+ All Categories
Home > Technology > O-ISM3 Risk Assessment

O-ISM3 Risk Assessment

Date post: 05-Dec-2014
Category:
Upload: vicente-aceituno
View: 572 times
Download: 1 times
Share this document with a friend
Description:
 
61
© Inovement Spain 2013
Transcript
Page 1: O-ISM3 Risk Assessment

© Inovement Spain 2013

Page 2: O-ISM3 Risk Assessment
Page 3: O-ISM3 Risk Assessment

ISM-RA

Page 4: O-ISM3 Risk Assessment
Page 5: O-ISM3 Risk Assessment
Page 6: O-ISM3 Risk Assessment

AU IT SB

FAIR

MAGERIT CRAMM

Dutch A&K

EBIOS

ISAMM

ISO27005

MARION

MEHARI

MIGRA

OCTAVE

SP 800-30

ISF Canadian RM Guide

……Etc

Page 7: O-ISM3 Risk Assessment

ISO27005 Establish Context

Ris

kC

om

mu

nic

atio

n

Ris

kM

on

itorin

ga

nd

Re

vie

w

Risk Treatment

Risk Evaluation

Risk Estimation

Risk Identification

Risk Assessment

Risk Analysis

Risk Acceptance

Accept risk?

Acceptable results?

Establish Context

Ris

kC

om

mu

nic

atio

n

Ris

kM

on

itorin

ga

nd

Re

vie

w

Risk Treatment

Risk Evaluation

Risk Estimation

Risk Identification

Risk Assessment

Risk Analysis

Risk Acceptance

Accept risk?

Acceptable results?

Page 8: O-ISM3 Risk Assessment

RA Method Design

Threat Taxonomy

Controls/Processes Taxonomy

Model

Scope

Depth

Threat Likelihood

Asset Value

Correct? Useful?

Page 9: O-ISM3 Risk Assessment

Impact Assets Value

Cost

Threats Frequency

Weaknesses

Countermeasures

RA Method Design

Likelihood

Exposure

Page 10: O-ISM3 Risk Assessment

Goals Scope (What is in, What is out)

Page 11: O-ISM3 Risk Assessment

Scope

The more choice on the side of the

certificate aspirant, the less value in

the certification.

The wider the scope, the higher the

cost.

ISM3-RA uses the scope of whole

companies.

Page 12: O-ISM3 Risk Assessment

Goals Organization Wide

Page 13: O-ISM3 Risk Assessment

Complexity Likelihood * Threats * Vulnerabilities * Countermeasures *

Asset Value * Exposure = N6

Page 14: O-ISM3 Risk Assessment

Correct? Useful?

Anyone can create a “correct” RA

method.

But, is it useful?

Page 15: O-ISM3 Risk Assessment

Utility

HIGH

MEDIUM

LOW

Page 16: O-ISM3 Risk Assessment

Utility

300

200

100

Page 17: O-ISM3 Risk Assessment

Utility – Added Value

What are we learning that we don’t know

already? (Non-Banal Analysis)

What are important threats to the

organization?

What should I do?

How safe am I? / How likely is that an

incident will happen?

How much will I lose this year?

How much should I invest this year?

Page 18: O-ISM3 Risk Assessment

Utility Challenges Lack of real data

Are opinions valid data?

Mixing opinions with arithmetic is a bit

like mixing magic and physics.

The higher the investment, the lower the

risk.

Return of investment is always positive.

Risk Assessment can be difficult and

expensive.

Page 19: O-ISM3 Risk Assessment

Inherent Limitations

Page 20: O-ISM3 Risk Assessment

Quantitative

Page 21: O-ISM3 Risk Assessment

Qualitative

Page 22: O-ISM3 Risk Assessment

Quantitative RA

Risk = Impact * Probability

Risk

Impact

Pro

ba

bility

Page 23: O-ISM3 Risk Assessment

Accounting

value of the

company

Expected Loss

[$]

Probability

[% / year] 100

0

0

Last year’s

losses

$ per year

Probability of

discontinuation of

the company per

year

Quantitative RA

Page 24: O-ISM3 Risk Assessment

Qualitative

Page 25: O-ISM3 Risk Assessment

Model No Model

Assets (Mostly Technical)

Servers, Databases,

Networks, etc (Purely

Technical)

ISM3-RA uses

Environments and

Business Functions

Page 26: O-ISM3 Risk Assessment

Depth

(Level

of

Detail)

Page 27: O-ISM3 Risk Assessment

Depth

The higher the level of detail, the more

complex and costly.

The depth should match the kind of

decisions we want to support.

ISM3-RA uses management-level

depth.

