28
© 2018 LOW IMPACT-HIGH YIELD SECURITY ASSESSMENTS Presented by: Claude L. Williams CISSP, CASP, CHFI, EDRP, CBCI, ECIH, CSA+, RPCS CyNtelligent Solutions, LLC [email protected]

LOW IMPACT-HIGH YIELD SECURITY ASSESSMENTS...•(ii) asset/impact-oriented; – An asset/impact-oriented approach starts with the identification of impacts or consequences of concern

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: LOW IMPACT-HIGH YIELD SECURITY ASSESSMENTS...•(ii) asset/impact-oriented; – An asset/impact-oriented approach starts with the identification of impacts or consequences of concern

© 2018

LOW IMPACT-HIGH YIELD SECURITY ASSESSMENTS

Presented by: Claude L. Williams

CISSP, CASP, CHFI, EDRP, CBCI, ECIH, CSA+, RPCS CyNtelligent Solutions, LLC

[email protected]

Page 2: LOW IMPACT-HIGH YIELD SECURITY ASSESSMENTS...•(ii) asset/impact-oriented; – An asset/impact-oriented approach starts with the identification of impacts or consequences of concern

© 2018

OBJECTIVES

• Understand Risk

• Understand Risk Management

• Understand Risk Assessments

• Conduct an efficient and effective Risk Assessment

Page 3: LOW IMPACT-HIGH YIELD SECURITY ASSESSMENTS...•(ii) asset/impact-oriented; – An asset/impact-oriented approach starts with the identification of impacts or consequences of concern

© 2018

RISK?! • Organizational risk can include many types of risk (e.g., program

management risk, investment risk, budgetary risk, legal liability risk, safety risk, inventory risk, supply chain risk, and security risk).

• Security risk related to the operation and use of information systems is just one of many components of organizational risk that senior leaders/executives address as part of their ongoing risk management responsibilities.

• Security risk is the loss potential to an asset that will likely occur if a threat is able to exploit a vulnerability. Derived and expressed either quantitively or qualitatively.

Page 4: LOW IMPACT-HIGH YIELD SECURITY ASSESSMENTS...•(ii) asset/impact-oriented; – An asset/impact-oriented approach starts with the identification of impacts or consequences of concern

© 2018

RISK?! • Security risk is the loss potential to an asset that will likely occur

if a threat is able to exploit a vulnerability. Derived and expressed either quantitively or qualitatively.

• Enterprise Approach to Addressing Risk – Risk Governance

– Risk Management

– Risk Assessment

– Risk Analysis

Page 5: LOW IMPACT-HIGH YIELD SECURITY ASSESSMENTS...•(ii) asset/impact-oriented; – An asset/impact-oriented approach starts with the identification of impacts or consequences of concern

© 2018

RISK GOVERNANCE • In general, governance is the set of responsibilities and practices

exercised by those responsible for an organization (e.g., the board of directors and executive management in a corporation, the head of a federal agency) with the express goal of: – (i) providing strategic direction;

– (ii) ensuring that organizational mission and business objectives are achieved;

– (iii) ascertaining that risks are managed appropriately;

– and (iv) verifying that the organization’s resources are used responsibly.

Page 6: LOW IMPACT-HIGH YIELD SECURITY ASSESSMENTS...•(ii) asset/impact-oriented; – An asset/impact-oriented approach starts with the identification of impacts or consequences of concern

© 2018

RISK GOVERNANCE • Leadership/Executive function for planning, budgeting, and directing

resources.

• Value creation from benefits realization, risk optimization and resource optimization.

• Effective risk governance helps ensure that risk management practices are embedded in the enterprise, enabling it to secure optimal risk-adjusted return.

• Risk governance has four main objectives:

– Establish and maintain a common risk view.

– Integrate risk management into the enterprise.

– Make risk-aware business decisions.

– Ensure that risk management controls are implemented and operating correctly.

Page 7: LOW IMPACT-HIGH YIELD SECURITY ASSESSMENTS...•(ii) asset/impact-oriented; – An asset/impact-oriented approach starts with the identification of impacts or consequences of concern

© 2018

RISK MANAGEMENT • The risk management process includes identifying, assessing,

mitigating and monitoring risk.

