Information security risk management using ISO/IEC 27005:2008



Similar documents
ISMS Implementation Guide

SECURITY RISK MANAGEMENT

Information Security Guideline for NSW Government Part 1 Information Security Risk Management

Third Party Security Requirements Policy

ISO Information Security Management Systems Foundation

Performing Effective Risk Assessments Dos and Don ts

Information technology Security techniques Information security management systems Overview and vocabulary

INFORMATION TECHNOLOGY SECURITY STANDARDS

Information Security Management System Policy

Information Security Team

Information Security Management System Information Security Policy

UoB Risk Assessment Methodology

Guidance on Risk Analysis Requirements under the HIPAA Security Rule

CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data

Guidelines 1 on Information Technology Security

Methods Commission CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS. 30, rue Pierre Semard, PARIS

INFORMATION SECURITY California Maritime Academy

NSW Government Digital Information Security Policy

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

A Structured Comparison of Security Standards

How To Study Information Security

Information Security: Business Assurance Guidelines

HIPAA Security. 6 Basics of Risk Analysis and Risk Management. Security Topics

RISK MANAGEMENT FOR INFRASTRUCTURE

1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services

DRAFT ÖNORM ISO/IEC 27005

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

ISO Controls and Objectives

FINAL May Guideline on Security Systems for Safeguarding Customer Information

UTech Services Compliance, Auditing, Risk, and Security (CARS) Team Charter

ISO27001 Controls and Objectives

Risk Management Guide for Information Technology Systems. NIST SP Overview

অপন র গ র ত বপ র ণ মত মত ননম ননন ত ই-মমইল ম রর কর য ল

INFORMATION SECURITY Humboldt State University

Virginia Commonwealth University School of Medicine Information Security Standard

Information Security Program

The potential legal consequences of a personal data breach

CITY UNIVERSITY OF HONG KONG Information Security Incident Management Standard

NSW Government Digital Information Security Policy

NIST National Institute of Standards and Technology

UF Risk IT Assessment Guidelines

BUDGET LETTER PEER-TO-PEER FILE SHARING , , EXECUTIVE ORDER S-16-04

Information Security for Managers

PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA

Politique de sécurité de l information Information Security Policy

Information Security Managing The Risk

An Executive Overview of GAPP. Generally Accepted Privacy Principles

Information Governance Strategy & Policy

How small and medium-sized enterprises can formulate an information security management system

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii

a Medical Device Privacy Consortium White Paper

Practical Overview on responsibilities of Data Protection Officers. Security measures

INFORMATION SECURITY PROCEDURES

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES

ITIL and Business Continuity (Service Perspective)

Chapter 4 Information Security Program Development

Information Security Incident Management Process

07/2013. Specific Terms and Conditions Mobile Device Management

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

Guidance on data security breach management

Data Security Incident Response Plan. [Insert Organization Name]

Road map for ISO implementation

Ohio Supercomputer Center

University of Sunderland Business Assurance Information Security Policy

Part A OVERVIEW Introduction Applicability Legal Provision...2. Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...

Managing e-health data: Security management. Marc Nyssen Medical Informatics VUB Master in Health Telematics KIST

What is required of a compliant Risk Assessment?

2008 by Bundesamt für Sicherheit in der Informationstechnik (BSI) Godesberger Allee , Bonn

Development, Acquisition, Implementation, and Maintenance of Application Systems

Ensuring Cloud Security Using Cloud Control Matrix

Network Security: Policies and Guidelines for Effective Network Management

Information Services IT Security Policies B. Business continuity management and planning

HIPAA Security Risk Analysis and Risk Management Methodology with Step-by-Step Instructions

Information Security Awareness Training

Information Technology Security Training Requirements APPENDIX A. Appendix A Learning Continuum A-1

Risk-Based Assessment and Scoping of IV&V Work Related to Information Assurance Presented by Joelle Spagnuolo-Loretta, Richard Brockway, John C.

TABLE OF CONTENTS INTRODUCTION... 1

Is it Time to Trust the Cloud? Unpacking the Notorious Nine

Guidance on data security breach management

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two

Q: What is CVSS? Q: Who developed CVSS?

