SlideShare uma empresa Scribd logo
1 de 28
Baixar para ler offline
M. Febri Ramadlan
Introduction and implementation
OWASP Risk Rating Management
About Me
Mohammad Febri Ramadlan (Ebi) is open source and information security enthusiast.
Currently, He is IT Security Consultant in Indonesia
Ebi also join some community such as OWASP, Code Security, Fowab (Forum Web Anak Bandung)
Last of all, his hobbies is swimming, playing music, blogging, and part time travelling.
Contact Person:
: (+62) 81809809636
: mohammadfebrir@gmail.com
: mohammadfebriramadlan
: mohammadfebriramadlan
: mohammadfebri.r
: mohammadfebrir
Introduction OWASP
Risk Rating Methodology
Risk
• Risk is hazards, consequences that may occur as a result of an ongoing process or future
event.
• Risk factor:
1. Intervension
• bad habit
• life style
• bankrupt
2. Non-Intervension
• gen
• age
• sex
Risk Management
Risk management is management process that encompasses the identification,
evaluation and control of risk that may threaten the continuity of a business or a
company's activities.
General Objectives: reduce expenditure, prevent companies from failure, increase
corporate profits, reduce production costs and many things.
Risk Assessment
Risk Assessment is methods performed to determine whether an activity / risk has an
acceptable or not.
Good assessment should to be done by a trained team and experienced.
Each company or organization have variety of acceptance level.
Risk Rating Method
Many standard and guidance that will help you:
• Trike
• AS/NZS 4360:2004 Risk Management
• CVSS
• OCTAVE
• OWASP Risk Rating Methodology
OWASP Risk Rating Methodology
Let's start with the standard risk model:
Risk = Likelihood * Impact
How to use OWASP Risk Rating Methodology:
#Step 1: Identifying a Risk
#Step 2: Factors for Estimating Likelihood
#Step 3: Factors for Estimating Impact
#Step 4: Determining Severity of the Risk
#Step 5: Deciding What to Fix
#Step 6: Customizing Your Risk Rating Model
#Step 1: Identifying a Risk
The first step is:
to identify a security risk that needs to be rated.
#Step 2: Factors for Estimating Likelihood
There are a number of factors that can help determine the likelihood. The first set of
factors are related to the threat agent involved.
 Skill level
 Motive
 Opportunity
 Size
 Ease of discovery
 Ease of exploit
 Awareness
 Intrusion detection
#Step 3: Factors for Estimating Impact
Again, each factor has a set of options:
 Loss of confidentiality
 Loss of integrity
 Loss of availability
 Loss of accountability
 Financial damage
 Reputation damage
 Non-compliance
 Privacy violation
#Step 4: Determining the Severity of the Risk (1)
• Informal Method
Likelihood and Impact Levels
0 to < 3 low
3 to < 6 medium
6 to 9 high
#Step 4: Determining the Severity of the Risk (2)
• Repeatable Method
Likelihood
Skill
level
Motive Opportunity Size Ease of
discovery
Ease of
exploit
Awareness Intrusion
detection
Overall Likelihood
5 9 4 9 3 3 4 8
5.625 Medium
#Step 4: Determining the Severity of the Risk (2)
• Repeatable Method
Likelihood
Skill
level
Motive Opportunity Size Ease of
discovery
Ease of
exploit
Awareness Intrusion
detection
Overall Likelihood
5 9 4 9 3 3 4 8
5.625 Medium
#Step 4: Determining the Severity of the Risk (2)
• Repeatable Method (2)
Impact
Loss of
confidenti-
ality
Loss of
integrity
Loss of
availability
Loss of
account-
ability
Financial
damage
Reputation
damage
Non-
compliance
Privacy
violation
Overall Impact
5 7 7 7 7 9 7 7
7.0 High
#Step 4: Determining the Severity of the Risk (2)
• Repeatable Method (2)
Impact
Loss of
confidenti-
ality
Loss of
integrity
Loss of
availability
Loss of
account-
ability
Financial
damage
Reputation
damage
Non-
compliance
Privacy
violation
Overall Impact
5 7 7 7 7 9 7 7
7.0 High
#Step 4: Determining the Severity of the Risk (3)
• Determining Severity
Overall Risk Severity
IMPACT
High MEDIUM HIGH CRITICAL
Medium LOW MEDIUM HIGH
Low NOTE LOW MEDIUM
Low Medium High
LIKELIHOOD
#Step 4: Determining the Severity of the Risk (3)
• Determining Severity
Overall Risk Severity
IMPACT
High MEDIUM HIGH CRITICAL
Medium LOW MEDIUM HIGH
Low NOTE LOW MEDIUM
Low Medium High
LIKELIHOOD
#Step 5: Deciding What to Fix
After the risks to the application have been classified there will be a prioritized list of
what to fix.
As a general rule, the most severe risks should be fixed first. It simply doesn't help
the overall risk profile to fix less important risks, even if they're easy or cheap to fix.
Remember that not all risks are worth fixing, and some loss is not only expected, but
justifiable based upon the cost of fixing the issue.
#Step 6: Customizing the Risk Rating Model
Having a risk ranking framework that is customizable for a business is critical for
adoption.
 Adding factors
 Customizing options
 Weighting factors
Tools
1. OWASP Risk Rating Template (excel format)
https://www.owasp.org/images/5/5b/OWASP_Risk_Rating_Template_Example.xlsx
2. OWASP Risk Rating Calc (one website/domain)
https://gist.github.com/ErosLever/f72bc0750af4d2e75c3a
3. OWASP Risk Rating Management
(many website/domain)
https://github.com/mohammadfebrir/o
wasp-riskrating
//category set by OWASP Top 10 - 2013
//you can assesst many website as you want (dynamic)
Question?
Thank you..

