tinge

ncy

Pla

nnin

g G

uide

for

Info

rmat

ion

Tech

nolo

gy S

yste

ms

Aud

un J

øsan

g34

L03

-IN

F351

0, U

iO s

prin

g 2

014

Aud

un J

øsan

gL0

3 -I

NF3

510,

UiO

spr

ing

201

435

Effe

ct o

f BC

MH

ow c

omm

on is

BC

M in

‘the

real

wor

ld’?

•20

06 C

CS

S e

xtra

ct: M

ost c

omm

only

repo

rted

cate

gorie

s of

co

mpu

ter s

ecur

ity p

olic

ies

and

proc

edur

es 2

006

(200

5, 2

004)

:–

Med

ia b

acku

p pr

oced

ures

-95

% (9

6%, 9

5%)

–U

ser a

cces

s m

anag

emen

t -93

% (9

7%, 9

4%)

–Ex

tern

al n

etw

ork

acce

ss c

ontro

l pro

cedu

res

-78%

(83%

, 79%

)–

Doc

umen

ted

oper

atin

g pr

oced

ures

-76

% (8

0%, 8

3%)

–U

ser r

espo

nsib

ilitie

s po

licie

s -7

2% (8

2%, 7

8%)

–C

ontro

ls a

gain

st m

alic

ious

sof

twar

e -6

6% (7

5%, 7

2%)

–M

onito

ring

syst

em a

cces

s an

d us

e -

64%

(72%

, 68%

)–

Cha

nge

cont

rol p

roce

dure

s -

60%

(82%

, 75%

)–

Clo

ck s

ynch

roni

satio

n po

licy

–59

% (5

9%, 4

3%)

–D

ecom

mis

sion

ing

equi

pmen

t pro

cedu

res

–59

% (6

5%, 4

0%)

–Sy

stem

aud

it po

licy

–58

% (7

1%, 5

8%)

–B

usin

ess

cont

inui

ty m

anag

emen

t –54

%(7

3%, 5

8%)

–In

cide

nt m

anag

emen

t pro

cedu

res

-51

% (6

7%, 6

4%)

Aud

un J

øsan

g36

L03

-IN

F351

0, U

iO s

prin

g 2

014

Bus

ines

s co

ntin

uity

man

agem

ent

•Th

e ra

nge

of in

cide

nts

and

disa

ster

s to

be

cons

ider

ed in

clud

e:–

Acts

of n

atur

e, fo

r exa

mpl

e:•

Exce

ssiv

e w

eath

er c

ondi

tions

•Ea

rthqu

ake

•Fl

ood

•Fi

re–

Hum

an a

cts

(inad

verte

nt o

r del

iber

ate)

, for

exa

mpl

e:•

Hac

ker a

ctiv

ity•

Mis

take

s by

ope

ratin

g st

aff

•Th

eft

•Fr

aud

•Va

ndal

ism

•Te

rror

ism

Aud

un J

øsan

g37

L03

-IN

F351

0, U

iO s

prin

g 2

014

Bus

ines

s C

ontin

uity

Pla

n (B

CP

)

•Th

e bu

sine

ss c

ontin

uity

pla

nde

scrib

es:

–a

sequ

ence

of a

ctio

ns

–an

d th

e pa

rties

resp

onsi

ble

for

carr

ying

them

out

in re

spon

se to

dis

aste

rs–

in o

rder

to re

stor

e no

rmal

bus

ines

s op

erat

ions

as

quic

kly

as p

ossi

ble

Aud

un J

øsan

g38

L03

-IN

F351

0, U

iO s

prin

g 2

014

From

:

Dea

ling

with

the

cris

is To:

Bac

k in

bu

sine

ss

BC

P T

erm

inol

ogy

•Bu

sine

ss C

ontin

uity

Pla

n–

Plan

for r

esto

ring

norm

al b

usin

ess

func

tions

afte

r dis

rupt

ion

•Bu

sine

ss C

ontin

genc

y P

lan

–Sa

me

as B

usin

ess

Con

tinui

ty P

lan

–C

ontin

genc

y m

eans

”som

ethi

ng u

npre

dict

able

that

can

hap

pen”

•D

isas

ter R

ecov

ery

–R

esta

blis

hmen

t of b

usin

ess

func

tions

afte

r a d

esas

ter,

poss

ibly

in

tem

pora

ry fa

cilit

ies

Aud

un J

øsan

gL0

3 -I

NF3

510,

UiO

spr

ing

201

439

BC

P D

evel

opm

ent

BC

P St

atem

ent

•Mgm

t app

rova

l•S

cope

•Res

pons

ibili

ty•T

eam

s

Bus

ines

s Im

pact

A

naly

sis

(BIA

)•C

ritic

al fu

nctio

ns•M

TD

•Ris

ks

Iden

tify

Prev

entiv

e C

ontr

ols

•Im

plem

ent c

ontro

ls•M

itiga

te ri

sks

Rec

over

y St

rate

gies

•Pro

cess

es•F

acili

ties

•Dat

a

Doc

umen

t BC

P•R

espo

nsib

ility

•Tea

ms

•Stra

tegi

es

Test

BC

P•E

xerc

ises

•Im

prov

emen

ts•T

rain

ing

Mai

ntai

n B

CP

•Int

egra

te•U

pdat

e•D

istri

bute

Sou

rce:

