This chapter covers risk management, its role in organizations, risk management techniques, risk assessment (likelihood of adverse events, effects on information assets), and results of the risk identification process.
Organizational operations inherently involve risk. Effective risk management requires understanding how information is collected, processed, stored, and transmitted.
Managers need to:
Risk management is the process of discovering and assessing risks to organizational operations and determining how to control or mitigate them.
Key Questions:
Risk management is complex, requiring a formal methodology including:
Both the RM framework and RM process should be continuous improvement activities, assessing current performance to improve future results.
The framework includes:
The risk management process involves:
Prior to framework design, the governance group must demonstrate commitment by:
The governance group specifies key responsibilities:
Typically, the CIO, CISO, or equivalent leads the RM effort, with the CIO often serving as the champion and the CISO as the project manager.
The project leader, in cooperation with the governance group, drafts a risk management policy. Common elements include:
The framework team designs the RM process to:
Organizations may select an existing methodology or develop their own. The framework team must also formally document the organization’s risk appetite and draft the RM plan.
The governance group communicates:
Residual risk is the risk remaining after all current controls are implemented.
Defining what the organization "can live with" is the risk appetite.
Risk Management Plan: A document that contains specifications for the implementation and conduct of RM efforts.
The RM plan includes specifications of the RM process and framework.
Implementation of the RM plan and RM process can be based on traditional IT implementation methods:
The RM process evaluates risk and remediation of key assets using team knowledge and perspective to:
Ensuring all members of the RM process team:
The first operational phase of RM is risk identification, starting with self-examination. Managers must:
The RM process team confirms or defines the categories and classifications for information assets.
The risk identification process begins with identifying and cataloging information assets, including:
An information asset is any asset that collects, stores, processes, or transmits information, or any collection/set/database of information valuable to the organization.
Some commercial RM applications simplify decisions by separating information assets from media.
Separating easily replaceable components (hardware and OS) from information assets streamlines RM efforts.
Components include:
Organizations use asset inventory systems to track hardware, network, and software components. The inventory process (automated or manual) requires planning to determine which attributes of each information asset should be tracked, based on the organization's needs and risk management efforts.
Consider the following attributes:
Assign to managers with necessary knowledge, experience, and judgment to identify, describe, and evaluate information assets. Record the identified information assets and use reliable data-handling processes (like those used for hardware/software).
Once an initial inventory is assembled:
Classification categories must be comprehensive and mutually exclusive.
As each information asset is identified, categorized, and classified, a relative value must be assigned.
Relative values are assigned based on criteria such as:
Consider what might happen if there were a loss of confidentiality, integrity, or availability. Would the organization experience any of the following results?
The final step in risk identification is to prioritize, or rank order, the assets using methods like weighted table analysis. This values information assets by ranking them based on criteria specified by the organization.
Criteria to consider:
Threat Assessment: Assessing potential weaknesses in each information asset after proper classification.
Organizations face a wide variety of threats. Project scope becomes too complex if you assume every threat attacks every information asset.
Questions to understand threats and their potential effects:
Conduct a weighted table analysis with threats, listing categories and selecting those that correspond to questions of interest. In extreme cases, assess each threat by asset if the severity differs depending on the nature of the information asset.
After identifying and prioritizing information assets and threats, compare assets to threats to create a list of vulnerabilities that remain potential risks. Vulnerabilities are specific avenues that threat agents can exploit to attack an asset. Create a list for each information asset to document its vulnerability to each possible or likely attack.
Possible vulnerabilities stem from:
At the end of risk identification, have a prioritized list of assets and threats. Combine these into a Threats-Vulnerabilities-Assets (TVA) worksheet to prepare for adding vulnerability and control information during risk assessment. This provides a starting point, along with other documents and forms.
Risk Analysis: Assessing the relative risk for each vulnerability, assigning a risk rating or score to gauge the relative risk associated with each vulnerable information asset. It facilitates comparative ratings later in the risk treatment process.
Considers:
If a vulnerability is fully managed by an existing control, it can be set aside. If partially controlled, estimate the percentage of the vulnerability that has been controlled.
Likelihood is the overall rating (numerical value on a defined scale) of the probability that a specific vulnerability will be exploited.
Next, the organization typically looks at the possible impact or consequences of a successful attack. The impact is of great concern in determining where to focus protection efforts using a "worst case/most likely outcome" approach. Most organizations create multiple scenarios to better understand the potential loss.
The level of impact from a threat event is the magnitude of harm that can be expected to result
from the unauthorized disclosure, modification, disruption, destruction, or loss of information
and/or denial of service. Such adverse impact, and hence harm, can be experienced by a
variety of organizational and non-organizational stakeholders including, for example, heads of
agencies, mission and business owners, information owners/stewards, mission/business
process owners, information system owners, or individuals/groups in the public or private
sectors relying on the organization-in essence, anyone with a vested interest in the
organization's operations, assets, or individuals, including other organizations in partnership
with the organization, or the Nation (for critical infrastructure-related considerations).
It is not possible to know everything about every vulnerability, such as the likelihood of an attack or the impact of a successful attack. The degree to which a current control can reduce risk is also subject to estimation error. Uncertainty is an estimate made by the manager using judgment and experience.
Risk determination can use a formula: risk = likelihood \times impact \pm uncertainty.
Most organizations simplify this to: risk = likelihood \times impact
Information asset 1 faced with threat 1 is at risk with general vulnerability 1. The risk rating for A1V1T1 (or T1V1A1 if you prefer) has been assigned a Likelihood value of 3 and an Impact value of 5. You estimate that assumptions and data are 90 percent accurate (uncertainty of ± 10%). The resulting risk rating is 15 ± 1.5, so your risk rating range is 13.5–16.5 on a 25-point scale.
In the same way, the evaluation for other information assets can be done with their respective values.
After calculating risk ratings for all TVA triples, the organization decides whether it can live with the analyzed level of risk (risk appetite). The organization translates its risk appetite from a general statement to a numerical value for comparison to each analyzed risk.
Compiling risks into a comprehensive list allows the organization to make informed choices based on the best available information.
The organization must decide whether the current level of risk is acceptable or if action is required. If the team is comfortable with the risk, the process moves to monitoring and review. If not, the process proceeds to risk treatment.
Risk treatment involves addressing risk once it has been identified, assessed, and evaluated as unacceptable. Options include: