SlideShare a Scribd company logo
NIST SPECIAL PUBLICATION
800-30 1
INTRODUCTION
 The NIST SP 800 30 provides guidance for conducting risk assessments of
information systems and organizations.
 The NIST 800 30 is designed in such a way that it can translate complex
cyber threats in a language easy to understand for the board .
 Any organization, be it private or public is heavily dependent on
information systems to successfully carry out its day-to-day operations.
Information systems may include a plethora of entities from office networks
to personnel systems to very specialized systems.
 To mitigate risks, one needs to create recommendations, and
implementation plans This helps with reducing the likelihood of a threat and
hence mitigating the risk impact of a cyber event. 2
RISK MANAGEMENT PROCESS
3
CONT’D
I. First, Frame risk or establish a risk context to produce a risk
management strategy that addresses how organizations intend to assess
risk, respond to risk, and monitor risk.
II. The second component of risk management addresses how
organizations assess risk within the context of the organizational risk
frame. The purpose of the risk assessment component is to identify:
• Threats
• Vulnerabilities
• Impact
• Likelihood
4
CONT’D
III. The third component of risk management addresses how organizations
respond to risk once that risk is determined based on the results of a risk
assessment.
IV. The fourth component of risk management addresses how organizations
monitor risk over time.
5
RISK ASSESSMENT
 The NIST SP 800 30 is used to do a risk assessment within the parameters
of the NIST framework to identify, estimate and prioritize risk to the
operation of organizations. The purpose of risk assessment is to inform the
decision-makers and support their risk responses by knowing:
•Both internal and external vulnerabilities
•Relevant threats to the organization
•Impact on their organization
•Likelihood of harm to occur
 Risk assessments are not simply one-time activities that provide
permanent and definitive information for decision makers to guide and
inform responses to information security risks. Rather, organizations
employ risk assessments on an ongoing basis throughout the system
6
CONT’D
development life cycle and across all of the tiers in the risk management
hierarchy with the frequency of the risk assessments and the resources
applied during the assessments, commensurate with the expressly defined
purpose and scope of the assessments.
 In particular, SP 800-30 guides execute the following steps of the risk
assessment process.
• Preparing for the risk assessment
• Conducting the assessment
• Communicating the results of the assessment
• And maintaining it
7
KEY RISK CONCEPTS
 Threats - A threat is any circumstance or event with the potential to
adversely impact organizational operations and assets, individuals, other
organizations, or the Nation through an information system via unauthorized
access, destruction, disclosure, or modification of information, and/or denial
of service.
 Vulnerability - A vulnerability is a weakness in an information system,
system security procedures, internal controls, or implementation that could
be exploited by a threat source.
 Likelihood - The likelihood of occurrence is a weighted risk factor based
on an analysis of the probability that a given threat is capable of exploiting a
given vulnerability (or set of vulnerabilities).
8
CONT’D
 Impact - The level of impact from a threat event is the magnitude of harm
that can be expected to result from the consequences of unauthorized
disclosure of information, unauthorized modification of information,
unauthorized destruction of information, or loss of information or
information system availability.
 Risk - Risk is a function of the likelihood of a threat event’s occurrence
and potential adverse impact should the event occur.
 Aggregation - Organizations may use risk aggregation to roll up several
discrete or lower-level risks into a more general or higher-level risk.
Organizations may also use risk aggregation to efficiently manage the scope
and scale of risk assessments involving multiple information systems and
multiple mission/business processes.
 Uncertainty - Uncertainty is inherent in the evaluation of risk. 9
CONDUCTING RISK
ASSESSMENTS WITHIN
ORGANIZATIONS
The process of assessing information security risk including:
I. a high-level overview of the risk assessment process;
II. the activities necessary to prepare for risk assessments;
III. the activities necessary to conduct effective risk assessments;
IV. the activities necessary to communicate the assessment results and share risk-
related information; and
V. the activities necessary to maintain the results of risk assessments on an
ongoing basis.
10
CONDUCTING RISK
ASSESSMENTS WITHIN
ORGANIZATIONS (CONT’D)
11
CONT’D
The risk assessment process is composed of four steps:
I. prepare for the assessment;
II. conduct the assessment;
III. communicate assessment results; and
IV. maintain the assessment.
Previous assessment plays a key role in understanding the vulnerabilities
and assisting in with the current requirements. This whole exercise helps
with understanding the weakness of the information system which one
can use as a starting point to improve upon.
12

More Related Content

Similar to 800-30.pptx

How to Conduct an ISO 27001 Risk Assessment That Works
How to Conduct an ISO 27001 Risk Assessment That WorksHow to Conduct an ISO 27001 Risk Assessment That Works
How to Conduct an ISO 27001 Risk Assessment That Works
VISTA InfoSec
 
INFORMATION SECURITY MANAGEMENT
INFORMATION SECURITY MANAGEMENTINFORMATION SECURITY MANAGEMENT
INFORMATION SECURITY MANAGEMENT
Ni
 
IS-Risk-Management-Lecture-2.pdf
IS-Risk-Management-Lecture-2.pdfIS-Risk-Management-Lecture-2.pdf
IS-Risk-Management-Lecture-2.pdf
AbdulrafiiMohammed
 
Auditing-Cybersecurity in the enterprise
Auditing-Cybersecurity in the enterpriseAuditing-Cybersecurity in the enterprise
Auditing-Cybersecurity in the enterprise
Thilak Pathirage -Senior IT Gov and Risk Consultant
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
.AIR UNIVERSITY ISLAMABAD
 