NIS

T S

peci

al P

ublic

atio

n 80

0-34

Con

tinge

ncy

Pla

nnin

g G

uide

for I

nfor

mat

ion

Tech

nolo

gy S

yste

ms

(p.1

4)A

udun

Jøs

ang

40L0

3 -I

NF3

510,

UiO

spr

ing

201

4

BC

P D

evel

opm

ent a

nd O

utpu

t: N

IST

SP

800-

34, p

.31

Dev

elop

men

t

Out

put

Aud

un J

øsan

g41

L03

-IN

F351

0, U

iO s

prin

g 2

014

BC

P D

evel

opm

ent -

BIA

•A

Bus

ines

s Im

pact

Ana

lysi

s (B

IA) i

s pe

rform

ed a

s pa

rt of

th

e B

CP

dev

elop

men

t to

iden

tify

the

func

tions

that

in th

e ev

ent o

f a d

isas

ter o

r dis

rupt

ion,

wou

ld c

ause

the

grea

test

fina

ncia

l or o

pera

tiona

l los

s.•

Con

side

r e.g

.:–

IT n

etw

ork

supp

ort

–D

ata

proc

essi

ng–

Acco

untin

g–

Softw

are

deve

lopm

ent

–Pa

yrol

l

Cus

tom

er s

uppo

rtO

rder

ent

ryP

rodu

ctio

n sc

hedu

ling

Pur

chas

ing

Com

mun

icat

ions

Aud

un J

øsan

g42

L03

-IN

F351

0, U

iO s

prin

g 2

014

BC

P D

evel

opm

ent -

BIA

•Th

e M

TD (M

axim

um T

oler

able

Dow

ntim

e) is

def

ined

for

each

func

tion

in th

e ev

ent o

f dis

aste

r.•

Exam

ple:

–N

on-e

ssen

tial =

30

days

–N

orm

al =

7 d

ays

–Im

porta

nt =

72

hour

s–

Urg

ent =

24

hour

s–

Crit

ical

= m

inut

es to

hou

rs

Aud

un J

øsan

g43

L03

-IN

F351

0, U

iO s

prin

g 2

014

BC

P D

evel

opm

ent -

Alte

rnat

ive

Site

s

•R

edun

dant

site

–M

irror

of t

he p

rimar

y pr

oces

sing

env

ironm

ent

–O

pera

ble

with

in m

inut

es•

Hot

site

–Fu

lly c

onfig

ured

har

dwar

e an

d so

ftwar

e, b

ut n

o da

ta–

Ope

rabl

e w

ithin

hou

rs•

Mob

ile s

ite•

War

m s

ite–

Parti

ally

con

figur

ed w

ith s

ome

equi

pmen

t, bu

t not

the

actu

al c

ompu

ters

–O

pera

ble

with

in d

ays

•C

old

site

–Ba

sic

elec

trici

ty a

nd p

lum

bing

–O

pera

ble

with

in w

eeks

Mor

e ex

pens

ive

Less

ex

pens

ive

Aud

un J

øsan

g44

L03

-IN

F351

0, U

iO s

prin

g 2

014

BC

P D

evel

opm

ent –

Stra

tegy

Sel

ectio

n

•An

alys

e al

tern

ativ

e di

sast

er re

cove

ry s

trate

gies

–C

hoos

ing

data

and

sof

twar

e ba

ckup

faci

lity

–C

hoos

ing

alte

rnat

ive

site

type

and

con

tract

–H

uman

reso

urce

s–

Insu

ranc

e–

Rec

ipro

cal a

nd m

utua

l aid

agr

eem

ents

–M

ultip

le p

roce

ssin

g ce

ntre

s–

Dat

a pr

oces

sing

ser

vice

bur

eaus

with

resp

ect t

o B

IA, c

ost,

rest

orat

ion

time

and

prac

tical

ity

Aud

un J

øsan

g45

L03

-IN

F351

0, U

iO s

prin

g 2

014

BC

P C

ompo

nent

s

•Su

ppor

ting

info

rmat

ion

–Es

tabl

ish

purp

ose,

app

licab

ility

and

sco

pe–

Syst

em d

escr

iptio

n an

d st

aff r

espo

nsib

ilitie

s

•N

otifi

catio

n/A

ctiv

atio

n P

hase

•R

ecov

ery

Pha

se•

Rec

onst

ruct

ion

Pha

se•

Appe

ndic

es–

Con

tact

info

rmat

ion

–SO

Ps

and

chec

klis

ts–

Equi

pmen

t and

sys

tem

requ

irem

ents

list

s

Aud

un J

øsan

g46

L03

-IN

F351

0, U

iO s

prin

g 2

014

BC

P P

hase

s

•A

secu

rity

inci

dent

can

var

y in

mag

nitu

de fr

om m

inor

in

cide

nt to

maj

or d

isas

ter.

