DOC PREVIEW
UI CS 448 - NIST National Institute of Standards and Technology

This preview shows page 1-2-3-4 out of 11 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 11 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 11 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 11 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 11 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 11 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

CS448/548 Sequence 26NIST National Institute of Standards and Technology!Lets look at SP800-30 Risk Management Guide for Information Technology Systems (July 2002)–What follows are the NIST SP800-30 slides, which are available from the web !Another NIST SP is: Managing Risk from Information Systems: An Organizational Perspective–PS800-39 (March 2011)!Source: http://csrc.nist.gov/publications/PubsSPs.html1Presented Bywww.RegulatoryPro.usRisk Assessment Process Based on recommendations of the National Institute of Standards and Technology in “Risk Management Guide for Information Technology Systems” (special publication 800-30)2Goal of Risk Management Process!Protect the organization’s ability to perform its mission (not just its IT assets)!An essential management function (not just an IT technical function)3NIST Guide Purpose !Provide a foundation for risk management program development!Provide information on cost-effective security controls4Guide Structure!Risk Management Overview!Risk Assessment Methodology!Risk Mitigation Process!Ongoing Risk Evaluation5Risk Assessment – a definition “The process of identifying the risks to system security and determining the probability of occurrence, the resulting impact, and additional safeguards that would mitigate this impact.”6Risk Assessment!1st process in risk management methodology!Used to determine potential threats and associated risk!Output of this process helps to identify appropriate controls to reduce or eliminate risk7Definitions!Vulnerability – weakness that can be accidentally triggered or intentionally exploited !Threat-Source – “Either (1) intent and method targeted at the intentional exploitation of a vulnerability or (2) a situation and method that may accidentally trigger a vulnerability.”!Threat – “The potential for a threat-source to exercise (accidentally trigger or intentionally exploit) a specific vulnerability.”8Definitions!Risk - “…a function of the likelihood of a given threat-source’s exercising a particular potential vulnerability, and the resulting impact of that adverse event on the organization.”!Risk management – process of identifying, assessing and reducing risk9Risk Assessment Methodology!Step 1: System Characterization"Input: system-related info including!Hardware!Software!System interfaces!Data and information!People!System mission"Output: A good picture of system boundary, functions, criticality and sensitivity10Risk Assessment Methodology!Step 2: Threat Identification"Input:!Security violation reports!Incident reports!Data from intelligence agencies and mass media "Output:Threat statement listing potential threat-sources(natural, human, environmental) applicable tothe system being evaluated 11Risk Assessment Methodology!Step 3: Vulnerability Identification"Input:!System security tests (e.g. penetration tests)!Audit results!Vulnerability lists/advisories!Security requirements checklist (contains basic security standards)"Output:List of system vulnerabilities (flaws orweaknesses) that could be exploited –Vulnerability/Threat pairs12Vulnerability/Threat Pair ExamplesVulnerabilityThreat-SourceThreat ActionTerminated employee ID’s are not removed from the system Terminated employeesDialing into the company’s network and accessing proprietary infoWater sprinklers used for fire suppression and no protective coverings in placeFire; negligent personsWater sprinklers being turned onVendor has identified security flaws in system and patches have not been appliedUnauthorized users (e.g. terminated employees, hackers) Obtaining unauthorized access to sensitive files based on known vulnerabilities13Risk Assessment Methodology!Step 4: Control Analysis"Input: current controls, planned controls!Control Methods – may be technical or non-technical!Control Categories – preventative or detective (e.g. audit trails)"Output:List of current and planned controls14Risk Assessment Methodology!Step 5: Likelihood Determination"Input: !Threat-source motivation & capability!Nature of the vulnerability!Existence & effectiveness of current controls"Output:Likelihood rating of High, Medium or Low15Risk Assessment Methodology!Step 6: Impact Analysis"Input: !System mission!System and data criticality!System and data sensitivity"Analysis: Adverse impact described in terms of loss or degradation of integrity, confidentiality, availability"Output: Impact Rating of High, Medium or Low16Risk Assessment Methodology!Step 7: Risk Determination"Input:!Likelihood of threat!Magnitude of risk!Adequacy of planned or current controls"Output:!Risk Level Matrix (Risk Level = Threat Likelihood x Threat Impact)!Risk Scale and Necessary Actions17Risk-Level MatrixThreatLikelihoodImpactImpactImpactThreatLikelihoodLow(10)Medium(50)High(100)High(1.0)Low10 X 1.0 = 10Medium50 X 1.0 = 50High100 X 1.0 = 100Medium(0.5)Low10 X 0.5 = 5Medium50 X 0.5 = 25Medium100 X 0.5 = 50Low(0.1)Low10 X 0.1 = 1Low50 X 0.1 = 5Low100 X 0.1 = 1018Risk Scale & Necessary ActionsRisk LevelRisk Description and Necessary ActionsHigh! Strong need for corrective measures! Corrective action plan must be put in place as soon as possibleMedium! Corrective actions are needed! Plan must be developed within a reasonable period of timeLow! Determine whether corrective actions are still required or decide to accept the risk19Risk Assessment Methodology!Step 8: Control Recommendations"Factors to consider!Effectiveness of recommended option!Legislation and regulation!Organizational policy!Operational impact!Safety and reliability"Output:Recommended controls and alternativesolutions to mitigate risk 20Risk Assessment Methodology!Step 9: Results Documentation"Output:Risk Assessment Report!Presented to senior management and mission owners!Describes threats & vulnerabilities, measures risk and provides recommendations on controls to implement!Purpose: Assist decision-makers in making decisions on policy, procedural, budget and system operational and management


View Full Document

UI CS 448 - NIST National Institute of Standards and Technology

Download NIST National Institute of Standards and Technology
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view NIST National Institute of Standards and Technology and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view NIST National Institute of Standards and Technology 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?