• Risk management is a comprehensive process that requires organizations to complete these stages: – (i) frame risk (i.e., establish the context for risk-based decisions)

• Produces/determines/defines the risk management strategy;

– (ii) assess risk;

– (iii) respond to risk once determined;

– and (iv) monitor risk on an ongoing basis using effective organizational communications and a feedback loop for continuous improvement in the risk-related activities of organizations.

Page 8: LOW IMPACT-HIGH YIELD SECURITY ASSESSMENTS...•(ii) asset/impact-oriented; – An asset/impact-oriented approach starts with the identification of impacts or consequences of concern

© 2018

RISK MANAGEMENT • Risk Identification and Classification Standards and Frameworks

– ISO 31000:2009 Risk Management – Principles and Guidelines

• IEC 31010:2009 Risk Management – Risk Assessment Techniques

– ISO/IEC 27005:2011 Information Technology – Security Techniques – Information Security Risk Management

– NIST Special Publications

• 800-30 – Guide to Conducting Risk Assessments

• 800-37 – Risk Management Framework (RMF)

Addresses concerns specific to the design, development, implementation, operation, & disposal of organizational information systems and the environments in which those systems operate.

• 800-39 – Managing Information Security Risk

• 800-53 – Security and Privacy Controls for Information Systems and Organizations

• 800-137 - Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations

Page 9: LOW IMPACT-HIGH YIELD SECURITY ASSESSMENTS...•(ii) asset/impact-oriented; – An asset/impact-oriented approach starts with the identification of impacts or consequences of concern

© 2018

RISK MANAGEMENT • NIST SP 800-39

Page 10: LOW IMPACT-HIGH YIELD SECURITY ASSESSMENTS...•(ii) asset/impact-oriented; – An asset/impact-oriented approach starts with the identification of impacts or consequences of concern

© 2018

RISK MANAGEMENT • NIST SP 800-39

Page 11: LOW IMPACT-HIGH YIELD SECURITY ASSESSMENTS...•(ii) asset/impact-oriented; – An asset/impact-oriented approach starts with the identification of impacts or consequences of concern

© 2018

RISK ASSESSMENT • The risk assessment is a key component of a holistic,

organization-wide risk management process.

• The risk assessment identifies, prioritizes, and estimates risk to organizational operations (i.e., mission, functions, image, and reputation), organizational assets, individuals, other organizations, and the Nation, resulting from the operation and use of information systems.

• Risk assessments use the results of threat and vulnerability assessments to identify and evaluate risk in terms of likelihood of occurrence and potential adverse impact (i.e., magnitude of harm) to organizations, assets, and individuals.

• Risk assessments can be conducted at any of the risk management tiers.

Page 12: LOW IMPACT-HIGH YIELD SECURITY ASSESSMENTS...•(ii) asset/impact-oriented; – An asset/impact-oriented approach starts with the identification of impacts or consequences of concern

© 2018

RISK ASSESSMENT • Risk assessments are not simply one-time activities that provide

permanent and definitive information for decision makers to guide and inform responses to information security risks.

• Rather, organizations employ risk assessments on an ongoing basis throughout the system development life cycle and across all of the tiers in the risk management hierarchy

• Frequency of the risk assessments and the resources applied during the assessments should be commensurate with the expressly defined purpose and scope of the assessments and the risk management strategy.

Page 13: LOW IMPACT-HIGH YIELD SECURITY ASSESSMENTS...•(ii) asset/impact-oriented; – An asset/impact-oriented approach starts with the identification of impacts or consequences of concern

© 2018

RISK ASSESSMENT • NIST SP 800-30 Rev 1

• The purpose of the risk assessment component is to identify: – (i) threats to organizations (i.e., operations, assets, or individuals) or

threats directed through organizations against other organizations or the Nation;

– (ii) vulnerabilities internal and external to organizations;

– (iii) the harm (i.e., adverse impact) that may occur given the potential for threats exploiting vulnerabilities;

– and (iv) the likelihood that harm will occur.

– The end result is a determination of risk (i.e., typically a function of the degree of harm and likelihood of harm occurring).

