230 likes | 236 Views
Learn about risk management and how to balance business needs with risk in the Lucent Worldwide Services Security Practice. Discover the different types of risk, measurement methods, and acceptable levels of risk. Join us at the ISC2 Philadelphia Seminar on November 3, 2005.
E N D
Lucent Worldwide ServicesSecurity Practice Risk Tolerance: Balancing Business Needs And Risk ISC2 Philadelphia Seminar November 3, 2005 George G. McBride, CISSP, CISM Managing Principal Lucent Worldwide Services Security Practice
Agenda • What is risk? • How can we measure it? • How do we know what is an acceptable level of risk? • Making the comparison and dealing with risk • Conclusions • Questions and Answers Lucent Technologies – ISC2 Philadelphia 2005
What is risk? • No universally recognized “Definition” • The exposure/potential/possibility to suffer some loss of an asset • What about likelihood and impact? • The most important concept: • When talking about “risk”, make sure you agree on what definition you are using! • Can be qualitative or quantitative Lucent Technologies – ISC2 Philadelphia 2005
Plugging In Some Numbers • Qualitative: Uses some reference point such as another “level” of risk for comparison • Quantitative: Uses solid numbers and dollars: • SLE: Single Loss Expectancy • ARO: Annual Rate of Occurrence • ALE: Annual Loss Expectancy • Cost of A Control: How much is that additional control such as a firewall or anti-virus software package? Likelihood Impact Lucent Technologies – ISC2 Philadelphia 2005
Quantitative Analysis • A very simplified version that ignores Net Present Value, Return On Investment (ROI): • If the virus attack happens, it will cost $200,000 to clean it up • SLE=$200,000.00 • An event happens once every 4 years • ARO= .25 • Company can expect to lose $200,000 every 4 years • ALE = $50,000.00 • Cost of the control to deploy a corporate wide anti-virus solution is $125,000.00 for the first year and $25,000 per year afterwards • You can reach a solid conclusion now! Lucent Technologies – ISC2 Philadelphia 2005
What types of risk are there? • Strategic Risk • Risks that affect an organization’s ability to reach it’s goals • Financial Risk • Risks of a company to suffer unnecessary losses • Environmental (Physical) Risk • Risks of a company moving or of physical damage • Operational Risk • Technical Risk • Business Continuity, Integrity, Change Management, Disclosure • Political/Cultural Risk • Personal agendas, regulatory, customer constraints Lucent Technologies – ISC2 Philadelphia 2005
Threats Likelihood Impact Vulnerabilities Controls Effectiveness Threat Assessment and Threat Matrix What do we have to measure? Vulnerability Assessment Controls Assessment The Risk Equation is Simple. Obtaining the Correct Values is Not Lucent Technologies – ISC2 Philadelphia 2005
Asset Identification • What are the assets within an organization? • Systems, buildings, cars, people, products • Business processes, applications, data • How and who determines the assets? • Commissioning, asset management, purchasing records, DHCP records, Active Directory • How often are the assets identified? Lucent Technologies – ISC2 Philadelphia 2005
Asset Ownership and Management • Asset owner is usually the system administrator or someone from the support organization • What data? • Who has access? • What inputs and outputs? • Should be a business unit representative: • Someone who can identify the data on the system • Someone who determine the users of the system • Someone who understands the data flow (inbound and outbound) Lucent Technologies – ISC2 Philadelphia 2005
Risk Speak • So many terms with so many equally valid definitions: • Threat Agent • Threat Catalyst • Inhibitors / Amplifiers • Capability • Motivation • And More! Lucent Technologies – ISC2 Philadelphia 2005
Traditional Risk Management • Mitigate all risks to effectively reduce risk to ZERO • Risk > 0 Becomes Unacceptable • Extremely costly • Slow to mitigate the risks • Generally shuts the business down. • How do you remove the risk of a production system Risk Unacceptable 0 Asset Criticality and Sensitivity Lucent Technologies – ISC2 Philadelphia 2005
Risk Management as an Enabler • Allows a business to measure the level of risk that they are “comfortable with” • Drive to mitigate risks to below the acceptable level, not zero • Acceptable level of risk may be by asset, physical location of device, corporate posture, etc. • Business enabler Unacceptable Risk Risk Tolerance Acceptable 0 Asset Criticality and Sensitivity Lucent Technologies – ISC2 Philadelphia 2005
