RISK MANAGEMENT - Concepts and Methods
|
|
|
- Augustine Lewis
- 10 years ago
- Views:
Transcription
1 WHITE PAPER RISK MANAGEMENT - Concepts and Methods Methods Commission / Espace Méthodes CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS 30, rue Pierre Sémard, PARIS Tel. : Fax : [email protected] Web :
2
3 Table of Contents 1 Introduction Summary Identification of risk situations Options for managing risks Tools and knowledge bases Risk: general principles and definitions Basic concepts Assets Asset damage Consequences for the entity Possible but uncertain causes of damage to an asset Defining threat Defining vulnerability Defining risk Defining risk based on an asset /threat or asset /threat/ exploited vulnerability framework Defining risk based on a scenario Risk Management: basic options Direct and individual risk management Global and indirect risk management Definitions of risk and types of management Risk identification Identifying critically important (or potentially critical) assets Identifying threats and vulnerabilities Identifying risk scenarios Estimating identified risks Risk estimation for individual risk management Analysis of the stakes or consequences of the risk Evaluating the most serious consequences of damage Evaluating the specific consequences of an analysed risk Evaluating the probability that a risk will occur Evaluating the effects of security measures Differentiating types of effects that security measures may have Integrating a certain level of quality in security measures Measuring a security measure s efficiency Security assurance The combined effects of multiple security measures Risk management CLUSIF 2008/2009 3
4 6.1.4 Estimating levels of risk The impact of how risk is defined Risk estimation for global risk management Estimating the stakes or consequences of the risk Describing a reference point for the seriousness of risk consequences Defining a scale of seriousness Estimating the level of threat Estimating the level of vulnerability Measuring the level of each vulnerability Measuring several combined vulnerabilities Estimating the level of risk Evaluating identified risks Risk evaluation for individual risk management Risk evaluation for global risk management Risk treatment Directly reducing critical risk situations Directly reducing risks using a knowledge base Direct risk reduction by the activity, project or process managers Indirect treatment of critical risks Transforming vulnerabilities into security goals Analysing vulnerabilities to determine what elements to include in a security policy Risk transfer Risk communication... 39
5 ACKNOWLEDGMENTS CLUSIF would like to extend special thanks to the members of the Methods space who made this document possible: Dominique BUC BUC SA Olivier CORBIER Éric DERONZIER YSOSECURE Jean-Philippe JOUAS CLUSIF Gérard MOLINES MOLINES CONSULTANTS Jean-Louis ROULE CLUSIF We would also like to thank our associate in Québec Martine GAGNE for her invaluable help in carefully re-reading the French document and making helpful suggestions. Risk Management CLUSIF
6 1 INTRODUCTION Starting or developing a business always requires taking risks. On this basis it is clearly important to identify, analyse, control and manage these risks, and sensible to do so using a methodological framework. Various methods of analysing and managing risk exist, each offering different definitions of risk management, which can be confusing. This document aims to define different types of risk management methods and describe resulting key steps. Presented in this light, the following study can be applied to a wide range of risks. However due to the development and importance of specific standards for managing IT security-related risks, we will often refer to and cite examples from this particular field. This study focuses strictly on risk management and is not intended as an evaluation of the pros and cons of different methods used as security management tools in a given context. Risk Management CLUSIF
7 2 SUMMARY The following study identifies significant differences between various risk management methods. The key areas in which differences exist are briefly described below. 2.1 Identification of risk situations The process of identifying risk situations may entail the broad participation of the management team and be focused on strategy and the entity's primary objectives, or on the contrary occur at an operational and technical level. Even the manner in which risks are defined will vary depending on the approach taken. 2.2 Options for managing risks Risk can be managed in one of two principal ways: by analysing each identified risk situation and taking specific measures that are adapted to each one, with the broad participation of the management in risk management, or by using more general analysis to establish security goals and guidelines in order to globally reduce risk without managing it through direct and personalised means and likely with less management participation. The first risk management option requires an advanced risk analysis model that the second option does not. These risk management options have a direct effect on each phase of the related process. These effects are described later on in the document. 2.3 Tools and knowledge bases Various risk management tools exist, ranging from the strict minimum to comprehensive methodological approaches that include knowledge and expertise bases, auditing tools, simulation tools for gauging risk levels in relation to the security measures taken, performance indicators, etc. It should also be considered how far these tools could be customised. Risk Management CLUSIF
8 3 RISK: GENERAL PRINCIPLES AND DEFINITIONS Before discussing management, we must first try to address the issue of what a risk is, as each method uses its own definition. These definitions are based on a few generally established concepts. These are presented below and followed by an examination of points of divergence that allow different decisions to be taken. 3.1 Basic concepts Risks exist because entities, companies and organisations have assets of a material or immaterial nature that could be subject to damage that has consequences on the entity in question. Four concepts are important here: assets, a term often used in the field of IT security 1, asset damage, consequences for the entity, possible but uncertain causes Assets In very general terms, an asset can be defined as anything that could be of value or importance to the entity. In information security, the ISO/IEC standard distinguishes between: Primary assets including: o Processes and activities, o Information Supporting assets including: o Equipment, o Software, o Networks, o Personnel, o Premises, o Organisational support 1 The term asset is clearly defined and explained in the ISO/IEC series of standards, which specifically address risks linked to information security. This term does not appear in more general standards like ISO Guide 73 or the ISO standard,. Risk Management CLUSIF
9 This is of course a very general definition that, while common to all methods, translates into a range of practical applications Asset damage Clearly, risks (and their consequences) differ depending on what type of damage occurs. Different categories of assets will be damaged in different ways, and while it is easy to list the ways in which information can be damaged (by being lost, tampered with or exposed, among other things), few standard classifications exist for processes or certain support-related assets. The type of damage an asset sustains is not clearly specified in the ISO/IEC standard, which does not distinguish either damage from consequences. In our view however it is important to distinguish between direct consequences of damage to assets, and secondary or indirect consequences affecting processes and the entity s activities Consequences for the entity The nature of consequences can vary widely, depending on whether the entity in question is a commercial business, public organisation or association for example. The only important thing to keep in mind at this stage is that an evaluation of these consequences will have to focus on the entity rather than its information systems or the technical scope of analysis, and that an evaluation of risk must include an assessment of the impact that damage of a particular asset would have on the entity Possible but uncertain causes of damage to an asset Definitions of risk usually make reference to the cause or type of cause necessarily uncertain of damage to an asset. The ISO guide 73 uses the term event to describe this notion of cause. Generally speaking: A risk (as opposed to an observation or certainty) exists only if an uncertain action or event happens that leads to the occurrence of that risk in other words the damage of the asset in question, Risk evaluations must include an assessment of how likely this action or event is to occur. While our use of the word cause can be ambiguous in the sense that there are direct causes (what Guide 73 calls events ) and indirect causes (what the same guide calls sources ), it represents well the general idea of something that will lead to damage. Risk Management CLUSIF
