SlideShare uma empresa Scribd logo
1 de 23
Information Systems Risk
Assessment Framework
(ISRAF)
(Addendum of NIST 800-39 information systems risk
management and revision of NIST SP 800 30 )




                              Prepared by
                              S. Periyakaruppan
                              (PK)
Need of Addendum/ Revision ?

   Ensure converged & integrated process
   Address the challenges in traditional approach
   Adaptive & Modular working model of information systems risk
    assessment.
   Improve the organizations risk based decision.
   Bring in value addition to business
Should It get transformed ? ! Why

   To make risk management an integral part of business and project
    management, IT Life cycle management.
   TO facilitate with practical approach to address risk.
   To Evolve business aligned approach.
   TO tailor down the model of domain agnostic approach.
Does it need a Model/Framework
     ??
   Evolve descriptive process and systematic thinking.
   Emerging business demand and process convergence
   Enhance communication among functional entities.
   Invoke result oriented approach
   Predict results in the systematic model




             !!!!!!! ???
Assessing risk – What & Why
   To identify the potential opportunity of a probable consequence of an
    adverse impact due to a weakness in the information systems.
   To support business with risk based decision.
   To identify external and internal threat exposures to an organization
    from nation and another organization, vice versa.
   To monitor the on-going risk exposure of the organization.
   To observe the effectiveness of information security program.
   To assist with Metrics for information security program management.




                                  ???????
Assessing risks - When
   During architecture development –( Org,process & Information
    system)
   During functional and business systems integration.
   During all phases of SDLC (Systems acquisition and development life
    cycle)
   During acquisition of new security or business/function solution.
   During modification of mission critical/business critical systems.
   During third party vendor/product acquisition.
   During decommissioning of systems/functions/groups of the
    organization
Risk framing  Model ???
   Determine the uncertainty of the risk and associated risk
    constraints.
   Define the risk tolerance and priority, and tradeoffs.
   Determine the set of risk factors, assessment scale and associated
    algorithm for combing factors
   Assist in precise risk communication and sketch out boundaries of
    information system authorization.
   Enhance the risk decision with appropriate information.
   Incorporate de-duplication in hierarchical risk management model.
   Determine the context of the entire risk assessment
    process/assessment/approach.
The Model/Framework
                                                      Frame
                                                    (CONTEXT)

         Tier 1


    Tier 2


Tier 3




             The Frame work addresses comprehensive risk management
             function in a hierarchical approach and leverage context centric
             approach.
The Focus

       Assess                  Respond              Monitor



Risk Assessment is a key element of risk
management

 Risk Assessment process in modular approach.
 Preparation checklist.
 Activity checklist.
 Protocol to maintain appropriate result of risk
  assessments.
 Method of communicating risk results across
  organization.
Strategy/Approach
Risk – Key concepts
   Risk aggregate  consolidation of individual Tier1/Tier2/Tier3 risks
    in to a cumulative risks to identify relationship among risks at various
    levels.
   Threat shifting the dynamic variation on threat source in response
    to the perceived countermeasures.
   Residual risk  Tolerable risk remain post the mitigation to an exten
    possible to reduce the level of adverse impact to the organization.
   Adversarial risk Risk that has an adverse effect by adversarial
    threats.
   Adversarial threats  Threat has an intrinsic characteristics of direc
    adverse impact. – Ex., business operation interruption.
   Non-adversarial threats  Threats has no direct or immediate effect
    of a threat impact. – Ex., Exposure of system errors, competitive
    intelligence gathering.
Risk – Key Factors
   Threat Event  Possible adverse impact through a potential
    circumstances/event to organization from national and
    another organization, vice versa.
   Threat source The intend and the method of exploitation
    or attack vector.
   Likelihood  The Probability of a threat become reality.
   Vulnerability  Flaw in an information system that can lead
    to a potential threat.
   Adverse Impact  The negative consequences /damage
    leads to potential impact to the business / organization/
    nation by the consequences of an exercised vulnerability
   Predisposing condition  The existing and known lack of
    controls/ in adequate countermeasures as part of available
    solution.
   Risk  Measure/ Unit of the extent to which an entity is
    threaten by a potential circumstances.
Assessing Risk – High Level
  Process


