60 likes | 305 Views
Systems Criticality Matrix. National Security Agency Information Assurance Methodology. OCTAVE SM. Operationally Critical, Threat, Asset and Vulnerability Evaluation Sort through complex organizational and technological issues Defines an approach to information security risk evaluations
E N D
Systems Criticality Matrix National Security Agency Information Assurance Methodology
OCTAVESM • Operationally Critical, Threat, Asset and Vulnerability Evaluation • Sort through complex organizational and technological issues • Defines an approach to information security risk evaluations • Comprehensive • Systematic • Context driven • Self-directed • Self directed • Business and IT part of the team • Three Phases • Build asset-based threat profiles • Identify infrastructure vulnerabilities • Develop security strategy and plans OCTAVESM Carnegie Mellon – Software Engineering Institute
M M L M L - M M M M H Disclosure Accidental Modification M M L M L - M M H M H Loss, Destruction Interruption Inside M M L M L - M M M M H Disclosure Modification M M H M H - M M H M H Deliberate Loss, Destruction Interruption Network Patient Records System M M L M L - M M M M H Disclosure Accidental Modification M M H M H - M M H M H Loss, Destruction Interruption Outside H H L M L - M M H M H Disclosure Modification Deliberate M M H M H - M M H M H Loss, Destruction Interruption Reputation Financial Productivity Fines Safety Other Human Actors Using Network Access OCTAVESM Carnegie Mellon – Software Engineering Institute
Disclosure Disclosure Disclosure Disclosure Modification Modification Modification Modification Loss, Destruction Loss, Destruction Loss, Destruction Loss, Destruction Interruption Interruption Interruption Interruption Software defects Malicious Code System crashes Hardware defects M M L M L - M M M M H M M L M L - M M H M H M M L M L - M M M M H M M H M H - M M H M H Patient Records System M M L M L - M M M M H M M H M H - M M H M H H H L M L - M M H M H Threat Profile: System Problems M M H M H - M M H M H Reputation Financial Productivity Fines Safety Other OCTAVESM Carnegie Mellon – Software Engineering Institute
Human Actors Using Network Access Basic Risk Profile OCTAVESM Carnegie Mellon – Software Engineering Institute