SlideShare une entreprise Scribd logo
1  sur  28
Télécharger pour lire hors ligne
M. Febri Ramadlan
Introduction and implementation
OWASP Risk Rating Management
About Me
Mohammad Febri Ramadlan (Ebi) is open source and information security enthusiast.
Currently, He is IT Security Consultant in Indonesia
Ebi also join some community such as OWASP, Code Security, Fowab (Forum Web Anak Bandung)
Last of all, his hobbies is swimming, playing music, blogging, and part time travelling.
Contact Person:
: (+62) 81809809636
: mohammadfebrir@gmail.com
: mohammadfebriramadlan
: mohammadfebriramadlan
: mohammadfebri.r
: mohammadfebrir
Introduction OWASP
Risk Rating Methodology
Risk
• Risk is hazards, consequences that may occur as a result of an ongoing process or future
event.
• Risk factor:
1. Intervension
• bad habit
• life style
• bankrupt
2. Non-Intervension
• gen
• age
• sex
Risk Management
Risk management is management process that encompasses the identification,
evaluation and control of risk that may threaten the continuity of a business or a
company's activities.
General Objectives: reduce expenditure, prevent companies from failure, increase
corporate profits, reduce production costs and many things.
Risk Assessment
Risk Assessment is methods performed to determine whether an activity / risk has an
acceptable or not.
Good assessment should to be done by a trained team and experienced.
Each company or organization have variety of acceptance level.
Risk Rating Method
Many standard and guidance that will help you:
• Trike
• AS/NZS 4360:2004 Risk Management
• CVSS
• OCTAVE
• OWASP Risk Rating Methodology
OWASP Risk Rating Methodology
Let's start with the standard risk model:
Risk = Likelihood * Impact
How to use OWASP Risk Rating Methodology:
#Step 1: Identifying a Risk
#Step 2: Factors for Estimating Likelihood
#Step 3: Factors for Estimating Impact
#Step 4: Determining Severity of the Risk
#Step 5: Deciding What to Fix
#Step 6: Customizing Your Risk Rating Model
#Step 1: Identifying a Risk
The first step is:
to identify a security risk that needs to be rated.
#Step 2: Factors for Estimating Likelihood
There are a number of factors that can help determine the likelihood. The first set of
factors are related to the threat agent involved.
 Skill level
 Motive
 Opportunity
 Size
 Ease of discovery
 Ease of exploit
 Awareness
 Intrusion detection
#Step 3: Factors for Estimating Impact
Again, each factor has a set of options:
 Loss of confidentiality
 Loss of integrity
 Loss of availability
 Loss of accountability
 Financial damage
 Reputation damage
 Non-compliance
 Privacy violation
#Step 4: Determining the Severity of the Risk (1)
• Informal Method
Likelihood and Impact Levels
0 to < 3 low
3 to < 6 medium
6 to 9 high
#Step 4: Determining the Severity of the Risk (2)
• Repeatable Method
Likelihood
Skill
level
Motive Opportunity Size Ease of
discovery
Ease of
exploit
Awareness Intrusion
detection
Overall Likelihood
5 9 4 9 3 3 4 8
5.625 Medium
#Step 4: Determining the Severity of the Risk (2)
• Repeatable Method
Likelihood
Skill
level
Motive Opportunity Size Ease of
discovery
Ease of
exploit
Awareness Intrusion
detection
Overall Likelihood
5 9 4 9 3 3 4 8
5.625 Medium
#Step 4: Determining the Severity of the Risk (2)
• Repeatable Method (2)
Impact
Loss of
confidenti-
ality
Loss of
integrity
Loss of
availability
Loss of
account-
ability
Financial
damage
Reputation
damage
Non-
compliance
Privacy
violation
Overall Impact
5 7 7 7 7 9 7 7
7.0 High
#Step 4: Determining the Severity of the Risk (2)
• Repeatable Method (2)
Impact
Loss of
confidenti-
ality
Loss of
integrity
Loss of
availability
Loss of
account-
ability
Financial
damage
Reputation
damage
Non-
compliance
Privacy
violation
Overall Impact
5 7 7 7 7 9 7 7
7.0 High
#Step 4: Determining the Severity of the Risk (3)
• Determining Severity
Overall Risk Severity
IMPACT
High MEDIUM HIGH CRITICAL
Medium LOW MEDIUM HIGH
Low NOTE LOW MEDIUM
Low Medium High
LIKELIHOOD
#Step 4: Determining the Severity of the Risk (3)
• Determining Severity
Overall Risk Severity
IMPACT
High MEDIUM HIGH CRITICAL
Medium LOW MEDIUM HIGH
Low NOTE LOW MEDIUM
Low Medium High
LIKELIHOOD
#Step 5: Deciding What to Fix
After the risks to the application have been classified there will be a prioritized list of
what to fix.
As a general rule, the most severe risks should be fixed first. It simply doesn't help
the overall risk profile to fix less important risks, even if they're easy or cheap to fix.
Remember that not all risks are worth fixing, and some loss is not only expected, but
justifiable based upon the cost of fixing the issue.
#Step 6: Customizing the Risk Rating Model
Having a risk ranking framework that is customizable for a business is critical for
adoption.
 Adding factors
 Customizing options
 Weighting factors
Tools
1. OWASP Risk Rating Template (excel format)
https://www.owasp.org/images/5/5b/OWASP_Risk_Rating_Template_Example.xlsx
2. OWASP Risk Rating Calc (one website/domain)
https://gist.github.com/ErosLever/f72bc0750af4d2e75c3a
3. OWASP Risk Rating Management
(many website/domain)
https://github.com/mohammadfebrir/o
wasp-riskrating
//category set by OWASP Top 10 - 2013
//you can assesst many website as you want (dynamic)
Question?
Thank you..

