SlideShare une entreprise Scribd logo
1  sur  23
Information Systems Risk
Assessment Framework
(ISRAF)
(Addendum of NIST 800-39 information systems risk
management and revision of NIST SP 800 30 )




                              Prepared by
                              S. Periyakaruppan
                              (PK)
Need of Addendum/ Revision ?

   Ensure converged & integrated process
   Address the challenges in traditional approach
   Adaptive & Modular working model of information systems risk
    assessment.
   Improve the organizations risk based decision.
   Bring in value addition to business
Should It get transformed ? ! Why

   To make risk management an integral part of business and project
    management, IT Life cycle management.
   TO facilitate with practical approach to address risk.
   To Evolve business aligned approach.
   TO tailor down the model of domain agnostic approach.
Does it need a Model/Framework
     ??
   Evolve descriptive process and systematic thinking.
   Emerging business demand and process convergence
   Enhance communication among functional entities.
   Invoke result oriented approach
   Predict results in the systematic model




             !!!!!!! ???
Assessing risk – What & Why
   To identify the potential opportunity of a probable consequence of an
    adverse impact due to a weakness in the information systems.
   To support business with risk based decision.
   To identify external and internal threat exposures to an organization
    from nation and another organization, vice versa.
   To monitor the on-going risk exposure of the organization.
   To observe the effectiveness of information security program.
   To assist with Metrics for information security program management.




                                  ???????
Assessing risks - When
   During architecture development –( Org,process & Information
    system)
   During functional and business systems integration.
   During all phases of SDLC (Systems acquisition and development life
    cycle)
   During acquisition of new security or business/function solution.
   During modification of mission critical/business critical systems.
   During third party vendor/product acquisition.
   During decommissioning of systems/functions/groups of the
    organization
Risk framing  Model ???
   Determine the uncertainty of the risk and associated risk
    constraints.
   Define the risk tolerance and priority, and tradeoffs.
   Determine the set of risk factors, assessment scale and associated
    algorithm for combing factors
   Assist in precise risk communication and sketch out boundaries of
    information system authorization.
   Enhance the risk decision with appropriate information.
   Incorporate de-duplication in hierarchical risk management model.
   Determine the context of the entire risk assessment
    process/assessment/approach.
The Model/Framework
                                                      Frame
                                                    (CONTEXT)

         Tier 1


    Tier 2


Tier 3




             The Frame work addresses comprehensive risk management
             function in a hierarchical approach and leverage context centric
             approach.
The Focus

       Assess                  Respond              Monitor



Risk Assessment is a key element of risk
management

 Risk Assessment process in modular approach.
 Preparation checklist.
 Activity checklist.
 Protocol to maintain appropriate result of risk
  assessments.
 Method of communicating risk results across
  organization.
Strategy/Approach
Risk – Key concepts
   Risk aggregate  consolidation of individual Tier1/Tier2/Tier3 risks
    in to a cumulative risks to identify relationship among risks at various
    levels.
   Threat shifting the dynamic variation on threat source in response
    to the perceived countermeasures.
   Residual risk  Tolerable risk remain post the mitigation to an exten
    possible to reduce the level of adverse impact to the organization.
   Adversarial risk Risk that has an adverse effect by adversarial
    threats.
   Adversarial threats  Threat has an intrinsic characteristics of direc
    adverse impact. – Ex., business operation interruption.
   Non-adversarial threats  Threats has no direct or immediate effect
    of a threat impact. – Ex., Exposure of system errors, competitive
    intelligence gathering.
Risk – Key Factors
   Threat Event  Possible adverse impact through a potential
    circumstances/event to organization from national and
    another organization, vice versa.
   Threat source The intend and the method of exploitation
    or attack vector.
   Likelihood  The Probability of a threat become reality.
   Vulnerability  Flaw in an information system that can lead
    to a potential threat.
   Adverse Impact  The negative consequences /damage
    leads to potential impact to the business / organization/
    nation by the consequences of an exercised vulnerability
   Predisposing condition  The existing and known lack of
    controls/ in adequate countermeasures as part of available
    solution.
   Risk  Measure/ Unit of the extent to which an entity is
    threaten by a potential circumstances.
Assessing Risk – High Level
  Process