Environments

Page 28: O-ISM3 Risk Assessment

Management Level

Page 29: O-ISM3 Risk Assessment

Business

(Components,

Relationships,

States)

Page 30: O-ISM3 Risk Assessment

Business

Functions

Page 31: O-ISM3 Risk Assessment

Business Functions

Every business function exist and has a different importance in every company.

Researc

h

Fin

ancin

g /

Accountin

g

Legal

Sale

s

Rela

tionship

s

Pro

ductio

n

Main

tenance

Busin

ess

Inte

lligence

Govern

ance

IT

Advertis

ing

Hum

an

Resourc

es

Infra

stru

ctu

re

Adm

inis

tratio

n

Pro

cure

ment

Logis

tics

Page 32: O-ISM3 Risk Assessment

Business Functions

Every business function exist and has a different importance in every company.

Researc

h

Fin

ancin

g /

Accountin

g

Legal

Sale

s

Rela

tionship

s

Pro

ductio

n

Main

tenance

Busin

ess

Inte

lligence

Govern

ance

IT

Advertis

ing

Hum

an

Resourc

es

Infra

stru

ctu

re

Adm

inis

tratio

n

Pro

cure

ment

Logis

tics

Page 33: O-ISM3 Risk Assessment

Information

Technology

(Components,

Relationships,

States)

Page 34: O-ISM3 Risk Assessment

Environments

Page 35: O-ISM3 Risk Assessment

Environment

You can’t model meaningfully a company as a set of servers, applications or “assets”.

On the other hand, an environment has a visible head, someone who will be responsible to carry out the action plan.

Host SSCC

Terceros

SSAA Oficinas

Usuarios

Móviles

Personal

Page 36: O-ISM3 Risk Assessment

Dependencies

Page 37: O-ISM3 Risk Assessment

ISM3-RA

Host SSCC Terceros

SSAA Oficinas Usuarios

Móviles

Personal

Researc

h

Fin

ancin

g /

Accountin

g

Legal

Sale

s

Rela

tionship

s

Pro

ductio

n

Main

tenance

Busin

ess

Inte

lligence

Govern

ance

IT

Advertis

ing

Hum

an

Resourc

es

Infra

stru

ctu

re

Adm

inis

tratio

n

Pro

cure

ment

Logis

tics

Page 38: O-ISM3 Risk Assessment

Threats (There is no

widely accepted

list of threats at

any level of

detail)

(There are no reliable

estimations of probability

of threats)

Page 39: O-ISM3 Risk Assessment

Threat Taxonomy Pretty Long Lists

Magerit: Accidental Natural,

Accidental Industrial, Accidental

Error, Deliberate, etc…

Against Confidentiality, against

Integrity, against Availability et al.

Page 40: O-ISM3 Risk Assessment

ISM3-RA

1. Destruction, corruption or loss of

valid information.

2. Failure to destroy expired

information.

3. Improper use of authorized access.

4. Improper recording of access.

5. Unauthorized access,

eavesdropping, theft and disclosure

of information.

6. Underperformance, interruption of

service & failure of authorized

access.

7. Aging of information & outdated

systems

Page 41: O-ISM3 Risk Assessment

Threat Likelihood

Normally there is no data enough to

know how likely is a threat.

The multiplicity and evolution of

threats make likelihood of threats very

difficult to model.

ISM3-RA uses a qualitative scale of

likelihood. (from very high to very low)

Page 42: O-ISM3 Risk Assessment

Impact (Euros,

High – Medium – Low,

Confidenciality – Integrity – Availability, etc)

Page 43: O-ISM3 Risk Assessment

Asset Value

Euros

High – Medium – Low

Magerit: Disponibilidad, integridad,

confidencialidad, autenticidad,

trazabilidad.

ISM3-RA uses “The more important

Business Functions depend on

Environments, the more valuable”

Page 44: O-ISM3 Risk Assessment

Controls

(ISO27001

PCI DSS

NIST

ISM3, etc)

Page 45: O-ISM3 Risk Assessment

Controls / Process Taxonomy

ISO 27002 Controls

PCI DSS Controls

Cobit Controls

Custom Made Lists

Etc…

ISM3-RA uses ISM3 Processes

Page 46: O-ISM3 Risk Assessment

Mix

Page 47: O-ISM3 Risk Assessment

Mix

Page 48: O-ISM3 Risk Assessment

Results

(7, other number,

“good”, “better”, an

action plan, or a

dashboard)