Step -1   Step -2   Step -3   Step -4
Prepare for Assessment
Conducting Assessment
 Identify Threat source and          Step 1   Intent,Target,Capability
 events                                       Capability of
                                              adversaries
                                              Range of effects
 Identify vulnerabilities and pre-   Step 2   Effect of existing
 disposing conditions                         controls
                                              Intentional/accidental
                                              flaw /weakness in
 Determine likelihood of             Step 3
                                              system/process
 Occurrence
                                              Depends on the degree
                                              of Step 1 and the effect
 Determine Magnitude of              Step 4   of Step 2
 Impact
                                              Result of BIA
                                              Depends on effective
                                     Step 5   BCP/DR
 Determine Risk
                                              MTTR/MTBF
                                              RTO/RPO

Risk  Combination of Step 3 and
Step 4
Method of Risk Analysis


Threat oriented              Vulnerability                Asset/Impact
• Identify threat source     oriented                     Oriented
  and event                  • Identify pre-disposing     • Identify
• Developing Threat            conditions                   mission/business
  scenario and model         • Identify exploitable         critical assets
• Identify vulnerabilities     vulnerabilities            • Analyze the
  in context of threats      • Identify threats related     consequences of the
                               to the known/open            adversarial threat
                               vulnerabilities              event
                                                          • Identify vulnerabilities
                                                            to the threat
                                                            events/scenario of
                                                            critical assets with
                                                            severe adverse impact.
Method of Risk Assessments
                    • Objective oriented assessment
                    • Using non-numerical values to define risk
                      factors
   Qualitative      • Likelihood and impact with definite value based
                      on individual expertise



                    • Subjective oriented approach
                    • Using numerical values to define risk factors
  Quantitative      • Likelihood and impact with definite number
                      based on history of events.




                    • Contextual analysis and result oriented
                      approach
                    • Using Bin values (numerical range) with unique
Semi Quantitative     meaning and context.
                    • Likelihood and impact derived with range of
                      numerical values with degree of unique context
Sample Assessment Scale
Qualitative           Quantitative               Semi Qualitative




    Caution: The assessment scales and its descriptive meanings are subject
    to vary between organization to organization and with in organization
    discretion to the organizational culture and its policies and guidelines
Communicate Result
                             Communicate to the         Furnish evidence
     Determine the
                                 designated                comply with
  appropriate method of
                               organizational         organizational policies
     communication
                                stakeholders              & Guidelines




Format defined by          Identify appropriate      Capture appropriate
organization.               authority.                 analysis data support
Executive briefings        Ensure right              the result.
Presenting                 information reach right    Include applicable
Illustrative risk figures   person at right time.      supporting documents
Risk Assessment             Present contextual       to convey the degree
Dashboards                  information in             of results
Out sketch the             accordance with risk        Identify and
organizational              strategy                   document the source
prioritized risk                                       of internal and external
                                                       information.
Maintain Risk Posture

                                          Reconfirm the
 Identify Key Risk   Define Frequency
                                           scope and
      factors             of revisit
                                          assumptions
• Monitor the key    • Track the risk   • Get the
  risk factors         response as        concurrence of
• Document the         required           scope and
  variations.        • Initiate the       assumptions
• Re-define the        assessment         from appropriate
  key risk factors     when needed        authorities
                     • Communicate      • Document the
                       the results to     plan of action
                       organizational     with respect to
                       entities           the risk
                                          response.
Applications of Risk
Assessment      Information Risk Strategy decisions
                Contribute EA design decisions
                IS Policy/Program/Guidance decisions
                Common Control/Security Standards
                decisions.
                Help risk response –
                Avoid/Accept/Mitigate/Transfer
                Investment decisions – ROSI(Returns Of
                Security Investments)/VAR(value at
                Risk)/ALE(Annual Loss Expectancy)

                Support EA(Enterprise Architecture)
                integration in to SA.
                Assist in business/function information
                continuity decisions
                Assist in business process resiliency
                requirements



                 Contribute IS systems design decisions
                 Supports vendor/product decisions
                 Supports on-going system operations
                 authorizations
Risk Assessment in RMF life
Cycle
             1




                     2

    6



                         3


        5


                 4
Organizational cultural effects on
     Risk assessment

   Risk models differ based on priorities and tradeoffs with respect to
    the pre-disposing condition of organizational culture
   Determination of risk factors and valuation of risk factors to constant
    values or qualitative approach depends on organizational culture
   Determination of risk assessment approach and analysis approach
    depends on organizational culture.
   Assessment and analysis approach may vary with in organization in
    different tiers.