Step -1   Step -2   Step -3   Step -4
Prepare for Assessment
Conducting Assessment
 Identify Threat source and          Step 1   Intent,Target,Capability
 events                                       Capability of
                                              adversaries
                                              Range of effects
 Identify vulnerabilities and pre-   Step 2   Effect of existing
 disposing conditions                         controls
                                              Intentional/accidental
                                              flaw /weakness in
 Determine likelihood of             Step 3
                                              system/process
 Occurrence
                                              Depends on the degree
                                              of Step 1 and the effect
 Determine Magnitude of              Step 4   of Step 2
 Impact
                                              Result of BIA
                                              Depends on effective
                                     Step 5   BCP/DR
 Determine Risk
                                              MTTR/MTBF
                                              RTO/RPO

Risk  Combination of Step 3 and
Step 4
Method of Risk Analysis


Threat oriented              Vulnerability                Asset/Impact
• Identify threat source     oriented                     Oriented
  and event                  • Identify pre-disposing     • Identify
• Developing Threat            conditions                   mission/business
  scenario and model         • Identify exploitable         critical assets
• Identify vulnerabilities     vulnerabilities            • Analyze the
  in context of threats      • Identify threats related     consequences of the
                               to the known/open            adversarial threat
                               vulnerabilities              event
                                                          • Identify vulnerabilities
                                                            to the threat
                                                            events/scenario of
                                                            critical assets with
                                                            severe adverse impact.
Method of Risk Assessments
                    • Objective oriented assessment
                    • Using non-numerical values to define risk
                      factors
   Qualitative      • Likelihood and impact with definite value based
                      on individual expertise



                    • Subjective oriented approach
                    • Using numerical values to define risk factors
  Quantitative      • Likelihood and impact with definite number
                      based on history of events.




                    • Contextual analysis and result oriented
                      approach
                    • Using Bin values (numerical range) with unique
Semi Quantitative     meaning and context.
                    • Likelihood and impact derived with range of
                      numerical values with degree of unique context
Sample Assessment Scale
Qualitative           Quantitative               Semi Qualitative




    Caution: The assessment scales and its descriptive meanings are subject
    to vary between organization to organization and with in organization
    discretion to the organizational culture and its policies and guidelines
Communicate Result
                             Communicate to the         Furnish evidence
     Determine the
                                 designated                comply with
  appropriate method of
                               organizational         organizational policies
     communication
                                stakeholders              & Guidelines




Format defined by          Identify appropriate      Capture appropriate
organization.               authority.                 analysis data support
Executive briefings        Ensure right              the result.
Presenting                 information reach right    Include applicable
Illustrative risk figures   person at right time.      supporting documents
Risk Assessment             Present contextual       to convey the degree
Dashboards                  information in             of results
Out sketch the             accordance with risk        Identify and
organizational              strategy                   document the source
prioritized risk                                       of internal and external
                                                       information.
Maintain Risk Posture

                                          Reconfirm the
 Identify Key Risk   Define Frequency
                                           scope and
      factors             of revisit
                                          assumptions
• Monitor the key    • Track the risk   • Get the
  risk factors         response as        concurrence of
• Document the         required           scope and
  variations.        • Initiate the       assumptions
• Re-define the        assessment         from appropriate
  key risk factors     when needed        authorities
                     • Communicate      • Document the
                       the results to     plan of action
                       organizational     with respect to
                       entities           the risk
                                          response.
Applications of Risk
Assessment      Information Risk Strategy decisions
                Contribute EA design decisions
                IS Policy/Program/Guidance decisions
                Common Control/Security Standards
                decisions.
                Help risk response –
                Avoid/Accept/Mitigate/Transfer
                Investment decisions – ROSI(Returns Of
                Security Investments)/VAR(value at
                Risk)/ALE(Annual Loss Expectancy)

