risk assessment

49
Risk Assessment By: Ashwin Vignesh Madhu

Upload: thuong

Post on 20-Jan-2016

48 views

Category:

Documents


2 download

DESCRIPTION

By: Ashwin Vignesh Madhu. Risk Assessment. Objective Introduction Risk Risk Management Cycle RA Methodologies CRAMM COBRA RuSecure British Standard Hierarchical Criteria Model. Common Failures in RA Elements of Good RA OCTAVE Characteristics Process Criteria Examples - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Risk Assessment

Risk Assessment

By:AshwinVigneshMadhu

Page 2: Risk Assessment

Overview● Objective● Introduction● Risk

Risk Management Cycle

● RA Methodologies CRAMM COBRA RuSecure British Standard Hierarchical Criteria

Model

● Common Failures in RA● Elements of Good RA● OCTAVE● Characteristics● Process● Criteria● Examples● OCTAVE Methodology● Choosing Methodology● Our Methodology

Page 3: Risk Assessment

Overview●Objective● Introduction●Risk

Risk Management Cycle

●RA Methodologies CRAMM COBRA RuSecure British Standard Hierarchical Criteria

Model

●Common Failures in RA●Elements of Good RA●OCTAVE●Characteristics●Process●Criteria●Examples●OCTAVE Methodology●Choosing Methodology●Our Methodology

Page 4: Risk Assessment

Objective

● Risk Assessment Process Not unique to the IT environment

● Provide the desired level of mission support depending on the budget

● Well-structured risk management methodology

Page 5: Risk Assessment

Overview●Objective● Introduction● Risk

Risk Management Cycle

● RA Methodologies CRAMM COBRA RuSecure British Standard Hierarchical Criteria

Model

● Common Failures in RA● Elements of Good RA● OCTAVE● Characteristics● Process● Criteria● Examples● OCTAVE Methodology● Choosing Methodology● Our Methodology

Page 6: Risk Assessment

Introduction

● The process of enumerating risks● Determining their classifications● Assigning probability and impact scores● Associating controls with each risk

Page 7: Risk Assessment

Overview● Objective● Introduction●Risk

Risk Management Cycle

● RA Methodologies CRAMM COBRA RuSecure British Standard Hierarchical Criteria

Model

● Common Failures in RA● Elements of Good RA● OCTAVE● Characteristics● Process● Criteria● Examples● OCTAVE Methodology● Choosing Methodology● Our Methodology

Page 8: Risk Assessment

Risk

● Risk Assessment measures Magnitude of the potential loss L Probability p that the loss will occur

● Risk R can be expressed as R = L * p (or) Risk = Impact * Likelihood

Page 9: Risk Assessment

Risk (Cont..)● Risk = PA * (1-PE) * C

PA – the likelihood of adversary attack PE - the security system effectiveness (1- PE) - the adversary success C – consequence of loss of the asset

● High L and low p – low L and high p Treated differently in practice Given nearly equal priority in dealing

Page 10: Risk Assessment

Risk Management Cycle

Page 11: Risk Assessment

Overview● Objective● Introduction● Risk

Risk Management Cycle

●RA Methodologies CRAMM COBRA RuSecure British Standard Hierarchical Criteria

Model

● Common Failures in RA● Elements of Good RA● OCTAVE● Characteristics● Process● Criteria● Examples● OCTAVE Methodology● Choosing Methodology● Our Methodology

Page 12: Risk Assessment

RA Methodologies

● CCTA Risk Analysis and Management Method (CRAMM)

● Consultative, Objective and Bi-functional Risk Analysis (COBRA)

● RuSecure● Operationally Critical Threat, Asset, and Vulnerability

Evaluation (OCTAVE)● Failure Mode and Effects Analysis (FMEA)● British Standard (BS)

Page 13: Risk Assessment

RA Methodologies (Cont..)