Page 14: LOW IMPACT-HIGH YIELD SECURITY ASSESSMENTS...•(ii) asset/impact-oriented; – An asset/impact-oriented approach starts with the identification of impacts or consequences of concern

© 2018

RISK ASSESSMENT • Risk assessment techniques

Page 15: LOW IMPACT-HIGH YIELD SECURITY ASSESSMENTS...•(ii) asset/impact-oriented; – An asset/impact-oriented approach starts with the identification of impacts or consequences of concern

© 2018

RISK ASSESSMENT METHODOLOGY • Organizations can use a single risk assessment methodology or

can employ multiple assessment methodologies, with the selection of a specific methodology depending on, for example: – (i) the time frame for investment planning or for planning policy changes;

– (ii) the complexity/maturity of organizational mission/business processes (by enterprise architecture segments);

– (iii) the phase of the information systems in the system development life cycle;

– or (iv) the criticality/sensitivity of the information and information systems supporting the core organizational missions/business functions.

Page 16: LOW IMPACT-HIGH YIELD SECURITY ASSESSMENTS...•(ii) asset/impact-oriented; – An asset/impact-oriented approach starts with the identification of impacts or consequences of concern

© 2018

RISK ASSESSMENT MODELS • Risk models define the risk factors to be assessed and the

relationships among those factors (inputs to determining levels of risk in risk assessments). – Typical risk factors include threat, vulnerability, impact, likelihood, and

predisposing condition.

– Risk factors can be decomposed into more detailed characteristics (e.g., threats decomposed into threat sources and threat events).

• Risk models differ in the degree of detail and complexity with which threat events are identified.

• When threat events are identified with great specificity, threat scenarios can be modeled, developed, and analyzed. – Threat events for cyber or physical attacks are characterized by the

tactics, techniques, and procedures (TTPs) employed by adversaries.

Page 17: LOW IMPACT-HIGH YIELD SECURITY ASSESSMENTS...•(ii) asset/impact-oriented; – An asset/impact-oriented approach starts with the identification of impacts or consequences of concern

© 2018

RISK ASSESSMENT MODELS • Generic Risk Model

Page 18: LOW IMPACT-HIGH YIELD SECURITY ASSESSMENTS...•(ii) asset/impact-oriented; – An asset/impact-oriented approach starts with the identification of impacts or consequences of concern

© 2018

RISK ASSESSMENT APPROACH • Quantitative assessments typically employ a set of methods,

principles, or rules for assessing risk based on the use of numbers, where the meanings and proportionality of values are maintained inside and outside the context of the assessment. This type of assessment most effectively supports cost-benefit analyses of alternative risk responses or courses of action. – The goals are:

• monetary expression of risk(s)

• analysis objectivity.

– Highly improbable to facilitate.

Page 19: LOW IMPACT-HIGH YIELD SECURITY ASSESSMENTS...•(ii) asset/impact-oriented; – An asset/impact-oriented approach starts with the identification of impacts or consequences of concern

© 2018

RISK ASSESSMENT APPROACH • Qualitative assessments typically employ a set of methods,

principles, or rules for assessing risk based on nonnumerical categories or levels (e.g., very low, low, moderate, high, very high). – Scales, rankings, and ratings are used

– Approach is highly subjective.

– Most efficient approach.

Page 20: LOW IMPACT-HIGH YIELD SECURITY ASSESSMENTS...•(ii) asset/impact-oriented; – An asset/impact-oriented approach starts with the identification of impacts or consequences of concern

© 2018

RISK ASSESSMENT APPROACH • Semi-quantitative assessments typically employ a set of

methods, principles, or rules for assessing risk that uses bins, scales, or representative numbers whose values and meanings are not maintained in other contexts. – Good for communicating risk.

Page 21: LOW IMPACT-HIGH YIELD SECURITY ASSESSMENTS...•(ii) asset/impact-oriented; – An asset/impact-oriented approach starts with the identification of impacts or consequences of concern

© 2018

RISK ANALYSIS • Analysis approaches differ with respect to the orientation or starting point of the

risk assessment, level of detail in the assessment, and how risks due to similar threat scenarios are treated. An analysis approach can be:

• (i) threat-oriented; – A threat-oriented approach starts with the identification of threat sources and threat events,

and focuses on the development of threat scenarios; vulnerabilities are identified in the context of threats, and for adversarial threats, impacts are identified based on adversary intent.

• (ii) asset/impact-oriented; – An asset/impact-oriented approach starts with the identification of impacts or consequences

of concern and critical assets, possibly using the results of a mission or business impact analyses and identifying threat events that could lead to and/or threat sources that could seek those impacts or consequences.