                Support EA(Enterprise Architecture)
                integration in to SA.
                Assist in business/function information
                continuity decisions
                Assist in business process resiliency
                requirements



                 Contribute IS systems design decisions
                 Supports vendor/product decisions
                 Supports on-going system operations
                 authorizations
Risk Assessment in RMF life
Cycle
             1




                     2

    6



                         3


        5


                 4
Organizational cultural effects on
     Risk assessment

   Risk models differ based on priorities and tradeoffs with respect to
    the pre-disposing condition of organizational culture
   Determination of risk factors and valuation of risk factors to constant
    values or qualitative approach depends on organizational culture
   Determination of risk assessment approach and analysis approach
    depends on organizational culture.
   Assessment and analysis approach may vary with in organization in
    different tiers.

Contenu connexe

Tendances

Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessmentprimeteacher32
 
Integrating Strategy and Risk Management
Integrating Strategy and Risk ManagementIntegrating Strategy and Risk Management
Integrating Strategy and Risk ManagementAndrew Smart
 
Data Driven Risk Assessment
Data Driven Risk AssessmentData Driven Risk Assessment
Data Driven Risk AssessmentResolver Inc.
 
Risk Management Procedure PowerPoint Presentation Slides
Risk Management Procedure PowerPoint Presentation Slides Risk Management Procedure PowerPoint Presentation Slides
Risk Management Procedure PowerPoint Presentation Slides SlideTeam
 
Operational Risk Management - A Gateway to managing the risk profile of your...
Operational Risk Management -  A Gateway to managing the risk profile of your...Operational Risk Management -  A Gateway to managing the risk profile of your...
Operational Risk Management - A Gateway to managing the risk profile of your...Eneni Oduwole
 
A compliance officer's guide to third party risk management
A compliance officer's guide to third party risk managementA compliance officer's guide to third party risk management
A compliance officer's guide to third party risk managementSALIH AHMED ISLAM
 
Implementing Enterprise Risk Management with ISO 31000:2009
Implementing Enterprise Risk Management with ISO 31000:2009Implementing Enterprise Risk Management with ISO 31000:2009
Implementing Enterprise Risk Management with ISO 31000:2009Goutama Bachtiar
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk ManagementGoutama Bachtiar
 
Business Continuity Workshop Final
Business Continuity Workshop   FinalBusiness Continuity Workshop   Final
Business Continuity Workshop FinalBill Lisse
 
Global CCISO Forum 2018 | Tari Schreider "The Fault Lies in the Architecture"
Global CCISO Forum 2018 | Tari Schreider "The Fault Lies in the Architecture"Global CCISO Forum 2018 | Tari Schreider "The Fault Lies in the Architecture"
Global CCISO Forum 2018 | Tari Schreider "The Fault Lies in the Architecture"EC-Council
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
Strategic Risk: Linking Risk Management & Strategy Management processes
Strategic Risk: Linking Risk Management & Strategy Management processesStrategic Risk: Linking Risk Management & Strategy Management processes
Strategic Risk: Linking Risk Management & Strategy Management processesGlobalStrategyTribe
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
 
GRC - Isaca Training 16.9.2014
GRC - Isaca Training 16.9.2014GRC - Isaca Training 16.9.2014
GRC - Isaca Training 16.9.2014Paul Simidi
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodologyRashad Aliyev
 
Third-Party Risk Management
Third-Party Risk ManagementThird-Party Risk Management
Third-Party Risk ManagementMark Scales
 
Introduction to Risk Management ISO31000:2009
Introduction to Risk Management ISO31000:2009Introduction to Risk Management ISO31000:2009
Introduction to Risk Management ISO31000:2009Ahmad Azwang Aisram Omar
 

Tendances (20)

Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessment
 
Integrating Strategy and Risk Management
Integrating Strategy and Risk ManagementIntegrating Strategy and Risk Management
Integrating Strategy and Risk Management
 
Data Driven Risk Assessment
Data Driven Risk AssessmentData Driven Risk Assessment
Data Driven Risk Assessment
 
