Open In App

Risk Management for Information Security | Set-2

Last Updated : 15 Nov, 2022
Improve
Improve
Like Article
Like
Save
Share
Report

Prerequisite – Risk Management | Set-1 2. Risk Assessment – Risk Management is a recurrent activity, on the other hand Risk assessment is executed at discrete points and until the performance of the next assessment. Risk Assessment is the process of evaluating known and postulated threats and vulnerabilities to determine expected loss. It also includes establishing the degree of acceptability to system operations. Risk Assessment receives input and output from Context establishment phase and output is the list of assessed risk risks, where risks are given priorities as per risk evaluation criteria.

  1. Risk Identification – In this step we identify the following:
    • assets
    • threats
    • existing and planned security measures
    • vulnerabilities
    • consequence
    • related business processes
    • list of asset and related business processes with associated list of threats, existing and planned security measures
    • list of vulnerabilities unrelated to any identified threats
    • list of incident scenarios with their consequences
  2. Risk Estimation – There are 2 methods for Risk Assessment: 1. Quantitative Risk Assessment – This methodology is not mostly used by the organizations except for the financial institutions and insurance companies. Quantitative risk is mathematically expressed as Annualised Loss Expectancy (ALE). ALE is the expected monetary loss that can be expected for an asset due to a risk being realised over a one-year period.
ALE= SLE * ARO
  1. Single Loss Expectancy (SLE) is the value of a single loss of the asset. This may or may not be the entire asset. This is the impact of the loss. Annualised Rate of Occurrence (ARO) is how often the loss occurs. This is the likelihood. Theoretically Quantitative risk assessment seems straightforward but there are issues in assigning values to parameters. While the cost of system is easy to define but indirect costs such as value of information, lost production activity and cost to recover are difficult to define accurately. The other element likelihood is not accurately known. Therefore, there is a large margin of error in Quantitative Risk Assessment. Due to unavailability of accurate and complete information it is not cost effective to perform a quantitative risk assessment for a IT System. 2. Qualitative Risk Assessment – Qualitative Risk Assessment defines likelihood, impact values and risk in subjective terms, keeping in mind that likelihood and impact values are highly uncertain. Qualitative risk assessments typically give risk results of “High”, “Moderate” and “Low”. Following are the steps in Qualitative Risk Assessment:
    1. Identifying Threats: Threats and Threat-Sources must be identified. Threats should include threat-source to ensure accurate estimation. It is important to compile a list of all possible threats that are present across the organization and use this list as the basis for all risk management activities. Some of the examples of threat and threat-source are:
      • Natural Threats- floods, earthquakes etc.
      • Human Threats- virus, worms etc.
      • Environmental Threats- power failure, pollution etc.
    2. Identifying Vulnerabilities: Vulnerabilities are identified by numerous means. Some of the tools are:
      1. Vulnerability Scanners – This is the software the compare the operating system or code for flaws against the database of flaw signatures.
      2. Penetration Testing – Human Security analyst will exercise threats against the system including operational vulnerabilities like Social Engineering.
      3. Audit of Operational and Management Controls – Operational and management controls are reviewed by comparing the current documentation to best practices for example ISO 17799 and by comparing actual practices against current documented processes.
    3. Relating Threats to Vulnerabilities: This is the most difficult and mandatory activity in Risk Assessment. T-V pair list is established by reviewing the vulnerability list and pairing a vulnerability with every threat that applies, then by reviewing the threat list and ensuring that all the vulnerabilities that threat-action/threat can act against have been identified.
    4. Defining Likelihood: Likelihood is the probability that a threat caused by a threat-source will occur against a vulnerability. Sample Likelihood definitions can be like: Low -0-30% chance of successful exercise of Threat during a one year period Moderate – 31-70% chance of successful exercise of Threat during a one year period High – 71-100% chance of successful exercise of Threat during a one year period This is just a sample definitions. Organization can use their own definition like Very Low, Low, Moderate, High, Very High.
    5. Defining Impact: Impact is best defined in terms of impact upon confidentiality, integrity and availability. Sample definitions for impact are as follows:
  Confidentiality Integrity Availability
Low Loss of Confidentiality leads to Limited effect on organization Loss of Integrity leads to Limited effect on organization Loss of Availability leads to Limited effect on organization
Medium Loss of Confidentiality leads to Serious effect on organization Loss of Integrity leads to Serious effect on organization Loss of Availability leads to Serious effect on organization
High Loss of Confidentiality leads to Severe effect on organization Loss of Integrity leads to Severe effect on organization Loss of Availability leads to Severe effect on organization
  1. Examples of Organizational Effect is as follows:
Effect Type Effect on Mission Capability Financial Loss Effect on Human Life
Limited Effect Temporary loss of one or more minor mission capabilities Under Rs 50, 000 Minor Harm
Serious Effect Long term loss of one or more minor capabilities or Temporary loss of one or more primary mission capabilities. Rs 50, 000- Rs 1, 00, 000 Significant Harm
Severe Effect Long term loss of one or more primary mission capabilities over Rs 1, 00, 000 Loss of life
  1. Assessing Risk: Assessing risk is the process to determine the likelihood of the threat being exercised against the vulnerability and the resulting impact from a successful compromise. Sample Risk Determination Matrix is as follows:
  Impact
High Moderate Low
Likelihood High High High Moderate
Moderate High Moderate Low
Low Moderate Low Low

