CS448/548 Sequence 26NIST National Institute of Standards and Technology!Lets look at SP800-30 Risk Management Guide for Information Technology Systems (July 2002)–What follows are the NIST SP800-30 slides, which are available from the web !Another NIST SP is: Managing Risk from Information Systems: An Organizational Perspective–PS800-39 (March 2011)!Source: http://csrc.nist.gov/publications/PubsSPs.html1Presented Bywww.RegulatoryPro.usRisk Assessment Process Based on recommendations of the National Institute of Standards and Technology in “Risk Management Guide for Information Technology Systems” (special publication 800-30)2Goal of Risk Management Process!Protect the organization’s ability to perform its mission (not just its IT assets)!An essential management function (not just an IT technical function)3NIST Guide Purpose !Provide a foundation for risk management program development!Provide information on cost-effective security controls4Guide Structure!Risk Management Overview!Risk Assessment Methodology!Risk Mitigation Process!Ongoing Risk Evaluation5Risk Assessment – a definition “The process of identifying the risks to system security and determining the probability of occurrence, the resulting impact, and additional safeguards that would mitigate this impact.”6Risk Assessment!1st process in risk management methodology!Used to determine potential threats and associated risk!Output of this process helps to identify appropriate controls to reduce or eliminate risk7Definitions!Vulnerability – weakness that can be accidentally triggered or intentionally exploited !Threat-Source – “Either (1) intent and method targeted at the intentional exploitation of a vulnerability or (2) a situation and method that may accidentally trigger a vulnerability.”!Threat – “The potential for a threat-source to exercise (accidentally trigger or intentionally exploit) a specific vulnerability.”8Definitions!Risk - “…a function of the likelihood of a given threat-source’s exercising a particular potential vulnerability, and the resulting impact of that adverse event on the organization.”!Risk management – process of identifying, assessing and reducing risk9Risk Assessment Methodology!Step 1: System Characterization"Input: system-related info including!Hardware!Software!System interfaces!Data and information!People!System mission"Output: A good picture of system boundary, functions, criticality and sensitivity10Risk Assessment Methodology!Step 2: Threat Identification"Input:!Security violation reports!Incident reports!Data from intelligence agencies and mass media "Output:Threat statement listing potential threat-sources(natural, human, environmental) applicable tothe system being evaluated 11Risk Assessment Methodology!Step 3: Vulnerability Identification"Input:!System security tests (e.g. penetration tests)!Audit results!Vulnerability lists/advisories!Security requirements checklist (contains basic security standards)"Output:List of system vulnerabilities (flaws orweaknesses) that could be exploited –Vulnerability/Threat pairs12Vulnerability/Threat Pair ExamplesVulnerabilityThreat-SourceThreat ActionTerminated employee ID’s are not removed from the system Terminated employeesDialing into the company’s network and accessing proprietary infoWater sprinklers used for fire suppression and no protective coverings in placeFire; negligent personsWater sprinklers being turned onVendor has identified security flaws in system and patches have not been appliedUnauthorized users (e.g. terminated employees, hackers) Obtaining unauthorized access to sensitive files based on known vulnerabilities13Risk Assessment Methodology!Step 4: Control Analysis"Input: current controls, planned controls!Control Methods – may be technical or non-technical!Control Categories – preventative or detective (e.g. audit trails)"Output:List of current and planned controls14Risk Assessment Methodology!Step 5: Likelihood Determination"Input: !Threat-source motivation & capability!Nature of the vulnerability!Existence & effectiveness of current controls"Output:Likelihood rating of High, Medium or Low15Risk Assessment Methodology!Step 6: Impact Analysis"Input: !System mission!System and data criticality!System and data sensitivity"Analysis: Adverse impact described in terms of loss or degradation of integrity, confidentiality, availability"Output: Impact Rating of High, Medium or Low16Risk Assessment Methodology!Step 7: Risk Determination"Input:!Likelihood of threat!Magnitude of risk!Adequacy of planned or current controls"Output:!Risk Level Matrix (Risk Level = Threat Likelihood x Threat Impact)!Risk Scale and Necessary Actions17Risk-Level MatrixThreatLikelihoodImpactImpactImpactThreatLikelihoodLow(10)Medium(50)High(100)High(1.0)Low10 X 1.0 = 10Medium50 X 1.0 = 50High100 X 1.0 = 100Medium(0.5)Low10 X 0.5 = 5Medium50 X 0.5 = 25Medium100 X 0.5 = 50Low(0.1)Low10 X 0.1 = 1Low50 X 0.1 = 5Low100 X 0.1 = 1018Risk Scale & Necessary ActionsRisk LevelRisk Description and Necessary ActionsHigh! Strong need for corrective measures! Corrective action plan must be put in place as soon as possibleMedium! Corrective actions are needed! Plan must be developed within a reasonable period of timeLow! Determine whether corrective actions are still required or decide to accept the risk19Risk Assessment Methodology!Step 8: Control Recommendations"Factors to consider!Effectiveness of recommended option!Legislation and regulation!Organizational policy!Operational impact!Safety and reliability"Output:Recommended controls and alternativesolutions to mitigate risk 20Risk Assessment Methodology!Step 9: Results Documentation"Output:Risk Assessment Report!Presented to senior management and mission owners!Describes threats & vulnerabilities, measures risk and provides recommendations on controls to implement!Purpose: Assist decision-makers in making decisions on policy, procedural, budget and system operational and management
View Full Document