Key risk indicators shareslide
Key risk indicators shareslideKey risk indicators shareslide
Key risk indicators shareslide
 
Risk Management Procedure PowerPoint Presentation Slides
Risk Management Procedure PowerPoint Presentation Slides Risk Management Procedure PowerPoint Presentation Slides
Risk Management Procedure PowerPoint Presentation Slides
 
Operational Risk Management - A Gateway to managing the risk profile of your...
Operational Risk Management -  A Gateway to managing the risk profile of your...Operational Risk Management -  A Gateway to managing the risk profile of your...
Operational Risk Management - A Gateway to managing the risk profile of your...
 
Risk Management Methodology - Copy
Risk Management Methodology - CopyRisk Management Methodology - Copy
Risk Management Methodology - Copy
 
A compliance officer's guide to third party risk management
A compliance officer's guide to third party risk managementA compliance officer's guide to third party risk management
A compliance officer's guide to third party risk management
 
Implementing Enterprise Risk Management with ISO 31000:2009
Implementing Enterprise Risk Management with ISO 31000:2009Implementing Enterprise Risk Management with ISO 31000:2009
Implementing Enterprise Risk Management with ISO 31000:2009
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk Management
 
Business Continuity Workshop Final
Business Continuity Workshop   FinalBusiness Continuity Workshop   Final
Business Continuity Workshop Final
 
Global CCISO Forum 2018 | Tari Schreider "The Fault Lies in the Architecture"
Global CCISO Forum 2018 | Tari Schreider "The Fault Lies in the Architecture"Global CCISO Forum 2018 | Tari Schreider "The Fault Lies in the Architecture"
Global CCISO Forum 2018 | Tari Schreider "The Fault Lies in the Architecture"
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
Stakeholder Risk Management
Stakeholder Risk ManagementStakeholder Risk Management
Stakeholder Risk Management
 
Strategic Risk: Linking Risk Management & Strategy Management processes
Strategic Risk: Linking Risk Management & Strategy Management processesStrategic Risk: Linking Risk Management & Strategy Management processes
Strategic Risk: Linking Risk Management & Strategy Management processes
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
GRC - Isaca Training 16.9.2014
GRC - Isaca Training 16.9.2014GRC - Isaca Training 16.9.2014
GRC - Isaca Training 16.9.2014
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
 
Third-Party Risk Management
Third-Party Risk ManagementThird-Party Risk Management
Third-Party Risk Management
 
Introduction to Risk Management ISO31000:2009
Introduction to Risk Management ISO31000:2009Introduction to Risk Management ISO31000:2009
Introduction to Risk Management ISO31000:2009
 

En vedette

A Method for Evaluating End-User Development Technologies
A Method for Evaluating End-User Development TechnologiesA Method for Evaluating End-User Development Technologies
A Method for Evaluating End-User Development TechnologiesClaudia Melo
 
Strategic information system management
Strategic information system managementStrategic information system management
Strategic information system managementPragnya Sahoo
 
Supply Chain Management
Supply Chain ManagementSupply Chain Management
Supply Chain ManagementAnupam Basu
 
Information risk management
Information risk managementInformation risk management
Information risk managementAkash Saraswat
 
System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)BPalmer13
 
A Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System RiskA Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System Riskamiable_indian
 
Challenge of Outsourcing
Challenge of OutsourcingChallenge of Outsourcing
Challenge of OutsourcingNascenia IT
 
Characterization of strategic information systems
Characterization of strategic information systemsCharacterization of strategic information systems
Characterization of strategic information systemsSuresh Kumar
 
End user development
End user developmentEnd user development
End user developmentgavhays
 
Make or buy, insourcingoutsourcing
Make or buy, insourcingoutsourcingMake or buy, insourcingoutsourcing
Make or buy, insourcingoutsourcingAnkit
 
Chapter 6 Information System-Critical Success Factor
Chapter 6 Information System-Critical Success FactorChapter 6 Information System-Critical Success Factor
Chapter 6 Information System-Critical Success FactorSanat Maharjan
 