10 3.1.5 Defining threat ISO/IEC series of standards on risk related to information systems refer to the idea of threat 2. Which is not really defined, except to say a threat has the potential to harm assets such as information, processes, and systems and therefore organizations (ISO/IEC 27005). One might assume that a threat is similar to the cause mentioned above, but it is in fact quite different: threats can apply to a wide range of aspects, particularly: Events or actions that can lead to the occurrence of a risk (for example an accident, fire, media theft, etc.), Actions or methods of action that make the occurrence of risk possible without causing it (for example abuse of privilege, illegal access rights or identity theft), Effects related to and which indicate undetermined causes (for example the saturation of an information system), Behaviour (for example unauthorized use of equipment) that is not in itself an event that leads to the occurrence of risk These examples show that a threat is not strictly linked to the cause of a risk, but it does make defining typologies of risk possible using a list of typical threats Defining vulnerability The term vulnerability is sometimes used in risk analysis but more widely in the domain of information systems security 3. Vulnerability can be defined in two ways. Linguistically speaking, the most correct definition describes vulnerability as a feature of a system, object or asset that may be susceptible to threats. If we take the example of a typed or handwritten document, where the threat would be rain or storms in general, possible vulnerabilities would be: that the ink is not waterproof, the paper is water-sensitive, the material it is written on is degradable. Often, it is more useful to think of vulnerabilities in terms of security controls and their potential shortcomings. Then, vulnerability is defined as a shortcoming or flaw in a security system that could be used by a threat to strike a targeted system, object or asset. 2 The term threat does not appear in more general standards like ISO Guide 73 or the ISO standard, but is used in the present document because it is widely employed in certain risk management methods. 3 Similarly, the term vulnerability is not used in general standards on risk management, particularly in ISO Guide 73, but is widely referred to in certain risk management methods. Risk Management CLUSIF
11 In the example above, the exploited vulnerability was a lack of protection against storms. From here, vulnerability branches out in many directions, as every security system has weaknesses and any solution intended to reduce vulnerability is vulnerable itself. If we go back to the example of the document made of degradable material an initial solution is the storage away from storms Resulting vulnerabilities: o Faulty plumbing systems within the building, o Inadequate or poorly executed storage procedures, o Activation of fire protection sprinklers, o Etc. When examining the notion of vulnerability, it may be useful to keep in mind that these two approaches are not the same. * * * * * By using these general concepts, several definitions of risk are possible and in fact proposed by different risk management methods. At the same time, they are compatible with standard-setting documents. 3.2 Defining risk The notion of risk in general is not problematic, but difficulties arise when we look for a formal definition that identifies every element of a risk. These elements come into play during the risk identification process, and the assessment process later. Paradoxically, risk management methods rarely provide such a formal definition. Possible definitions fall into one of two major categories: Threat-based definitions of risk, linked or not linked to vulnerabilities, Scenario-based definitions of risk Defining risk based on an asset /threat or asset /threat/ exploited vulnerability framework Risk can initially be defined as: The combination of an asset with a threat capable of damaging that asset. Risk management methods that use this definition often provide a typology of different types of threats 4. Another approach, seen in some methods, is to include certain vulnerabilities that are exploited by a threat in the definition of risk. Here, the idea is that risk only exists in the presence of an exploitable vulnerability. 4 Appendix C of the ISO/IEC standard provides a list of typical threats. Risk Management CLUSIF
12 Risk is then defined as: The combination of an asset, a threat capable of damaging that asset and vulnerabilities exploited by the threat to damage the asset. From these definitions, certain common or typical risks emerge based on types of threats, assets and, in some cases, vulnerabilities. This is a static model of risk in that the elements under consideration do not incorporate time as a variable, and it is impossible to describe sequences of events, causes or consequences Defining risk based on a scenario Another definition of risk incorporates asset damage and a description of the circumstances in which the damage took place. Circumstances can refer to a: Place: for example, media theft from one type of location or another, Time: for example, an action carried out during or outside business hours, Processes or phases of a process: for example, altering files during maintenance. Risk is then defined as: The combination of an asset, a type of damage that may occur to the asset and the circumstances in which this damage may occur. The term threat can still be used if taken to mean a general description of the types of circumstances in which a risk may appear. Circumstances are hence described as: a generic threat that describes a typology of circumstances, and specific circumstances that identify a generic threat. In practice, this definition leads to a definition of risk situations or risk scenarios that simultaneously describe the damage to an asset and the circumstances in which the damage occurred. This is exactly how risk is described in the ISO Guide 73, which defines a risk as consisting of dangerous sources or phenomena (circumstances), triggering events and consequences. This is a dynamic model of risk in which time plays a role, and as a result, different phases of the risk scenario in question result in different types of action. This dynamic model makes it possible to describe and take into account chains of events, causes and consequences. It is interesting to note that the ISO/IEC standard addresses the notion of incident scenarios, very similar to the risk scenario mentioned above, but not exactly equivalent. Incident scenarios involve the exploitation of a given vulnerability or set of vulnerabilities, but the particular circumstances in which a risk occurs can be linked to a range of elements that, as explained above, are not Risk Management CLUSIF
13 necessarily linked to vulnerabilities. * * * * * * * * * There are obviously other ways of defining risk and its components, but we will focus on these two definitions, which are a significant feature of risk management. Risk Management CLUSIF
14 4 RISK MANAGEMENT: BASIC OPTIONS Independently of a definition of risk, the goals of risk management can also be very different. Practically speaking, risk management aims to achieve one of two things, which when studied closely, appear fundamentally different: direct and individual management of each risk within the framework of a risk management policy, global and indirect risk management using a security policy that is adapted to possible risks. Note: The content and level of detail of this policy is discussed in Chapter Direct and individual risk management This management approach, which is defined by and built around a risk management policy, aims to: Identify all the risks to which the company is exposed Determine the level of each risk Take measures to reduce the level of each risk identified as unacceptable to an acceptable level Ensure constant monitoring of risks and levels of risk using the appropriate tools Ensure that each individual risk is well managed and that a decision has been taken to accept, reduce, or transfer each risk. This management method is highly oriented towards the entity s activities and Risk Management CLUSIF
15 fundamental interests, and can only be used successfully in full agreement with the entity s management team, who must participate actively. It is also highly adapted to project-based organisations in which project managers are responsible for risk management. Underlying principle and pre-condition Clearly, managing each risk on an individual basis requires knowing when to examine all existing or planned security measures that may influence the level of risk. The underlying principle and pre-condition of a management method of this type then is a risk model that, for each identified risk, determines: Structural risk factors related to the entity s activities and current context that are independent of security measures The role of security measures and their effects on the risk in question The overall level of risk that results Without such a model, it would be impossible to link the decision to implement security measures to the resulting level of residual risk. This link is necessary however for individual risk management. 4.2 Global and indirect risk management Here, the goal is to develop a security policy based on evaluating risks. The aim is to: Identify certain elements that can lead to risks Classify these elements by order of importance Determine a policy and security goals Ensure constant monitoring of risks and levels of risk using the appropriate tools This management method requires less intervention from the entity s management Risk Management CLUSIF
