NIST 800 30 revision Sep 2012

2,224 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
2,224
On SlideShare
0
From Embeds
0
Number of Embeds
8
Actions
Shares
0
Downloads
88
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

NIST 800 30 revision Sep 2012

  1. 1. Information Systems Risk Assessment Framework (ISRAF)(Addendum of NIST 800-39 information systems risk management and revision of NIST SP 800 30 ) Prepared by S. Periyakaruppan (PK)
  2. 2. Need of Addendum/ Revision ?
  3. 3. Should It get transformed ? ! Why
  4. 4. Does it need a Model/Framework ?? !!!!!!! ???
  5. 5. Assessing risk – What & Why ???????
  6. 6. Assessing risks - When
  7. 7. Risk framing  Model ???
  8. 8. The Model/Framework Frame (CONTEXT) Tier 1 Tier 2Tier 3 The Frame work addresses comprehensive risk management function in a hierarchical approach and leverage context centric approach.
  9. 9. The Focus Assess Respond Monitor Risk Assessment is a key element of risk management Risk Assessment process in modular approach. Preparation checklist. Activity checklist. Protocol to maintain appropriate result of risk assessments. Method of communicating risk results across organization.
  10. 10. Strategy/Approach
  11. 11. Risk – Key concepts
  12. 12. Risk – Key Factors
  13. 13. Assessing Risk – High Level Process Step -1 Step -2 Step -3 Step -4
  14. 14. Prepare for Assessment
  15. 15. Conducting Assessment Intent,Target,CapabilityIdentify Threat source and events Capability of adversaries Step 1 Range of effectsIdentify vulnerabilities and pre-disposing conditions Step 2 Effect of existing controls Intentional/accidentalDetermine likelihood of Occurrence flaw /weakness in Step 3 system/processDetermine Magnitude of Impact Depends on the degree of Step 4 Step 1 and the effect ofDetermine Risk Step 2 Step 5 Result of BIA Depends on effective BCP/DR MTTR/MTBF RTO/RPO
  16. 16. Method of Risk AnalysisThreat oriented Vulnerability oriented Asset/Impact Oriented• Identify threat source • Identify pre-disposing • Identify mission/business and event conditions critical assets• Developing Threat • Identify exploitable • Analyze the scenario and model vulnerabilities consequences of the• Identify vulnerabilities in • Identify threats related adversarial threat event context of threats to the known/open • Identify vulnerabilities to vulnerabilities the threat events/scenario of critical assets with severe adverse impact.
  17. 17. Method of Risk Assessments • Objective oriented assessment • Using non-numerical values to define risk factors Qualitative • Likelihood and impact with definite value based on individual expertise • Subjective oriented approach • Using numerical values to define risk factors Quantitative • Likelihood and impact with definite number based on history of events. • Contextual analysis and result oriented approach • Using Bin values (numerical range) with uniqueSemi Quantitative meaning and context. • Likelihood and impact derived with range of numerical values with degree of unique context
  18. 18. Sample Assessment ScaleQualitative Quantitative Semi QualitativeCaution: The assessment scales and its descriptive meanings are subject to varybetween organization to organization and with in organization discretion to theorganizational culture and its policies and guidelines
  19. 19. Communicate Result Determine the Communicate to the Furnish evidence comply appropriate method of designated organizational with organizational communication stakeholders policies & GuidelinesFormat defined by Identify appropriate Capture appropriateorganization. authority. analysis data support theExecutive briefings Ensure right result.Presenting Illustrative information reach right Include applicablerisk figures person at right time. supporting documentsRisk Assessment  Present contextual to convey the degree ofDashboards information in resultsOut sketch the accordance with risk  Identify andorganizational prioritized strategy document the source ofrisk internal and external information.
  20. 20. Maintain Risk Posture Identify Key Risk Define Frequency of Reconfirm the scope factors revisit and assumptions• Monitor the key • Track the risk • Get the risk factors response as concurrence of• Document the required scope and variations. • Initiate the assumptions from• Re-define the key assessment when appropriate risk factors needed authorities • Communicate the • Document the plan results to of action with organizational respect to the risk entities response.
  21. 21. Applications of Risk Assessment Information Risk Strategy decisions Contribute EA design decisions IS Policy/Program/Guidance decisions Common Control/Security Standards decisions. Help risk response – Avoid/Accept/Mitigate/Transfer Investment decisions – ROSI(Returns Of Security Investments)/VAR(value at Risk)/ALE(Annual Loss Expectancy) Support EA(Enterprise Architecture) integration in to SA. Assist in business/function information continuity decisions Assist in business process resiliency requirements Contribute IS systems design decisions Supports vendor/product decisions Supports on-going system operations authorizations
  22. 22. Risk Assessment in RMF life Cycle 1 2 6 3 5 4
  23. 23. Organizational cultural effects on Risk assessment

×