Strategic information system
Strategic information system Strategic information system
Strategic information system Megha_pareek
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and RisksMiguel Rebollo
 
Information system and security control
Information system and security controlInformation system and security control
Information system and security controlCheng Olayvar
 

En vedette (20)

A Method for Evaluating End-User Development Technologies
A Method for Evaluating End-User Development TechnologiesA Method for Evaluating End-User Development Technologies
A Method for Evaluating End-User Development Technologies
 
Make or buy diagram
Make or buy diagramMake or buy diagram
Make or buy diagram
 
Strategic information system management
Strategic information system managementStrategic information system management
Strategic information system management
 
Make or Buy
Make or BuyMake or Buy
Make or Buy
 
Outsource
OutsourceOutsource
Outsource
 
Supply Chain Management
Supply Chain ManagementSupply Chain Management
Supply Chain Management
 
Outsourcing
OutsourcingOutsourcing
Outsourcing
 
Information risk management
Information risk managementInformation risk management
Information risk management
 
System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)
 
A Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System RiskA Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System Risk
 
Challenge of Outsourcing
Challenge of OutsourcingChallenge of Outsourcing
Challenge of Outsourcing
 
Characterization of strategic information systems
Characterization of strategic information systemsCharacterization of strategic information systems
Characterization of strategic information systems
 
End user development
End user developmentEnd user development
End user development
 
Make or buy, insourcingoutsourcing
Make or buy, insourcingoutsourcingMake or buy, insourcingoutsourcing
Make or buy, insourcingoutsourcing
 
Chapter 6 Information System-Critical Success Factor
Chapter 6 Information System-Critical Success FactorChapter 6 Information System-Critical Success Factor
Chapter 6 Information System-Critical Success Factor
 
End user development
End user developmentEnd user development
End user development
 
Strategic information system
Strategic information system Strategic information system
Strategic information system
 
Outsourcing Ppt 1
Outsourcing Ppt 1Outsourcing Ppt 1
Outsourcing Ppt 1
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
 
Information system and security control
Information system and security controlInformation system and security control
Information system and security control
 

Similaire à Information systems risk assessment frame workisraf 130215042410-phpapp01

Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).pptAjjuSingh2
 
Risk Management Overview
Risk Management OverviewRisk Management Overview
Risk Management OverviewJIGNESH PADIA
 
Risk Management And Communication Maps
Risk Management And Communication MapsRisk Management And Communication Maps
Risk Management And Communication MapsJonelle Hilleary
 
Quantitative Techniques and Concepts in Finance
Quantitative Techniques and Concepts in FinanceQuantitative Techniques and Concepts in Finance
Quantitative Techniques and Concepts in FinanceRoselle Fuentes
 
Session 02 Risk Assessment Program for YSP_The Risk Assessment Process
Session 02 Risk Assessment Program for YSP_The Risk Assessment ProcessSession 02 Risk Assessment Program for YSP_The Risk Assessment Process
Session 02 Risk Assessment Program for YSP_The Risk Assessment ProcessMuizz Anibire
 
ISO 31000 risk management process
ISO 31000 risk management processISO 31000 risk management process
ISO 31000 risk management processMuizz Anibire
 
Crash Course: Managing Cyber Risk Using Quantitative Analysis
Crash Course: Managing Cyber Risk Using Quantitative AnalysisCrash Course: Managing Cyber Risk Using Quantitative Analysis
Crash Course: Managing Cyber Risk Using Quantitative Analysis"Apolonio \"Apps\"" Garcia
 
Final Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptxFinal Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptxGeorgeKabongah2
 
ICH Q9 QUALITY RISK MANAGEMENT(QRM)
ICH Q9 QUALITY RISK MANAGEMENT(QRM)ICH Q9 QUALITY RISK MANAGEMENT(QRM)
ICH Q9 QUALITY RISK MANAGEMENT(QRM)saimsoleja
 
In the risk prioritization step, the overall set of identified risk .pdf
In the risk prioritization step, the overall set of identified risk .pdfIn the risk prioritization step, the overall set of identified risk .pdf
In the risk prioritization step, the overall set of identified risk .pdfannaelctronics
 
