Risk Management Framework
|
|
|
- Hugh Lynch
- 10 years ago
- Views:
Transcription
1 Risk Management Framework Christopher J. Alberts Audrey J. Dorofee August 2010 TECHNICAL REPORT CMU/SEI-2010-TR-017 ESC-TR Acquisition Support Program Unlimited distribution subject to the copyright.
2 This report was prepared for the SEI Administrative Agent ESC/XPK 5 Eglin Street Hanscom AFB, MA The ideas and findings in this report should not be construed as an official DoD position. It is published in the interest of scientific and technical information exchange. This work is sponsored by the U.S. Department of Defense. The Software Engineering Institute is a federally funded research and development center sponsored by the U.S. Department of Defense. Copyright 2010 Carnegie Mellon University. NO WARRANTY THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN AS-IS BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. Use of any trademarks in this report is not intended in any way to infringe on the rights of the trademark holder. Internal use. Permission to reproduce this document and to prepare derivative works from this document for internal use is granted, provided the copyright and No Warranty statements are included with all reproductions and derivative works. External use. This document may be reproduced in its entirety, without modification, and freely distributed in written or electronic form without requesting formal permission. Permission is required for any other external and/or commercial use. Requests for permission should be directed to the Software Engineering Institute at [email protected]. This work was created in the performance of Federal Government Contract Number FA C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center. The Government of the United States has a royalty-free government-purpose license to use, duplicate, or disclose the work, in whole or in part and in any manner, and to have or permit others to do so, for government purposes pursuant to the copyright license under the clause at For information about SEI publications, please visit the library on the SEI website (
3 Table of Contents Acknowledgments Abstract v vii 1 Introduction 1 2 Risk Management Concepts 5 3 Framework Overview 9 4 Prepare for Risk Management (Phase 1) 15 5 Perform Risk Management Activities (Phase 2) Assess Risk (Activity 2.1) Plan for Risk Mitigation (Activity 2.2) Mitigate Risk (Activity 2.3) 31 6 Sustain and Improve Risk Management (Phase 3) 35 7 Framework Requirements 39 Appendix: Evaluating a Risk Management Practice 45 References/Bibliography 59 i CMU/SEI-2010-TR-017
4 ii CMU/SEI-2010-TR-017
5 List of Figures Figure 1: Components of Risk 6 Figure 2: Risk Management Activities 7 Figure 3: Framework Structure 9 Figure 4: Structure of Dataflow Diagrams 11 Figure 5: Dataflow for Phase 1 15 Figure 6: Dataflow for Phase 2 19 Figure 7: Dataflow for Activity Figure 8: Dataflow for Activity Figure 9: Dataflow for Activity Figure 10: Dataflow for Phase 3 35 iii CMU/SEI-2010-TR-017
6 iv CMU/SEI-2010-TR-017
7 Acknowledgments The authors would like to thank the Army Strategic Software Improvement Program (ASSIP) for piloting a workshop that resulted in significant improvements to the framework. The authors also wish to acknowledge the contributions of the reviewers, Carol Woody, Julie Cohen, and Tricia Oberndorf, and the editor of this technical report, Barbara White. v CMU/SEI-2010-TR-017
8 vi CMU/SEI-2010-TR-017
9 Abstract Although most programs and organizations use risk management when developing and operating software-reliant systems, preventable failures continue to occur at an alarming rate. In many instances, the root causes of these preventable failures can be traced to weaknesses in the risk management practices employed by those programs and organizations. To help improve existing risk management practices, Carnegie Mellon University Software Engineering Institute (SEI) researchers undertook a project to define what constitutes best practice for risk management. The SEI has conducted research and development in the area of risk management since the early 1990s. Past SEI research has applied risk management methods, tools, and techniques across the life cycle (including acquisition, development, and operations) and has examined various types of risk, including software development risk, system acquisition risk, operational risk, mission risk, and information security risk, among others. In this technical report, SEI researchers have codified this experience and expertise by specifying (1) a Risk Management Framework that documents accepted best practice for risk management and (2) an approach for evaluating a program s or organization s risk management practice in relation to the framework. vii CMU/SEI-2010-TR-017
10 viii CMU/SEI-2010-TR-017
11 1 Introduction Occurrence of Preventable Failures Although most programs and organizations use risk management when developing and operating software-reliant systems, preventable failures continue to occur at an alarming rate. Several reasons contribute to the occurrence of these failures, including significant gaps in the risk management practices employed by programs and organizations uneven and inconsistent application of risk management practices within and across organizations ineffective integration of risk management with program and organizational management increasingly complex management environment To help improve existing risk management practices, Carnegie Mellon Software Engineering Institute (SEI) researchers undertook a project to define what constitutes best practice for risk management. This technical report provides the results of that research project by specifying the following: a Risk Management Framework that documents accepted best practice for risk management an approach for evaluating a program s or organization s risk management practice in relation to the requirements specified in the framework SEI Background in Risk Management Since the early 1990s, the SEI has conducted research and development in the area of risk management and has applied risk management methods, tools, and techniques across the life cycle (including acquisition, development, and operations). In addition, past SEI research examined various types of risk, including software development risk [Dorofee 1996, Williams 1999, Alberts 2009], system acquisition risk [Gallagher 1999], operational risk [Gallagher 2005], mission risk [Alberts 2009] and information security risk [Alberts 2002], among others. In this technical report, SEI researchers have codified this experience in the form of a Risk Management Framework. Carnegie Mellon is registered in the U.S. Patent and Trademark Office by Carnegie Mellon University. 1 CMU/SEI-2010-TR-017
12 Risk Management Framework The Risk Management Framework specifies accepted best practice for the discipline of risk management. The framework is implementation independent it defines key risk management activities, but does not specify how to perform those activities. In particular, the framework helps provide a foundation for a comprehensive risk management methodology basis for evaluating and improving a program s risk management practice The Risk Management Framework can be applied in all phases of the system development life cycle (e.g., acquisition, development, operations). In addition, the framework can be used to guide the management of many different types of risk (e.g., acquisition program risk, software development risk, operational risk, information security risk). Purpose of this Document The purpose of this technical report is to present the Risk Management Framework, which defines the core set of activities and outputs required to manage risk effectively. However, this document does not provide step-bystep procedures for conducting the risk management activities. Other SEI documents and courses provide specific methods, tools, and techniques for managing different types of risk. Intended Audience The primary audience for this technical report is people who are responsible for assessing and managing risk in development and operational settings. People who are interested in the following topics might also find this document useful: learning about what constitutes best practice in risk management evaluating and improving an existing risk management practice 2 CMU/SEI-2010-TR-017
13 Structure of This Document This technical report is divided into the following parts: Section 1: Introduction provides a brief overview of the motivation for developing the Risk Management Framework and defines the audience for this document Section 2: Risk Management Concepts presents background information about risk management Section 3: Framework Overview describes how the Risk Management Framework is structured Section 4: Prepare for Risk Management (Phase 1) presents activities that are required to prepare for risk management Section 5: Perform Risk Management Activities (Phase 2) describes activities that are required to manage risk effectively Section 6: Sustain and Improve Risk Management (Phase 3) presents activities that are required to sustain and improve a risk management practice over time Section 7: Framework Requirements defines the criteria that are used to establish conformance with the Risk Management Framework Appendix: Evaluating a Risk Management Practice presents a set of worksheets that can be used to evaluate a program s or organization s risk management practice and establish consistency with the Risk Management Framework 3 CMU/SEI-2010-TR-017
14 4 CMU/SEI-2010-TR-017
15 2 Risk Management Concepts Multiple Contexts of Risk Management The term risk is used universally, but different audiences often attach different meanings to it [Kloman 1990]. In fact, the details about risk and how it supports decision making depend upon the context in which it is applied [Charette 1990]. For example, safety professionals view risk management in terms of reducing the number of accidents and injuries. A hospital administrator views risk as part of the organization s quality assurance program, while the insurance industry relies on risk management techniques when setting insurance rates. Each industry thus uses a definition that is uniquely tailored to its context. No universally accepted definition of risk exists. Three Conditions of Risk Whereas specific definitions of risk might vary, a few characteristics are common to all definitions. For risk to exist in any circumstance, the following three conditions must be satisfied [Charette 1990]: 1. The potential for loss must exist. 2. Uncertainty with respect to the eventual outcome must be present Some choice or decision is required to deal with the uncertainty and potential for loss. Basic Definition of Risk These three characteristics can be used to forge a very basic definition of the word risk. Most definitions focus on the first two conditions loss and uncertainty because they are the two measurable aspects of risk. Thus, the essence of risk, no matter what the domain, can be succinctly captured by the following definition: Risk is the possibility of suffering loss [Dorofee 1996]. 1 Some researchers separate the concepts of certainty (the absence of doubt), risk (where the probabilities of alternative outcomes are known), and uncertainty (where the probabilities of possible outcomes are unknown). However, because uncertainty is a fundamental attribute of risk, we do not differentiate between decision making under risk and decision making under uncertainty in this technical report. 5 CMU/SEI-2010-TR-017
16 Components of Risk As illustrated in Figure 1, a risk can be thought of as a cause-and-effect pair, where the threat is the cause and the resulting consequence is the effect. In this context, a threat is defined as a circumstance with the potential to produce loss, while a consequence is defined as the loss that will occur when a threat is realized [Alberts 2009]. Cause Effect Threat Consequence Probability Impact Figure 1: Components of Risk Risk Measures Three measures are associated with a risk: (1) probability, (2) impact, and (3) risk exposure. The relationships between probability and impact and the components of risk are shown in Figure 1. In this context, probability is defined as a measure of the likelihood that a threat will occur, while impact is defined as a measure of the loss that will occur if the threat is realized. Risk exposure provides a measure of the magnitude of a risk based on current values of probability and impact. Risk Management Risk management is a systematic approach for minimizing exposure to potential losses. It provides a disciplined environment for continuously assessing what could go wrong (i.e., assessing risks) determining which risks to address (i.e., setting mitigation priorities) implementing actions to address high-priority risks and bring those risks within tolerance 6 CMU/SEI-2010-TR-017
17 Risk Management Activities Figure 2 illustrates the three core risk management activities: assess risk transform the concerns people have into distinct, tangible risks that are explicitly documented and analyzed plan for risk mitigation determine an approach for addressing or mitigating each risk; produce a plan for implementing the approach 2 mitigate risk deal with each risk by implementing its defined mitigation plan and tracking the plan to completion These three activities form the foundation of the Risk Management Framework. Assess Mitigate Plan Figure 2: Risk Management Activities 2 No universal definition for the term mitigation exits. In fact, various risk management standards and guidelines use this term quite differently. In this report, we define mitigation broadly as any action taken to address a risk. 7 CMU/SEI-2010-TR-017