• Or (iii) vulnerability-oriented. – A vulnerability-oriented approach starts with a set of predisposing conditions or exploitable

weaknesses/deficiencies in organizational information systems or the environments in which the systems operate, and identifies threat events that could exercise those vulnerabilities together with possible consequences of vulnerabilities being exercised.

Page 22: LOW IMPACT-HIGH YIELD SECURITY ASSESSMENTS...•(ii) asset/impact-oriented; – An asset/impact-oriented approach starts with the identification of impacts or consequences of concern

© 2018

RISK ANALYSIS • Each analysis approach takes into consideration the same risk

factors (based on the risk model), and thus entails the same set of risk assessment activities, albeit in different order.

• Differences in the starting point of the risk assessment can potentially bias the results, causing some risks not to be identified. Therefore, identification of risks from a second orientation (e.g., complementing a threat-oriented analysis approach with an asset/impact-oriented analysis approach) can improve the rigor and effectiveness of the analysis.

Page 23: LOW IMPACT-HIGH YIELD SECURITY ASSESSMENTS...•(ii) asset/impact-oriented; – An asset/impact-oriented approach starts with the identification of impacts or consequences of concern

© 2018

TARGETED RISK ASSESSMENTS • Organizations can use targeted risk assessments, in which the

scope is narrowly defined, to produce answers to specific questions, e.g.: – what is the risk associated with a new asset, business function, customer,

or with relying on a given technology;

– how should prior assessments of risk be revised based on incidents that have occurred;

– what new risks can be identified based on knowledge about a newly discovered threat or vulnerability);

– or to inform specific decisions.

Page 24: LOW IMPACT-HIGH YIELD SECURITY ASSESSMENTS...•(ii) asset/impact-oriented; – An asset/impact-oriented approach starts with the identification of impacts or consequences of concern

© 2018

CONDUCTING THE RISK ASSESSMENT

Page 25: LOW IMPACT-HIGH YIELD SECURITY ASSESSMENTS...•(ii) asset/impact-oriented; – An asset/impact-oriented approach starts with the identification of impacts or consequences of concern

© 2018

CONDUCTING THE RISK ASSESSMENT Prepare for the Assessment

– Identify the purpose of the risk assessment in terms of the information that the assessment is intended to produce and the decisions the assessment is intended to support.

– Identify the scope of the risk assessment in terms of organizational applicability, time frame supported, and architectural/technology considerations.

– Identify the specific assumptions and constraints under which the risk assessment is conducted.

– Identify the sources of descriptive, threat, vulnerability, and impact information to be used in the risk assessment.

– Identify the risk model and analytic approach to be used in the risk assessment.

Page 26: LOW IMPACT-HIGH YIELD SECURITY ASSESSMENTS...•(ii) asset/impact-oriented; – An asset/impact-oriented approach starts with the identification of impacts or consequences of concern

© 2018

CONDUCTING THE RISK ASSESSMENT Recommended Assessment Methodology

• Tier 1 and Tier 2

• Targeted risk assessments are more efficient and less disruptive.

• One or more facilitated risk assessment sessions with appropriate personnel. – Qualitative, scenario-based session(s).

– Document threat statements (sources and dangers), known vulnerability and predispositions, and probable short-term and long-term impacts.

– Prioritize further assessments (with corresponding models) based on likelihood.

Page 27: LOW IMPACT-HIGH YIELD SECURITY ASSESSMENTS...•(ii) asset/impact-oriented; – An asset/impact-oriented approach starts with the identification of impacts or consequences of concern

© 2018

CONDUCTING THE RISK ASSESSMENT Recommended Assessment Methodology

• RIIOT – Review documentation

• e.g. policies, procedures, standards, and baselines

– Inspection

• e.g., logs, reports, and other artifacts

– Interview

– Observation

– Testing

• Procedural, physical, and electronic

• e.g., vulnerability, penetration, continuity, failure, etc.

Page 28: LOW IMPACT-HIGH YIELD SECURITY ASSESSMENTS...•(ii) asset/impact-oriented; – An asset/impact-oriented approach starts with the identification of impacts or consequences of concern

© 2018

Low Impact-High Yield Security Assessments

Presented by: Claude L. Williams

CISSP , CASP, CHFI, EDRP, CBCI, ECIH, CSA+, RPCS CyNtelligent Solutions, LLC

[email protected]

Cyber Intelligent Solutions http://www.CyNtell.com

(202) 630 - 9672