3. Risk Evaluation – The risk evaluation process receives as input the output of risk analysis process. It first compares each risk level against the risk acceptance criteria and then prioritise the risk list with risk treatment indications. 

3. Risk Mitigation/ Management – Risk Mitigation involves prioritizing, evaluating, and implementing the appropriate risk-reducing controls recommended from the risk assessment process. Since eliminating all risk in an organization is close to impossible thus, it is the responsibility of senior management and functional and business managers to use the least-cost approach and implement the most appropriate controls to decrease risk to an acceptable level. As per NIST SP 800 30 framework there are 6 steps in Risk Mitigation.

  1. Risk Assumption: This means to accept the risk and continue operating the system but at the same time try to implement the controls to
  2. Risk Avoidance: This means to eliminate the risk cause or consequence in order to avoid the risk for example shutdown the system if the risk is identified.
  3. Risk Limitation: To limit the risk by implementing controls that minimize the adverse impact of a threat’s exercising a vulnerability (e.g., use of supporting, preventive, detective controls)
  4. Risk Planning: To manage risk by developing a risk mitigation plan that prioritizes, implements, and maintains controls
  5. Research and Acknowledgement: In this step involves acknowledging the vulnerability or flaw and researching controls to correct the vulnerability.
  6. Risk Transference: This means to transfer the risk to compensate for the loss for example purchasing insurance guarantees not 100% in all cases but atleast some recovery from the loss.

4. Risk Communication – The main purpose of this step is to communicate, give an understanding of all aspects of risk to all the stakeholder’s of an organization. Establishing a common understanding is important, since it influences decisions to be taken. 5. Risk Monitoring and Review – Security Measures are regularly reviewed to ensure they work as planned and changes in the environment don’t make them ineffective. With major changes in the work environment security measures should also be updated.Business requirements, vulnerabilities and threats can change over the time. Regular audits should be scheduled and should be conducted by an independent party. 6. IT Evaluation and Assessment – Security controls should be validated. Technical controls are systems that need to tested and verified. Vulnerability assessment and Penetration test are used for verifying status of security controls. Monitoring system events according to a security monitoring strategy, an incident response plan and security validation and metrics are fundamental activities to assure that an optimal level of security is obtained. It is important to keep a check on new vulnerabilities and apply procedural and technical controls for example regularly update software.



Like Article
Suggest improvement
Share your thoughts in the comments

Similar Reads