● Methods support in Detecting critical places and parts in organization Detecting risk factors Collecting data about risk factors Evaluation and estimation of risk Generate report of risk management process

Page 14: Risk Assessment

Overview● Objective● Introduction● Risk

Risk Management Cycle

●RA Methodologies CRAMM COBRA RuSecure British Standard Hierarchical Criteria

Model

● Common Failures in RA● Elements of Good RA● OCTAVE● Characteristics● Process● Criteria● Examples● OCTAVE Methodology● Choosing Methodology● Our Methodology

Page 15: Risk Assessment

CRAMM

Page 16: Risk Assessment

Overview● Objective● Introduction● Risk

Risk Management Cycle

●RA Methodologies CRAMM COBRA RuSecure British Standard Hierarchical Criteria

Model

● Common Failures in RA● Elements of Good RA● OCTAVE● Characteristics● Process● Criteria● Examples● OCTAVE Methodology● Choosing Methodology● Our Methodology

Page 17: Risk Assessment

COBRA● COBRA

Two modules● COBRA Risk Consultant● ISO Compliance Analyst

Support in process of evaluating risk security Evaluation steps

● Building queries● Risk evaluation● Constructing reports

Contains library of countermeasures

Page 18: Risk Assessment

Overview● Objective● Introduction● Risk

Risk Management Cycle

●RA Methodologies CRAMM COBRA RuSecure British Standard Hierarchical Criteria

Model

● Common Failures in RA● Elements of Good RA● OCTAVE● Characteristics● Process● Criteria● Examples● OCTAVE Methodology● Choosing Methodology● Our Methodology

Page 19: Risk Assessment

RuSecure

Page 20: Risk Assessment

RuSecure

Page 21: Risk Assessment

RuSecure

Page 22: Risk Assessment

Overview● Objective● Introduction● Risk

Risk Management Cycle

● RA Methodologies CRAMM COBRA RuSecure British Standard Hierarchical Criteria

Model

● Common Failures in RA● Elements of Good RA● OCTAVE● Characteristics● Process● Criteria● Examples● OCTAVE Methodology● Choosing Methodology● Our Methodology

Page 23: Risk Assessment

British Standard

Page 24: Risk Assessment

Overview● Objective● Introduction● Risk

Risk Management Cycle

● RA Methodologies CRAMM COBRA RuSecure British Standard Hierarchical Criteria

Model

● Common Failures in RA● Elements of Good RA● OCTAVE● Characteristics● Process● Criteria● Examples● OCTAVE Methodology● Choosing Methodology● Our Methodology

Page 25: Risk Assessment

Hierarchical Criteria Model

Page 26: Risk Assessment

Overview● Objective● Introduction● Risk

Risk Management Cycle

● RA Methodologies CRAMM COBRA RuSecure British Standard Hierarchical Criteria

Model

●Common Failures in RA● Elements of Good RA● OCTAVE● Characteristics● Process● Criteria● Examples● OCTAVE Methodology● Choosing Methodology● Our Methodology

Page 27: Risk Assessment

Common Failures in RA

● Poor executive support● High cost of implementation● Untimely response● Insufficient accountability● Inability to qualitatively measure control

environment● Infrequent in assessment● Inaccurate data

Page 28: Risk Assessment

Overview● Objective● Introduction● Risk

Risk Management Cycle

● RA Methodologies CRAMM COBRA RuSecure British Standard Hierarchical Criteria

Model

● Common Failures in RA●Elements of Good RA● OCTAVE● Characteristics● Process● Criteria● Examples● OCTAVE Methodology● Choosing Methodology● Our Methodology

Page 29: Risk Assessment

Elements of good RA

● Provides clear instructions● Simplifies user Response● Identifies support contacts● Focuses on leaders as well as executors● Provides feedback to users and Risk leaders● Has a broad Scope● Identifies User for follow up if necessary and

applicable

Page 30: Risk Assessment

Overview● Objective● Introduction● Risk

Risk Management Cycle

● RA Methodologies CRAMM COBRA RuSecure British Standard Hierarchical Criteria

Model

● Common Failures in RA● Elements of Good RA●OCTAVE● Characteristics● Process● Criteria● Examples● OCTAVE Methodology● Choosing Methodology● Our Methodology

Page 31: Risk Assessment

OCTAVE

● Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE)

● Effective security risk evaluation ● Considers both organizational and technological

issues● Self-directed

Page 32: Risk Assessment

Overview● Objective● Introduction● Risk

Risk Management Cycle

● RA Methodologies CRAMM COBRA RuSecure British Standard Hierarchical Criteria

Model

● Common Failures in RA● Elements of Good RA● OCTAVE●Characteristics● Process● Criteria● Examples● OCTAVE Methodology● Choosing Methodology● Our Methodology

Page 33: Risk Assessment

Characteristics

● Identify information-related assets● Focus risk analysis activities on critical assets● Consider the relationships among critical assets, the

threats to those assets, and vulnerabilities● Evaluate risks in an operational context - how they

are used to conduct an organization’s business● Create a protection strategy for risk mitigation