Mais conteúdo relacionado

Mais procurados

Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...PECB
 
Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guideJoAnna Cheshire
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
Security risk management
Security risk managementSecurity risk management
Security risk managementG Prachi
 
Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Third-Party Risk Management (TPRM) | Risk Assessment QuestionnairesThird-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Third-Party Risk Management (TPRM) | Risk Assessment QuestionnairesCorporater
 
Risk and Control Self Assessment - IRM India Affiliate
Risk and Control Self  Assessment - IRM India AffiliateRisk and Control Self  Assessment - IRM India Affiliate
Risk and Control Self Assessment - IRM India AffiliateIRM India Affiliate
 
Risk Assessment: Creating a Risk Matrix
Risk Assessment: Creating a Risk MatrixRisk Assessment: Creating a Risk Matrix
Risk Assessment: Creating a Risk MatrixEtQ, Inc.
 
Integrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementIntegrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementPriyanka Aash
 
Operational risk management and measurement
Operational risk management and measurementOperational risk management and measurement
Operational risk management and measurementRahmat Mulyana
 
Risk Assessment Step Powerpoint Presentation Slides
Risk Assessment Step Powerpoint Presentation SlidesRisk Assessment Step Powerpoint Presentation Slides
Risk Assessment Step Powerpoint Presentation SlidesSlideTeam
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanDr David Probert
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceCharles Lim
 
Operational risk management (orm)
Operational risk management (orm)Operational risk management (orm)
Operational risk management (orm)Bushra Angbeen
 
Supply Chain Risk Management - riskmethods
Supply Chain Risk Management - riskmethodsSupply Chain Risk Management - riskmethods
Supply Chain Risk Management - riskmethodsHeiko Schwarz
 
Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approachtschraider
 

Mais procurados (20)

Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
 
Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guide
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Third-Party Risk Management (TPRM) | Risk Assessment QuestionnairesThird-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires
 
Risk and Control Self Assessment - IRM India Affiliate
Risk and Control Self  Assessment - IRM India AffiliateRisk and Control Self  Assessment - IRM India Affiliate
Risk and Control Self Assessment - IRM India Affiliate
 
Risk Assessment: Creating a Risk Matrix
Risk Assessment: Creating a Risk MatrixRisk Assessment: Creating a Risk Matrix
Risk Assessment: Creating a Risk Matrix
 
Integrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementIntegrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk Management
 
Operational risk management and measurement
Operational risk management and measurementOperational risk management and measurement
Operational risk management and measurement
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
 
Risk Assessment Step Powerpoint Presentation Slides
Risk Assessment Step Powerpoint Presentation SlidesRisk Assessment Step Powerpoint Presentation Slides
Risk Assessment Step Powerpoint Presentation Slides
 
Introduction to Risk Management
Introduction to Risk ManagementIntroduction to Risk Management
Introduction to Risk Management
 
ISO 27001
ISO 27001ISO 27001
ISO 27001
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action Plan
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
Operational risk management (orm)
Operational risk management (orm)Operational risk management (orm)
Operational risk management (orm)
 
Supply Chain Risk Management - riskmethods
Supply Chain Risk Management - riskmethodsSupply Chain Risk Management - riskmethods
Supply Chain Risk Management - riskmethods
 
Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approach
 

Destaque

A Method for Evaluating End-User Development Technologies
A Method for Evaluating End-User Development TechnologiesA Method for Evaluating End-User Development Technologies
A Method for Evaluating End-User Development TechnologiesClaudia Melo
 
Strategic information system management
Strategic information system managementStrategic information system management
Strategic information system managementPragnya Sahoo
 
Supply Chain Management
Supply Chain ManagementSupply Chain Management
Supply Chain ManagementAnupam Basu
 
System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)BPalmer13
 
A Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System RiskA Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System Riskamiable_indian
 
Challenge of Outsourcing
Challenge of OutsourcingChallenge of Outsourcing
Challenge of OutsourcingNascenia IT
 