18 Issue/Problem One of the fundamental conditions of risk is uncertainty regarding its occurrence. A risk, by definition, might or might not occur. In contrast, an issue 3 (also referred to as a problem in many contexts) is a loss or adverse consequence that has occurred or is certain to occur. With an issue, no uncertainty exists the loss or adverse consequence has taken place or is certain to take place. 4 Issues can also lead to (or contribute to) other risks by creating a circumstance that produces a new threat making an existing threat more likely to occur aggravating the consequences of existing risks Opportunity Risk is focused on the potential for loss; it does not address the potential for gain. The concept of opportunity is used to address the potential for gain. An opportunity is the likelihood of realizing a gain from an allocation or reallocation of resources. Opportunity defines a set of circumstances that provides the potential for a desired gain and requires an investment or action to realize that gain (i.e., to take advantage of the opportunity). Pursuit of an opportunity can produce new risks or issues, and it can also change existing risks or issues. Focus of the Risk Management Framework The Risk Management Framework (hereafter also referred to as the framework ) defines activities that are required to manage risk effectively. Activities for managing issues and opportunities are not explicitly specified in the Risk Management Framework. While risk management can be integrated with issue and opportunity management [Alberts 2009], the details for achieving an integrated approach for managing risks, issues, and opportunities is beyond the scope of this report. 3 4 People do not always find it easy to distinguish between an issue and the future risk posed by that issue (if left uncorrected). This confusion can result in issues being documented in a risk database and being treated like risks (and vice versa). Management must take great care to ensure that their approaches for managing issues and risks are integrated appropriately and understood by both management and staff. Many of the same tools and techniques can be applied to both issue and risk management. 8 CMU/SEI-2010-TR-017
19 3 Framework Overview Introduction This section presents an overview of the Risk Management Framework. Figure 3 shows the three phases of the framework. The main goal of the framework is to specify the core sequence of activities that must be executed when performing risk management (Phase 2). However, because risk management must be conducted within a broader context or environment, the framework also specifies activities to prepare for risk management (Phase 1) as well as to sustain and improve the risk management practice over time (Phase 3). Phase 1 Prepare for Risk Management Phase 2 Perform Risk Management Activities Phase 3 Sustain and Improve Risk Management Figure 3: Framework Structure Risk Management Framework: Three Phases Phase 1 ( Prepare for Risk Management ) is used to get ready for the other two phases. Phase 1 activities should be complete before activities in the other phases are executed. Phase 2 ( Perform Risk Management Activities ) defines a set of activities for managing risk. Phase 2 activities are continually performed to ensure that the overall risk to key objectives is effectively managed over time. The activities of Phase 3 ( Sustain and Improve Risk Management ) are normally performed on a periodic basis to ensure that the risk management practice remains effective over time. Phase 3 activities are used to identify improvements to a risk management practice. While Phase 1 is generally completed prior to beginning the other two, Phases 2 and 3 are typically executed concurrently. 9 CMU/SEI-2010-TR-017
20 Specifying Framework Phases The following common elements are used to specify each phase of the framework: description of the phase key questions answered by the phase dataflow for the phase that highlights the phase s inputs, constraints, resources, and outputs description of each input required by the activities performed in the phase description of each constraint affecting activities performed in the phase description of each resource required by activities performed in the phase description of each output produced by the activities performed in the phase description of each activity that must be performed in the phase Specifying Phase 2 Activities Phase 2 is described in more detail than the other phases because it specifies the distinct sequence of activities that uniquely defines a risk management practice. Phase 2 of the framework comprises the following three activities: Activity 2.1: Assess Risk Activity 2.2: Plan for Risk Mitigation Activity 2.3: Mitigate Risk The following common elements are used to specify each Phase 2 activity: description of the activity key questions answered by the activity dataflow of inputs and outputs for the activity descriptions of each input to the activity descriptions of each output produced by the activity circumstances that trigger execution of the activity description of each sub-activity that must be performed when conducting the activity 10 CMU/SEI-2010-TR-017
21 Dataflow Diagrams Dataflow diagrams are used to document phases and activities in the Risk Management Framework. Figure 4 shows the structures of the dataflow diagrams for a phase and an activity. Constraints Inputs Framework Phase Outputs Inputs Framework Activity Outputs Resources Note: Activity diagrams are provided for Phase 2 only. Figure 4: Structure of Dataflow Diagrams Note that dataflow diagrams include the following four elements: inputs items that are used by a phase or activity to produce an output or result outputs the results that are produced by a phase or activity constraints items that restrict the execution of a phase and its activities resources items that can be used during the execution of a phase and its activities In the Risk Management Framework, dataflow diagrams for activities are documented only for Phase 2. Because Phase 2 defines the core risk management activities, additional details are provided for that phase of the framework. Dataflow diagrams are not provided for the activities of Phases 1 and 3. Notice that the dataflow structure for a Phase 2 activity does not include constraints and resources. (Refer to Figure 4.) Phase 2 constraints and resources influence all activities that are performed during that phase. For simplicity, Phase 2 constraints and resources are documented in the Phase 2 diagram only; they are not replicated in each activity diagram for Phase CMU/SEI-2010-TR-017
22 Dataflow Identifiers Each input, output, constraint, and resource included in a dataflow is represented by an identifier, which includes a prefix and a number. The prefix is based on the type of data and the number represents a specific data element of that type. For example: C1 is the first risk management constraint (affects all phases). R3 is the third risk management resource (affects Phases 1 and 3). PI1 is the first input to Phase 1 (preparation). O4 is the fourth output of Phase 2 (conduct risk management). SO2 is the second output of Phase 3 (sustainment and improvement). The prefixes used in the dataflow diagrams are listed in Table 1. Table 1: Prefixes Used in the Dataflow Diagrams Assessment Phase Phase 1 Prefixes PI is an input to preparation activities. PO is an output that is produced when preparation activities are performed. C is a constraint. R is a resource. Phase 2 I is an input to the core risk management activities of Phase 2. O is an output produced when the core risk management activities of Phase 2 are performed. C is a constraint. PO is an output of Phase 1 that either acts as a constraint or is used as a resource during Phase 2. Phase 3 SI is an input to sustainment and improvement activities. SO is an output that is produced when sustainment and improvement activities are performed. C is a constraint. R is a resource. 12 CMU/SEI-2010-TR-017
23 Specifying Framework Requirements One of the objectives of the framework is to provide a basis for evaluating and improving risk management practice for a program or organization. Requirements have been specified for each output in the framework. These requirements provide the basis for evaluating a risk management practice. Requirements are presented for the following phases and activities: Phase 1: Prepare for Risk Management Phase 2: Perform Risk Management Activities, Activity 2.1: Assess Risk Phase 2: Perform Risk Management Activities, Activity 2.2: Plan for Risk Mitigation Phase 2: Perform Risk Management Activities, Activity 2.3: Mitigate Risk Phase 3: Sustain and Improve Risk Management A set of worksheets that can be used to evaluate a risk management practice and establish conformance with the Risk Management Framework is provided in the appendix of this report. Framework Specification: Structure The basic structure of the Risk Management Framework is defined as: Phase 1: Prepare for Risk Management Phase 2: Perform Risk Management Activities Activity 2.1: Assess Risk Activity 2.2: Plan for Risk Mitigation Activity 2.3: Mitigate Risk Phase 3: Sustain and Improve Risk Management Framework Requirements This structure forms the basis for the remainder of this report. 13 CMU/SEI-2010-TR-017
24 14 CMU/SEI-2010-TR-017
25 4 Prepare for Risk Management (Phase 1) Description In this phase, preparation activities for risk management are performed. Key Questions This phase answers the following questions: Who is sponsoring risk management? How can stakeholder sponsorship be attained? What is the plan for conducting risk management? What resources are required to effectively conduct risk management? Dataflow The following dataflow describes the inputs and outputs of this phase. Constraint C1 Risk Management Constraints Input PI1 Stakeholder Requirements Phase 1 Prepare for risk management Outputs PO1 Stakeholder Sponsorship PO2 Risk Management Plan PO3 Risk Sources PO4 Risk Management Criteria PO5 Tailored Methods and Tools PO6 Trained Personnel Resources R1 Policies, Standards, Laws, and Regulations R2 Standard Risk Management Practice R3 Experienced Personnel Figure 5: Dataflow for Phase 1 Input The following is the input to this phase. Input PI1 Stakeholder Requirements Description The needs of the key stakeholders regarding risk management 15 CMU/SEI-2010-TR-017
26 Constraint The following is the constraint for this phase. Constraint C1 Risk Management Constraints Description Any circumstances, including logistics, standards, laws, regulations, personnel, schedule, and cost issues that could affect risk management activities Resources The following are the resources required by this phase. Resource R1 Policies, Standards, Laws, and Regulations R2 Standard Risk Management Practice R3 Experienced Personnel 5 Description Any informative policies, standards, laws, and regulations that guide the implementation of the risk management practice The accepted practice for implementing risk management, including methods, tools, procedures, criteria, worksheets, automated support tools, and databases. The standard risk management practice must be tailored for each specific application of risk management (e.g., program, organization, technology). A core group of people who are collectively experienced in all phases of risk management. Risk management roles and responsibilities for these people are defined, and they have received training that is appropriate for their roles and responsibilities. 5 This core group of experienced personnel is responsible for setting up and sustaining an effective risk management practice. Other personnel who will also be performing risk management activities will be trained as needed. 16 CMU/SEI-2010-TR-017
27 Outputs The following are the outputs of this phase. Output PO1 Stakeholder Sponsorship PO2 Risk Management Plan PO3 Risk Sources PO4 Risk Management Criteria PO5 Tailored Methods and Tools PO6 Trained Personnel 6 Description Active and visible support of risk management by key stakeholders and decision makers The activities a program intends to perform when conducting risk management. Examples of items commonly found in a risk management plan include the objectives of the risk management effort the scope of the risk management effort (e.g., actively participating groups and teams, support groups, interfaces) resources (e.g., personnel, funding, technology, facilities, and equipment) needed to conduct risk management roles and responsibilities for conducting risk management description of the risk management method being employed relationships and dependencies with other management practices (e.g., project, problem/issue, or opportunity management) pointers to the procedures, artifacts, and tools used in each risk management activity the sources of risk being assessed all relevant criteria for conducting risk management activities, including the criteria for probability, impact, and risk exposure a communication framework that describes formal paths for sharing risk information among key stakeholders time intervals and other triggers for establishing risk baselines effectiveness measures used to evaluate the risk management practice The causes of risk that will be assessed (this should be kept current) The parameters used when managing risks, including probability, impact, and risk exposure criteria decision-making criteria (e.g., for prioritizing risks during mitigation or deciding when to escalate risks within a program or organization) criteria that establish risk tolerance criteria for communicating with collaborators and partners as well as with senior management The methods and tools that will be used when conducting risk management, including procedures, criteria, worksheets, automated support tools, and databases. Methods and tools are usually tailored from a standard set for a specific application of risk management (e.g., program, organization, technology). The people who are tasked with performing risk management activities and are prepared to conduct them 6 The majority of personnel in a program typically receive awareness training to enable them to effectively identify risks or bring them to the attention of those responsible for risk management activities. Other people can receive more specialized training based on their roles in the risk management process. 17 CMU/SEI-2010-TR-017
28 Activities The following activities are performed in this phase. Activity 1.1 Develop stakeholder sponsorship 1.2 Develop risk management plan Description Meet with key stakeholders and decision makers to foster their active, visible, and continuous support of risk management and gather their requirements. Create the plan for conducting risk management based on requirements and constraints (e.g., schedule, funding, logistics, and contractual restrictions). Note: The risk management plan needs to be consistent with applicable policies, standards, laws, and regulations. 1.3 Tailor methods and tools Adapt the risk management methods and tools (e.g., procedures, criteria, worksheets, automated support tools, databases) for the specific application of risk management (e.g., program, organization, technology). 1.4 Train personnel Ensure that all of the people who will participate in risk management are able to effectively perform their assigned roles and responsibilities. 18 CMU/SEI-2010-TR-017