Page 49: O-ISM3 Risk Assessment

High

Medium

Low

Page 50: O-ISM3 Risk Assessment

ISM3-RA

0

20

40

60

80

100

120

Relative Weight of Business Functions

Researc

h

Fin

ancin

g /

Accountin

g

Legal

Sale

s

Rela

tionship

s

Pro

ductio

n

Main

tenance

Busin

ess

Inte

lligence

Govern

ance

IT

Advertis

ing

Hum

an

Resourc

es

Infra

stru

ctu

re

Adm

inis

tratio

n

Pro

cure

ment

Logis

tics

Page 51: O-ISM3 Risk Assessment

0,0000

0,1000

0,2000

0,3000

0,4000

0,5000

0,6000

0,7000

0,8000

Internet SSCC Oficinas Host SSAA Terceros Usuarios Mobiles

Personal

Relative Protection per Environment

ISM3-RA

Host SSCC Terceros

SSAA Oficinas Usuarios

Móviles

Personal

Page 52: O-ISM3 Risk Assessment

ISM3-RA

0

2000

4000

6000

8000

10000

12000

Internet SSCC Oficinas Host SSAA Terceros Usuarios

Mobiles

Personal

Relative Environment Criticality

Host SSCC Terceros

SSAA Oficinas Usuarios

Móviles

Personal

Page 53: O-ISM3 Risk Assessment

0,000000

0,200000

0,400000

0,600000

0,800000

1,000000

1,200000

1,400000

1,600000

1,800000

SSCC Oficinas Host SSAA Terceros Usuarios Mobiles Personal

Risk to Environment

ISM3-RA

Host SSCC Terceros

SSAA Oficinas Usuarios

Móviles

Personal

Page 54: O-ISM3 Risk Assessment

0,00000000

1,00000000

2,00000000

3,00000000

4,00000000

5,00000000

6,00000000

7,00000000

8,00000000

SSCC Oficinas Host SSAA Terceros Usuarios Mobiles

Risk to Technical Environment per Threat Improper recording of access to information or systems /

(anon or otherwise)

Unauthorized access, eavesdropping, theft and disclosure of information or systems AND

Improper use of authorized access to information or systems

Failure to destroy expired information or systems &

Failure to stop systems at will

Underperformance OR Interruption of valid system services &

Failure of authorized access

Aging of information &Outdated systems

Destruction /Corruption /

Loss of valid information or systems

ISM3-RA

Host SSCC Terceros

SSAA Oficinas Usuarios

Móviles

Personal

Page 55: O-ISM3 Risk Assessment

02000400060008000

10000120001400016000

Relative Reliance on Environments

ISM3-RA

Researc

h

Fin

ancin

g /

Accountin

g

Legal

Sale

s

Rela

tionship

s

Pro

ductio

n

Main

tenance

Busin

ess

Inte

lligence

Govern

ance

IT

Advertis

ing

Hum

an

Resourc

es

Infra

stru

ctu

re

Adm

inis

tratio

n

Pro

cure

ment

Logis

tics

Page 56: O-ISM3 Risk Assessment

0,000000

0,500000

1,000000

1,500000

2,000000

2,500000

Risk per Business Function

Personal

Usuarios Mobiles

Terceros

SSAA

Host

Oficinas

SSCC

ISM3-RA

Researc

h

Fin

ancin

g /

Accountin

g

Legal

Sale

s

Rela

tionship

s

Pro

ductio

n

Main

tenance

Busin

ess

Inte

lligence

Govern

ance

IT

Advertis

ing

Hum

an

Resourc

es

Infra

stru

ctu

re

Adm

inis

tratio

n

Pro

cure

ment

Logis

tics

Page 57: O-ISM3 Risk Assessment

ISM3-RA

Internal

Network DMZ

Mobile

Users

Internal

Users

WiFi

Networks

Govern

ance

Infra

stru

ctu

re

Hum

an

Resourc

es

Pro

ductio

n

Logis

tics

Adm

inis

tratio

n

IT

Advertis

ing

Researc

h

Pro

cure

ment

Sale

s

Busin

ess

Inte

lligence

Fin

ancin

g /

Accountin

g

Main

tenance

Rela

tionship

s

Legal

Page 58: O-ISM3 Risk Assessment

ISM3-RA

Internal

Network DMZ

Mobile

Users

Internal

Users

WiFi

Networks

Govern

ance

Infra

stru

ctu

re

Hum

an

Resourc

es

Pro

ductio

n

Logis

tics

Adm

inis

tratio

n

IT

Advertis

ing

Researc

h

Pro

cure

ment

Sale

s

Busin

ess

Inte

lligence

Fin

ancin

g /

Accountin

g

Main

tenance

Rela

tionship

s

Legal

Page 59: O-ISM3 Risk Assessment

ISM3-RA

Dashboard?

Page 60: O-ISM3 Risk Assessment

Information Security that makes Business

Sense

inovement.es/oism3

Web www.inovement.es

Video Blog youtube.com/user/vaceituno

Blog ism3.com

Twitter twitter.com/vaceituno

Presentations slideshare.net/vaceituno/presentations

Articles slideshare.net/vaceituno/documents

Page 61: O-ISM3 Risk Assessment

Recommended