Characterization of strategic information systems
Characterization of strategic information systemsCharacterization of strategic information systems
Characterization of strategic information systemsSuresh Kumar
 
End user development
End user developmentEnd user development
End user developmentgavhays
 
Make or buy, insourcingoutsourcing
Make or buy, insourcingoutsourcingMake or buy, insourcingoutsourcing
Make or buy, insourcingoutsourcingAnkit
 
Chapter 6 Information System-Critical Success Factor
Chapter 6 Information System-Critical Success FactorChapter 6 Information System-Critical Success Factor
Chapter 6 Information System-Critical Success FactorSanat Maharjan
 
Strategic information system
Strategic information system Strategic information system
Strategic information system Megha_pareek
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and RisksMiguel Rebollo
 
Information system and security control
Information system and security controlInformation system and security control
Information system and security controlCheng Olayvar
 
Outsourcing introduction & issues
Outsourcing introduction & issuesOutsourcing introduction & issues
Outsourcing introduction & issuesnishant_ns
 

Destaque (20)

A Method for Evaluating End-User Development Technologies
A Method for Evaluating End-User Development TechnologiesA Method for Evaluating End-User Development Technologies
A Method for Evaluating End-User Development Technologies
 
Make or buy diagram
Make or buy diagramMake or buy diagram
Make or buy diagram
 
Strategic information system management
Strategic information system managementStrategic information system management
Strategic information system management
 
Make or Buy
Make or BuyMake or Buy
Make or Buy
 
Outsource
OutsourceOutsource
Outsource
 
Supply Chain Management
Supply Chain ManagementSupply Chain Management
Supply Chain Management
 
Outsourcing
OutsourcingOutsourcing
Outsourcing
 
System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)
 
A Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System RiskA Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System Risk
 
Challenge of Outsourcing
Challenge of OutsourcingChallenge of Outsourcing
Challenge of Outsourcing
 
Characterization of strategic information systems
Characterization of strategic information systemsCharacterization of strategic information systems
Characterization of strategic information systems
 
End user development
End user developmentEnd user development
End user development
 
Make or buy, insourcingoutsourcing
Make or buy, insourcingoutsourcingMake or buy, insourcingoutsourcing
Make or buy, insourcingoutsourcing
 
Chapter 6 Information System-Critical Success Factor
Chapter 6 Information System-Critical Success FactorChapter 6 Information System-Critical Success Factor
Chapter 6 Information System-Critical Success Factor
 
End user development
End user developmentEnd user development
End user development
 
Strategic information system
Strategic information system Strategic information system
Strategic information system
 
Outsourcing Ppt 1
Outsourcing Ppt 1Outsourcing Ppt 1
Outsourcing Ppt 1
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
 
Information system and security control
Information system and security controlInformation system and security control
Information system and security control
 
Outsourcing introduction & issues
Outsourcing introduction & issuesOutsourcing introduction & issues
Outsourcing introduction & issues
 

Semelhante a Information systems risk assessment frame workisraf 130215042410-phpapp01

Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).pptAjjuSingh2
 
Risk Management Overview
Risk Management OverviewRisk Management Overview
Risk Management OverviewJIGNESH PADIA
 
Risk Management And Communication Maps
Risk Management And Communication MapsRisk Management And Communication Maps
Risk Management And Communication MapsJonelle Hilleary
 
Quantitative Techniques and Concepts in Finance
Quantitative Techniques and Concepts in FinanceQuantitative Techniques and Concepts in Finance
Quantitative Techniques and Concepts in FinanceRoselle Fuentes
 
Session 02 Risk Assessment Program for YSP_The Risk Assessment Process
Session 02 Risk Assessment Program for YSP_The Risk Assessment ProcessSession 02 Risk Assessment Program for YSP_The Risk Assessment Process
Session 02 Risk Assessment Program for YSP_The Risk Assessment ProcessMuizz Anibire
 
Crash Course: Managing Cyber Risk Using Quantitative Analysis
Crash Course: Managing Cyber Risk Using Quantitative AnalysisCrash Course: Managing Cyber Risk Using Quantitative Analysis
Crash Course: Managing Cyber Risk Using Quantitative Analysis"Apolonio \"Apps\"" Garcia
 