Advantages and Disadvantages of Quantitative and Qualitative Information Risk Approaches

How To Understand The Importance Of Internal Control

Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. Session Objectives. Introduction Tom Walsh

NEEDS BASED PLANNING FOR IT DISASTER RECOVERY

How To Manage A Financial Institution

Dodging Breaches from Dodgy Vendors: Tackling Vendor Risk Management in Healthcare

Outsourcing and third party access

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies

Transcription:

Information security risk management using ISO/IEC 27005:2008 Hervé Cholez / Sébastien Pineau Centre de Recherche Public Henri Tudor herve.cholez@tudor.lu sebastien.pineau@tudor.lu March, 29 th 2011 1

Objectives ISO/IEC 27005 is a standard that propose a way to manage information security risks, particularly in the context of the implementation of an ISMS* (ISO/IEC 27001) ISO/IEC 27005 is not a method, just a guide For the moment... discussions in progress! * ISMS: Information Security Management System 2

Risk? Risk = (Threat * Vulnerability * Impact) Vulnerability: intrinsic to the object or situation Threat: probability of occurrence of an (external) event exploiting the vulnerability Impact: consequence Example: burglary in your house Vulnerability: your home keys under your carpet Threat: a burglar comes along... Impact: loss of your money, your TV, etc. 3

Information Security Risk? (1/3) potential that a given threat will exploit vulnerabilities of an asset or group of assets and thereby cause harm to the organization Threat exploits Vulnerability causes Impact concerns Asset 4

Information Security Risk? (2/3) Asset anything that has value to the organization Primary: business processes and activities, information Support: hardware, software, network, personal, facilities Threat Potential cause of an unwanted incident, which may result in harm to a system or organization Source of the risk, possible attack 3 kinds Accidental (unintentional human action) Deliberate (voluntary human action) Environmental (non-human action) 5

Information Security Risk? (3/3) Vulnerability weakness of an asset (or control) that can be exploited by a threat Impact adverse change to the level of business objectives achieved Consequence of the risk on the system or organization Generally expressed in terms of: Confidentiality Integrity Availability 6

Impacts? Confidentiality property that information is not made available or disclosed to unauthorized individuals, entities or processes Integrity internal disclosure, external disclosure... property of protecting the accuracy and completeness of assets Availability accidental modification, deliberate modification, incorrect results, incomplete results property of being accessible and usable upon demand by an authorized entity performance degradation, short-term/long-term interruption, total loss (destruction) 7

Information security risk management (ISRM)? The total process of identifying, controlling, and eliminating or minimizing uncertain events that may affect IT system resources [ISO/IEC 13335-1] 3 objectives Improve information system security Justify information system security budget Prove the credibility of the information system using the analysis performed 8

ISO/IEC 27005 Information technology Security techniques Information security risk management 9

Tudor s activities FOURNISSEURS WEB Audit à blanc 27001 Implémentation d un SMSI Guide d implémentation 27001 + templates Formation(s) 27001 Maturer/Packager Analyse écarts 27001 Maturer/Packager Gestion des risques Outil de gestion des risques (27005 EBIOS) Formation gestion des risques (27005) Décliner en niveaux/packager Décliner en niveaux/packager SaaS Définition d'une Politique de sécurité Méthodologie + template Toolbox Maturer/Packager Evaluation de la maturité en sécurité de l information Méthodologie + outil de mesure Décliner en niveaux/packager 10

Process 11

Process 12

Context establishment Basic Criteria The scope and boundaries Organization for IRSM 13

Context establishment > Basic Criteria Risk evaluation criteria Impact criteria Risk acceptance criteria These criteria are specific to a given organization/system, to a given study, etc. 14

Context establishment > Basic Criteria > Risk evaluation criteria (1) Depends on The strategic value of the business information process The criticality of the information assets involved Legal and regulatory requirements, and contractual obligations Operational and business importance of CIA Stakeholders expectations and perceptions, and negative consequences for goodwill and reputation Enables to prioritize risks 15

Context establishment > Basic Criteria > Risk evaluation criteria (2) Examples Financial Risk level 0 Loss < 1000 Unimportant risk 1 1000 < Loss < 5000 Risk affecting the internal operation 2 5000 < Loss < 10000 Risk affecting customers 3 Loss > 10000 Risk Goal: Clear differentiation between levels Unambiguous interpretation 16

Context establishment > Basic Criteria > Impact criteria (1) Cost per security incident, considering Level of classification of the impacted information asset Breaches of information security (e.g. Loss of CIA) Loss of business and financial value Disruption of plans and deadlines Damage of reputation Breaches of legal, regulatory or contractual requirements 17

Context establishment > Basic Criteria > Impact criteria (2) Example Confidentiality Integrity Availability 0 Public No constraint No constraint 1 Restricted Change visible Unavailable 1 week/year 2 Very restricted Change reduced Unavailable 1 day/year 3 Secret Can not be altered Always available Goal: Clear differentiation between levels Unambiguous interpretation 18