16 and can be applied on a technical level. Underlying principle and pre-condition The principle of this type of management is to define security needs or goals by classifying levels of risk according to whether these goals are reached or not and whether or not these needs are met. This may result in a partial view of risk that only takes into consideration some of the elements that affect the real level of risk - in particular certain vulnerabilities (or types of vulnerabilities) exploited by typical threats. The underlying principle and pre-condition of a management method of this type then is a risk model that, for each identified risk, determines: a level of risk as a function of elements listed in the description of this risk The influence of the choice of goals in the security policy The relative level of risk that results It is important to note that this evaluation of risk levels is only valid based on elements identified during the risk identification process and based on the impact of the security policy on these elements. Therefore it does not represent the real level of risk faced by the entity, but the importance of the security goals that are held in the security policy. 4.3 Definitions of risk and types of management Clearly, scenario-based definitions of risk are particularly well adapted to direct and individual risk management, while definitions based on threats and vulnerabilities are in principle well adapted to global and indirect risk management. In theory though, there is no reason why a scenario-based definition couldn t be used for indirect risk management in the framework of a security policy. Nor is it impossible to use a definition of risk based on threats and vulnerabilities for direct and individual risk management; the search for scenarios that may lead to the risk in question or belong to this risk category becomes part of the risk evaluation process and the process of choosing security measures. A note on the link between vulnerabilities and risk management methods It is worthwhile to examine the link between incorporating vulnerabilities into risk identification and the style of management. Incorporating vulnerabilities into the process of defining risks (as opposed to the risk analysis phase) has several consequences worth examining: Not incorporating vulnerabilities into risk identification implies that a risk results simply from the combination of an asset element that has value and of circumstances in which this value could be put at risk. It also implies that Risk Management CLUSIF
17 it is the situation to be managed and that vulnerabilities will be taken into account later, during the analysis of this risk situation. This is a direct approach to risk management. Incorporating vulnerabilities into the process of defining risks however implies that it is the vulnerabilities that will be evaluated and managed. This, then, is indirect risk management. In a given risk situation though, several vulnerabilities are often involved and exploited rather than just one. For example, a case of piracy from outside the company that leads to application data theft can simultaneously exploit vulnerabilities such as weak network access control, a lack of network partitioning or confinement of sensitive files, weak system access control, weak application access control, a lack of file encryption, etc. In this context, incorporating a list of exploited vulnerabilities into the risk definition process would definitely make direct risk management more difficult. It would also add a technical analysis task (searching for all the vulnerabilities related to a risk situation) to what is supposed to be a management task (risk identification). Therefore, it is fair to say that incorporating vulnerabilities into risk identification is compatible with global and indirect risk management, but much less so with direct and individual risk management. * * * * * * * * After outlining these basic approaches, the chapters that follow will examine how they determine the content of the various phases described by standards and particularly by ISO Guide 73, which appears below (the phases to be analysed in detail are in bold; attention is not paid in particular to the process of moving from one step to another). * Risk Management CLUSIF
18 RISK MANAGEMENT RISK ASSESSMENT RISK ANALYSIS RISK IDENTIFICATION RISK ESTIMATION RISK EVALUATION RISK TREATMENT RISK AVOIDANCE RISK OPTIMISATION (reduction) RISK TRANSFER RISK RETENTION RISK ACCEPTANCE RISK COMMUNICATION Risk Management CLUSIF
19 5 RISK IDENTIFICATION The nature of the risk identification phase depends on how risk has been defined. Whatever the definition, a risk arises in the presence of values or asset elements that represent a stake for the company or organisation; where certain qualities must be maintained for the entity to function properly. Identifying potentially critical assets is therefore the first step, and a part of all risk analysis methods. The second step, which depends on how risk has been defined, involves looking for: threats that may damage these assets, and vulnerabilities that could be exploited (where risk is identified on a threat/vulnerability basis), or damage that may affect these assets and the circumstances in which this damage may occur (where risk is identified on a situation/scenario basis) We will begin by looking at asset identification, followed by threat/vulnerability identification and risk scenario identification 5.1 Identifying critically important (or potentially critical) assets This is unquestionably an essential phase in risk identification. Two main approaches exist: As seen in the diagram below, the first approach involves: analysing the processes and activities of the company or entity and looking for any process malfunctions that could have an impact on the entity's goals and expected results, Looking for the assets and damage to these assets that could be the origin of such malfunctions, Establish a list of assets (it may be useful to specify those of critical importance to avoid overloading the other risk management phases). Risk Management CLUSIF
20 This approach focuses on the importance of the entity's different activities, and should ideally be carried out by high-level management. This approach quite naturally leads one to look for circumstances in which damage may occur and to define risk scenarios. The second approach involves: Analysing how the primary means supporting the entity's activities are structured (be it the information system, or any other means like manufacturing, logistics and communication), If appropriate, looking for secondary means that support the primary means (like energy and organizational means, etc.), Establishing a list of assets to be considered when identifying risks. This is a far more technical approach that can be carried out without the help of high-level management. It is conducive to a search for possible threats to these Risk Management CLUSIF
21 assets and to the identification of risk based on threats and vulnerabilities. One key difference is that with scenario-based definitions of risk, the type of damage an asset may suffer if a risk occurs is taken into account when looking for critically important assets. In other words, the criteria used to value assets during the risk estimation process (in threat-based definitions of risk) are incorporated even into the asset identification process, when identifying risk scenarios. As an illustration, here are a few examples involving three types of assets. In a static conception of risk, identified assets could be: A strategic planning document the database for a particular business line the data server for a given operation In a dynamic conception of risk based on scenarios, identified elements will also be linked to a type of damage: A. A confidential strategic planning document B. A database for a given business line, the integrity of which must be maintained C. A data server for a given operation which must remain available 5.2 Identifying threats and vulnerabilities Threat-based definitions of risk usually involve selecting, from a list of typical threats, standard elements that are relevant to the type of asset in question. For the asset elements of the three examples listed above, there would be (based on just some examples from ISO/IEC 27005): 1. Strategic document Related threats 2. Database Media or document theft Disclosure Related threats 3. Data server Tampering using software Software malfunction Related threats Fire Water damage Risk Management CLUSIF
22 Serious accident Destruction of equipment Flooding Etc. Definitions of risk that include exploited vulnerabilities usually involve selecting related vulnerabilities from a list that if necessary has been pre-sorted according to types of threats or vulnerabilities. For the examples listed above, there would be (also based on the examples given in the appendices of ISO/IEC standard): 1. Strategic document Threat and vulnerability: 2. Database Media or document theft due to insufficient data storage protection Threat and vulnerability: 3. Data server Tampering, due to downloading and uncontrolled use of software Threat and vulnerability: Destruction of equipment due to a lack of provisions for its periodic replacement 5.3 Identifying risk scenarios This consists in analysing the processes involving the asset element in question, the life cycle of this element, or its structure, to see what may put it at risk. This inventory is done either directly or using a knowledge base that lists frequently encountered risk scenarios where possible (depending on the method used). For the same examples: 1. Confidential strategic document Calls for the analysis of how this type of document is produced, monitored and distributed. It is possible to list various circumstances that lead to specific risks: when the document is produced (a computer file either on the PC of the manager or his/her assistant, or on a shared server) when the document is saved when the document is printed (on a shared printer) when it is sent by when it is sent in the mail when it is stored 2. A database whose integrity must be maintained Also calls for an analysis of the various processes involving the database that may put its integrity at risk. It is possible to list various circumstances that lead to specific risks: when the database is accessed simultaneously (software risks) Risk Management CLUSIF
