IT Security Management and Risk Assessment
IT Security Management and Risk Assessment
IT Security Management
and Risk Assessment
IT Security Management Overview
What can be
What assets need to be How are those done to
protected assets counter those
threatened threats
o Security risk assessment is needed for each asset in the organization that requires protection; this assessment must answer
the three key questions listed above.
o Provides the information necessary to decide what management, operational, and technical controls are needed to reduce the
risks identified to an acceptable level or otherwise accept the resultant risk.
The process continues by:
- selecting suitable controls
- and then writing plans and procedures to ensure these necessary controls
are implemented effectively.
- and the plans and procedures kept up-to-date, because of the rapid rate
of change in both the technology and the risk environment.
Table 14.1
ISO/IEC 27000 Series of Standards on IT Security Techniques
Monitoring the
implementation
Determining Identifying and and operation of
organizational Determining analyzing safeguards that Developing and
Identifying Specifying are necessary in implementing a Detecting
IT security organizational security threats
and analyzing appropriate order to cost security and reacting
objectives, IT security to IT assets effectively protect
risks safeguards awareness to incidents
strategies, and requirements within the the information program
policies organization and services
within the
organization
ISO 27001
ISO 27005
Plan establish security policy, objectives, processes and procedures; perform risk assessment; develop risk treatment
plan with appropriate selection of controls or acceptance of risk.
Act maintain and improve the information security risk management process in response to incidents, review, or
identified changes.
Organizational Context and Security Policy
Strategies - how to o What data created, managed, processed, and stored by the IT systems
need protection?
meet objectives
o What are the consequences to the organization of a security failure in their
IT systems?
Policies - identify
what needs to be
done If the answers to some of the above questions show that IT systems
are important to the organization in achieving its goals, then clearly the
risks to them should be assessed and appropriate action taken to
address any deficiencies identified. A list of key organization security
objectives should result from this examination.
Security Policy
Needs to address:
• Scope and purpose including relation of objectives to business, legal, regulatory requirements
• IT security requirements
• Assignment of responsibilities
• Risk management approach
• Security awareness and training
• General personnel issues and any legal sanctions
• Integration of security into systems development
• Information classification scheme
• Contingency and business continuity planning
• Incident detection and handling processes
• How and when policy reviewed, and change control to it
• The intent of the policy is to provide a clear overview of how an organization’s IT infrastructure supports its
overall business objectives in general, and more specifically what security requirements must be provided in
order to do this most effectively.
Management Support
• IT security policy must be supported by senior management
• Need IT security officer
o To provide consistent overall supervision
o Liaison with senior management
o Maintenance of IT security objectives, strategies, policies
o Handle incidents
o Management of IT security awareness and training programs
o Interaction with IT project security officers
• Large organizations need separate IT project security officers
associated with major projects and systems
o Manage security policies within their area
Security Risk Assessment
Assess using
formal Suitable for large
structured organizations
process with IT systems
• Number of stages critical to their
• Identify threats and
vulnerabilities to assets
business
• Identify likelihood of risk objectives
occurring and
consequences
Combined Approach
Results in the development of a
strategic picture of the IT
resources and where major risks
are likely to occur
Highest cost
• Risk appetite
o The level of risk the organization views as acceptable
• Asset: A system resource or capability of value to its
owner that requires protection
• Threat: A potential for a threat source to exploit a
vulnerability in some asset, which if it occurs may
compromise the security of the asset and cause harm to
the asset’s owner
• Vulnerability: A flaw or weakness in an asset’s design,
implementation, or operation and management that
could be exploited by some threat
• Risk: The potential for loss computed as the
combination of the likelihood that a given threat exploits
some vulnerability to an asset, and the magnitude of
harmful consequence that results to the asset’s owner
Asset Identification
• Identify assets to examine
• Draw on expertise of people in relevant areas of organization
to identify key assets
o Identify and interview such personnel
Asset
Confidentiality Availability
Anything that
might hinder or
prevent an asset
from providing
appropriate levels
of the key security
services
Reliability Accountability
Authenticity
Threat Sources
• Threats may be
o Natural “acts of God”
o Man-made
o Accidental or deliberate
• Motivation
• Capability
• Resources
• Probability of attack
• Deterrence
What can be
What assets need to be How are those done to
protected assets counter those
threatened threats
o Security risk assessment is needed for each asset in the organization that requires protection; this assessment must answer
the three key questions listed above.
o Provides the information necessary to decide what management, operational, and technical controls are needed to reduce the
risks identified to an acceptable level or otherwise accept the resultant risk.
Risk Analysis
• Specify likelihood of occurrence of each identified threat to
asset given existing controls
• Specify consequence should threat occur
• Derive overall risk rating for each threat
o Risk = probability threat occurs x cost to organization
• Hard to determine accurate probabilities and realistic cost
consequences
• Use qualitative, not quantitative, ratings
Table 14.2
Risk Likelihood
Table 14.3
Risk
Consequences
Risk Register
Risk Treatment Alternatives
Choosing to accept a risk level greater than normal
Risk for business reasons, due to excessive cost or time
acceptance needed to treat the risk. Management must then
accept responsibility for the consequences
Sharing
responsibility for
Risk transfer the risk with a
third party
Availability, integrity of
maintenance/production system