Page 34: Risk Assessment

Overview● Objective● Introduction● Risk

Risk Management Cycle

● RA Methodologies CRAMM COBRA RuSecure British Standard Hierarchical Criteria

Model

● Common Failures in RA● Elements of Good RA● OCTAVE● Characteristics●Process● Criteria● Examples● OCTAVE Methodology● Choosing Methodology● Our Methodology

Page 35: Risk Assessment

OCTAVE Process

Page 36: Risk Assessment

Overview● Objective● Introduction● Risk

Risk Management Cycle

● RA Methodologies CRAMM COBRA RuSecure British Standard Hierarchical Criteria

Model

● Common Failures in RA● Elements of Good RA● OCTAVE● Characteristics● Process●Criteria● Examples● OCTAVE Methodology● Choosing Methodology● Our Methodology

Page 37: Risk Assessment

Criteria

● Principle Fundamental concepts driving the nature of the

evaluation, and defining the philosophy behind the evaluation process

● Attribute Distinctive qualities, or characteristics, of the

evaluation● Output

Define the outcomes that an analysis team must achieve during each phase

Page 38: Risk Assessment

Overview● Objective● Introduction● Risk

Risk Management Cycle

● RA Methodologies CRAMM COBRA RuSecure British Standard Hierarchical Criteria

Model

● Common Failures in RA● Elements of Good RA● OCTAVE● Characteristics● Process● Criteria●Examples● OCTAVE Methodology● Choosing Methodology● Our Methodology

Page 39: Risk Assessment

Examples

Page 40: Risk Assessment

Examples

Page 41: Risk Assessment

Overview● Objective● Introduction● Risk

Risk Management Cycle

● RA Methodologies CRAMM COBRA RuSecure British Standard Hierarchical Criteria

Model

● Common Failures in RA● Elements of Good RA● OCTAVE● Characteristics● Process● Criteria● Examples●OCTAVE Methodology● Choosing Methodology● Our Methodology

Page 42: Risk Assessment

OCTAVE Method Process

● Phase 1: Build Asset-Based Threat Profiles Process 1: Identify Senior Management

Knowledge Process 2: Identify Operational Area Knowledge Process 3: Identify Staff Knowledge Process 4: Create Threat Profiles

Page 43: Risk Assessment

OCTAVE Method Process

● Phase 2: Identify Infrastructure Vulnerabilities Process 5: Identify Key Components Process 6: Evaluate Selected Components

● Phase 3: Develop Security Strategy and Plans Process 7: Conduct Risk Analysis – An organizational set

of impact evaluation criteria are defined to establish the impact value

Process 8: Develop Protection Strategy – The team develops an organization-wide protection strategy to improve the organization’s security practices

Page 44: Risk Assessment

Overview● Objective● Introduction● Risk

Risk Management Cycle

● RA Methodologies CRAMM COBRA RuSecure British Standard Hierarchical Criteria

Model

● Common Failures in RA● Elements of Good RA● OCTAVE● Characteristics● Process● Criteria● Examples● OCTAVE Methodology●Choosing Methodology● Our Methodology

Page 45: Risk Assessment

Choosing Methods

● Depending on organization size● Depending on organization hierarchical structure● Structured or Open-Ended Method● Analysis team composition● IT resources

Page 46: Risk Assessment

Overview● Objective● Introduction● Risk

Risk Management Cycle

● RA Methodologies CRAMM COBRA RuSecure British Standard Hierarchical Criteria

Model

● Common Failures in RA● Elements of Good RA● OCTAVE● Characteristics● Process● Criteria● Examples● OCTAVE Methodology● Choosing Methodology●Our Methodology

Page 47: Risk Assessment

Our Methodology● Policies and procedures● Requirement analysis● Network Topology● Categorizing the network● Scanning based on categorization● Analysis of vulnerabilities

Use different scanning tools Penetration testing

● Risk strategy● Mitigation of risk

Page 48: Risk Assessment

References

● NIST – Risk Management Guide for Information Technology Systems

● http://www.gao.gov/special.pubs/ai00033.pdf● http://en.wikipedia.org/wiki/Risk_management● http://en.wikipedia.org/wiki/Risk_assessment● http://www.sandia.gov/ram● http://www.carnet.hr/CUC/cuc2004/program/radovi/

a5_baca/a5_full.pdf● http://www.octave.org

Page 49: Risk Assessment

Thank You