29 5 Perform Risk Management Activities (Phase 2) Description In this phase, risk management activities are performed as planned. Key Questions This phase answers the following questions: What risks could affect the achievement of key program objectives? How will each risk be addressed? What needs to be done to ensure that each risk is maintained within an acceptable tolerance over time? Is each mitigation plan having its intended effect? Dataflow The following dataflow describes the inputs and outputs of this phase. Input I1 Concerns Constraints C1 Risk Management Constraints PO1 Stakeholder Sponsorship PO2 Risk Management Plan Phase 2 Perform risk management activities Resources PO3 Risk Sources PO4 Risk Management Criteria PO5 Tailored Methods and Tools PO6 Trained Personnel Outputs O1 Risk Statement O2 Context O3 Probability O4 Impact O5 Risk Exposure O6 Risk Profile O7 Mitigation Approach O8 Mitigation Plan O9 Executed Mitigation Plan O10 Tracking Data O11 Tracking Decision Figure 6: Dataflow for Phase 2 19 CMU/SEI-2010-TR-017
30 Input The following is the input to this phase. Input I1 Concerns Description Doubts, worries, and unease about how current conditions and potential events might adversely affect the ability to achieve key objectives Constraints The following are the constraints for this phase. 7 Constraint C1 Risk Management Constraints PO1 Stakeholder Sponsorship PO2 Risk Management Plan Description Any circumstances, including logistics, standards, laws, regulations, personnel, schedule, and cost issues that could affect risk management activities Active and visible support of risk management by key stakeholders and decision makers. The activities a program intends to perform when conducting risk management. Examples of items commonly found in a risk management plan include the objectives of the risk management effort the scope of the risk management effort (e.g., actively participating groups and teams, support groups, interfaces) resources (e.g., personnel, funding, technology, facilities, and equipment) needed to conduct risk management roles and responsibilities for conducting risk management description of the risk management method being employed relationships and dependencies with other management practices (e.g., project, problem/issue, or opportunity management) pointers to the procedures, artifacts, and tools used in each risk management activity the sources of risk being assessed all relevant criteria for conducting risk management activities, including the criteria for probability, impact, and risk exposure a communication framework that describes formal paths for sharing risk information among key stakeholders time intervals and other triggers for establishing risk baselines effectiveness measures used to evaluate the risk management practice 7 Constraints affect all activities performed during Phase 2. Similarly, resources are used to aid the completion of all activities performed during Phase 2. The definitions for all Phase 2 constraints and resources are provided in this section only. They are not replicated in the sections for individual Phase 2 activities. 20 CMU/SEI-2010-TR-017
31 Resources The following are the resources required by this phase. Resource PO3 Risk Sources PO4 Risk Management Criteria PO5 Tailored Methods and Tools PO6 Trained Personnel Description The causes of risk that will be assessed (this should be kept current) The parameters used when managing risks, including probability, impact, and risk exposure criteria decision-making criteria (e.g., for prioritizing risks during mitigation or deciding when to escalate risks within a program or organization) criteria that establish risk tolerance criteria for communicating with collaborators and partners as well as with senior management The methods and tools that will be used when conducting risk management, including procedures, criteria, worksheets, automated support tools, and databases. Methods and tools are usually tailored from a standard set for a specific application of risk management (e.g., program, organization, technology). The people who are tasked with performing risk management activities and are prepared to conduct them Outputs The following are the outputs of this phase. 8 Output O1 Risk Statement O2 Context O3 Probability O4 Impact O5 Risk Exposure Description A succinct and unique description of a risk. Risk statements typically describe (1) a circumstance with the potential to produce loss (i.e., threat) and (2) the loss that will occur if that circumstance is realized (i.e., consequence). Note: A risk statement does not have to be documented using text. For example, a graphical expression or model can also be used to provide a succinct and unique description of a risk. Additional information essential for characterizing a risk, including any relevant background information about the risk, elaborations about the threat and consequence, any aggravating or mitigating conditions, and relationships and dependencies with other risks A measure of the likelihood that a risk will occur A measure of the severity of a risk s consequence if the risk were to occur A measure of the magnitude of a risk based on current values of probability and impact 8 Outputs O1 through O5 will exist for each risk that is identified. Output O6 provides a snapshot of all risks that are identified. Output O7 will exist for each risk that is identified. Finally, outputs O8 through O11 will exit for each risk that is being actively mitigated. 21 CMU/SEI-2010-TR-017
32 Output Description 06 Risk Profile A snapshot or summary of all risks relevant to the specific application of risk management (e.g., program, organization, technology) O7 Mitigation Approach O8 Mitigation Plan O9 Executed Mitigation Plan O10 Tracking Data O11 Tracking Decision A strategy for addressing a risk. Examples of common mitigation approaches include accept If a risk occurs, its consequences will be tolerated; no proactive action to address the risk will be taken. When a risk is accepted, the rationale for doing so is documented. transfer A risk is shifted to another party (e.g., through insurance or outsourcing). avoid Activities are restructured to eliminate the possibility of a risk occurring. control Actions are implemented in an attempt to reduce or contain a risk. A set of actions for implementing the selected mitigation approach. Examples of items commonly found in a mitigation plan include objectives of the plan resources allocated to the plan responsibility for completing each action in the plan a schedule for completing all actions in the plan the funding allocated to performing the plan s actions measures for tracking the execution of the plan (in relation to the schedule and cost) and the effectiveness of the plan a contingency plan and triggers when appropriate Note: Changes in probability, impact, and risk exposure (i.e., residual risk) are often used to track a plan s effectiveness. A set of completed actions (as outlined in a mitigation plan) Specific data that are gathered when monitoring the progress of a mitigation plan Reaching a conclusion or determination about what action(s) to take related to a mitigation plan. Examples of common tracking decisions include continue implementing the mitigation plan as intended modify the mitigation approach and develop a new plan as appropriate modify the mitigation plan implement the contingency plan (if one exists) close the risk 22 CMU/SEI-2010-TR-017
33 Importance of Open Communication Effective communication among all stakeholders ensures that information, plans, actions, concerns, and progress are known. Risk communication is not a separate activity; it is embedded in all other risk management activities. The importance of communication is highlighted by its emphasis in the risk management plan, where a communication framework for sharing risk information among key stakeholders is documented. Success cannot be achieved if risk information is not communicated to and understood by the organization s decision makers and stakeholders. Open communication requires risk management activities that are built upon collaborative approaches encouraging exchanges of risk information among all levels of an organization using consensus-based processes that value the individual voice Activities The following activities are performed in this phase. Activity Description 2.1 Assess risk Transform concerns into distinct, tangible risks that are explicitly documented and measured 2.2 Plan for risk mitigation Determine an approach for addressing or mitigating each risk, and produce a plan for implementing the approach 2.3 Mitigate risk Deal with each risk by implementing its defined mitigation plan and tracking it to completion 23 CMU/SEI-2010-TR-017
34 5.1 Assess Risk (Activity 2.1) Description This activity transforms concerns into distinct, tangible risks that are explicitly documented and measured. Assessing risk is an activity that is performed continually. Key Questions This activity answers the following questions: What is the statement of risk? What additional information is important for understanding this risk? What are the root causes of the risk? What conditions aggravate or mitigate the risk? What are the relationships and dependencies with other risks? What is the likelihood that the risk will occur? What is the severity of the impact if the risk were to occur? What is the magnitude of a risk exposure based on current values of probability and impact? What is the current snapshot or profile of all risks? Dataflow The following dataflow describes the inputs and outputs of this activity. Input I1 Concerns Activity 2.1 Assess risk Outputs O1 Risk Statement O2 Context O3 Probability O4 Impact O5 Risk Exposure O6 Risk Profile Figure 7: Dataflow for Activity CMU/SEI-2010-TR-017
35 Input The following is the input to this activity. Input I1 Concerns Description Doubts, worries, and unease about how current conditions and potential events might adversely affect the ability to achieve key objectives Outputs The following are the outputs of this activity. Output O1 Risk Statement O2 Context O3 Probability O4 Impact O5 Risk Exposure Description A succinct and unique description of a risk. Risk statements typically describe (1) a circumstance with the potential to produce loss (i.e., threat) and (2) the loss that will occur if that circumstance is realized (i.e., consequence). Note: A risk statement does not have to be documented using text. For example, a graphical expression or model can also be used to provide a succinct and unique description of a risk. Additional information essential for characterizing a risk, including any relevant background information about the risk, elaborations about the threat and consequence, any aggravating or mitigating conditions, and relationships and dependencies with other risks A measure of the likelihood that a risk will occur A measure of the severity of a risk s consequence if the risk were to occur A measure of the magnitude of a risk based on current values of probability and impact 06 Risk Profile A snapshot or summary of all risks relevant to the specific application of risk management (e.g., program, organization, technology) Activity Triggers The following situations will trigger this activity: A risk evaluation, appraisal, or audit is scheduled to be performed. Someone raises a new concern that could affect the ability to achieve key objectives. Conditions indicate a potential change in the current risk profile. A tracking decision requires a risk to be reassessed. 25 CMU/SEI-2010-TR-017
36 Sub-Activities The following table describes the sub-activities performed when conducting this activity. Sub-Activity Description Outputs Identify risk A concern is transformed into a distinct, tangible risk that can be described and measured. Note: Risks that are related can be grouped to provide an aggregate view of risk to objectives. A risk statement for the group is documented, and the statement for the group is carried forward in the rest of the risk management activities. 9 Aggregating risks in this manner helps keep the total number of risks to a manageable level without losing the broader view Analyze risk The risk is evaluated in relation to predefined criteria to determine its probability, impact, and risk exposure. Note: Measures for existing risks must be re-evaluated on a periodic basis. Note: Some risk management methods include timeframe as a risk measure. Timeframe is the period when action is required in order to mitigate a risk. However, timeframe is not a standard risk measure; many methods do not use it. For this reason, it is not included as a standard output in the framework Develop risk profile A snapshot or summary of all risks relevant to the specific application of risk management (e.g., program, organization, or technology) is developed and documented. The risk profile should be shared with all relevant stakeholders as appropriate. O1 Risk Statement O2 Context O3 Probability O4 Impact O5 Risk Exposure O6 Risk Profile 9 When multiple risks are grouped into an aggregate risk, a new risk statement is documented for the aggregate risk. The aggregate risk is handled the same as other risks from this point forward in the process. 26 CMU/SEI-2010-TR-017
37 5.2 Plan for Risk Mitigation (Activity 2.2) Description This activity determines an approach for addressing or mitigating a risk, and produces a plan for implementing the approach. Key Questions This activity answers the following questions for each risk: How will the risk be addressed? What is the plan for mitigating the risk? What are the objectives of the mitigation plan? Who is responsible for completing each action in the plan? When will each action be completed? How much funding is allocated to executing the plan? What are the requirements for tracking the risk mitigating plan s execution and effectiveness? Is a contingency plan needed for the risk? If so, what it the contingency plan? Dataflow The following dataflow describes the inputs and outputs of this activity. Inputs O1 Risk Statement O2 Context O3 Probability O4 Impact O5 Risk Exposure O6 Risk Profile Activity 2.2 Plan for risk mitigation Outputs O7 Mitigation Approach O8 Mitigation Plan Figure 8: Dataflow for Activity CMU/SEI-2010-TR-017