Contenu connexe

Similaire à OWASP Risk Rating Management

Introduction to risk management
Introduction to risk managementIntroduction to risk management
Introduction to risk managementMukund Sreeram
 
Stop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudStop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudWynyard Group
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementWilliam McBorrough
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementWilliam McBorrough
 
Risk management
Risk managementRisk management
Risk managementTanvirrm32
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management Ersoy AKSOY
 
Cyber Security Challenges and Strategies
Cyber Security Challenges and StrategiesCyber Security Challenges and Strategies
Cyber Security Challenges and StrategiesTom Freer
 
Enterprise Risk Management & Fraud Sample Presentation
Enterprise Risk Management & Fraud Sample PresentationEnterprise Risk Management & Fraud Sample Presentation
Enterprise Risk Management & Fraud Sample PresentationAlexander Larsen
 
Its time to grow up by Eric C.
Its time to grow up by Eric C.Its time to grow up by Eric C.
Its time to grow up by Eric C.ISSA LA
 
2-iosh_powerpoint-ra-back-to-basics.pptx
2-iosh_powerpoint-ra-back-to-basics.pptx2-iosh_powerpoint-ra-back-to-basics.pptx
2-iosh_powerpoint-ra-back-to-basics.pptxwaleed50405
 
Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides SlideTeam
 
Risk Assessment Powerpoint Presentation Slides
Risk Assessment Powerpoint Presentation SlidesRisk Assessment Powerpoint Presentation Slides
Risk Assessment Powerpoint Presentation SlidesSlideTeam
 
practical-approach-to-strategic-risk-management-220318051837.pdf
practical-approach-to-strategic-risk-management-220318051837.pdfpractical-approach-to-strategic-risk-management-220318051837.pdf
practical-approach-to-strategic-risk-management-220318051837.pdfHany Farouk
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptAnkitSharma13479
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptKameswara Rao Poranki
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptnew617824
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptQuỳnh Nhi
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptaminrahman34
 
strategic-risk-management
strategic-risk-management strategic-risk-management
strategic-risk-management dollumehta1
 

Similaire à OWASP Risk Rating Management (20)