Acceptable Levels of Risk Factors • How does a company determine their acceptable level of risk? • Organization Risk Tolerance: Is the company a former brick & mortar type firm with a conservative approach or a progressive Silicon Valley firm looking to be the first to market? • Personnel Tolerance: Individuals within the organization will affect the tolerance levels • Reaction to Previous Events: What were the results of any previous compromises/intrusions/breaches? • Policy, Regulations, Legal Issues: These may determine what level of risk a company can deal with • Risk Scope: An organization may be focused on a particular system, but need to be aware of additional connectivity issues Lucent Technologies – ISC2 Philadelphia 2005
Advantages of “Acceptable Risk” • Truly serves as a business enabler • This redefines the concept of “business vs security” • Competitive Advantage? • Absolutely! Get services to market first! • Focus on fixing the risks that you have to address • May maintain various levels of acceptable risk • Logical & Physical Location, Scope, Connectivity, Customer Base and usage Lucent Technologies – ISC2 Philadelphia 2005
Risk Management • What stays the same? • Still need a Risk Management Program • Still need to know what the assets are • Still need to have some type of risk assessment methodology • Still need a risk management organization • Still need to agree on a measurement mechanism • Quantitative or Qualitative • Risk Measurement is not a one-off effort • Trigger points should initiate risk analysis at potential risk value change points during the asset lifecycle • Still need to mitigate the risk Lucent Technologies – ISC2 Philadelphia 2005
Risk Management – What Must Change • Modifications of the existing risk management program: • Ensure that acceptable risk doesn’t slide below an agreed upon threshold • Security analysts need to business and operations savvy to understand business drivers • Continuously monitor external resources such as new regulations, technologies, and what the competition is doing • Process to determine whether to continue to mitigate further below “Acceptable Risk” or to move on Lucent Technologies – ISC2 Philadelphia 2005
Risk Management Lifecycle Lucent Technologies – ISC2 Philadelphia 2005
Risk Management Program Plan • Develop a “Risk Management Program Plan” • Defines the overall structure and program of the risk management efforts of the organization • Describes the organizational structure, roles and responsibilities of the members • Provides metrics, governance, compliance issues, reporting mechanisms, etc. • Should place a “Risk Management Director/Officer” with the overall Corporate level responsibility • manages the risk management organization and activities • Database may be used to support the Program Lucent Technologies – ISC2 Philadelphia 2005
Risk Database • Maintains Threats, Vulnerabilities, Controls, Likelihood, Impacts • Can be utilized for Quantitative and Qualitative efforts • Can prompt for periodic assessment reminders • Integrate with, or be, the Asset Database • Can be used to provide Enterprise Risk Management functions including: • Dashboard • Tiered and Segmented Reporting • Is extremely valuable to malicious individuals and must be protected accordingly • Supports compliance and governance matters Lucent Technologies – ISC2 Philadelphia 2005
Trigger Points • You can’t just measure the risk of an asset every year or two. Certain changes must trigger a risk measurement of the asset. • A “Trigger Point” is a Risk Management program call that is inserted into other operations and programs to ensure that Risk Management is considered as part of certain programs and at the appropriate times. • Business Impact Analysis • Change Management • Acquisitions • System Commissioning or Decommissioning Lucent Technologies – ISC2 Philadelphia 2005
Risk Methodologies • Many different types. Some fit better in particular companies or industries than others. • OCTAVE: Operationally Critical Threat, Asset, and Vulnerability Evaluation (http://www.cert.org/octave/) • SPRINT, SARA, FIRM (http://www.securityforum.org) • (Restricted to ISF Members Only) • CRAMM (http://www.cramm.com/) • RiskWatch, COBRA, and many others • Choose the one that works the best for you. • Industry / Business Sector – Some tools work better than others • Collateral Support - Including tools and training availability • Industry Support – Who recognizes which methodologies Lucent Technologies – ISC2 Philadelphia 2005
Summary • Know Your Assets! • Devote the required resources • Determine your “Acceptable Level of Risk” • Use a consistent measurement unit • Your “Medium” may not be somebody else’s “5” • Determine the scope of the Acceptable Level • Is it for all assets or particular assets • Measure the level of risk Lucent Technologies – ISC2 Philadelphia 2005
Lucent Technologies Bell Labs Innovations George McBride Managing Principal Lucent Worldwide Services Lucent Technologies Inc. Room 1B-237A 101 Crawfords Corner Road Holmdel, NJ 07733 Phone: +1.732.949.3408 E-mail: gmcbride@lucent.com Any questions? • Contact me at gmcbride@lucent.com with any questions that you may have. Lucent Technologies – ISC2 Philadelphia 2005