38 Inputs The following are the inputs to this activity. Input O1 Risk Statement O2 Context O3 Probability O4 Impact O5 Risk Exposure Description A succinct and unique description of a risk. Risk statements typically describe (1) a circumstance with the potential to produce loss (i.e., threat) and (2) the loss that will occur if that circumstance is realized (i.e., consequence). Note: A risk statement does not have to be documented using text. For example, a graphical expression or model can also be used to provide a succinct and unique description of a risk. Additional information essential for characterizing a risk, including any relevant background information about the risk, elaborations about the threat and consequence, any aggravating or mitigating conditions, and relationships and dependencies with other risks A measure of the likelihood that a risk will occur A measure of the severity of a risk s consequence if the risk were to occur A measure of the magnitude of a risk based on current values of probability and impact 06 Risk Profile A snapshot or summary of all risks relevant to the specific application of risk management (e.g., program, organization, technology) Outputs The following are the outputs of this activity. Output O7 Mitigation Approach Description A strategy for addressing a risk. Examples of common mitigation approaches include accept If a risk occurs, its consequences will be tolerated; no proactive action to address the risk will be taken. When a risk is accepted, the rationale for doing so is documented. transfer A risk is shifted to another party (e.g., through insurance or outsourcing). avoid Activities are restructured to eliminate the possibility of a risk occurring. control Actions are implemented in an attempt to reduce or contain a risk. 28 CMU/SEI-2010-TR-017
39 Output O8 Mitigation Plan Description A set of actions for implementing the selected mitigation approach. Examples of items commonly found in a mitigation plan include objectives of the plan resources allocated to the plan responsibility for completing each action in the plan a schedule for completing all actions in the plan the funding allocated to performing the plan s actions measures for tracking the execution of the plan (in relation to the schedule and cost) and the effectiveness of the plan a contingency plan and triggers when appropriate Note: Changes in probability, impact, and risk exposure (i.e., residual risk) are often used to track a plan s effectiveness. Activity Triggers The following situations will trigger this activity: A risk has been assessed (or reassessed). A tracking decision changes the mitigation approach calls for a new or modified mitigation plan Sub-Activities The following table describes the sub-activities performed when conducting this activity. Sub-Activity Description Outputs Determine mitigation approach The strategy for addressing a risk is based on the current measures for the risk (i.e., probability, impact, and risk exposure). Decision-making criteria (e.g., for prioritizing risks during mitigation or deciding when to escalate risks within a program or organization) may also be used to help determine the appropriate strategy for addressing a risk. Common mitigation approaches include accept If a risk occurs, its consequences will be tolerated; no proactive action to address the risk will be taken. When a risk is accepted, the rationale for doing so is documented. transfer A risk is shifted to another party (e.g., through insurance or outsourcing). avoid Activities are restructured to eliminate the possibility of a risk occurring. control Actions are implemented in an attempt to reduce or contain a risk. Mitigation approaches should be shared with all relevant stakeholders as appropriate. O7 Mitigation Approach 29 CMU/SEI-2010-TR-017
40 Sub-Activity Description Outputs Develop mitigation plan A mitigation plan is defined and documented. Mitigation plans should be shared with all relevant stakeholders as appropriate. Note: More than one risk might share a common root cause. Relationships between risks (including those within an aggregate risk or between the smaller risks in different aggregate groups) can point to more effective mitigation actions. Mitigation actions should maximize the return on investment for resources. O8 Mitigation Plan 30 CMU/SEI-2010-TR-017
41 5.3 Mitigate Risk (Activity 2.3) Description This activity deals with the risk by implementing the defined mitigation plan and tracking it to completion. Key Questions This activity answers the following questions for each mitigation plan: Is the mitigation plan being implemented as planned? Is the mitigation plan having its intended effect? Based on tracking data, do any corrective actions need to be taken? Dataflow The following dataflow describes the inputs and outputs of this activity. Inputs O1 Risk Statement O2 Context O3 Probability O4 Impact O5 Risk Exposure O6 Risk Profile O7 Mitigation Approach O8 Mitigation Plan Activity 2.3 Mitigate risk Outputs O9 Executed Mitigation Plan O10 Tracking Data O11 Tracking Decision Figure 9: Dataflow for Activity 2.3 Inputs The following are the inputs to this activity. Input O1 Risk Statement O2 Context O3 Probability Description A succinct and unique description of a risk. Risk statements typically describe (1) a circumstance with the potential to produce loss (i.e., threat) and (2) the loss that will occur if that circumstance is realized (i.e., consequence). Note: A risk statement does not have to be documented using text. For example, a graphical expression or model can also be used to provide a succinct and unique description of a risk. Additional information essential for characterizing a risk, including any relevant background information about the risk, elaborations about the threat and consequence, any aggravating or mitigating conditions, and relationships and dependencies with other risks A measure of the likelihood that a risk will occur 31 CMU/SEI-2010-TR-017
42 Input O4 Impact O5 Risk Exposure Description A measure of the severity of a risk s consequence if the risk were to occur A measure of the magnitude of a risk based on current values of probability and impact 06 Risk Profile A snapshot or summary of all risks relevant to the specific application of risk management (e.g., program, organization, technology) O7 Mitigation Approach O8 Mitigation Plan A strategy for addressing a risk. Examples of common mitigation approaches include accept If a risk occurs, its consequences will be tolerated; no proactive action to address the risk will be taken. When a risk is accepted, the rationale for doing so is documented. transfer A risk is shifted to another party (e.g., through insurance or outsourcing). avoid Activities are restructured to eliminate the possibility of a risk occurring. control Actions are implemented in an attempt to reduce or contain a risk. A set of actions for implementing the selected mitigation approach. Examples of items commonly found in a mitigation plan include objectives of the plan resources allocated to the plan responsibility for completing each action in the plan a schedule for completing all actions in the plan the funding allocated to performing the plan s actions measures for tracking the execution of the plan (in relation to the schedule and cost) and the effectiveness of the plan a contingency plan and triggers when appropriate Note: Changes in probability, impact, and risk exposure (i.e., residual risk) are often used to track a plan s effectiveness. Outputs The following are the outputs of this activity. Output O9 Executed Mitigation Plan O10 Tracking Data O11 Tracking Decision Description A set of completed actions (as outlined in a mitigation plan) Specific data that are gathered when monitoring the progress of a mitigation plan Reaching a conclusion or determination about what action(s) to take related to a mitigation plan. Examples of common tracking decisions include continue implementing the mitigation plan as intended modify the mitigation approach and develop a new plan as appropriate modify the mitigation plan implement the contingency plan (if one exists) close the risk 32 CMU/SEI-2010-TR-017
43 Activity Trigger The following situation will trigger this activity: a mitigation plan has been developed or modified. Sub-Activities The following table describes the sub-activities performed when conducting this activity. Sub-Activity Description Outputs Implement mitigation plan The mitigation plan (or the contingency plan) is executed as intended. O9 Executed Mitigation Plan Track mitigation plan The measures for tracking the action plan s execution are collected and analyzed as specified in the mitigation plan. Tracking data should be shared with all relevant stakeholders as appropriate Make tracking decision A decision about whether to take corrective action(s) related to a risk or it s mitigation plan is made. Tracking decisions should be shared with all relevant stakeholders as appropriate. O10 Tracking Data O11 Tracking Decisions 33 CMU/SEI-2010-TR-017
44 34 CMU/SEI-2010-TR-017
45 6 Sustain and Improve Risk Management (Phase 3) Description In this phase, activities are performed to sustain and improve risk management effort over time. Key Questions This phase answers the following questions: Which risk management assets (e.g., methods, tools) and work products (e.g., risk profile, mitigation plans) need to be under configuration control? What lessons were learned when preparing for risk management? What lessons were learned when conducting risk management? How does the risk management practice (e.g., plan, methods, tools, resources, training) need to be updated or improved? Dataflow The following dataflow describes the inputs and outputs of this phase. Constraint C1 Risk Management Constraints Inputs PI1 Stakeholder Requirements SI1 Risk Management Results SI2 Risk Management Effectiveness Data SI3 Risk Management Practice Phase 3 Sustain and improve risk management Outputs SO1 Controlled Risk Management Assets and Work Products SO2 Lessons Learned SO3 Updates to Risk Management Practice Resources R1 Policies, Standards, Laws, and Regulations R2 Standard Risk Management Practice R3 Experienced Personnel R4 Sustainment/Improvement Procedures R5 Sustainment/Improvement Artifacts and Tools PO2 Risk Management Plan Figure 10: Dataflow for Phase 3 35 CMU/SEI-2010-TR-017
46 Inputs The following are the inputs to this phase. Input PI1 Stakeholder Requirements SI1 Risk Management Results SI2 Risk Management Effectiveness Data SI3 Risk Management Practice Description The needs of the key stakeholders regarding risk management All outputs and data produced when preparing for and conducting risk management, including the risk management plan, risks, mitigation plans, and risk tracking data Specific data that are gathered to evaluate the effectiveness of the risk management practice The accepted approach for performing risk management activities, including the risk management plan, methods, tools, resources, and training Constraint The following is the constraint for this phase. Constraint C1 Risk Management Constraints Description Any circumstances, including logistics, standards, laws, regulations, personnel, schedule, and cost issues that could affect risk management activities Resources The following are the resources required by this phase. Resource R1 Policies, Standards, Laws, and Regulations R2 Standard Risk Management Practice R3 Experienced Personnel R4 Sustainment/ Improvement Procedures R5 Sustainment/ Improvement Artifacts and Tools Description Any informative policies, standards, laws, and regulations that guide the implementation of the risk management practice The accepted practice for implementing risk management, including methods, tools, procedures, criteria, worksheets, automated support tools, and databases. The standard risk management practice must be tailored for each specific application of risk management (e.g., program, organization, technology). A core group of people who are collectively experienced in all phases of risk management. Risk management roles and responsibilities for these people are defined, and they have received training that is appropriate for their roles and responsibilities. Documentation that describes how to conduct sustainment and improvement activities Basic items that can be used when conducting sustainment and improvement activities, including templates, worksheets, standard presentations, automated tools, and databases 36 CMU/SEI-2010-TR-017
47 Resource PO2 Risk Management Plan Description The activities a program intends to perform when conducting risk management. Examples of items commonly found in a risk management plan include the objectives of the risk management effort the scope of the risk management effort (e.g., actively participating groups and teams, support groups, interfaces) resources (e.g., personnel, funding, technology, facilities, and equipment) needed to conduct risk management roles and responsibilities for conducting risk management description of the risk management method being employed relationships and dependencies with other management practices (e.g., project, problem/issue, or opportunity management) pointers to the procedures, artifacts, and tools used in each risk management activity the sources of risk being assessed all relevant criteria for conducting risk management activities, including the criteria for probability, impact, and risk exposure a communication framework that describes formal paths for sharing risk information among key stakeholders time intervals and other triggers for establishing risk baselines effectiveness measures used to evaluate the risk management practice Outputs The following are the outputs of this phase. Output SO1 Controlled Risk Management Assets and Work Products SO2 Lessons Learned SO3 Updates to Risk Management Practice Description Selected risk management assets (e.g., methods, tools) and work products (e.g., risk profile, mitigation plans) that are under configuration control Knowledge gained by preparing for and conducting risk management activities that can be used to modify and improve the risk management practice Any changes to the risk management practice (e.g., changes to the risk management plan, methods, tools, resources, training ) to improve the efficiency and effectiveness of its application 37 CMU/SEI-2010-TR-017
48 Activities The following activities are performed in this phase. Activity 3.1 Manage risk management assets and work products 3.2 Evaluate effectiveness of risk management practice 3.3 Implement improvements to risk management practice Description Place designated assets (e.g., methods, tools) and work products (e.g., risk profile, mitigation plans) of the risk management practice under appropriate levels of control. Analyze risk management results and effectiveness measures (as specified in the risk management plan) to identify and document lessons learned regarding the strengths and weaknesses of the risk management practice (e.g., risk management plan, methods, tools, resources, training). Make identified changes to the risk management practice (e.g., changes to the risk management plan, methods, tools, resources, training) based on lessons learned. 38 CMU/SEI-2010-TR-017