Chapter 1 risk management (3)
Chapter 1  risk management (3)Chapter 1  risk management (3)
Chapter 1 risk management (3)rafeeqameen
 
Risk management standard_030820
Risk management standard_030820Risk management standard_030820
Risk management standard_030820minhaj52
 
Risk management standard_030820
Risk management standard_030820Risk management standard_030820
Risk management standard_030820Vijay Kejriwal
 
Risk management standard
Risk management standardRisk management standard
Risk management standardLuis Vitiritti
 

Similaire à Information systems risk assessment frame workisraf 130215042410-phpapp01 (20)

NIST 800 30 revision Sep 2012
NIST 800 30 revision  Sep 2012NIST 800 30 revision  Sep 2012
NIST 800 30 revision Sep 2012
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).ppt
 
Risk Management Overview
Risk Management OverviewRisk Management Overview
Risk Management Overview
 
Risk Management And Communication Maps
Risk Management And Communication MapsRisk Management And Communication Maps
Risk Management And Communication Maps
 
Risk Assessment and Management
Risk Assessment and ManagementRisk Assessment and Management
Risk Assessment and Management
 
Quantitative Techniques and Concepts in Finance
Quantitative Techniques and Concepts in FinanceQuantitative Techniques and Concepts in Finance
Quantitative Techniques and Concepts in Finance
 
Session 02 Risk Assessment Program for YSP_The Risk Assessment Process
Session 02 Risk Assessment Program for YSP_The Risk Assessment ProcessSession 02 Risk Assessment Program for YSP_The Risk Assessment Process
Session 02 Risk Assessment Program for YSP_The Risk Assessment Process
 
ADCB Presentation - MENA Bank Tech June 2014 v2
ADCB Presentation - MENA Bank Tech June 2014 v2ADCB Presentation - MENA Bank Tech June 2014 v2
ADCB Presentation - MENA Bank Tech June 2014 v2
 
ISO 31000 risk management process
ISO 31000 risk management processISO 31000 risk management process
ISO 31000 risk management process
 
Crash Course: Managing Cyber Risk Using Quantitative Analysis
Crash Course: Managing Cyber Risk Using Quantitative AnalysisCrash Course: Managing Cyber Risk Using Quantitative Analysis
Crash Course: Managing Cyber Risk Using Quantitative Analysis
 
Final Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptxFinal Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptx
 
Dj24712716
Dj24712716Dj24712716
Dj24712716
 
ICH Q9 QUALITY RISK MANAGEMENT(QRM)
ICH Q9 QUALITY RISK MANAGEMENT(QRM)ICH Q9 QUALITY RISK MANAGEMENT(QRM)
ICH Q9 QUALITY RISK MANAGEMENT(QRM)
 
Lecture2.pptx
Lecture2.pptxLecture2.pptx
Lecture2.pptx
 
Risk Health Check
Risk Health CheckRisk Health Check
Risk Health Check
 
In the risk prioritization step, the overall set of identified risk .pdf
In the risk prioritization step, the overall set of identified risk .pdfIn the risk prioritization step, the overall set of identified risk .pdf
In the risk prioritization step, the overall set of identified risk .pdf
 
Chapter 1 risk management (3)
Chapter 1  risk management (3)Chapter 1  risk management (3)
Chapter 1 risk management (3)
 
Risk management standard_030820
Risk management standard_030820Risk management standard_030820
Risk management standard_030820
 
Risk management standard_030820
Risk management standard_030820Risk management standard_030820
Risk management standard_030820
 
Risk management standard
Risk management standardRisk management standard
Risk management standard
 

Plus de S Periyakaruppan CISM,ISO31000,C-EH,ITILF (6)

E payment security – pci dss
E payment security – pci dssE payment security – pci dss
E payment security – pci dss
 
Software compliance
Software complianceSoftware compliance
Software compliance
 
Software compliance
Software complianceSoftware compliance
Software compliance
 
IT Infrastrucutre Security
IT Infrastrucutre SecurityIT Infrastrucutre Security
IT Infrastrucutre Security
 
