Friday, August 23, 2013

Risk Management


RISK MANAGEMENT: IDENTIFYING AND ASSESSING RISK Learning Objectives:

Upon completion of this chapter you should be able to:
– Define risk management and its role in the SecSDLC
– Understand how risk is identified
– Assess risk based on the likelihood of occurrence and impact on an organization

– Grasp the fundamental aspects of documenting risk identification and assessment.

RiskManagement:
 If you know the enemy and know yourself, you need not fear the result of a hundred battles.
 If you know yourself but not the enemy, for every victory gained you will also suffer a defeat.
 If you know neither the enemy nor yourself, you will succumb in every battle.

Know Ourselves:
 First, we must identify, examine, and understand the information, and systems, currently in place
 In order to protect our assets, defined here as the information and the systems that use, store, and transmit it, we have to understand everything about the information
 Once we have examined these aspects, we can then look at what we are already doing to protect the information and systems from the threats.

Know the Enemy:
 For information security this means identifying, examining, and understanding the threats that most directly affect our organization and the security of our organization‘s information assets
 We then can use our understanding of these aspects to create a list of threats prioritized by importance to the organization.

Accountability for RiskManagement:
 It is the responsibility of each community of interest to manage risks; each community has a role to play:
– Information Security - best understands the threats and attacks that introduce risk
into the organization
– Management and Users – play a part in the early detection and response process - they also insure sufficient resources are allocated
– Information Technology – must assist in building secure systems and operating them safely.

Accountability for RiskManagement:
 All three communities must also:
– Evaluate the risk controls
– Determine which control options are cost effective
– Assist in acquiring or installing needed controls
– Ensure that the controls remain effective.

RiskManagement Process:
 Management reviews asset inventory
 The threats and vulnerabilities that have been identified as dangerous to the asset inventory must be reviewed and verified as complete and current
 The potential controls and mitigation strategies should be reviewed for completeness
 The cost effectiveness of each control should be reviewed as well, and the decisions about deployment of controls revisited
Risk Identification:
 A risk management strategy calls on us to ―know ourselves‖ by identifying, classifying,
and prioritizing the organization‘s information assets
 These assets are the targets of various threats and threat agents and our goal is to protect them from these threats
 Next comes threat identification:
– Assess the circumstances and setting of each information asset
– Identify the vulnerabilities and begin exploring the controls that might be used to manage the risks.

Asset Identification and Valuation:
 This iterative process begins with the identification of assets, including all of the elements of an organization‘s system: people, procedures, data and information, software, hardware, and networking elements
 Then, we classify and categorize the assets adding details as we dig deeper into the analysis.


No comments:

Post a Comment