Mais conteúdo relacionado

Semelhante a OWASP Risk Rating Management

Introduction to risk management
Introduction to risk managementIntroduction to risk management
Introduction to risk managementMukund Sreeram
 
Stop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudStop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudWynyard Group
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementWilliam McBorrough
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementWilliam McBorrough
 
Risk management
Risk managementRisk management
Risk managementTanvirrm32
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management Ersoy AKSOY
 
Cyber Security Challenges and Strategies
Cyber Security Challenges and StrategiesCyber Security Challenges and Strategies
Cyber Security Challenges and StrategiesTom Freer
 
Enterprise Risk Management & Fraud Sample Presentation
Enterprise Risk Management & Fraud Sample PresentationEnterprise Risk Management & Fraud Sample Presentation
Enterprise Risk Management & Fraud Sample PresentationAlexander Larsen
 
Its time to grow up by Eric C.
Its time to grow up by Eric C.Its time to grow up by Eric C.
Its time to grow up by Eric C.ISSA LA
 
2-iosh_powerpoint-ra-back-to-basics.pptx
2-iosh_powerpoint-ra-back-to-basics.pptx2-iosh_powerpoint-ra-back-to-basics.pptx
2-iosh_powerpoint-ra-back-to-basics.pptxwaleed50405
 
Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides SlideTeam
 
Risk Assessment Powerpoint Presentation Slides
Risk Assessment Powerpoint Presentation SlidesRisk Assessment Powerpoint Presentation Slides
Risk Assessment Powerpoint Presentation SlidesSlideTeam
 
practical-approach-to-strategic-risk-management-220318051837.pdf
practical-approach-to-strategic-risk-management-220318051837.pdfpractical-approach-to-strategic-risk-management-220318051837.pdf
practical-approach-to-strategic-risk-management-220318051837.pdfHany Farouk
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptAnkitSharma13479
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptKameswara Rao Poranki
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptnew617824
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptQuỳnh Nhi
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptaminrahman34
 
strategic-risk-management
strategic-risk-management strategic-risk-management
strategic-risk-management dollumehta1
 

Semelhante a OWASP Risk Rating Management (20)