49 7 Framework Requirements Framework Requirements Framework requirements define criteria that are used to establish conformance with the Risk Management Framework. A requirement is specified for each output in the framework. Requirements are presented for the following phases and activities: Phase 1: Prepare for Risk Management Phase 2: Perform Risk Management Activities, Activity 2.1: Assess Risk Phase 2: Perform Risk Management Activities, Activity 2.2: Plan for Risk Mitigation Phase 2: Perform Risk Management Activities, Activity 2.3: Mitigate Risk Phase 3: Sustain and Improve Risk Management The appendix of this document provides a set of worksheets for evaluating a risk management practice against the framework requirements. Phase 1 Requirements The following are the framework requirements for Phase 1: Prepare for Risk Management. Requirement Related Output REQ 1 Support of risk management by key stakeholders is tangible, active, and visible. PO1 Stakeholder Sponsorship Examples of sponsorship Organizational policies; memos from senior management; resources; funding; risks discussed at management meetings REQ 2 A risk management plan is defined, documented, and approved. Examples of plan content Objectives; scope; resources; descriptions of methods and tools; sources of risk; risk management criteria; communication framework; schedule and triggers for conducting evaluations; effectiveness measures PO2 Risk Management Plan 39 CMU/SEI-2010-TR-017
50 Requirement Related Output REQ 3 Risk sources are defined, documented, and kept current. PO3 Risk Sources Examples of documents containing risk sources Publicly available lists and taxonomies; domain-specific lists and taxonomies; organizational lists and taxonomies Examples of risk categories Program management, technical, organizational, infrastructure, support services, and product REQ 4 Risk management criteria are defined and documented. Examples of risk management criteria Probability, impact, and risk exposure criteria; decision-making criteria (e.g., for escalation or prioritization); criteria that establish risk tolerance; criteria for communicating with collaborators, partners, subcontractors, suppliers, customers, and other stakeholders PO4 Risk Management Criteria REQ 5 Methods and tools used to support risk management activities have been appropriately tailored for use. PO5 Tailored Methods and Tools Examples of methods and tools Procedures for conducting risk management activities; risk management criteria; risk sources; worksheets; automated support tools; report generators; databases REQ 6 People who perform risk management activities are prepared to conduct them. PO6 Trained Personnel Examples of people who need training Managers, technical leads, and staff who participate in risk management activities; risk manager; risk database administrator Examples of types of training Awareness training; method training; tool training Phase 2, Activity 2.1 Requirements The following are the framework requirements for Phase 2: Perform Risk Management Activities, Activity 2.1: Assess Risk. Requirement Related Output REQ 7 A risk statement is documented for each risk using a standard format. O1 Risk Statement Examples of items that influence the format and use of risk statements Organizational guidance for communicating, documenting, and updating risks; requirements of methods and tools; needs of decision makers, collaborators, partners, subcontractors, suppliers, customers, and other stakeholders 40 CMU/SEI-2010-TR-017
51 Requirement Related Output REQ 8 Context is documented for each risk. O2 Context Examples of items that influence the format and use of context Organizational guidance for communicating, documenting, and updating risks; requirements of methods and tools; needs of decision makers, collaborators, partners, subcontractors, suppliers, customers, and other stakeholders Examples of context Root causes; aggravating conditions; mitigating conditions; relationships and dependencies with other risks REQ 9 Probability is evaluated and documented for each risk. O3 Probability Examples of items that influence the use of probability Probability criteria; organizational guidance for assessing probability; requirements of methods and tools; needs of decision makers, collaborators, partners, subcontractors, suppliers, customers, and other stakeholders REQ 10 Impact is evaluated and documented for each risk. O4 Impact Examples of items that influence the use of impact Impact criteria; organizational guidance for assessing impact; requirements of methods and tools; needs of decision makers, collaborators, partners, subcontractors, suppliers, customers, and other stakeholders REQ 11 Risk exposure is evaluated and documented for each risk. O5 Risk Exposure Examples of items that influence the use of risk exposure Risk exposure criteria; organizational guidance for assessing risk exposure; requirements of methods and tools; needs of decision makers, collaborators, partners, subcontractors, suppliers, customers, and other stakeholders REQ 12 A profile of all risks is developed, documented, and kept current. O6 Risk Profile Examples of items that influence the development of a risk profile Organizational guidance for communicating, documenting, and updating the risk profile; requirements of methods and tools; format of risk statements; risk profile format; needs of decision makers, collaborators, partners, subcontractors, suppliers, customers, and other stakeholders 41 CMU/SEI-2010-TR-017
52 Phase 2, Activity 2.2 Requirements The following are the framework requirements for Phase 2: Perform Risk Management Activities, Activity 2.2: Plan for Risk Mitigation. Requirement Related Output REQ 13 A mitigation approach is established and documented for each risk. O7 Mitigation Approach Examples of items that influence selection of a mitigation approach Organizational guidance for communicating, documenting, and updating a mitigation approach; requirements of methods and tools; needs of decision makers, collaborators, partners, subcontractors, suppliers, customers, and other stakeholders; risk tolerance; decision-making criteria Examples of common mitigation approaches Accept a risk and take no action; transfer a risk to another party; restructure activities to avoid a risk by eliminating the possibility of it occurring; take action to reduce or contain a risk REQ 14 A mitigation plan is defined and documented for each risk that is actively being addressed. O8 Mitigation Plan Examples of items that influence development of a mitigation plan Organizational guidance for communicating, documenting, and updating a mitigation plan; requirements of methods and tools; needs of decision makers, collaborators, partners, subcontractors, suppliers, customers, and other stakeholders; risk tolerance Examples of a mitigation plan s content Objectives for the plan; resources responsible for completing each action; schedule for completing all actions; funding allocated to performing the plan s actions; measures for tracking the execution of the plan (in relation to the schedule and cost); measures for tracking the effectiveness of the plan; a contingency plan and triggers when appropriate Phase 2, Activity 2.3 Requirements The following are the framework requirements for Phase 2: Perform Risk Management Activities, Activity 2.3: Mitigate Risk. Requirement Related Output REQ 15 Mitigation plans are implemented as intended (unless circumstances force a change in direction). O9 Executed Mitigation Plan Examples of items that influence plan execution Resources available for plan execution; funding allocated to the plan; responsibility for implementing the plan; authority for implementing plan; verification of completion; visible support of management Examples of data that can be used to evaluate plan implementation Tracking measures for effectiveness and efficiency of mitigation plan execution; tracking measures for verifying plan completion; triggers for contingency or alternate plans 42 CMU/SEI-2010-TR-017
53 Requirement Related Output REQ 16 Data for tracking mitigation plans are collected, analyzed, documented, and reported. O10 Tracking Data Examples of items that influence collection of tracking data Organizational guidance for selecting tracking measures; organizational guidance for communicating, documenting, and updating tracking data; requirements of methods and tools; needs of decision makers, collaborators, partners, subcontractors, suppliers, customers, and other stakeholders; approach for collecting measurement data; approach for analyzing measurement data; frequency requirements for collecting tracking data Examples of types of tracking measures Tracking measures for effectiveness and efficiency of mitigation plan execution; tracking measures for verifying plan completion; triggers for contingency or alternate plans REQ 17 Tracking decisions for mitigation plans are documented appropriately. O11 Tracking Decisions Examples of items that influence tracking decisions Organizational guidance for communicating, documenting, and updating tracking decisions; requirements for approving tracking decisions; requirements of methods and tools; needs of decision makers, collaborators, partners, subcontractors, suppliers, customers, and other stakeholders; decision-making criteria Examples of common tracking decisions Modify the mitigation approach and develop a new plan; modify an existing mitigation plan; implement a contingency plan; close a risk Phase 3 Requirements The following are the framework requirements for Phase 3: Sustain and Improve Risk Management. Requirement Related Output REQ 18 Selected risk management assets and work products are under configuration control. Examples of assets under configuration control Risk management plan; methods and tools; risk sources, risk criteria SO1 Controlled Risk Management Assets and Work Products Examples of work products under configuration control Risk profile; mitigation plans; tracking decisions; status reports REQ 19 Lessons learned are collected and documented for the risk management practice. SO3 Lessons Learned Examples of items that influence lessons learned Requirements for developing lessons learned; needs of decision makers, collaborators, partners, subcontractors, suppliers, customers, and other stakeholders; types of effectiveness measures collected for the risk management practice; strengths of the risk management practice; weaknesses of the risk management practice; changes in best practices; new standards or changes to existing standards or regulations; new methods and tools or changes to existing methods and tools 43 CMU/SEI-2010-TR-017
54 Requirement Related Output REQ 20 The risk management practice is updated as appropriate based on lessons learned. Examples of items that influence how lessons are incorporated Change management process; organizational guidance for managing change; needs of decision makers, collaborators, partners, subcontractors, suppliers, customers, and other stakeholders SO3 Updates to Risk Management Practice Examples of items that could be updated or changed Risk management plan; funding for risk management; methods; tools; resources; training 44 CMU/SEI-2010-TR-017
55 Appendix: Evaluating a Risk Management Practice This appendix provides a set of worksheets that can be used to evaluate a risk management practice and establish conformance with the Risk Management Framework. Conformance is established through satisfaction of the framework requirements. Non-conformance to any requirement generally indicates a less effective and potentially inadequate risk management practice. Directions: You must complete the following two steps when evaluating each requirement. 1. Evaluate each requirement in the checklist by checking the most appropriate box. The following table defines the range of responses for each requirement. Response Definition Satisfied The requirement is met by the risk management practice. Partially Satisfied The requirement is partially met by the risk management practice. Some aspects of the requirement are not met satisfactorily. Unsatisfied The requirement is not met by the risk management practice. Don t Know More information is needed to evaluate the requirement. 2. After you evaluate each requirement, document the rationale for your response in the space provided. Note where your response is based on objective data and where it is based on more subjective data, such as opinions. 45 CMU/SEI-2010-TR-017
56 Evaluation: Framework Requirements Stakeholder Sponsorship Requirement 1. Support of risk management by key stakeholders is tangible, active, and visible. Examples of sponsorship Organizational policies; memos from senior management; resources; funding; risks discussed at management meetings Response Satisfied Partially Satisfied Unsatisfied Don t Know Risk Management Plan 2. A risk management plan is defined, documented, and approved. Examples of plan content Objectives; scope; resources; descriptions of methods and tools; sources of risk; risk management criteria; communication framework; schedule and triggers for conducting evaluations; effectiveness measures Satisfied Partially Satisfied Unsatisfied Don t Know Risk Sources 3. Risk sources are defined, documented, and kept current. Examples of documents containing risk sources Publicly available lists and taxonomies; domain-specific lists and taxonomies; organizational lists and taxonomies Examples of risk categories Program management, technical, organizational, infrastructure, support services, and product Satisfied Unsatisfied Partially Satisfied Don t Know Risk Management Criteria 4. Risk management criteria are defined and documented. Examples of risk management criteria Probability, impact, and risk exposure criteria; decision-making criteria (e.g., for escalation or prioritization); criteria that establish risk tolerance; criteria for communicating with collaborators, partners, subcontractors, suppliers, customers, and other stakeholders Satisfied Unsatisfied Partially Satisfied Don t Know 46 CMU/SEI-2010-TR-017
57 Evaluation: Framework Requirements Rationale Stakeholder Sponsorship 1. Risk Management Plan 2. Risk Sources 3. Risk Management Criteria CMU/SEI-2010-TR-017