Final Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptxFinal Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptxGeorgeKabongah2
 
ICH Q9 QUALITY RISK MANAGEMENT(QRM)
ICH Q9 QUALITY RISK MANAGEMENT(QRM)ICH Q9 QUALITY RISK MANAGEMENT(QRM)
ICH Q9 QUALITY RISK MANAGEMENT(QRM)saimsoleja
 
In the risk prioritization step, the overall set of identified risk .pdf
In the risk prioritization step, the overall set of identified risk .pdfIn the risk prioritization step, the overall set of identified risk .pdf
In the risk prioritization step, the overall set of identified risk .pdfannaelctronics
 
Chapter 1 risk management (3)
Chapter 1  risk management (3)Chapter 1  risk management (3)
Chapter 1 risk management (3)rafeeqameen
 
Risk management standard_030820
Risk management standard_030820Risk management standard_030820
Risk management standard_030820minhaj52
 
Risk management standard_030820
Risk management standard_030820Risk management standard_030820
Risk management standard_030820Vijay Kejriwal
 
Risk management standard
Risk management standardRisk management standard
Risk management standardLuis Vitiritti
 
Risk management standard_030820
Risk management standard_030820Risk management standard_030820
Risk management standard_030820Tim Smith
 

Semelhante a Information systems risk assessment frame workisraf 130215042410-phpapp01 (20)

Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).ppt
 
Risk Management Overview
Risk Management OverviewRisk Management Overview
Risk Management Overview
 
Risk Management And Communication Maps
Risk Management And Communication MapsRisk Management And Communication Maps
Risk Management And Communication Maps
 
Risk Assessment and Management
Risk Assessment and ManagementRisk Assessment and Management
Risk Assessment and Management
 
Quantitative Techniques and Concepts in Finance
Quantitative Techniques and Concepts in FinanceQuantitative Techniques and Concepts in Finance
Quantitative Techniques and Concepts in Finance
 
Session 02 Risk Assessment Program for YSP_The Risk Assessment Process
Session 02 Risk Assessment Program for YSP_The Risk Assessment ProcessSession 02 Risk Assessment Program for YSP_The Risk Assessment Process
Session 02 Risk Assessment Program for YSP_The Risk Assessment Process
 
ADCB Presentation - MENA Bank Tech June 2014 v2
ADCB Presentation - MENA Bank Tech June 2014 v2ADCB Presentation - MENA Bank Tech June 2014 v2
ADCB Presentation - MENA Bank Tech June 2014 v2
 
Crash Course: Managing Cyber Risk Using Quantitative Analysis
Crash Course: Managing Cyber Risk Using Quantitative AnalysisCrash Course: Managing Cyber Risk Using Quantitative Analysis
Crash Course: Managing Cyber Risk Using Quantitative Analysis
 
Final Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptxFinal Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptx
 
Dj24712716
Dj24712716Dj24712716
Dj24712716
 
ICH Q9 QUALITY RISK MANAGEMENT(QRM)
ICH Q9 QUALITY RISK MANAGEMENT(QRM)ICH Q9 QUALITY RISK MANAGEMENT(QRM)
ICH Q9 QUALITY RISK MANAGEMENT(QRM)
 
Lecture2.pptx
Lecture2.pptxLecture2.pptx
Lecture2.pptx
 
Risk Health Check
Risk Health CheckRisk Health Check
Risk Health Check
 
In the risk prioritization step, the overall set of identified risk .pdf
In the risk prioritization step, the overall set of identified risk .pdfIn the risk prioritization step, the overall set of identified risk .pdf
In the risk prioritization step, the overall set of identified risk .pdf
 
Chapter 1 risk management (3)
Chapter 1  risk management (3)Chapter 1  risk management (3)
Chapter 1 risk management (3)
 
Risk management standard_030820
Risk management standard_030820Risk management standard_030820
Risk management standard_030820
 
Risk management standard_030820
Risk management standard_030820Risk management standard_030820
Risk management standard_030820
 
Risk management standard
Risk management standardRisk management standard
Risk management standard
 
Risk management standard_030820
Risk management standard_030820Risk management standard_030820
Risk management standard_030820
 