Introduction to risk management
Introduction to risk managementIntroduction to risk management
Introduction to risk management
 
Stop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudStop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraud
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
Risk management
Risk managementRisk management
Risk management
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Cyber Security Challenges and Strategies
Cyber Security Challenges and StrategiesCyber Security Challenges and Strategies
Cyber Security Challenges and Strategies
 
Enterprise Risk Management & Fraud Sample Presentation
Enterprise Risk Management & Fraud Sample PresentationEnterprise Risk Management & Fraud Sample Presentation
Enterprise Risk Management & Fraud Sample Presentation
 
Its time to grow up by Eric C.
Its time to grow up by Eric C.Its time to grow up by Eric C.
Its time to grow up by Eric C.
 
Wisegate_GeekSpeak_LG
Wisegate_GeekSpeak_LGWisegate_GeekSpeak_LG
Wisegate_GeekSpeak_LG
 
2-iosh_powerpoint-ra-back-to-basics.pptx
2-iosh_powerpoint-ra-back-to-basics.pptx2-iosh_powerpoint-ra-back-to-basics.pptx
2-iosh_powerpoint-ra-back-to-basics.pptx
 
Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides
 
Risk Assessment Powerpoint Presentation Slides
Risk Assessment Powerpoint Presentation SlidesRisk Assessment Powerpoint Presentation Slides
Risk Assessment Powerpoint Presentation Slides
 
practical-approach-to-strategic-risk-management-220318051837.pdf
practical-approach-to-strategic-risk-management-220318051837.pdfpractical-approach-to-strategic-risk-management-220318051837.pdf
practical-approach-to-strategic-risk-management-220318051837.pdf
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.ppt
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.ppt
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.ppt
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.ppt
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.ppt
 
strategic-risk-management
strategic-risk-management strategic-risk-management
strategic-risk-management
 

Plus de Mohammad Febri

RumahSehat Enterprise Architecture using TOGAF
RumahSehat Enterprise Architecture using TOGAFRumahSehat Enterprise Architecture using TOGAF
RumahSehat Enterprise Architecture using TOGAFMohammad Febri
 
Automated IOC Detection and Response through Seamless Orchestration.pdf
Automated IOC Detection and Response through Seamless Orchestration.pdfAutomated IOC Detection and Response through Seamless Orchestration.pdf
Automated IOC Detection and Response through Seamless Orchestration.pdfMohammad Febri
 
Cybersecurity and Risk Management Technology
Cybersecurity and Risk Management TechnologyCybersecurity and Risk Management Technology
Cybersecurity and Risk Management TechnologyMohammad Febri
 
Cloud Security: Securing The Invisible Thing
Cloud Security: Securing The Invisible ThingCloud Security: Securing The Invisible Thing
Cloud Security: Securing The Invisible ThingMohammad Febri
 
STRIDE: Digging Vulnerability by Threat Modelling
STRIDE: Digging Vulnerability by Threat ModellingSTRIDE: Digging Vulnerability by Threat Modelling
STRIDE: Digging Vulnerability by Threat ModellingMohammad Febri
 
Hacktoberfest Mozilla Indonesia 2020
Hacktoberfest Mozilla Indonesia 2020Hacktoberfest Mozilla Indonesia 2020
Hacktoberfest Mozilla Indonesia 2020Mohammad Febri
 
Leadership Skills - Communication in Organization
Leadership Skills - Communication in OrganizationLeadership Skills - Communication in Organization
Leadership Skills - Communication in OrganizationMohammad Febri
 
CDEF - Security Incident Handling and Response
CDEF - Security Incident Handling and ResponseCDEF - Security Incident Handling and Response
CDEF - Security Incident Handling and ResponseMohammad Febri
 
Vooya Passion Playground 2021 - Journey in Cybersecurity
Vooya Passion Playground 2021 - Journey in CybersecurityVooya Passion Playground 2021 - Journey in Cybersecurity
Vooya Passion Playground 2021 - Journey in CybersecurityMohammad Febri
 