23 in the case of malevolent access during software maintenance during development or maintenance tests during maintenance operations 3. A data server which must remain available Calls for analysis and list of various types of possible causes and internal processes involving this asset element, which could make it unavailable: Physical accidents (fire, water damage, etc.) and their origin: o fire caused by a short circuit within a cable, o fire caused internally (ashtray, secondary heating source, etc.) Common and less common breakdowns and the specific conditions surrounding them: o Common breakdowns handled by maintenance o Breakdowns requiring escalation o Etc. Denial of service attacks Equipment or software maintenance error o due to insufficient training o due to insufficient documentation o Etc. Note: Including the circumstances in which a risk may occur in the risk identification process reveals - through context and the processes involved - whether a given asset element is in fact, at a given moment, particularly at risk. The different results obtained from these three examples clearly demonstrate that beyond the words and terms used, there is a profound difference in how risk definitions are construed. Identifying threats to an asset and the vulnerabilities that these threats can exploit to affect that asset makes it possible to characterize a given type of risk, but does not aim towards, or in any case make possible, the direct identification of "risk situations" that potentially require specific actions as part of a direct risk management process. Risk Management CLUSIF
24 6 ESTIMATING IDENTIFIED RISKS The step referred to as risk estimation" in ISO standards actually involves risk quantification. This step covers very different things depending on what risk management method is used. 6.1 Risk estimation for individual risk management The goal, for each identified risk, is to evaluate the level of risk to which the entity is exposed. It is generally agreed that the level of risk depends on two factors: impact (or how serious the consequences will be) and potentiality (or probability). To make these evaluations in a situation where security measures have already been taken, attention must also be paid to the quality of these measures. As already stated, a risk model is a necessary pre-requisite. Different methods suggest different models, but it is nevertheless possible to list some reoccurring elements that are always necessary. These are: Analysis of the stakes or consequences of the risk Analysis of the probability that the risk scenario will occur Effects of security measures Analysis of the stakes or consequences of the risk Since the definition and description of the risk include that of the asset element in question as well as the type of damage, the goal is to evaluate the seriousness of this damage. This is of course a question of method that cannot be examined in any more detail here. We can however highlight general principles, which must be followed. Evaluating the most serious consequences of damage The first principle involves identifying what the most serious consequences of damage would be. This is often done during what is called classification. Classification must include the following: Risk Management CLUSIF
25 a. the creation of a scale of seriousness One of the first things to do is establish a scale of seriousness. The scale should express the varying levels of seriousness of different consequences (such as death or loss of the entity, lasting after-effects, temporary loss of competitiveness, etc.), in the same way we would speak about the effects of accidents on people (critical condition, permanent disability, need for ongoing care, common illness requiring a few weeks of bed rest, etc.). In the public service sector, the level of seriousness can refer to the degree of service unavailability (in terms of duration, percentage of the population affected, etc.). b. An evaluation of the seriousness of consequences (not of the inconvenience they cause an entity's managers) The goal of this exercise is to evaluate how serious the consequences of risk are for the entity. The evaluation and analysis of consequences must therefore target the processes of the entity. During this analysis, it is important not to over-rate inconveniences to the entity's managers (but to correctly evaluate inconveniences to clients). c. the approval by management of the scale of seriousness The consequences of different risks should be evaluated at the business level by activity managers themselves, and approved by an executive committee. Not doing this can, and generally does, result in the overestimation of certain consequences: events seen as serious by lower- and middle-ranking staff are often seen as tolerable or inconsequential by high-level management. Because risk management is primarily the responsibility of a company's managers, it is they who should determine how serious risks really are. Evaluating the specific consequences of an analysed risk The evaluation described above, sometimes summarised in asset classifications, looks at the highest level of consequences faced by the entity due to a particular type of damage to a given asset element. In certain circumstances and in the case of certain threats however, consequences may be less significant. As a result, direct risk management methods must provide for the correction, if necessary, of the evaluation of consequences to reflect a potentially lower impact Evaluating the probability that a risk will occur Because risk estimation relies in part on the likelihood that this risk will occur, it is necessary to evaluate the a priori probability of occurrence without any security measures. Access to adequate statistical data would of course be ideal, so as to base these a priori probabilities on completely impartial and objective information. This is rarely possible however, for various reasons: Agencies that collect accident- or loss-related information are reluctant to disclose it (insurance companies in particular) Risk Management CLUSIF
26 data can be biased due to the fact that not all accidents/losses are declared (particularly those that may effect the organisation s image) Certain accidents/losses are not even known to the victim (particularly in the case of data theft). There is often little choice but to subjectively evaluate these a priori probabilities, noting however that: consensus from a working group reduces subjectivity existing methods may offer data that provides an adequate starting point That said, the method used to define these a priori probabilities must be included in the risk model associated with this type of management and must include elements described below: a. the creation of a scale of probability One of the first things to do is establish a scale of probability. This scale should express levels of probability that are easily understood by everyone involved in the risk analysis process. The number of levels should be limited so that consensus can be easily reached as to the levels of probability of each threat. b. an evaluation of the a priori probability of a risk scenario Evaluating maximum and a priori probability, independently of security measures, will most often be associated with each category of scenario. This will indeed apply if the method provides for a structured knowledge base. Otherwise, it is advisable to group scenarios together under similar types of probabilities. In reality, this amounts to distinguishing threats that are common to several types of scenarios. Practically speaking, this probability often refers to the probability of a threat, independently of the specific context of the entity. c. an evaluation of the entity's exposure to the analysed scenario The notion of exposure (sometimes called natural exposure) is of fundamental importance. However probable the occurrence of a certain risk may or may not be in general, the important thing is to know if the entity is particularly exposed or not to this type of risk. This exposure brings several factors into play: the interest this action holds for the person who carries it out the more or less unique character of the entity as a target of the threat the social context the economic context It is also important to note that this exposure can fluctuate over time. Risk Management CLUSIF
27 The risk management method must therefore allow for an evaluation of this exposure depending on the specific context of the entity, to ultimately define the "intrinsic potentiality" of a risk without any security measures Evaluating the effects of security measures It is undoubtedly here that the various risk models common to this type of management can be a source of significant and distinctive help. Nonetheless, it is a good idea to highlight certain imperative elements that must be described in detail in any risk analysis model associated with direct risk management: the differentiation of types of effects that security measures may have the integration of a certain level of quality in these measures the measurement of a security measure s efficiency the integration of the idea of security assurance (beyond the technical quality of a measure, how can we be sure of its actual efficiency?) the manner in which simultaneous effects of several security measures are integrated and combined Differentiating types of effects that security measures may have Security measures can have a variety of effects that must be clearly noted in the risk model to ensure accurate risk assessment. It is important for example to distinguish between effects that reduce the probability of a risk and those that mitigate consequences. Aside from that, other slight variations should be highlighted, including: the effect of deterrence the effect of prevention (preventing an action or the successful completion of that action) the effect of detection followed by prevention the effect of detection followed by action to mitigate consequences the effect of confinement to mitigate consequences the effect of restoration the effect of palliative recovery measures Etc. Risk Management CLUSIF