Introduction to risk management
Introduction to risk managementIntroduction to risk management
Introduction to risk management
 
Stop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudStop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraud
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
Risk management
Risk managementRisk management
Risk management
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Cyber Security Challenges and Strategies
Cyber Security Challenges and StrategiesCyber Security Challenges and Strategies
Cyber Security Challenges and Strategies
 
Enterprise Risk Management & Fraud Sample Presentation
Enterprise Risk Management & Fraud Sample PresentationEnterprise Risk Management & Fraud Sample Presentation
Enterprise Risk Management & Fraud Sample Presentation
 
Its time to grow up by Eric C.
Its time to grow up by Eric C.Its time to grow up by Eric C.
Its time to grow up by Eric C.
 
Wisegate_GeekSpeak_LG
Wisegate_GeekSpeak_LGWisegate_GeekSpeak_LG
Wisegate_GeekSpeak_LG
 
2-iosh_powerpoint-ra-back-to-basics.pptx
2-iosh_powerpoint-ra-back-to-basics.pptx2-iosh_powerpoint-ra-back-to-basics.pptx
2-iosh_powerpoint-ra-back-to-basics.pptx
 
Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides
 
Risk Assessment Powerpoint Presentation Slides
Risk Assessment Powerpoint Presentation SlidesRisk Assessment Powerpoint Presentation Slides
Risk Assessment Powerpoint Presentation Slides
 
practical-approach-to-strategic-risk-management-220318051837.pdf
practical-approach-to-strategic-risk-management-220318051837.pdfpractical-approach-to-strategic-risk-management-220318051837.pdf
practical-approach-to-strategic-risk-management-220318051837.pdf
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.ppt
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.ppt
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.ppt
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.ppt
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.ppt
 
strategic-risk-management
strategic-risk-management strategic-risk-management
strategic-risk-management
 

Mais de Mohammad Febri

RumahSehat Enterprise Architecture using TOGAF
RumahSehat Enterprise Architecture using TOGAFRumahSehat Enterprise Architecture using TOGAF
RumahSehat Enterprise Architecture using TOGAFMohammad Febri
 
Automated IOC Detection and Response through Seamless Orchestration.pdf
Automated IOC Detection and Response through Seamless Orchestration.pdfAutomated IOC Detection and Response through Seamless Orchestration.pdf
Automated IOC Detection and Response through Seamless Orchestration.pdfMohammad Febri
 
Cybersecurity and Risk Management Technology
Cybersecurity and Risk Management TechnologyCybersecurity and Risk Management Technology
Cybersecurity and Risk Management TechnologyMohammad Febri
 
Cloud Security: Securing The Invisible Thing
Cloud Security: Securing The Invisible ThingCloud Security: Securing The Invisible Thing
Cloud Security: Securing The Invisible ThingMohammad Febri
 
STRIDE: Digging Vulnerability by Threat Modelling
STRIDE: Digging Vulnerability by Threat ModellingSTRIDE: Digging Vulnerability by Threat Modelling
STRIDE: Digging Vulnerability by Threat ModellingMohammad Febri
 
Hacktoberfest Mozilla Indonesia 2020
Hacktoberfest Mozilla Indonesia 2020Hacktoberfest Mozilla Indonesia 2020
Hacktoberfest Mozilla Indonesia 2020Mohammad Febri
 
Leadership Skills - Communication in Organization
Leadership Skills - Communication in OrganizationLeadership Skills - Communication in Organization
Leadership Skills - Communication in OrganizationMohammad Febri
 
CDEF - Security Incident Handling and Response
CDEF - Security Incident Handling and ResponseCDEF - Security Incident Handling and Response
CDEF - Security Incident Handling and ResponseMohammad Febri
 
Vooya Passion Playground 2021 - Journey in Cybersecurity
Vooya Passion Playground 2021 - Journey in CybersecurityVooya Passion Playground 2021 - Journey in Cybersecurity
Vooya Passion Playground 2021 - Journey in CybersecurityMohammad Febri
 
