The National Institute of Standards & Technology (NIST) Methodology, specifically NIST Special Publication (SP) 800-30, outlines a nine-step process for managing risks in information technology systems [1, 2]. This standard is mandated by FISMA, requiring civilian federal government agencies to perform risk assessments [3]. While not required for non-governmental systems, the standard offers valuable guidance for commercial entities [3].
The NIST Methodology consists of nine primary steps:
System Characterization: Define the boundaries of the system being assessed. Identify and document the system's hardware, software, interfaces, data, information, people, mission, use cases, and workflows [4, 5]. It is crucial to clearly define what you are trying to protect, including tangible assets such as data, equipment, and facilities, and intangible assets like reputation [5].
Threat Identification: Identify and categorize potential threats, considering their sources, motivations, and vectors [6]. Categorize threats as natural or human-caused. Understand the "who, why, and how" of each threat [6]. Examples of threats include criminals, insider threats, script kiddies, and activists [6].
Vulnerability Identification: Determine weaknesses in the system that threats could exploit [7, 8]. This step involves identifying weaknesses in hardware, software, and procedures that could be exploited by threats [7, 8]. Evaluate password security, patching procedures, administrative practices, and well-known sources of vulnerabilities like web servers and human error [8].
Control Analysis: Analyze existing security controls and their effectiveness in mitigating vulnerabilities [2].
Likelihood Determination: Assess the probability of a threat event occurring [2, 4]. Analyze the likelihood of a threat being initiated or occurring and the likelihood of the event causing adverse impacts [9]. This involves considering the nature of the threat, the events, and the vulnerabilities [10].
Impact Analysis: Evaluate the potential negative consequences of a threat event on organizational operations, assets, individuals, and the nation [2, 4, 11]. Impacts can include harm to operations, assets, individuals, other organizations, and the nation [12].
Risk Determination: Combine the likelihood and impact analyses to determine the overall level of risk [2, 4, 13]. Organizations determine risk levels by combining the likelihood of threat exploitation and the impact of such exploitation [14]. This step may use risk tables or risk matrices to rank risks based on their likelihood and impact [15, 16].
Control Recommendations: Develop recommendations for security controls to mitigate unacceptable risks [2, 3].
Results Documentation: Document the findings of the risk assessment in a comprehensive report [2, 4]. Communicate assessment results to decision-makers and stakeholders [10]. Maintain and update the risk assessment over time to reflect changes in the risk environment and the effectiveness of implemented controls [10, 17].