28 This is not an exhaustive list, and the risk model must provide for a typology of these effects, by grouping them together if necessary, to describe the actions of security measures and allow for an individual evaluation of each risk. Integrating a certain level of quality in security measures Evidently, the effect(s) of a given security measure depend on the quality of that measure. Some measures or some procedures are more effective than others, and it is important to know how to judge quality. As a result, the risk model should include a method of evaluation. The method of evaluation itself may or may not involve experts, but it is highly recommended that it at least rely on a knowledge base. Measuring a security measure s efficiency The intrinsic quality of a security measure does not in itself indicate whether the measure will effectively reduce the level of a particular risk, even if experience shows it can play a positive role in reducing this risk. The efficiency of a measure may also depend on the type of effect as one measure may produce several effects. Using the risk model then, a relationship must be established between the quality of a security measure and how effective it is in producing a given effect on different types of risk scenarios. Security assurance This notion, perfectly described by ITSEC and common criteria, aims to distinguish between the level of efficiency of a security measure and the assurance that this measure is effectively in place. It involves a separate evaluation of the strength of a technical measure and whether it will be definitely implemented and maintained over time. The integration of this notion into the risk model is therefore a parameter that should be examined. The combined effects of multiple security measures Lastly, the manner in which simultaneous effects of several security measures must be explained in the risk model for a correct evaluation of the residual level of risk when several measures are active and appropriate, which is the case most of the time Estimating levels of risk An estimation of levels of risk must summarise partial estimations and as a minimum result in: an evaluation of the potentiality of a risk occurring (its probability) an evaluation of its impact (the seriousness of its consequences) Risk Management CLUSIF
29 The risk model must of course describe the manner in which these summary values are obtained The impact of how risk is defined Clearly, the operations described above are perfectly adapted to scenario-based definitions of risk. If risks are defined as based on threats and vulnerabilities, it will be necessary, for each risk defined in this way, to identify all possible scenarios (incident scenarios, as defined in ISO/IEC 27005) and estimate the level of risk for each scenario. The different points developed above will be necessary then for this estimation. A method for establishing a summary for each risk will also be necessary. 6.2 Risk estimation for global risk management It is possible of course to use a complete risk model as described above to individually estimate each risk identified as a risk scenario and, as a result, develop a security policy and goals that are adapted to global risk management. Here however, we will look at risks defined by a threat and an exploited vulnerability (or group of vulnerabilities). With this representation of risk it is very important to note the partial view of risk it provides by listing only some of the vulnerabilities. By not taking into account all the security measures that may influence a level of risk, this representation makes it possible to attribute a certain value to risk (by looking at the exploited vulnerability but not the other security measures that could reduce the risk). While this value can be used to classify vulnerabilities by order of importance, it is not a full evaluation of the level of risk to which the organisation is exposed. That said, a relative model for risk estimation must include several things: an estimation of the stakes or consequences of the risk an estimation of the level of the threat an estimation of the level of vulnerabilities listed in the description of the risk (this level could be a function of the security policy) Estimating the stakes or consequences of the risk The risk estimation must of course take into account the damage to an asset element when the risk occurs. Since the description of the risk includes a description of the asset element in question and the type of damage it suffers (even though this damage is not referred to explicitly and must be found in the type of threat), the task at hand is to evaluate the seriousness of this damage. This is, here again, a question of method that will not be examined here. It is possible however to highlight the general principles to be followed. These are shaped by the fact that obtaining an absolute value of the level of risk is not the goal. Risk Management CLUSIF
30 Describing a reference point for the seriousness of risk consequences In the sense that an absolute value of risk levels is not necessary here, a reference point for seriousness can be more loosely defined. For example, a reference point for a scale of seriousness could be: the real seriousness of consequences for the entity (as seen in Chapter 6.1.1) the inconvenience to users, the inconvenience to management the recovery costs any other criteria that reflect a certain order of importance of consequences (how long a service is unavailable, for example) Defining a scale of seriousness After the reference point, a scale must also be established. The number of levels is relatively unimportant for this type of management; a scale with few levels will facilitate later steps in the quantification process Estimating the level of threat The value given to a risk must of course take into account the level of threat. The manner in which this level is evaluated must appear in the risk estimation model, and can include different parameters such as: The a priori probability that an event will occur which triggers the threat the destructive potential of the threat the entity's exposure to this type of threat, in relative terms the ease of occurrence of the threat Etc. Of course, a function combining the a priori probability of occurrence with the entity's exposure to this type of threat seems the closest thing to the idea of probability. In this relative risk estimation however, the process of evaluating the level of threat must above all allow for good communication and be understood by decision makers. The theoretical validity of this evaluation is not of major importance, though Estimating the level of vulnerability Lastly, the risk estimation must take into account the level of the vulnerabilities in Risk Management CLUSIF
31 question, as these represent a key element in the identified risk. The following points should be discussed and described in the management model: The determination of the level of each vulnerability The manner in which several combined vulnerabilities are accounted for and valued, if several vulnerabilities are described in the risk identification process. Measuring the level of each vulnerability To manage possible risks over time, even in the framework of a partial risk model, the level of vulnerability must be measured. This evaluation can be carried out: subjectively based on a vulnerability audit and a knowledge base. One way or another, the method must describe the evaluation process which in turn must take into account elements from the security policy. Measuring several combined vulnerabilities Furthermore, if several vulnerabilities are described in a type of risk, the method of globally evaluating the level of vulnerability should be described and include: a typology of vulnerabilities (can such different vulnerabilities as access control and back-up weaknesses be compared?), the way in which vulnerabilities of the same type are combined (the minimum, maximum, or another formula?), the way in which different types of vulnerabilities are combined Estimating the level of risk An estimation of the level of risk must take into account all the preceding evaluations and result in a classification by order of importance of the risks described. Risk Management CLUSIF
32 7 EVALUATING IDENTIFIED RISKS The step referred to in ISO standards as risk evaluation actually involves judging whether a described risk is acceptable or unacceptable. 7.1 Risk evaluation for individual risk management For this type of management, the risk estimation step leads to an evaluation of the impact (I) and the probability (P) of each risk. The only task remaining is to give an overall mark or, simply, to establish a range of risk acceptability. The easily accessible nature of the two basic concepts makes it easy for management to deal with this aspect. A possible decision-making tool could be: A function of Seriousness of a risk S = f(p,i) An acceptability table as a function of P and I, like the one below for example. 7.2 Risk evaluation for global risk management In this type of management, evaluation leads to an overall mark according to which risks can be classified by order of importance. The decision to treat a risk or not is made based on a cut-off limit that must be set by a special committee. Risk Management CLUSIF