58 Evaluation: Framework Requirements (continued) Tailored Methods and Tools Requirement 5. Methods and tools used to support risk management activities have been appropriately tailored for use. Examples of methods and tools Procedures for conducting risk management activities; risk management criteria; risk sources; worksheets; automated support tools; report generators; databases Response Satisfied Partially Satisfied Unsatisfied Don t Know Trained Personnel 6. People who perform risk management activities are prepared to conduct them. Examples of people who need training Managers, technical leads, and staff who participate in risk management activities; risk manager; risk database administrator Examples of types of training Awareness training; method training; tool training Satisfied Partially Satisfied Unsatisfied Don t Know Risk Statement 7. A risk statement is documented for each risk using a standard format. Examples of items that influence the format and use of risk statements Organizational guidance for communicating, documenting, and updating risks; requirements of methods and tools; needs of decision makers, collaborators, partners, subcontractors, suppliers, customers, and other stakeholders Satisfied Unsatisfied Partially Satisfied Don t Know Context 8. Context is documented for each risk. Examples of items that influence the format and use of context Organizational guidance for communicating, documenting, and updating risks; requirements of methods and tools; needs of decision makers, collaborators, partners, subcontractors, suppliers, customers, and other stakeholders Examples of context Root causes; aggravating conditions; mitigating conditions; relationships and dependencies with other risks Satisfied Unsatisfied Partially Satisfied Don t Know 48 CMU/SEI-2010-TR-017
59 Evaluation: Framework Requirements (continued) Rationale Tailored Methods and Tools 5. Trained Personnel 6. Risk Statement 7. Context CMU/SEI-2010-TR-017
60 Evaluation: Framework Requirements (continued) Probability Requirement 9. Probability is evaluated and documented for each risk. Examples of items that influence the use of probability Probability criteria; organizational guidance for assessing probability; requirements of methods and tools; needs of decision makers, collaborators, partners, subcontractors, suppliers, customers, and other stakeholders Response Satisfied Partially Satisfied Unsatisfied Don t Know Impact 10. Impact is evaluated and documented for each risk. Examples of items that influence the use of impact Impact criteria; organizational guidance for assessing impact; requirements of methods and tools; needs of decision makers, collaborators, partners, subcontractors, suppliers, customers, and other stakeholders Satisfied Partially Satisfied Unsatisfied Don t Know Risk Exposure 11. Risk exposure is evaluated and documented for each risk. Examples of items that influence the use of risk exposure Risk exposure criteria; organizational guidance for assessing risk exposure; requirements of methods and tools; needs of decision makers, collaborators, partners, subcontractors, suppliers, customers, and other stakeholders Satisfied Unsatisfied Partially Satisfied Don t Know Risk Profile 12. A profile of all risks is developed, documented, and kept current. Examples of items that influence the development of a risk profile Organizational guidance for communicating, documenting, and updating the risk profile; requirements of methods and tools; format of risk statements; risk profile format; needs of decision makers, collaborators, partners, subcontractors, suppliers, customers, and other stakeholders Satisfied Unsatisfied Partially Satisfied Don t Know 50 CMU/SEI-2010-TR-017
61 Evaluation: Framework Requirements (continued) Rationale Probability 9. Impact 10. Risk Exposure 11. Risk Profile CMU/SEI-2010-TR-017
62 Evaluation: Framework Requirements (continued) Mitigation Approach Requirement 13. A mitigation approach is established and documented for each risk. Examples of items that influence selection of a mitigation approach Organizational guidance for communicating, documenting, and updating a mitigation approach; requirements of methods and tools; needs of decision makers, collaborators, partners, subcontractors, suppliers, customers, and other stakeholders; risk tolerance; decision-making criteria Examples of common mitigation approaches Accept a risk and take no action; transfer a risk to another party; restructure activities to avoid a risk by eliminating the possibility of it occurring; take action to reduce or contain a risk Mitigation Plan 14. A mitigation plan is defined and documented for each risk that is actively being addressed. Examples of items that influence development of a mitigation plan Organizational guidance for communicating, documenting, and updating a mitigation plan; requirements of methods and tools; needs of decision makers, collaborators, partners, subcontractors, suppliers, customers, and other stakeholders; risk tolerance Examples of a mitigation plan s content Objectives for the plan; resources responsible for completing each action; schedule for completing all actions; funding allocated to performing the plan s actions; measures for tracking the execution of the plan (in relation to the schedule and cost); measures for tracking the effectiveness of the plan; a contingency plan and triggers when appropriate Executed Mitigation Plan 15. Mitigation plans are implemented as intended (unless circumstances force a change in direction). Examples of items that influence plan execution Resources available for plan execution; funding allocated to the plan; responsibility for implementing the plan; authority for implementing plan; verification of completion; visible support of management Examples of data that can be used to evaluate plan implementation Tracking measures for effectiveness and efficiency of mitigation plan execution; tracking measures for verifying plan completion; triggers for contingency or alternate plans Response Satisfied Partially Satisfied Unsatisfied Don t Know Satisfied Partially Satisfied Unsatisfied Don t Know Satisfied Unsatisfied Partially Satisfied Don t Know 52 CMU/SEI-2010-TR-017
63 Evaluation: Framework Requirements (continued) Rationale Mitigation Approach 13. Mitigation Plan 14. Executed Mitigation Plan CMU/SEI-2010-TR-017
64 Evaluation: Framework Requirements (continued) Tracking Data Requirement 16. Data for tracking mitigation plans are collected, analyzed, documented, and reported. Examples of items that influence collection of tracking data Organizational guidance for selecting tracking measures; organizational guidance for communicating, documenting, and updating tracking data; requirements of methods and tools; needs of decision makers, collaborators, partners, subcontractors, suppliers, customers, and other stakeholders; approach for collecting measurement data; approach for analyzing measurement data; frequency requirements for collecting tracking data Examples of tracking measures Tracking measures for effectiveness and efficiency of mitigation plan execution; tracking measures for verifying plan completion; triggers for contingency or alternate plans Tracking Decision 17. Tracking decisions for mitigation plans are documented appropriately. Examples of items that influence tracking decisions Organizational guidance for communicating, documenting, and updating tracking decisions; requirements for approving tracking decisions; requirements of methods and tools; needs of decision makers, collaborators, partners, subcontractors, suppliers, customers, and other stakeholders; decision-making criteria Examples of common tracking decisions Modify the mitigation approach and develop a new plan; modify an existing mitigation plan; implement a contingency plan; close a risk Controlled Risk Management Assets and Work Products 18. Selected risk management assets and work products are under configuration control. Examples of assets under configuration control Risk management plan; methods and tools; risk sources; risk criteria Examples of work products under configuration control Risk profile; mitigation plans; tracking decisions; status reports Response Satisfied Partially Satisfied Unsatisfied Don t Know Satisfied Partially Satisfied Unsatisfied Don t Know Satisfied Unsatisfied Partially Satisfied Don t Know 54 CMU/SEI-2010-TR-017
65 Evaluation: Framework Requirements (continued) Rationale Tracking Data 16. Tracking Decision 17. Controlled Risk Management Assets and Work Products CMU/SEI-2010-TR-017
66 Evaluation: Framework Requirements (continued) Lessons Learned Requirement 19. Lessons learned are collected and documented for the risk management practice. Examples of items that influence lessons learned Requirements for developing lessons learned; needs of decision makers, collaborators, partners, subcontractors, suppliers, customers, and other stakeholders; types of effectiveness measures collected for the risk management practice; strengths of the risk management practice; weaknesses of the risk management practice; changes in best practices; new standards or changes to existing standards or regulations; new methods and tools or changes to existing methods and tools Updates to Risk Management Practice 20. The risk management practice is updated as appropriate based on lessons learned. Examples of items that influence how lessons are incorporated Change management process; organizational guidance for managing change; needs of decision makers, collaborators, partners, subcontractors, suppliers, customers, and other stakeholders Examples of items that could be updated or changed Risk management plan; funding for risk management; methods; tools; resources; training Response Satisfied Partially Satisfied Unsatisfied Don t Know Satisfied Unsatisfied Partially Satisfied Don t Know 56 CMU/SEI-2010-TR-017
67 Evaluation: Framework Requirements (continued) Rationale Lessons Learned 19. Updates to Risk Management Practice CMU/SEI-2010-TR-017
68 58 CMU/SEI-2010-TR-017
69 References/Bibliography URLs are valid as of the publication date of this document. [Alberts 2002] Alberts, Christopher & Dorofee, Audrey. Managing Information Security Risks: The OCTAVE SM Approach. Boston, MA: Addison-Wesley, 2002 (ISBN ). [Alberts 2009] Alberts, Christopher & Dorofee, Audrey. A Framework for Categorizing Key Drivers of Risk (CMU/SEI-2009-TR-007). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, [Charette 1990] Charette, Robert N. Application Strategies for Risk Analysis. New York, NY: McGraw-Hill Book Company, [Dorofee 1996] Dorofee, A.; Walker, J.; Alberts, C.; Higuera, R.; Murphy, R.; & Williams, R. Continuous Risk Management Guidebook. Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, [Gallagher 1999] Gallagher, Brian. Software Acquisition Risk Management Key Process Area (KPA) A Guidebook Version 1.02 (CMU/SEI-99-HB-001). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, [Gallagher 2005] Gallagher, B.; Case, P; Creel, R.; Kushner, S.; & Williams, R. A Taxonomy of Operational Risks (CMU/SEI-2005-TN-036). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, [Kloman 1990] Kloman, H. F. Risk Management Agonists. Risk Analysis 10, 2 (June 1990): [Williams 1999] Williams, R.; Pandelios, G.; & Behrens, S. Software Risk Evaluation (SRE) Method Description (Version 2.0) (CMU/SEI-99-TR-029). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, CMU/SEI-2010-TR-017
70 60 CMU/SEI-2010-TR-017
71 REPORT DOCUMENTATION PAGE Form Approved OMB No Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA , and to the Office of Management and Budget, Paperwork Reduction Project ( ), Washington, DC AGENCY USE ONLY 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED (Leave Blank) August 2010 Final 4. TITLE AND SUBTITLE Risk Management Framework 6. AUTHOR(S) Christopher J. Alberts and Audrey J. Dorofee 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Software Engineering Institute Carnegie Mellon University Pittsburgh, PA SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) HQ ESC/XPK 5 Eglin Street Hanscom AFB, MA SUPPLEMENTARY NOTES 5. FUNDING NUMBERS FA C PERFORMING ORGANIZATION REPORT NUMBER CMU/SEI-2010-TR SPONSORING/MONITORING AGENCY REPORT NUMBER ESC-TR A DISTRIBUTION/AVAILABILITY STATEMENT Unclassified/Unlimited, DTIC, NTIS 13. ABSTRACT (MAXIMUM 200 WORDS) 12B DISTRIBUTION CODE Although most programs and organizations use risk management when developing and operating software-reliant systems, preventable failures continue to occur at an alarming rate. In many instances, the root causes of these preventable failures can be traced to weaknesses in the risk management practices employed by those programs and organizations. To help improve existing risk management practices, Carnegie Mellon University Software Engineering Institute (SEI) researchers undertook a project to define what constitutes best practice for risk management. The SEI has conducted research and development in the area of risk management since the early 1990s. Past SEI research has applied risk management methods, tools, and techniques across the life cycle (including acquisition, development, and operations) and has examined various types of risk, including software development risk, system acquisition risk, operational risk, mission risk, and information security risk, among others. In this technical report, SEI researchers have codified this experience and expertise by specifying (1) a Risk Management Framework that documents accepted best practice for risk management and (2) an approach for evaluating a program s or organization s risk management practice in relation to the framework. 14. SUBJECT TERMS risk, risk analysis, risk management, risk management framework 16. PRICE CODE 15. NUMBER OF PAGES SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY CLASSIFICATION OF THIS PAGE Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT NSN Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. Z UL
72
A Framework for Categorizing Key Drivers of Risk
A Framework for Categorizing Key Drivers of Risk Christopher J. Alberts Audrey J. Dorofee April 2009 TECHNICAL REPORT CMU/SEI-2009-TR-007 ESC-TR-2009-007 Acquisition Support Program Unlimited distribution
Operationally Critical Threat, Asset, and Vulnerability Evaluation SM (OCTAVE SM ) Framework, Version 1.0
Operationally Critical Threat, Asset, and Vulnerability Evaluation SM (OCTAVE SM ) Framework, Version 1.0 Christopher J. Alberts Sandra G. Behrens Richard D. Pethia William R. Wilson June 1999 TECHNICAL
Introduction to the OCTAVE Approach
Introduction to the OCTAVE Approach Christopher Alberts Audrey Dorofee James Stevens Carol Woody August 2003 Pittsburgh, PA 15213-3890 Introduction to the OCTAVE Approach Christopher Alberts Audree Dorofee
Supply-Chain Risk Management Framework
Supply-Chain Risk Management Framework Carol Woody March 2010 Scope of SEI Work Context Significantly reduce the risk (any where in the supply chain) that an unauthorized party can change the behavior
Guidelines for Developing a Product Line Concept of Operations
Guidelines for Developing a Product Line Concept of Operations Sholom Cohen August 1999 TECHNICAL REPORT CMU/SEI-99-TR-008 ESC-TR-99-008 Pittsburgh, PA 15213-3890 Guidelines for Developing a Product Line
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Management Model (CERT-RMM), both developed at Carnegie
An Application of an Iterative Approach to DoD Software Migration Planning
An Application of an Iterative Approach to DoD Software Migration Planning John Bergey Liam O Brien Dennis Smith September 2002 Product Line Practice Initiative Unlimited distribution subject to the copyright.