Security Architecture: 3 Lines of Defense
Security Architecture: 3 Lines of DefenseSecurity Architecture: 3 Lines of Defense
Security Architecture: 3 Lines of DefenseMohammad Febri
 

Plus de Mohammad Febri (10)

RumahSehat Enterprise Architecture using TOGAF
RumahSehat Enterprise Architecture using TOGAFRumahSehat Enterprise Architecture using TOGAF
RumahSehat Enterprise Architecture using TOGAF
 
Automated IOC Detection and Response through Seamless Orchestration.pdf
Automated IOC Detection and Response through Seamless Orchestration.pdfAutomated IOC Detection and Response through Seamless Orchestration.pdf
Automated IOC Detection and Response through Seamless Orchestration.pdf
 
Cybersecurity and Risk Management Technology
Cybersecurity and Risk Management TechnologyCybersecurity and Risk Management Technology
Cybersecurity and Risk Management Technology
 
Cloud Security: Securing The Invisible Thing
Cloud Security: Securing The Invisible ThingCloud Security: Securing The Invisible Thing
Cloud Security: Securing The Invisible Thing
 
STRIDE: Digging Vulnerability by Threat Modelling
STRIDE: Digging Vulnerability by Threat ModellingSTRIDE: Digging Vulnerability by Threat Modelling
STRIDE: Digging Vulnerability by Threat Modelling
 
Hacktoberfest Mozilla Indonesia 2020
Hacktoberfest Mozilla Indonesia 2020Hacktoberfest Mozilla Indonesia 2020
Hacktoberfest Mozilla Indonesia 2020
 
Leadership Skills - Communication in Organization
Leadership Skills - Communication in OrganizationLeadership Skills - Communication in Organization
Leadership Skills - Communication in Organization
 
CDEF - Security Incident Handling and Response
CDEF - Security Incident Handling and ResponseCDEF - Security Incident Handling and Response
CDEF - Security Incident Handling and Response
 
Vooya Passion Playground 2021 - Journey in Cybersecurity
Vooya Passion Playground 2021 - Journey in CybersecurityVooya Passion Playground 2021 - Journey in Cybersecurity
Vooya Passion Playground 2021 - Journey in Cybersecurity
 
Security Architecture: 3 Lines of Defense
Security Architecture: 3 Lines of DefenseSecurity Architecture: 3 Lines of Defense
Security Architecture: 3 Lines of Defense
 

Dernier

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Dernier (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