•D

iffer

ent s

ub-p

lans

nee

ded

for d

iffer

ent p

hase

s in

the

busi

ness

con

tinui

ty p

roce

ss.

–Pl

an fo

r act

ivat

ion

phas

e–

Plan

s fo

r rec

over

y ph

ase

–Pl

an fo

r rec

onst

itutio

n ph

ase

Aud

un J

øsan

g47

L03

-IN

F351

0, U

iO s

prin

g 2

014

BC

Act

ivat

ion

Pha

se P

lan

•Ac

tions

to ta

ke im

med

iate

ly a

fter i

ncid

ent

–Pr

oced

ures

for c

onta

ctin

g re

cove

ry te

ams

–As

sess

men

t of d

amag

e to

prim

ary

site

faci

litie

s•

Estim

ated

out

age

time

at p

rimar

y si

te•

Com

pare

with

pre

defin

ed M

TD a

nd a

ctiv

atio

n cr

iteria

–N

otify

BC

man

agem

ent

–M

anag

emen

t dec

lare

s a

disa

ster

if c

riter

ia a

re m

et–

Star

t im

plem

entin

g B

CP

•BC

P a

ctiv

atio

n re

spon

sibi

lity

–O

nly

one

pers

on

–C

EO

or o

ther

pre

defin

ed ro

le–

Succ

essi

on o

f res

pons

ibilit

y m

ust b

e pr

edef

ined

Aud

un J

øsan

g48

L03

-IN

F351

0, U

iO s

prin

g 2

014

BC

Rec

over

y P

hase

Pla

n

•Ev

acua

tion

and

safe

ty o

f per

sonn

el–

Alw

ays

first

prio

rity

•N

otify

ing

alte

rnat

ive

site

s•

Secu

ring

hom

e si

te•

Activ

atio

n of

reco

very

team

s•

Rel

ocat

ion

to a

ltern

ativ

e si

tes

•R

esum

ptio

n of

crit

ical

bus

ines

s fu

nctio

ns•

Rev

iew

ing

how

the

orga

nisa

tion

will

inte

rface

with

ex

tern

al p

artie

s (c

usto

mer

s, p

artn

ers)

from

alte

rnat

ive

site

Aud

un J

øsan

g49

L03

-IN

F351

0, U

iO s

prin

g 2

014

BC

Rec

onst

itutio

n P

hase

Pla

n

•P

lan

for r

etur

ning

to n

orm

al o

pera

tions

at p

rimar

y si

te–

Rep

airin

g pr

imar

y si

te, o

r pre

pare

new

site

–In

stal

ling

hard

war

e an

d so

ftwar

e–

Test

ing

busi

ness

func

tions

Mig

ratin

g bu

sine

ss fu

nctio

ns s

tepw

ise

•Le

ast c

ritic

al fu

nctio

ns fi

rst

•M

ost c

ritic

al fu

nctio

ns la

st–

Shut

ting

dow

n al

tern

ativ

e si

te–

Secu

ring

and

rem

ovin

g se

nsiti

ve d

ata

from

alte

rnat

ive

site

Aud

un J

øsan

g50

L03

-IN

F351

0, U

iO s

prin

g 2

014

BC

P A

ppen

dice

s

•In

clud

e–

Con

tact

info

rmat

ion

for k

ey p

erso

nnel

•C

all t

ree

data

–C

onta

ct in

form

atio

n fo

r ven

dors

and

alte

rnat

ive

site

pro

vide

rs

•In

clud

ing

SLA

and

reci

proc

al a

gree

men

ts–

Che

cklis

ts fo

r rec

over

y pr

oces

ses

–Eq

uipm

ent a

nd s

yste

ms

requ

irem

ent l

ists

–D

escr

iptio

n of

and

dire

ctio

ns to

alte

rnat

ive

site

Aud

un J

øsan

g51

L03

-IN

F351

0, U

iO s

prin

g 2

014

BC

P T

estin

g

•C

heck

list t

est

–C

opie

s of

the

BC

P d

istri

bute

d to

dep

artm

ents

for r

evie

w•

Stru

ctur

ed w

alk-

thro

ugh

test

–R

epre

sent

ativ

es fr

om e

ach

depa

rtmen

t com

e to

geth

er to

go

thro

ugh

the

plan

•S

imul

atio

n te

st–

All s

taff

in o

pera

tiona

l and

sup

port

func

tions

com

e to

geth

er to

pr

actic

e ex

ecut

ing

the

BC

P•

Para

llel t

est

–Bu

sine

ss fu

nctio

ns te

sted

at a

ltern

ativ

e si

te•

Full

inte

rrupt

ion

test

–Bu

sine

ss fu

nctio

ns a

t prim

ary

site

hal

ted,

and

mig

rate

d to

al

tern

ativ

e si

te in

acc

orda

nce

with

the

BC

P

Aud

un J

øsan

g52

L03

-IN

F351

0, U

iO s

prin

g 2

014

End

of L

ectu

re

Aud

un J

øsan

gL0

3 -I

NF3

510,

UiO

spr

ing

201

453