Introducing OCTAVE Allegro: Improving the Information Security Risk Assessment Process
Introducing OCTAVE Allegro: Improving the Information Security Risk Assessment Process Richard A. Caralli James F. Stevens Lisa R. Young William R. Wilson May 2007 TECHNICAL REPORT CMU/SEI-2007-TR-012
2012 CyberSecurity Watch Survey
2012 CyberSecurity Watch Survey Unknown How 24 % Bad is the Insider Threat? 51% 2007-2013 Carnegie Mellon University 2012 Carnegie Mellon University NO WARRANTY THIS MATERIAL OF CARNEGIE MELLON UNIVERSITY
CMMI: What do we need to do in Requirements Management & Engineering?
Colin Hood Page 1 of 11 : What do we need to do in Requirements Management & Engineering? Colin Hood HOOD Group February 2003 : What do we need to do in Requirements Management & Engineering?... 1 1 Abstract...
Guidelines for Developing a Product Line Production Plan
Guidelines for Developing a Product Line Production Plan Gary Chastek John D. McGregor June 2002 TECHNICAL REPORT CMU/SEI-2002-TR-006 ESC-TR-2002-006 Pittsburgh, PA 15213-3890 Guidelines for Developing
Assurance Cases for Design Analysis of Complex System of Systems Software
Assurance Cases for Design Analysis of Complex System of Systems Software Presented at AIAA Infotech@Aerospace Conference Software Assurance Session 8 April 2009 Stephen Blanchette, Jr. Problem: SoS are
Sustaining Operational Resiliency: A Process Improvement Approach to Security Management
Sustaining Operational Resiliency: A Process Improvement Approach to Security Management Author Richard A. Caralli Principle Contributors James F. Stevens Charles M. Wallen, Financial Services Technology
Contracting Officer s Representative (COR) Interactive SharePoint Wiki
Contracting Officer s Representative (COR) Interactive SharePoint Wiki James Smith Andy Boyd Software Solutions Conference 2015 November 16 18, 2015 Copyright 2015 Carnegie Mellon University This material
Exploring the Interactions Between Network Data Analysis and Security Information/Event Management
Exploring the Interactions Between Network Data Analysis and Security Information/Event Management Timothy J. Shimeall CERT Network Situational Awareness (NetSA) Group January 2011 2011 Carnegie Mellon
Information Asset Profiling
Information Asset Profiling Author James F. Stevens Principal Contributors Richard A. Caralli Bradford J. Willke June 2005 Networked Systems Survivability Program Unlimited distribution subject to the
Defining Incident Management Processes for CSIRTs: A Work in Progress
Defining Incident Management Processes for CSIRTs: A Work in Progress Chris Alberts Audrey Dorofee Georgia Killcrece Robin Ruefle Mark Zajicek October 2004 TECHNICAL REPORT CMU/SEI-2004-TR-015 ESC-TR-2004-015
Incident Management Capability Metrics Version 0.1
Incident Management Capability Metrics Version 0.1 Audrey Dorofee Georgia Killcrece Robin Ruefle Mark Zajicek April 2007 TECHNICAL REPORT CMU/SEI-2007-TR-008 ESC-TR-2007-008 CERT Program Unlimited distribution
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Management Model (CERT -RMM), both developed at Carnegie
CMMI for Development, Version 1.3
CMMI for Development, Version 1.3 CMMI-DEV, V1.3 CMMI Product Team Improving processes for developing better products and services November 2010 TECHNICAL REPORT CMU/SEI-2010-TR-033 ESC-TR-2010-033 Software
How To Ensure Security In A System
Software Assurance vs. Security Compliance: Why is Compliance Not Enough? Carol Woody, Ph.D. Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 2012 Carnegie Mellon University
Continuous Risk Management Guidebook
Carnegie Mellon Software Engineering Institute Continuous Guidebook Audrey J. Dorofee Julie A. Walker Christopher J. Alberts Ronald P. Higuera Richard L. Murphy Ray C. Williams The ideas and findings in
Software Acquisition Capability Maturity Model (SA-CMM ) Version 1.03
Software Acquisition Capability Maturity Model (SA-CMM ) Version 1.03 Editors: Jack Cooper Matthew Fisher March 2002 TECHNICAL REPORT CMU/SEI-2002-TR-010 ESC-TR-2002-010 Pittsburgh, PA 15213-3890 Software
CMMI for Acquisition, Version 1.3
CMMI for Acquisition, Version 1.3 CMMI-ACQ, V1.3 CMMI Product Team Improving processes for acquiring better products and services November 2010 TECHNICAL REPORT CMU/SEI-2010-TR-032 ESC-TR-2010-032 Software
CMMI for Development, Version 1.3
Carnegie Mellon University Research Showcase @ CMU Software Engineering Institute 11-2010 CMMI for Development, Version 1.3 CMMI Product Team Follow this and additional works at: http://repository.cmu.edu/sei
Overview. CMU/SEI Cyber Innovation Center. Dynamic On-Demand High-Performance Computing System. KVM and Hypervisor Security.
KVM and Hypervisor Security David Shepard and Matt Gaston CMU/SEI Cyber Innovation Center February 2012 2012 by Carnegie Mellon University. Published SEI PROPRIETARY INFORMATION. Distribution: Director
A Study of Systems Engineering Effectiveness. Building a Business Case for Systems Engineering
Building a Business Case for Systems Engineering NO WARRANTY THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES
Interpreting Capability Maturity Model Integration (CMMI ) for Business Development Organizations in the Government and Industrial Business Sectors
Interpreting Capability Maturity Model Integration (CMMI ) for Business Development Organizations in the Government and Industrial Business Sectors Donald R. Beynon, Jr. January 2007 Technical Note CMU/SEI-2007-TN-004
Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) (Case Study) James Stevens Senior Member, Technical Staff - CERT Division
Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) (Case Study) James Stevens Senior Member, Technical Staff - CERT Division James Stevens is a senior member of the technical staff
CMM SM -Based Appraisal for Internal Process Improvement (CBA IPI): Method Description
Technical Report CMU/SEI-96-TR-007 ESC-TR-96-007 CMM SM -Based Appraisal for Internal Process Improvement (CBA IPI): Method Description Donna K. Dunaway Steve Masters April 1996 Technical Report CMU/SEI-96-TR-007
Department of Homeland Security Cyber Resilience Review (Case Study) Matthew Butkovic Technical Manager - Cybersecurity Assurance, CERT Division
Department of Homeland Security Cyber Resilience Review (Case Study) Matthew Butkovic Technical Manager - Cybersecurity Assurance, CERT Division Matthew Butkovic is a Technical Manager Cybersecurity Assurance
Monitoring Trends in Network Flow for Situational Awareness
Monitoring Trends in Network Flow for Situational Awareness SEI CERT NetSA 2011 Carnegie Mellon University NO WARRANTY THIS MATERIAL OF CARNEGIE MELLON UNIVERSITY AND ITS SOFTWARE ENGINEERING INSTITUTE
Introduction to the Security Engineering Risk Analysis (SERA) Framework
Introduction to the Security Engineering Risk Analysis (SERA) Framework Christopher Alberts Carol Woody Audrey Dorofee November 2014 TECHNICAL NOTE CMU/SEI-2014-TN-025 CERT Division http://www.sei.cmu.edu
Cyber Intelligence Workforce
Cyber Intelligence Workforce Troy Townsend Melissa Kasan Ludwick September 17, 2013 Agenda Project Background Research Methodology Findings Training and Education Project Findings Workshop Results Objectives
CERT Resilience Management Model (RMM) v1.1: Code of Practice Crosswalk Commercial Version 1.1
CERT Resilience (RMM) : Code of Practice Crosswalk Commercial Version 1.1 Kevin G. Partridge Lisa R. Young October 2011 TECHNICAL NOTE CMU/SEI-2011-TN-012 CERT Program Unlimited distribution subject to
Moving Target Reference Implementation
CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Moving Target Reference Implementation Software Engineering Institute, Carnegie Mellon University Andrew O. Mellinger December 17, 2014
Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire. P3M3 Project Management Self-Assessment
Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Project Management Self-Assessment Contents Introduction 3 User Guidance 4 P3M3 Self-Assessment Questionnaire
Maturity Model. March 2006. Version 1.0. P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce
Maturity Model March 2006 Version 1.0 P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce This is a Value Added product which is outside the scope of the HMSO
Interpreting Capability Maturity Model Integration (CMMI ) for Service Organizations a Systems Engineering and Integration Services Example
Interpreting Capability Maturity Model Integration (CMMI ) for Service Organizations a Systems Engineering and Integration Services Example Mary Anne Herndon, SAIC Robert Moore, SAIC Mike Phillips, Software
Applying Software Quality Models to Software Security
Applying Software Quality Models to Software Security Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Carol Woody, Ph.D. April 21, 2015 Copyright 2015 Carnegie Mellon University
Integrated Measurement and Analysis Framework for Software Security
Integrated Measurement and Analysis Framework for Software Security Christopher Alberts Julia Allen Robert Stoddard September 2010 TECHNICAL NOTE CMU/SEI-2010-TN-025 CERT Program Unlimited distribution
SOA for Healthcare: Promises and Pitfalls
SOA for Healthcare: Promises and Pitfalls Dennis B. Smith [email protected] SOA in Health Care Conference: Value in a Time of Change Chicago, IL USA June 3, 2009 Agenda Healthcare IT Challenges SOA: The
RiskManagement ESIEE 06/03/2012. Aloysius John March 2012
RiskManagement MOTIS ESIEE 06/03/2012 Aloysius John March 2012 Risk Management is a Introduction Process for Project manager to identify factors that may more or less affect the success or the achievement
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research)
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
Network Monitoring for Cyber Security
Network Monitoring for Cyber Security Paul Krystosek, PhD CERT Network Situational Awareness 2006 Carnegie Mellon University What s Coming Up The scope of network monitoring Cast of characters Descriptions
+SAFE, V1.2 A Safety Extension to CMMI-DEV, V1.2
+SAFE, V1.2 A Safety Extension to CMMI-DEV, V1.2 Defence Materiel Organisation, Australian Department of Defence March 2007 TECHNICAL NOTE CMU/SEI-2007-TN-006 Software Engineering Process Management Program
A Taxonomy of Operational Risks
Sponsored by the U.S. Department of Defense 2005 by Carnegie Mellon University A Taxonomy of Operational Risks Brian Gallagher Director, Acquisition Support page 1 Operational Risk By its nature, the uncertainty
Taxonomy-Based Risk Identification
Technical Report CMU/SEI-93-TR-6 ESC-TR-93-183 Taxonomy-Based Risk Identification Marvin J. Carr Suresh L. Konda Ira Monarch F. Carol Ulrich Clay F. Walker June 1993 Technical Report CMU/SEI-93-TR-6 ESC-TR-93-183
Arcade Game Maker Pedagogical Product Line: Marketing and Product Plan
Arcade Game Maker Pedagogical Product Line: Marketing and Product Plan Arcade Game Team July 2003 Unlimited distribution subject to the copyright. This work is sponsored by the U.S. Department of Defense.