OWASP Risk Rating Management

  • 1. M. Febri Ramadlan Introduction and implementation OWASP Risk Rating Management
  • 2. About Me Mohammad Febri Ramadlan (Ebi) is open source and information security enthusiast. Currently, He is IT Security Consultant in Indonesia Ebi also join some community such as OWASP, Code Security, Fowab (Forum Web Anak Bandung) Last of all, his hobbies is swimming, playing music, blogging, and part time travelling. Contact Person: : (+62) 81809809636 : mohammadfebrir@gmail.com : mohammadfebriramadlan : mohammadfebriramadlan : mohammadfebri.r : mohammadfebrir
  • 4. Risk • Risk is hazards, consequences that may occur as a result of an ongoing process or future event. • Risk factor: 1. Intervension • bad habit • life style • bankrupt 2. Non-Intervension • gen • age • sex
  • 5. Risk Management Risk management is management process that encompasses the identification, evaluation and control of risk that may threaten the continuity of a business or a company's activities. General Objectives: reduce expenditure, prevent companies from failure, increase corporate profits, reduce production costs and many things.
  • 6. Risk Assessment Risk Assessment is methods performed to determine whether an activity / risk has an acceptable or not. Good assessment should to be done by a trained team and experienced. Each company or organization have variety of acceptance level.
  • 7. Risk Rating Method Many standard and guidance that will help you: • Trike • AS/NZS 4360:2004 Risk Management • CVSS • OCTAVE • OWASP Risk Rating Methodology
  • 8. OWASP Risk Rating Methodology Let's start with the standard risk model: Risk = Likelihood * Impact How to use OWASP Risk Rating Methodology: #Step 1: Identifying a Risk #Step 2: Factors for Estimating Likelihood #Step 3: Factors for Estimating Impact #Step 4: Determining Severity of the Risk #Step 5: Deciding What to Fix #Step 6: Customizing Your Risk Rating Model
  • 9. #Step 1: Identifying a Risk The first step is: to identify a security risk that needs to be rated.
  • 10. #Step 2: Factors for Estimating Likelihood There are a number of factors that can help determine the likelihood. The first set of factors are related to the threat agent involved.  Skill level  Motive  Opportunity  Size  Ease of discovery  Ease of exploit  Awareness  Intrusion detection
  • 11. #Step 3: Factors for Estimating Impact Again, each factor has a set of options:  Loss of confidentiality  Loss of integrity  Loss of availability  Loss of accountability  Financial damage  Reputation damage  Non-compliance  Privacy violation
  • 12. #Step 4: Determining the Severity of the Risk (1) • Informal Method Likelihood and Impact Levels 0 to < 3 low 3 to < 6 medium 6 to 9 high
  • 13. #Step 4: Determining the Severity of the Risk (2) • Repeatable Method Likelihood Skill level Motive Opportunity Size Ease of discovery Ease of exploit Awareness Intrusion detection Overall Likelihood 5 9 4 9 3 3 4 8 5.625 Medium
  • 14. #Step 4: Determining the Severity of the Risk (2) • Repeatable Method Likelihood Skill level Motive Opportunity Size Ease of discovery Ease of exploit Awareness Intrusion detection Overall Likelihood 5 9 4 9 3 3 4 8 5.625 Medium
  • 15. #Step 4: Determining the Severity of the Risk (2) • Repeatable Method (2) Impact Loss of confidenti- ality Loss of integrity Loss of availability Loss of account- ability Financial damage Reputation damage Non- compliance Privacy violation Overall Impact 5 7 7 7 7 9 7 7 7.0 High
  • 16. #Step 4: Determining the Severity of the Risk (2) • Repeatable Method (2) Impact Loss of confidenti- ality Loss of integrity Loss of availability Loss of account- ability Financial damage Reputation damage Non- compliance Privacy violation Overall Impact 5 7 7 7 7 9 7 7 7.0 High
  • 17. #Step 4: Determining the Severity of the Risk (3) • Determining Severity Overall Risk Severity IMPACT High MEDIUM HIGH CRITICAL Medium LOW MEDIUM HIGH Low NOTE LOW MEDIUM Low Medium High LIKELIHOOD
  • 18. #Step 4: Determining the Severity of the Risk (3) • Determining Severity Overall Risk Severity IMPACT High MEDIUM HIGH CRITICAL Medium LOW MEDIUM HIGH Low NOTE LOW MEDIUM Low Medium High LIKELIHOOD
  • 19. #Step 5: Deciding What to Fix After the risks to the application have been classified there will be a prioritized list of what to fix. As a general rule, the most severe risks should be fixed first. It simply doesn't help the overall risk profile to fix less important risks, even if they're easy or cheap to fix. Remember that not all risks are worth fixing, and some loss is not only expected, but justifiable based upon the cost of fixing the issue.
  • 20. #Step 6: Customizing the Risk Rating Model Having a risk ranking framework that is customizable for a business is critical for adoption.  Adding factors  Customizing options  Weighting factors
  • 21. Tools
  • 22. 1. OWASP Risk Rating Template (excel format) https://www.owasp.org/images/5/5b/OWASP_Risk_Rating_Template_Example.xlsx
  • 23. 2. OWASP Risk Rating Calc (one website/domain) https://gist.github.com/ErosLever/f72bc0750af4d2e75c3a
  • 24. 3. OWASP Risk Rating Management (many website/domain) https://github.com/mohammadfebrir/o wasp-riskrating
  • 25. //category set by OWASP Top 10 - 2013
  • 26. //you can assesst many website as you want (dynamic)