33 8 RISK TREATMENT After their assesment, risks need to be treated. This means a decision about: accepting them as such, avoiding them completely due to structural changes to make the risk disappear, reducing them, transferring or sharing them with a third party. In this section we will examine the last two options: risk reduction and the transfer of risks to a third party. Clearly, reducing risks that are considered critical is linked to the management method that has been chosen. But it is also linked (primarily perhaps) to the actual definition of those risks. 8.1 Directly reducing critical risk situations As its name implies, direct risk management involves deciding, on a scenario-byscenario basis, what measures should be taken. That said, several options are available depending on what is allowed by the risk management method. The two main options are: a reliance on a risk scenario knowledge base in which appropriate security measures are referenced and which allows an evaluation of their effects in terms of reducing the level of risk, direct reduction of risk situations by the managers of the activity, project or process Directly reducing risks using a knowledge base The most interesting option is a risk scenario knowledge base in which pertinent security measures are referenced for each scenario and which allows an evaluation of the effects of these measures in terms of reducing the level of risk. An additional element to consider is whether the risk management method offers other types of assistance, in particular a choice of risk reduction strategies, then allowing optimised decisions. Otherwise the risk manager will have to decide by himself which security measures will be implemented. The risk management diagram given in Chapter 4.1 is thus modified to include the following: Risk Management CLUSIF
34 8.1.2 Direct risk reduction by the activity, project or process managers As the circumstances in which each risk may occur are completely defined, it is possible for the activity, project or process managers to directly manage the solutions to be implemented and this often proves to be economical. Considering the scenario of a confidential strategic document being diverted while it is printed on a shared printer. The decision could be to simply modify the process and print this same document locally on a printer that isn't shared, rather than having to secure the printing process on a shared printer. The risk management diagram given in Chapter 4.1 is thus modified to include the following: 8.2 Indirect treatment of critical risks In an approach where risks are defined based on threats and vulnerabilities, the objective is generally to reduce the vulnerabilities. Here it is important to know what level of detail is considered with such a risk management method. This is because decisions on how to treat risks, and possible orientations can be Risk Management CLUSIF
35 linked to different levels of detail. As indicated in the diagram below, they can be linked to: a global security policy that outlines broad general directions theme-based security policies that outline security goals to be reached concerning different security-related domains or themes a security operational manual that describes required mechanisms and security guidelines in detail So, treating certain risks may consist of: as part of a theme-based policy, the implemention of procedures for processing and storing information in order to protect it from illicit use and dissemination at the level of security objectives (although the content and even the chapter headings of these procedures are not defined or decided at this level) Risk Management CLUSIF
36 an analysis of each element that plays a role in achieving information protection and a decision regarding each of these elements, in a security operational manual, as well as, for example: (from a non-exhaustive list suggested in the ISO/IEC standard) o labelling of all media based on how they are classified o Access restrictions o a continually updated list of those authorised to receive information o data entry and output validation controls o Data protection prior to publication or transmission o Media storage in keeping with supplier specifications o information publication restrictions o labelling media copies o periodical review of publication and distribution lists o Etc. Two options are available for the indirect management of common risks: The direct transformation of vulnerabilities to be reduced into security objectives specified in theme-based policies, and the deferral to a later phase of the transformation of these security goals into practical elements of a security operational manual a more detailed analysis of these vulnerabilities to determine, even this early on in the management process, which practical elements in a security operational manual should be implemented. Risk Management CLUSIF
37 8.2.1 Transforming vulnerabilities into security goals This transformation is relatively simple and does not require any specific tools; the lists of common vulnerabilities often pertain to the same level as lists of control objectives. Note: One could imagine working with very detailed vulnerabilities, and defined at the same level as the elements of a security operational manual. This would make risk identification and analysis very complicated however by multiplying the number of vulnerabilities to be taken into account for each common risk without simplifying the way they are dealt with The risk management diagram given in Chapter 4.2 is thus modified to include the following: The methods relevant to this diagram are in fact security goal management methods based on an evaluation of the level of common risks that may exploit vulnerabilities not addressed by security objectives. Risk Management CLUSIF
38 8.2.2 Analysing vulnerabilities to determine what elements to include in a security policy Deciding on and implementing elements of a security operational manual requires the analysis of possible incident or risk scenarios that are compatible with the characteristics threats and vulnerabilities of the risk that is analysed. Risk treatment involves looking for scenarios, choosing appropriate measures for reducing the level of risk, and including measures in the security operational manual. The risk management diagram given in Chapter 4.2 is thus modified to include the following: The methods relevant to this diagram are in fact methods for managing elements of the operational security manual, based on an evaluation of the seriousness level of risks resulting from incident scenarios that may exploit vulnerabilities not yet addressed by the security manual. 8.3 Risk transfer Risk transfer most often refers to an agreement between the entity and one or more third parties to share certain responsibilities. The most typical example is that of insurance, but many other kinds of agreements are possible. Methods are not particularly helpful in this area and agreements should be studied and concluded on a case-by-case basis. Often however, an in-depth analysis of risk situations is more useful and more directly applicable to transfer agreements than a study of threats and vulnerabilities. Risk Management CLUSIF
39 9 RISK COMMUNICATION Authoritative texts in the field of risk management all highlight the importance of risk-related communication. We indeed feel that when an organisation commits to serious risk management, it is essential that there be shared knowledge and a consensus on: The risks that are tolerated, but they still may well occur and require action in the future, the risks whose reduction has been decided, allowing time for related projects to be started and to complete, the risks that are high and theoretically inadmissible that must be tolerated because no avoidance nor reduction solution. This shared knowledge relies entirely on appropriate communication methods. Regardless of communication tools, it is obvious that communicating about risk situations serves a purpose and is conducive to responsible behaviour. In contrast, communicating about threats and vulnerabilities will be harder to manage and may not be supported by the staff. Risk Management CLUSIF
40 L ESPRIT DE L ÉCHANGE CLUB DE LA SÉCURITÉ DE L'INFORMATION FRANÇAIS 30, rue Pierre Sémard Paris [email protected]
Methods Commission CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS. 30, rue Pierre Semard, 75009 PARIS
MEHARI 2007 Overview Methods Commission Mehari is a trademark registered by the Clusif CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS 30, rue Pierre Semard, 75009 PARIS Tél.: +33 153 25 08 80 - Fax: +33
MEHARI 2010. Overview. April 2010. Methods working group. Please post your questions and comments on the forum: http://mehari.
MEHARI 2010 Overview April 2010 Methods working group Please post your questions and comments on the forum: http://mehari.info/ CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS 30 rue Pierre Sémard, 75009
MEHARI 2010 Information risk management method ISO/IEC 27005 compliant
MEHARI 2010 Information risk management method ISO/IEC 27005 compliant Exceeding the basic guidelines of the standard allows for a real management of risk. Février 2011 Risk Management using ISO 27005
Risk analysis and treatment Guide. August 2010. Methods Commission. Please post your questions and comments on the forum: http://mehari.
METHODS MEHARI 2010 Risk analysis and treatment Guide August 2010 Methods Commission Please post your questions and comments on the forum: http://mehari.info/ CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS
Information Security Team
Title Document number Add document Document status number Draft Owner Approver(s) CISO Information Security Team Version Version history Version date 0.01-0.05 Initial drafts of handbook 26 Oct 2015 Preface
MEHARI 2010. Evaluation Guide for security services. May 2010. Methods working group
MEHARI 2010 Evaluation Guide May 2010 Methods working group Please post your questions and comments on the forum: http://mehari.info/ CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS 30 rue Pierre Sémard,
OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii
The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department
UF Risk IT Assessment Guidelines
Who Should Read This All risk assessment participants should read this document, most importantly, unit administration and IT workers. A robust risk assessment includes evaluation by all sectors of an
Chapter 4 Information Security Program Development
Chapter 4 Information Security Program Development Introduction Formal adherence to detailed security standards for electronic information processing systems is necessary for industry and government survival.