Risk management standard_030820
Risk management standard_030820Risk management standard_030820
Risk management standard_030820
 

Mais de S Periyakaruppan CISM,ISO31000,C-EH,ITILF (6)

E payment security – pci dss
E payment security – pci dssE payment security – pci dss
E payment security – pci dss
 
Software compliance
Software complianceSoftware compliance
Software compliance
 
Software compliance
Software complianceSoftware compliance
Software compliance
 
IT Infrastrucutre Security
IT Infrastrucutre SecurityIT Infrastrucutre Security
IT Infrastrucutre Security
 
Security Information and Event Managemen
Security Information and Event ManagemenSecurity Information and Event Managemen
Security Information and Event Managemen
 
Information technology Vs Information security
Information technology Vs Information securityInformation technology Vs Information security
Information technology Vs Information security
 

Information systems risk assessment frame workisraf 130215042410-phpapp01

  • 1. Information Systems Risk Assessment Framework (ISRAF) (Addendum of NIST 800-39 information systems risk management and revision of NIST SP 800 30 ) Prepared by S. Periyakaruppan (PK)
  • 2. Need of Addendum/ Revision ?  Ensure converged & integrated process  Address the challenges in traditional approach  Adaptive & Modular working model of information systems risk assessment.  Improve the organizations risk based decision.  Bring in value addition to business
  • 3. Should It get transformed ? ! Why  To make risk management an integral part of business and project management, IT Life cycle management.  TO facilitate with practical approach to address risk.  To Evolve business aligned approach.  TO tailor down the model of domain agnostic approach.
  • 4. Does it need a Model/Framework ??  Evolve descriptive process and systematic thinking.  Emerging business demand and process convergence  Enhance communication among functional entities.  Invoke result oriented approach  Predict results in the systematic model !!!!!!! ???
  • 5. Assessing risk – What & Why  To identify the potential opportunity of a probable consequence of an adverse impact due to a weakness in the information systems.  To support business with risk based decision.  To identify external and internal threat exposures to an organization from nation and another organization, vice versa.  To monitor the on-going risk exposure of the organization.  To observe the effectiveness of information security program.  To assist with Metrics for information security program management. ???????
  • 6. Assessing risks - When  During architecture development –( Org,process & Information system)  During functional and business systems integration.  During all phases of SDLC (Systems acquisition and development life cycle)  During acquisition of new security or business/function solution.  During modification of mission critical/business critical systems.  During third party vendor/product acquisition.  During decommissioning of systems/functions/groups of the organization
  • 7. Risk framing  Model ???  Determine the uncertainty of the risk and associated risk constraints.  Define the risk tolerance and priority, and tradeoffs.  Determine the set of risk factors, assessment scale and associated algorithm for combing factors  Assist in precise risk communication and sketch out boundaries of information system authorization.  Enhance the risk decision with appropriate information.  Incorporate de-duplication in hierarchical risk management model.  Determine the context of the entire risk assessment process/assessment/approach.
  • 8. The Model/Framework Frame (CONTEXT) Tier 1 Tier 2 Tier 3 The Frame work addresses comprehensive risk management function in a hierarchical approach and leverage context centric approach.
  • 9. The Focus Assess Respond Monitor Risk Assessment is a key element of risk management  Risk Assessment process in modular approach.  Preparation checklist.  Activity checklist.  Protocol to maintain appropriate result of risk assessments.  Method of communicating risk results across organization.
  • 11. Risk – Key concepts  Risk aggregate  consolidation of individual Tier1/Tier2/Tier3 risks in to a cumulative risks to identify relationship among risks at various levels.  Threat shifting the dynamic variation on threat source in response to the perceived countermeasures.  Residual risk  Tolerable risk remain post the mitigation to an exten possible to reduce the level of adverse impact to the organization.  Adversarial risk Risk that has an adverse effect by adversarial threats.  Adversarial threats  Threat has an intrinsic characteristics of direc adverse impact. – Ex., business operation interruption.  Non-adversarial threats  Threats has no direct or immediate effect of a threat impact. – Ex., Exposure of system errors, competitive intelligence gathering.