Distributed and Outsourced Software Engineering. The CMMI Model. Peter Kolb. Software Engineering
Distributed and Outsourced Software Engineering The CMMI Model Peter Kolb Software Engineering SEI Trademarks and Service Marks SM CMM Integration SCAMPI are service marks of Carnegie Mellon University
Data Management Maturity (DMM) Model Update
Data Management Maturity (DMM) Model Update Rawdon Young November 2012 Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Contents / Agenda The DMM SEI Observations on Core
THE SOUTH AFRICAN HERITAGE RESOURCES AGENCY ENTERPRISE RISK MANAGEMENT FRAMEWORK
THE SOUTH AFRICAN HERITAGE RESOURCES AGENCY ENTERPRISE RISK MANAGEMENT FRAMEWORK ACCOUNTABLE SIGNATURE AUTHORISED for implementation SIGNATURE On behalf of Chief Executive Officer SAHRA Council Date Date
Software Assurance Competency Model
Software Assurance Competency Model Thomas Hilburn, Embry-Riddle Aeronautical University Mark Ardis, Stevens Institute of Technology Glenn Johnson, (ISC) 2 Andrew Kornecki, Embry-Riddle Aeronautical University
Advanced Risk Analysis for High-Performing Organizations
Pittsburgh, PA 15213-3890 Advanced Risk Analysis for High-Performing Organizations Christopher Alberts Audrey Dorofee Sponsored by the U.S. Department of Defense 2006 by Carnegie Mellon University page
A Comparison of Requirements Specification Methods from a Software Architecture Perspective
A Comparison of Requirements Specification Methods from a Software Architecture Perspective Len Bass John Bergey Paul Clements Paulo Merson Ipek Ozkaya Raghvinder Sangwan August 2006 TECHNICAL REPORT CMU/SEI-2006-TR-013
Risk Management Primer
Risk Management Primer Purpose: To obtain strong project outcomes by implementing an appropriate risk management process Audience: Project managers, project sponsors, team members and other key stakeholders
Deriving Software Security Measures from Information Security Standards of Practice
Deriving Software Measures from Standards of Practice Julia Allen Christopher Alberts Robert Stoddard February 2012 2012 Carnegie Mellon University Copyright 2012 Carnegie Mellon University. This material
Practice Guide COORDINATING RISK MANAGEMENT AND ASSURANCE
Practice Guide COORDINATING RISK MANAGEMENT AND ASSURANCE March 2012 Table of Contents Executive Summary... 1 Introduction... 1 Risk Management and Assurance (Assurance Services)... 1 Assurance Framework...
P3M3 Portfolio Management Self-Assessment
Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Portfolio Management Self-Assessment P3M3 is a registered trade mark of AXELOS Limited Contents Introduction
Project Risk Management
Project Risk Management Study Notes PMI, PMP, CAPM, PMBOK, PM Network and the PMI Registered Education Provider logo are registered marks of the Project Management Institute, Inc. Points to Note Risk Management
Steve Masters (SEI) SEPG North America March 2011. 2011 Carnegie Mellon University
Using Organizational Business Objectives to Guide a Process Improvement Program Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 (SEI) SEPG North America March 2011 Agenda
Building Resilient Systems: The Secure Software Development Lifecycle
Building Resilient Systems: The Secure Software Development Lifecycle Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213, PhD Technical Director, CERT [email protected]
Develop Project Charter. Develop Project Management Plan
Develop Charter Develop Charter is the process of developing documentation that formally authorizes a project or a phase. The documentation includes initial requirements that satisfy stakeholder needs
Space project management
ECSS-M-ST-80C Space project management Risk management ECSS Secretariat ESA-ESTEC Requirements & Standards Division Noordwijk, The Netherlands Foreword This Standard is one of the series of ECSS Standards
Common Testing Problems: Pitfalls to Prevent and Mitigate
: Pitfalls to Prevent and Mitigate AIAA Case Conference 12 September 2012 Donald Firesmith Software Engineering Institute (SEI) Carnegie Mellon University Pittsburgh, PA 15213 Clarification and Caveat
IT@Intel. Measuring the Return on IT Security Investments. White Paper Intel Information Technology Computer Manufacturing Information Security
White Paper Intel Information Technology Computer Manufacturing Information Security Measuring the Return on IT Security Investments Intel IT developed a model for measuring return on security investment
PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3)
PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3) 1st February 2006 Version 1.0 1 P3M3 Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce This is a Value
Information technology Security techniques Information security management systems Overview and vocabulary
INTERNATIONAL STANDARD ISO/IEC 27000 Third edition 2014-01-15 Information technology Security techniques Information security management systems Overview and vocabulary Technologies de l information Techniques
IFAD Policy on Enterprise Risk Management
Document: EB 2008/94/R.4 Agenda: 5 Date: 6 August 2008 Distribution: Public Original: English E IFAD Policy on Enterprise Risk Management Executive Board Ninety-fourth Session Rome, 10-11 September 2008
CMMI for SCAMPI SM Class A Appraisal Results 2011 End-Year Update
CMMI for SCAMPI SM Class A 2011 End-Year Update Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 1 Outline Introduction Current Status Community Trends Organizational Trends
Leveraging CMMI framework for Engineering Services
Leveraging CMMI framework for Engineering Services Regu Ayyaswamy, Mala Murugappan Tata Consultancy Services Ltd. Introduction In response to Global market demand, several OEMs adopt Global Engineering
Avondale College Limited Enterprise Risk Management Framework 2014 2017
Avondale College Limited Enterprise Risk Management Framework 2014 2017 President s message Risk management is part of our daily life, something we do regularly; often without realising we are doing it.
Risk Management approach for Cultural Heritage Projects Based on Project Management Body of Knowledge
1 Extreme Heritage, 2007 Australia, 19-21 July 2007, James Cook University, Cairns, Australia Theme 6: Heritage disasters and risk preparedness approach for Cultural Heritage Projects Based on Project
UFO: Verification with Interpolants and Abstract Interpretation
: Verification with Interpolants and Abstract Interpretation and Sagar Chaki Software Engineering Institute Carnegie Mellon University Aws Albarghouthi, Yi i and Marsha Chechik University of Toronto A
<name of project> Software Project Management Plan
The document in this file is adapted from the IEEE standards for Software Project Management Plans, 1058-1998, which conforms to the requirements of ISO standard 12207 Software Life Cycle Processes. Tailor
A Systematic Method for Big Data Technology Selection
A Systematic Method for Big Data Technology Selection John Klein Software Solutions Conference 2015 November 16 18, 2015 Copyright 2015 Carnegie Mellon University This material is based upon work funded
CRR Supplemental Resource Guide. Volume 6. Service Continuity Management. Version 1.1
CRR Supplemental Resource Guide Volume 6 Service Continuity Management Version 1.1 Copyright 2016 Carnegie Mellon University This material is based upon work funded and supported by Department of Homeland
CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data
CRISC Glossary Term Access control Access rights Application controls Asset Authentication The processes, rules and deployment mechanisms that control access to information systems, resources and physical
CRR Supplemental Resource Guide. Volume 5. Incident Management. Version 1.1
CRR Supplemental Resource Guide Volume 5 Incident Management Version 1.1 Copyright 2016 Carnegie Mellon University This material is based upon work funded and supported by Department of Homeland Security
Architectural Implications of Cloud Computing
Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,
PROJECT RISK MANAGEMENT
PROJECT RISK MANAGEMENT DEFINITION OF A RISK OR RISK EVENT: A discrete occurrence that may affect the project for good or bad. DEFINITION OF A PROBLEM OR UNCERTAINTY: An uncommon state of nature, characterized
ISO, CMMI and PMBOK Risk Management: a Comparative Analysis
ISO, CMMI and PMBOK Risk Management: a Comparative Analysis Cristine Martins Gomes de Gusmão Federal University of Pernambuco / Informatics Center Hermano Perrelli de Moura Federal University of Pernambuco
Crosswalk Between Current and New PMP Task Classifications
Crosswalk Between Current and New PMP Task Classifications Domain 01 Initiating the Project Conduct project selection methods (e.g., cost benefit analysis, selection criteria) through meetings with the
Partnering for Project Success: Project Manager and Business Analyst Collaboration
Partnering for Project Success: Project Manager and Business Analyst Collaboration By Barbara Carkenord, CBAP, Chris Cartwright, PMP, Robin Grace, CBAP, Larry Goldsmith, PMP, Elizabeth Larson, PMP, CBAP,