Information security risk management using ISO/IEC 27005:2008
Information security risk management using ISO/IEC 27005:2008 Hervé Cholez / Sébastien Pineau Centre de Recherche Public Henri Tudor [email protected] [email protected] March, 29 th 2011 1
PROCEDURE FOR SECURITY RISK MANAGEMENT IN PPC S.A. INFORMATION TECHNOLOGY SYSTEMS DA-1
PUBLIC POWER CORPORATION S.A. INFORMATION TECHNOLOGY DIVISION CENTRAL SYSTEMS SUPPORT SECTION IT SYSTEMS SECURITY SUBSECTION PROCEDURE FOR SECURITY RISK MANAGEMENT IN PPC S.A. INFORMATION TECHNOLOGY SYSTEMS
Ohio Supercomputer Center
Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Information Security Policies and Procedures Development Framework for Government Agencies. First Edition - 1432 AH
Information Security Policies and Procedures Development Framework for Government Agencies First Edition - 1432 AH 6 Contents Chapter 1 Information Security Policies and Procedures Development Framework
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
Sytorus Information Security Assessment Overview
Sytorus Information Assessment Overview Contents Contents 2 Section 1: Our Understanding of the challenge 3 1 The Challenge 4 Section 2: IT-CMF 5 2 The IT-CMF 6 Section 3: Information Management (ISM)
Information Management Advice 39 Developing an Information Asset Register
Information Management Advice 39 Developing an Information Asset Register Introduction The amount of information agencies create is continually increasing, and whether your agency is large or small, if
EXIN Information Security Foundation based on ISO/IEC 27002. Sample Exam
EXIN Information Security Foundation based on ISO/IEC 27002 Sample Exam Edition June 2016 Copyright 2016 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored
Airmic review of the supply chain insurance market Review of recent developments in the supply chain insurance market
REPORT Airmic review of the supply chain insurance market Review of recent developments in the supply chain insurance market 1. Executive summary Increasingly complex supply chains, together with greater
Guidelines 1 on Information Technology Security
Guidelines 1 on Information Technology Security Introduction The State Bank of Pakistan recognizes that financial industry is built around the sanctity of the financial transactions. Owing to the critical
QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT
QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT Rok Bojanc ZZI d.o.o. [email protected] Abstract: The paper presents a mathematical model to improve our knowledge of information security and
Information Security Awareness Training
Information Security Awareness Training Presenter: William F. Slater, III M.S., MBA, PMP, CISSP, CISA, ISO 27002 1 Agenda Why are we doing this? Objectives What is Information Security? What is Information
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
ISMS Implementation Guide
atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759 Tel: 512-615-7300 Fax: 512-615-7301 www.atsec.com ISMS Implementation Guide atsec information security ISMS Implementation
NIST National Institute of Standards and Technology
NIST National Institute of Standards and Technology Lets look at SP800-30 Risk Management Guide for Information Technology Systems (September 2012) What follows are the NIST SP800-30 slides, which are
Information Security Guideline for NSW Government Part 1 Information Security Risk Management
Department of Commerce Guidelines Information Security Guideline for NSW Government Part 1 Information Security Risk Management Issue No: 3.2 First Published: Sept 1997 Current Version: Jun 2003 Table
security policy Purpose The purpose of this paper is to outline the steps required for developing and maintaining a corporate security policy.
Abstract This paper addresses the methods and methodologies required to develop a corporate security policy that will effectively protect a company's assets. Date: January 1, 2000 Authors: J.D. Smith,
UoB Risk Assessment Methodology
[Type here] UoB Risk Assessment Methodology The Risk Assessment Methodology describes how information security risk will be managed, including guidance for assessing, scoring, choosing acceptance or treatment
INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS
INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS Effective Date June 9, 2014 INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS OF THE HELLER SCHOOL FOR SOCIAL POLICY AND MANAGEMENT Table of Contents 1.
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
Annex 1: Assesing risk: threats, vulnerabilities and capacities
Annex 1: Assesing risk: threats, vulnerabilities and capacities There is no widely accepted definition of risk, but we can say that risk refers to possible events, however uncertain, that result in harm.
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 14 Risk Mitigation
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 14 Risk Mitigation Objectives Explain how to control risk List the types of security policies Describe how awareness and training
Practical Overview on responsibilities of Data Protection Officers. Security measures
Practical Overview on responsibilities of Data Protection Officers Security measures Manuel Villaseca Spanish Data Protection Agency [email protected] Security measures Agenda: The rol of DPO on security measures
ON EXTERNAL OBJECTS By Immanuel Kant From Critique of Pure Reason (1781)
ON EXTERNAL OBJECTS By Immanuel Kant From Critique of Pure Reason (1781) General Observations on The Transcendental Aesthetic To avoid all misapprehension, it is necessary to explain, as clearly as possible,
Risk-Based Assessment and Scoping of IV&V Work Related to Information Assurance Presented by Joelle Spagnuolo-Loretta, Richard Brockway, John C.
Risk-Based Assessment and Scoping of IV&V Work Related to Information Assurance Presented by Joelle Spagnuolo-Loretta, Richard Brockway, John C. Burget September 14, 2014 1 Agenda Information Assurance
Underwriting put to the test: Process risks for life insurers in the context of qualitative Solvency II requirements
Underwriting put to the test: Process risks for life insurers in the context of qualitative Solvency II requirements Authors Lars Moormann Dr. Thomas Schaffrath-Chanson Contact [email protected]
Does it state the management commitment and set out the organizational approach to managing information security?
Risk Assessment Check List Information Security Policy 1. Information security policy document Does an Information security policy exist, which is approved by the management, published and communicated
FDA Releases Final Cybersecurity Guidance for Medical Devices
FDA Releases Final Cybersecurity Guidance for Medical Devices By Jean Marie R. Pechette and Ken Briggs Overview and General Principles On October 2, 2014, the Food and Drug Administration ( FDA ) finalized
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Business Continuity Management Standard for IT Systems This standard is applicable to all VCU School of Medicine
What You Should Know About Cloud- Based Data Backup
What You Should Know About Cloud- Based Data Backup An Executive s Guide to Data Backup and Disaster Recovery Matt Zeman 3Fold IT, LLC PO Box #1350 Grafton, WI 53024 Telephone: (844) 3Fold IT Email: [email protected]
Institutional Policy. Tackling the risk: Handicap International s Safety and Security Policy. Federal Executive Division 2012 IP 05
Institutional Policy Tackling the risk: Handicap International s Safety and Security Policy Federal Executive Division 2012 IP 05 Institutional Policy Tackling the risk: Handicap International s Safety
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
Guideline on Vulnerability and Patch Management
CMSGu2014-03 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Vulnerability and Patch Management National Computer Board
A Risk Management Standard
A Risk Management Standard Introduction This Risk Management Standard is the result of work by a team drawn from the major risk management organisations in the UK, including the Institute of Risk management
Business Continuity Plan
Business Continuity Plan October 2007 Agenda Business continuity plan definition Evolution of the business continuity plan Business continuity plan life cycle FFIEC & Business continuity plan Questions
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
Disaster Recovery. 1.1 Introduction. 1.2 Reasons for Disaster Recovery. EKAM Solutions Ltd Disaster Recovery
Disaster Recovery 1.1 Introduction Every day, there is the chance that some sort of business interruption, crisis, disaster, or emergency will occur. Anything that prevents access to key processes and
ICT Disaster Recovery Plan
7 Appendix A ICT Disaster Recovery Plan Definition of a Disaster A computer disaster is the occurrence of any computer system or associated event which causes the interruption of business, leading in the
UF IT Risk Assessment Standard
UF IT Risk Assessment Standard Authority This standard was enacted by the UF Senior Vice President for Administration and the UF Interim Chief Information Officer on July 10, 2008 [7]. It was approved
Supplier IT Security Guide
Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA
Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG
Database Security Guideline Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG Table of Contents Chapter 1 Introduction... 4 1.1 Objective... 4 1.2 Prerequisites of this Guideline...