  • 12. Risk – Key Factors  Threat Event  Possible adverse impact through a potential circumstances/event to organization from national and another organization, vice versa.  Threat source The intend and the method of exploitation or attack vector.  Likelihood  The Probability of a threat become reality.  Vulnerability  Flaw in an information system that can lead to a potential threat.  Adverse Impact  The negative consequences /damage leads to potential impact to the business / organization/ nation by the consequences of an exercised vulnerability  Predisposing condition  The existing and known lack of controls/ in adequate countermeasures as part of available solution.  Risk  Measure/ Unit of the extent to which an entity is threaten by a potential circumstances.
  • 13. Assessing Risk – High Level Process Step -1 Step -2 Step -3 Step -4
  • 15. Conducting Assessment Identify Threat source and Step 1 Intent,Target,Capability events Capability of adversaries Range of effects Identify vulnerabilities and pre- Step 2 Effect of existing disposing conditions controls Intentional/accidental flaw /weakness in Determine likelihood of Step 3 system/process Occurrence Depends on the degree of Step 1 and the effect Determine Magnitude of Step 4 of Step 2 Impact Result of BIA Depends on effective Step 5 BCP/DR Determine Risk MTTR/MTBF RTO/RPO Risk  Combination of Step 3 and Step 4
  • 16. Method of Risk Analysis Threat oriented Vulnerability Asset/Impact • Identify threat source oriented Oriented and event • Identify pre-disposing • Identify • Developing Threat conditions mission/business scenario and model • Identify exploitable critical assets • Identify vulnerabilities vulnerabilities • Analyze the in context of threats • Identify threats related consequences of the to the known/open adversarial threat vulnerabilities event • Identify vulnerabilities to the threat events/scenario of critical assets with severe adverse impact.
  • 17. Method of Risk Assessments • Objective oriented assessment • Using non-numerical values to define risk factors Qualitative • Likelihood and impact with definite value based on individual expertise • Subjective oriented approach • Using numerical values to define risk factors Quantitative • Likelihood and impact with definite number based on history of events. • Contextual analysis and result oriented approach • Using Bin values (numerical range) with unique Semi Quantitative meaning and context. • Likelihood and impact derived with range of numerical values with degree of unique context
  • 18. Sample Assessment Scale Qualitative Quantitative Semi Qualitative Caution: The assessment scales and its descriptive meanings are subject to vary between organization to organization and with in organization discretion to the organizational culture and its policies and guidelines
  • 19. Communicate Result Communicate to the Furnish evidence Determine the designated comply with appropriate method of organizational organizational policies communication stakeholders & Guidelines Format defined by Identify appropriate Capture appropriate organization. authority. analysis data support Executive briefings Ensure right the result. Presenting information reach right Include applicable Illustrative risk figures person at right time. supporting documents Risk Assessment  Present contextual to convey the degree Dashboards information in of results Out sketch the accordance with risk  Identify and organizational strategy document the source prioritized risk of internal and external information.
  • 20. Maintain Risk Posture Reconfirm the Identify Key Risk Define Frequency scope and factors of revisit assumptions • Monitor the key • Track the risk • Get the risk factors response as concurrence of • Document the required scope and variations. • Initiate the assumptions • Re-define the assessment from appropriate key risk factors when needed authorities • Communicate • Document the the results to plan of action organizational with respect to entities the risk response.
  • 21. Applications of Risk Assessment Information Risk Strategy decisions Contribute EA design decisions IS Policy/Program/Guidance decisions Common Control/Security Standards decisions. Help risk response – Avoid/Accept/Mitigate/Transfer Investment decisions – ROSI(Returns Of Security Investments)/VAR(value at Risk)/ALE(Annual Loss Expectancy) Support EA(Enterprise Architecture) integration in to SA. Assist in business/function information continuity decisions Assist in business process resiliency requirements Contribute IS systems design decisions Supports vendor/product decisions Supports on-going system operations authorizations
  • 22. Risk Assessment in RMF life Cycle 1 2 6 3 5 4
  • 23. Organizational cultural effects on Risk assessment  Risk models differ based on priorities and tradeoffs with respect to the pre-disposing condition of organizational culture  Determination of risk factors and valuation of risk factors to constant values or qualitative approach depends on organizational culture  Determination of risk assessment approach and analysis approach depends on organizational culture.  Assessment and analysis approach may vary with in organization in different tiers.