Context establishment > Basic Criteria > Likelihood of risk Threat Explanation 1 Very unlikely, according to statistics, or the cost or level of expertise required 2 May happen from time to time 3 Very likely easier to implement, no investment or special expertise Vulnerability Explanation 0 Very low: measures in place effective against the threat 1 Medium: measures insufficient or inappropriate 2 High: no effective protection measures in place 3 Very high: lack of measures, or obsolete or irrelevant 19

Context establishment > Basic Criteria > Risk acceptance criteria (1) Formula: Risk level = max(concerned impact) * (threat + vulnerability 1) Max(I) * (T+V-1) 0 1 2 3 4 5 0 0 0 0 0 0 0 1 0 1 2 3 4 5 2 0 2 4 6 8 10 3 0 3 6 9 12 15 20

Example Context establishment > Basic Criteria > Risk acceptance criteria (2) An unacceptable risk is: A very likely risk Threat = 3 With inadequate or inappropriate measures Vulnerability = 1 And whose asset value is 3 Impact = 3 RL = 3 * (3 + 1-1) = 9 Max(I) * (T+V-1) 0 1 2 3 4 5 0 0 0 0 0 0 0 1 0 1 2 3 4 5 2 0 2 4 6 8 10 3 0 3 6 9 12 15 21

Context establishment > Basic Criteria > The scope and boundaries Generally the first step (chronologically) Definition of: Activity, processes to take into account Objectives Study borders (geographically, logically,...) Legal constraints Etc. 22

Context establishment > Basic Criteria > Organization for ISRM Roles and responsibilities definition for the risk management process Must be documented 23

Process 24

Risk assessment Risk analysis Risk identification Risk estimation Risk evaluation 25

Risk assessment > Risk identification > Asset identification (1) Primary asset identification business processes and activities, information Support assets identification (and mapping) Hardware, software, networking, people, facilities Knowledge bases available (e.g. EBIOS method) For each asset Owner identification Value determination Qualitative, quantitative, semi quantitative 26

Risk assessment > Risk identification > Asset identification (2) For each asset, impact determination Based on impact criteria if criteria X of asset A is not fulfil, the impact would be... Confidentiality Integrity Availability 0 Public No constraint No constraint 1 Restricted Change visible Unavailable 1 week/year 2 Very restricted Change reduced Unavailable 1 day/year 3 Secret Can not be altered Always available 27

Knowledge bases Risk assessment > Risk identification > Threat and vulnerabilities identification Interviews, brainstorming Expert analysis Take into account controls already in place (vulnerabilities) For threats, take into account: Deliberate Accidental 28

Risk assessment > Risk estimation Risk = (Threat * Vulnerability * Impact) Use of the formula Risk level = max(concerned impact) * (threat + vulnerability 1) Value for each identified risk 29

Risk evaluation Comparison Obtained risk levels from risk assessment Defined risk acceptance levels Max(I) * (T+V-1) 0 1 2 3 4 5 0 0 0 0 0 0 0 1 0 1 2 3 4 5 2 0 2 4 6 8 10 3 0 3 6 9 12 15 30

Process 31

Risk treatment 4 choices Risk Reduction Risk treatment Risk Retention Risk Avoidance Risk Reduction Risk Retention Risk Avoidance Risk Transfer Risk Transfer Can be combined Results on a risk treatment plan 32

Risk treatment > Risk reduction Controls (measures) are implemented to reduce the risk It generally affects the vulnerability ISO/IEC 27002 proposes a set of controls Constraints for risk reduction exist Time, financial, technical, etc... 33

Risk treatment > Risk retention Risk is accepted Nothing is done to reduce it Generally when risk level is less than risk acceptance value But can be decided when risk is greater than risk acceptance value Negative ROSI Risk-taking 34

Risk treatment > Risk avoidance Risk is refused business function cancelled Generally if the risk is too high and that no costeffective solution is found 35

Risk treatment > Risk transfer Risk is transferred or shared with third party Outsourcing Insurance Generally for high impact risks with low occurrence Can create other risks or modify existing risks Transfer the responsibility to manage the risk but not the liability of an impact 36

Process 37

Risk acceptance Risks effectively treated Review of the risk treatment Validation of selected solutions Selection of residual risks Residual risks Accepting a number of risks that can consider itself unable to deal, or are acceptable to the organization 38

Process 39

Risk communication Continuous step Obtain and communicate with all the stakeholders Collect information on risks and security Share risk assessment results Present risk treatment plan Awareness Etc. 40

Process 41

Risk monitoring and review Continuous step Risks are constantly changing, all risk equation elements must be tracked! New assets New threats New vulnerabilities Incidents Etc. Minor changes vs. major changes 42

Thanks for your attention! Any questions? jocelyn.aubert@tudor.lu 43