Security Architecture: 3 Lines of Defense
Security Architecture: 3 Lines of DefenseSecurity Architecture: 3 Lines of Defense
Security Architecture: 3 Lines of DefenseMohammad Febri
 

Mais de Mohammad Febri (10)

RumahSehat Enterprise Architecture using TOGAF
RumahSehat Enterprise Architecture using TOGAFRumahSehat Enterprise Architecture using TOGAF
RumahSehat Enterprise Architecture using TOGAF
 
Automated IOC Detection and Response through Seamless Orchestration.pdf
Automated IOC Detection and Response through Seamless Orchestration.pdfAutomated IOC Detection and Response through Seamless Orchestration.pdf
Automated IOC Detection and Response through Seamless Orchestration.pdf
 
Cybersecurity and Risk Management Technology
Cybersecurity and Risk Management TechnologyCybersecurity and Risk Management Technology
Cybersecurity and Risk Management Technology
 
Cloud Security: Securing The Invisible Thing
Cloud Security: Securing The Invisible ThingCloud Security: Securing The Invisible Thing
Cloud Security: Securing The Invisible Thing
 
STRIDE: Digging Vulnerability by Threat Modelling
STRIDE: Digging Vulnerability by Threat ModellingSTRIDE: Digging Vulnerability by Threat Modelling
STRIDE: Digging Vulnerability by Threat Modelling
 
Hacktoberfest Mozilla Indonesia 2020
Hacktoberfest Mozilla Indonesia 2020Hacktoberfest Mozilla Indonesia 2020
Hacktoberfest Mozilla Indonesia 2020
 
Leadership Skills - Communication in Organization
Leadership Skills - Communication in OrganizationLeadership Skills - Communication in Organization
Leadership Skills - Communication in Organization
 
CDEF - Security Incident Handling and Response
CDEF - Security Incident Handling and ResponseCDEF - Security Incident Handling and Response
CDEF - Security Incident Handling and Response
 
Vooya Passion Playground 2021 - Journey in Cybersecurity
Vooya Passion Playground 2021 - Journey in CybersecurityVooya Passion Playground 2021 - Journey in Cybersecurity
Vooya Passion Playground 2021 - Journey in Cybersecurity
 
Security Architecture: 3 Lines of Defense
Security Architecture: 3 Lines of DefenseSecurity Architecture: 3 Lines of Defense
Security Architecture: 3 Lines of Defense
 

Último

Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Último (20)

Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 

OWASP Risk Rating Management

  • 1. M. Febri Ramadlan Introduction and implementation OWASP Risk Rating Management
  • 2. About Me Mohammad Febri Ramadlan (Ebi) is open source and information security enthusiast. Currently, He is IT Security Consultant in Indonesia Ebi also join some community such as OWASP, Code Security, Fowab (Forum Web Anak Bandung) Last of all, his hobbies is swimming, playing music, blogging, and part time travelling. Contact Person: : (+62) 81809809636 : mohammadfebrir@gmail.com : mohammadfebriramadlan : mohammadfebriramadlan : mohammadfebri.r : mohammadfebrir
  • 4. Risk • Risk is hazards, consequences that may occur as a result of an ongoing process or future event. • Risk factor: 1. Intervension • bad habit • life style • bankrupt 2. Non-Intervension • gen • age • sex
  • 5. Risk Management Risk management is management process that encompasses the identification, evaluation and control of risk that may threaten the continuity of a business or a company's activities. General Objectives: reduce expenditure, prevent companies from failure, increase corporate profits, reduce production costs and many things.
  • 6. Risk Assessment Risk Assessment is methods performed to determine whether an activity / risk has an acceptable or not. Good assessment should to be done by a trained team and experienced. Each company or organization have variety of acceptance level.
  • 7. Risk Rating Method Many standard and guidance that will help you: • Trike • AS/NZS 4360:2004 Risk Management • CVSS • OCTAVE • OWASP Risk Rating Methodology
  • 8. OWASP Risk Rating Methodology Let's start with the standard risk model: Risk = Likelihood * Impact How to use OWASP Risk Rating Methodology: #Step 1: Identifying a Risk #Step 2: Factors for Estimating Likelihood #Step 3: Factors for Estimating Impact #Step 4: Determining Severity of the Risk #Step 5: Deciding What to Fix #Step 6: Customizing Your Risk Rating Model
  • 9. #Step 1: Identifying a Risk The first step is: to identify a security risk that needs to be rated.
  • 10. #Step 2: Factors for Estimating Likelihood There are a number of factors that can help determine the likelihood. The first set of factors are related to the threat agent involved.  Skill level  Motive  Opportunity  Size  Ease of discovery  Ease of exploit  Awareness  Intrusion detection
  • 11. #Step 3: Factors for Estimating Impact Again, each factor has a set of options:  Loss of confidentiality  Loss of integrity  Loss of availability  Loss of accountability  Financial damage  Reputation damage  Non-compliance  Privacy violation
  • 12. #Step 4: Determining the Severity of the Risk (1) • Informal Method Likelihood and Impact Levels 0 to < 3 low 3 to < 6 medium 6 to 9 high
  • 13. #Step 4: Determining the Severity of the Risk (2) • Repeatable Method Likelihood Skill level Motive Opportunity Size Ease of discovery Ease of exploit Awareness Intrusion detection Overall Likelihood 5 9 4 9 3 3 4 8 5.625 Medium
  • 14. #Step 4: Determining the Severity of the Risk (2) • Repeatable Method Likelihood Skill level Motive Opportunity Size Ease of discovery Ease of exploit Awareness Intrusion detection Overall Likelihood 5 9 4 9 3 3 4 8 5.625 Medium
  • 15. #Step 4: Determining the Severity of the Risk (2) • Repeatable Method (2) Impact Loss of confidenti- ality Loss of integrity Loss of availability Loss of account- ability Financial damage Reputation damage Non- compliance Privacy violation Overall Impact 5 7 7 7 7 9 7 7 7.0 High
  • 16. #Step 4: Determining the Severity of the Risk (2) • Repeatable Method (2) Impact Loss of confidenti- ality Loss of integrity Loss of availability Loss of account- ability Financial damage Reputation damage Non- compliance Privacy violation Overall Impact 5 7 7 7 7 9 7 7 7.0 High
  • 17. #Step 4: Determining the Severity of the Risk (3) • Determining Severity Overall Risk Severity IMPACT High MEDIUM HIGH CRITICAL Medium LOW MEDIUM HIGH Low NOTE LOW MEDIUM Low Medium High LIKELIHOOD
  • 18. #Step 4: Determining the Severity of the Risk (3) • Determining Severity Overall Risk Severity IMPACT High MEDIUM HIGH CRITICAL Medium LOW MEDIUM HIGH Low NOTE LOW MEDIUM Low Medium High LIKELIHOOD
  • 19. #Step 5: Deciding What to Fix After the risks to the application have been classified there will be a prioritized list of what to fix. As a general rule, the most severe risks should be fixed first. It simply doesn't help the overall risk profile to fix less important risks, even if they're easy or cheap to fix. Remember that not all risks are worth fixing, and some loss is not only expected, but justifiable based upon the cost of fixing the issue.
  • 20. #Step 6: Customizing the Risk Rating Model Having a risk ranking framework that is customizable for a business is critical for adoption.  Adding factors  Customizing options  Weighting factors
  • 21. Tools
  • 22. 1. OWASP Risk Rating Template (excel format) https://www.owasp.org/images/5/5b/OWASP_Risk_Rating_Template_Example.xlsx
  • 23. 2. OWASP Risk Rating Calc (one website/domain) https://gist.github.com/ErosLever/f72bc0750af4d2e75c3a
  • 24. 3. OWASP Risk Rating Management (many website/domain) https://github.com/mohammadfebrir/o wasp-riskrating
  • 25. //category set by OWASP Top 10 - 2013
  • 26. //you can assesst many website as you want (dynamic)