Security Information and Event Managemen
Security Information and Event ManagemenSecurity Information and Event Managemen
Security Information and Event Managemen
 
Information technology Vs Information security
Information technology Vs Information securityInformation technology Vs Information security
Information technology Vs Information security
 

Information systems risk assessment frame workisraf 130215042410-phpapp01

  • 1. Information Systems Risk Assessment Framework (ISRAF) (Addendum of NIST 800-39 information systems risk management and revision of NIST SP 800 30 ) Prepared by S. Periyakaruppan (PK)
  • 2. Need of Addendum/ Revision ?  Ensure converged & integrated process  Address the challenges in traditional approach  Adaptive & Modular working model of information systems risk assessment.  Improve the organizations risk based decision.  Bring in value addition to business
  • 3. Should It get transformed ? ! Why  To make risk management an integral part of business and project management, IT Life cycle management.  TO facilitate with practical approach to address risk.  To Evolve business aligned approach.  TO tailor down the model of domain agnostic approach.
  • 4. Does it need a Model/Framework ??  Evolve descriptive process and systematic thinking.  Emerging business demand and process convergence  Enhance communication among functional entities.  Invoke result oriented approach  Predict results in the systematic model !!!!!!! ???
  • 5. Assessing risk – What & Why  To identify the potential opportunity of a probable consequence of an adverse impact due to a weakness in the information systems.  To support business with risk based decision.  To identify external and internal threat exposures to an organization from nation and another organization, vice versa.  To monitor the on-going risk exposure of the organization.  To observe the effectiveness of information security program.  To assist with Metrics for information security program management. ???????
  • 6. Assessing risks - When  During architecture development –( Org,process & Information system)  During functional and business systems integration.  During all phases of SDLC (Systems acquisition and development life cycle)  During acquisition of new security or business/function solution.  During modification of mission critical/business critical systems.  During third party vendor/product acquisition.  During decommissioning of systems/functions/groups of the organization
  • 7. Risk framing  Model ???  Determine the uncertainty of the risk and associated risk constraints.  Define the risk tolerance and priority, and tradeoffs.  Determine the set of risk factors, assessment scale and associated algorithm for combing factors  Assist in precise risk communication and sketch out boundaries of information system authorization.  Enhance the risk decision with appropriate information.  Incorporate de-duplication in hierarchical risk management model.  Determine the context of the entire risk assessment process/assessment/approach.
  • 8. The Model/Framework Frame (CONTEXT) Tier 1 Tier 2 Tier 3 The Frame work addresses comprehensive risk management function in a hierarchical approach and leverage context centric approach.
  • 9. The Focus Assess Respond Monitor Risk Assessment is a key element of risk management  Risk Assessment process in modular approach.  Preparation checklist.  Activity checklist.  Protocol to maintain appropriate result of risk assessments.  Method of communicating risk results across organization.
  • 11. Risk – Key concepts  Risk aggregate  consolidation of individual Tier1/Tier2/Tier3 risks in to a cumulative risks to identify relationship among risks at various levels.  Threat shifting the dynamic variation on threat source in response to the perceived countermeasures.  Residual risk  Tolerable risk remain post the mitigation to an exten possible to reduce the level of adverse impact to the organization.  Adversarial risk Risk that has an adverse effect by adversarial threats.  Adversarial threats  Threat has an intrinsic characteristics of direc adverse impact. – Ex., business operation interruption.  Non-adversarial threats  Threats has no direct or immediate effect of a threat impact. – Ex., Exposure of system errors, competitive intelligence gathering.
  • 12. Risk – Key Factors  Threat Event  Possible adverse impact through a potential circumstances/event to organization from national and another organization, vice versa.  Threat source The intend and the method of exploitation or attack vector.  Likelihood  The Probability of a threat become reality.  Vulnerability  Flaw in an information system that can lead to a potential threat.  Adverse Impact  The negative consequences /damage leads to potential impact to the business / organization/ nation by the consequences of an exercised vulnerability  Predisposing condition  The existing and known lack of controls/ in adequate countermeasures as part of available solution.  Risk  Measure/ Unit of the extent to which an entity is threaten by a potential circumstances.