Regulations on Information Systems Security. I. General Provisions
Riga, 7 July 2015 Regulations No 112 (Meeting of the Board of the Financial and Capital Market Commission Min. No 25; paragraph 2) Regulations on Information Systems Security Issued in accordance with
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
LSE PCI-DSS Cardholder Data Environments Information Security Policy
LSE PCI-DSS Cardholder Data Environments Information Security Policy Written By: Jethro Perkins, Information Security Manager Reviewed By: Ali Lindsley, PCI-DSS Project Manager Endorsed By: PCI DSS project
CMS Information Security Risk Assessment (RA) Methodology
DEPARTMENT OF HEALTH & HUMAN SERVICES Centers for Medicare & Medicaid Services 7500 Security Boulevard, Mail Stop N2-14-26 Baltimore, Maryland 21244-1850 CENTERS FOR MEDICARE & MEDICAID SERVICES (CMS)
Business Continuity Planning and Disaster Recovery Planning
4 Business Continuity Planning and Disaster Recovery Planning Basic Concepts 1. Business Continuity Management: Business Continuity means maintaining the uninterrupted availability of all key business
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Section VI Principles of Laboratory Biosecurity
Section VI Principles of Laboratory Biosecurity Since the publication of the 4th edition of BMBL in 1999, significant events have brought national and international scrutiny to the area of laboratory security.
The Use of Spreadsheets: Considerations for Section 404 of the Sarbanes-Oxley Act*
The Use of Spreadsheets: Considerations for Section 404 of the Sarbanes-Oxley Act* July 2004 *connectedthinking The Use of Spreadsheets: Considerations for Section 404 of the Sarbanes-Oxley Act Introduction
Advantages and Disadvantages of Quantitative and Qualitative Information Risk Approaches
Chinese Business Review, ISSN 1537-1506 December 2011, Vol. 10, No. 12, 1106-1110 D DAVID PUBLISHING Advantages and Disadvantages of Quantitative and Qualitative Information Risk Approaches Stroie Elena
Business Case. for an. Information Security Awareness Program
Business Case (BS.ISAP.01) 1 (9) Business Case for an Information Security Business Case (BS.ISAP.01) 2 Contents 1. Background 3 2. Purpose of This Paper 3 3. Business Impact 3 4. The Importance of Security
Computer Security Incident Response Plan. Date of Approval: 23- FEB- 2015
Name of Approver: Mary Ann Blair Date of Approval: 23- FEB- 2015 Date of Review: 22- FEB- 2015 Effective Date: 23- FEB- 2015 Name of Reviewer: John Lerchey Table of Contents Table of Contents... 2 Introduction...
Stellenbosch University. Information Security Regulations
Stellenbosch University Information Security Regulations 1. Preamble 1.1. Information Security is a component of the Risk structure and procedures of the University. 1.2. Stellenbosch University has an
CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data
CRISC Glossary Term Access control Access rights Application controls Asset Authentication The processes, rules and deployment mechanisms that control access to information systems, resources and physical
CISM ITEM DEVELOPMENT GUIDE
CISM ITEM DEVELOPMENT GUIDE Updated January 2015 TABLE OF CONTENTS Content Page Purpose of the CISM Item Development Guide 3 CISM Exam Structure 3 Writing Quality Items 3 Multiple-Choice Items 4 Steps
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Four
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Four Data Handling in University Business Impact Analysis ( BIA ) Agenda Overview Terminologies Performing
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:
SERVER SECURITY STANDARD Security Standards are mandatory security rules applicable to the defined scope with respect to the subject. Overview Scope Purpose Instructions Improperly configured systems,
The Cybersecurity Journey How to Begin an Integrated Cybersecurity Program. Version 1.0 March 2005
The Cybersecurity Journey How to Begin an Integrated Cybersecurity Program March 2005 Legal and Copyright Notice The Chemical Industry Data Exchange (CIDX) is a nonprofit corporation, incorporated in the
Recommendations for companies planning to use Cloud computing services
Recommendations for companies planning to use Cloud computing services From a legal standpoint, CNIL finds that Cloud computing raises a number of difficulties with regard to compliance with the legislation
Information technology Security techniques Information security management systems Overview and vocabulary
INTERNATIONAL STANDARD ISO/IEC 27000 Third edition 2014-01-15 Information technology Security techniques Information security management systems Overview and vocabulary Technologies de l information Techniques
TABLE OF CONTENTS INTRODUCTION... 1
TABLE OF CONTENTS INTRODUCTION... 1 Overview...1 Coordination with GLBA Section 501(b)...2 Security Objectives...2 Regulatory Guidance, Resources, and Standards...3 SECURITY PROCESS... 4 Overview...4 Governance...5
Third Party Security Requirements Policy
Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,
08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview
Data protection and compliance In the cloud and in your data center 1 November 2013 Agenda 1 Introduction 2 Data protection overview 3 Understanding the cloud 4 Where do I start? 5 Wrap-up Page 2 Data
1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services
1. Computer Security: An Introduction Definitions Security threats and analysis Types of security controls Security services Mar 2012 ICS413 network security 1 1.1 Definitions A computer security system
PORT ASSESSMENT. Name of Port : Date : Reference: Questions GENERAL INFORMATION - ASSESSORS
Name of Port : Date : Reference: Questions GENERAL INFORMATION - ASSESSORS PORT ASSESSMENT Details Notes 1 Date of assessment/survey 2 Name(s) of person(s) carrying out assessment 3 Relevant skills & expertise
UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE
UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE Originator Patch Management Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Recommended by Director
Security Risk Management - Approaches and Methodology
228 Informatica Economică vol. 15, no. 1/2011 Security Risk Management - Approaches and Methodology Elena Ramona STROIE, Alina Cristina RUSU Academy of Economic Studies, Bucharest, Romania [email protected],
Key Components of a Risk-Based Security Plan
Key Components of a Risk-Based Security Plan How to Create a Plan That Works Authors: Vivek Chudgar Principal Consultant Foundstone Professional Services Jason Bevis Director Foundstone Professional Services
How small and medium-sized enterprises can formulate an information security management system
How small and medium-sized enterprises can formulate an information security management system Royal Holloway Information Security Thesis Series Information security for SMEs Vadim Gordas, MSc (RHUL) and
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT
Cloud Computing Security Considerations
Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction
The Advantages of a Firewall Over an Interafer
FIREWALLS VIEWPOINT 02/2006 31 MARCH 2006 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to the Centre for the Protection
APPLYING MEHARI TO A FICTITIOUS COMPANY
METHODS APPLYING MEHARI TO A FICTITIOUS COMPANY September 2000 Version 1.0 Methods Committee CLUB DE LA SECURITE DES SYSTEMES D INFORMATION FRANÇAIS 30, Rue Pierre Sémard 75009 Paris Mail : [email protected]
Guide to Vulnerability Management for Small Companies
University of Illinois at Urbana-Champaign BADM 557 Enterprise IT Governance Guide to Vulnerability Management for Small Companies Andrew Tan Table of Contents Table of Contents... 1 Abstract... 2 1. Introduction...
Executive Summary. Summary - 1
Executive Summary For as long as human beings have deceived one another, people have tried to develop techniques for detecting deception and finding truth. Lie detection took on aspects of modern science
APPLICATION THREAT MODELING
APPLICATION THREAT MODELING APPENDIX PROCESS FOR ATTACK SIMULATION AND THREAT ANALYSIS Marco M. Morana WILEY Copyrighted material Not for distribution 1 2 Contents Appendix process for attack simulation
SECURITY RISK MANAGEMENT
SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W
Cloud Computing and Records Management
GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 [email protected] www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version