  • 13. Assessing Risk – High Level Process Step -1 Step -2 Step -3 Step -4
  • 15. Conducting Assessment Identify Threat source and Step 1 Intent,Target,Capability events Capability of adversaries Range of effects Identify vulnerabilities and pre- Step 2 Effect of existing disposing conditions controls Intentional/accidental flaw /weakness in Determine likelihood of Step 3 system/process Occurrence Depends on the degree of Step 1 and the effect Determine Magnitude of Step 4 of Step 2 Impact Result of BIA Depends on effective Step 5 BCP/DR Determine Risk MTTR/MTBF RTO/RPO Risk  Combination of Step 3 and Step 4
  • 16. Method of Risk Analysis Threat oriented Vulnerability Asset/Impact • Identify threat source oriented Oriented and event • Identify pre-disposing • Identify • Developing Threat conditions mission/business scenario and model • Identify exploitable critical assets • Identify vulnerabilities vulnerabilities • Analyze the in context of threats • Identify threats related consequences of the to the known/open adversarial threat vulnerabilities event • Identify vulnerabilities to the threat events/scenario of critical assets with severe adverse impact.
  • 17. Method of Risk Assessments • Objective oriented assessment • Using non-numerical values to define risk factors Qualitative • Likelihood and impact with definite value based on individual expertise • Subjective oriented approach • Using numerical values to define risk factors Quantitative • Likelihood and impact with definite number based on history of events. • Contextual analysis and result oriented approach • Using Bin values (numerical range) with unique Semi Quantitative meaning and context. • Likelihood and impact derived with range of numerical values with degree of unique context
  • 18. Sample Assessment Scale Qualitative Quantitative Semi Qualitative Caution: The assessment scales and its descriptive meanings are subject to vary between organization to organization and with in organization discretion to the organizational culture and its policies and guidelines
  • 19. Communicate Result Communicate to the Furnish evidence Determine the designated comply with appropriate method of organizational organizational policies communication stakeholders & Guidelines Format defined by Identify appropriate Capture appropriate organization. authority. analysis data support Executive briefings Ensure right the result. Presenting information reach right Include applicable Illustrative risk figures person at right time. supporting documents Risk Assessment  Present contextual to convey the degree Dashboards information in of results Out sketch the accordance with risk  Identify and organizational strategy document the source prioritized risk of internal and external information.
  • 20. Maintain Risk Posture Reconfirm the Identify Key Risk Define Frequency scope and factors of revisit assumptions • Monitor the key • Track the risk • Get the risk factors response as concurrence of • Document the required scope and variations. • Initiate the assumptions • Re-define the assessment from appropriate key risk factors when needed authorities • Communicate • Document the the results to plan of action organizational with respect to entities the risk response.
  • 21. Applications of Risk Assessment Information Risk Strategy decisions Contribute EA design decisions IS Policy/Program/Guidance decisions Common Control/Security Standards decisions. Help risk response – Avoid/Accept/Mitigate/Transfer Investment decisions – ROSI(Returns Of Security Investments)/VAR(value at Risk)/ALE(Annual Loss Expectancy) Support EA(Enterprise Architecture) integration in to SA. Assist in business/function information continuity decisions Assist in business process resiliency requirements Contribute IS systems design decisions Supports vendor/product decisions Supports on-going system operations authorizations
  • 22. Risk Assessment in RMF life Cycle 1 2 6 3 5 4
  • 23. Organizational cultural effects on Risk assessment  Risk models differ based on priorities and tradeoffs with respect to the pre-disposing condition of organizational culture  Determination of risk factors and valuation of risk factors to constant values or qualitative approach depends on organizational culture  Determination of risk assessment approach and analysis approach depends on organizational culture.  Assessment and analysis approach may vary with in organization in different tiers.