Risk Assessment: Approach to enhance Network Security
Risk Assessment: Approach to enhance Network SecurityRisk Assessment: Approach to enhance Network Security
Risk Assessment: Approach to enhance Network Security
IJCSIS Research Publications
 
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
Cam Fulton
 
Microsoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobileMicrosoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobile
Vijayananda Mohire
 
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
cyberprosocial
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).ppt
AjjuSingh2
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
360 BSI
 
IAS101REPORTINGINFORMATIONRISKBSIT3B.pptx
IAS101REPORTINGINFORMATIONRISKBSIT3B.pptxIAS101REPORTINGINFORMATIONRISKBSIT3B.pptx
IAS101REPORTINGINFORMATIONRISKBSIT3B.pptx
JakeariesMacarayo
 
REPORTING IAS101djfjfjffjfjfjjfjfjjf.pptx
REPORTING IAS101djfjfjffjfjfjjfjfjjf.pptxREPORTING IAS101djfjfjffjfjfjjfjfjjf.pptx
REPORTING IAS101djfjfjffjfjfjjfjfjjf.pptx
JakeariesMacarayo
 
Managing Security Risks in Manufacturing
Managing Security Risks in ManufacturingManaging Security Risks in Manufacturing
Managing Security Risks in Manufacturing
William McBorrough
 
1Contents1 Introduction21.1 Project Description21.2
1Contents1 Introduction21.1 Project Description21.2 1Contents1 Introduction21.1 Project Description21.2
1Contents1 Introduction21.1 Project Description21.2
EttaBenton28
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
Nikhil Soni
 
51_operational_risk
51_operational_risk51_operational_risk
51_operational_risk
Hafeez Farooq
 
ISACA Cybersecurity Audit course brochure
ISACA Cybersecurity Audit course brochureISACA Cybersecurity Audit course brochure
ISACA Cybersecurity Audit course brochure
Thilak Pathirage -Senior IT Gov and Risk Consultant
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacob
Beji Jacob
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
Tyler Carlson
 

Similar to 800-30.pptx (20)

How to Conduct an ISO 27001 Risk Assessment That Works
How to Conduct an ISO 27001 Risk Assessment That WorksHow to Conduct an ISO 27001 Risk Assessment That Works
How to Conduct an ISO 27001 Risk Assessment That Works
 
INFORMATION SECURITY MANAGEMENT
INFORMATION SECURITY MANAGEMENTINFORMATION SECURITY MANAGEMENT
INFORMATION SECURITY MANAGEMENT
 
IS-Risk-Management-Lecture-2.pdf
IS-Risk-Management-Lecture-2.pdfIS-Risk-Management-Lecture-2.pdf
IS-Risk-Management-Lecture-2.pdf
 
Auditing-Cybersecurity in the enterprise
Auditing-Cybersecurity in the enterpriseAuditing-Cybersecurity in the enterprise
Auditing-Cybersecurity in the enterprise
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
 
Risk Assessment: Approach to enhance Network Security
Risk Assessment: Approach to enhance Network SecurityRisk Assessment: Approach to enhance Network Security
Risk Assessment: Approach to enhance Network Security
 
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
 
Microsoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobileMicrosoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobile
 
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).ppt
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
IAS101REPORTINGINFORMATIONRISKBSIT3B.pptx
IAS101REPORTINGINFORMATIONRISKBSIT3B.pptxIAS101REPORTINGINFORMATIONRISKBSIT3B.pptx
IAS101REPORTINGINFORMATIONRISKBSIT3B.pptx
 
REPORTING IAS101djfjfjffjfjfjjfjfjjf.pptx
REPORTING IAS101djfjfjffjfjfjjfjfjjf.pptxREPORTING IAS101djfjfjffjfjfjjfjfjjf.pptx
REPORTING IAS101djfjfjffjfjfjjfjfjjf.pptx
 
Managing Security Risks in Manufacturing
Managing Security Risks in ManufacturingManaging Security Risks in Manufacturing
Managing Security Risks in Manufacturing
 
1Contents1 Introduction21.1 Project Description21.2
1Contents1 Introduction21.1 Project Description21.2 1Contents1 Introduction21.1 Project Description21.2
1Contents1 Introduction21.1 Project Description21.2
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
51_operational_risk
51_operational_risk51_operational_risk
51_operational_risk
 
ISACA Cybersecurity Audit course brochure
ISACA Cybersecurity Audit course brochureISACA Cybersecurity Audit course brochure
ISACA Cybersecurity Audit course brochure
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacob
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 

Recently uploaded

Stealth attraction for mens gets her with your words
Stealth attraction for mens gets her with your wordsStealth attraction for mens gets her with your words
Stealth attraction for mens gets her with your words
ichettrisagar95
 
Writing skills English language Teaching.pptx
Writing skills English language Teaching.pptxWriting skills English language Teaching.pptx
Writing skills English language Teaching.pptx
MANIVALANSR
 
maths class 10 practice sheet boards important.pdf
maths class 10 practice sheet boards important.pdfmaths class 10 practice sheet boards important.pdf
maths class 10 practice sheet boards important.pdf
eystreemc
 
Call Girls Mumbai🔥9910780858🔥Premium Escorts in Mumbai Available 24/7
Call Girls Mumbai🔥9910780858🔥Premium Escorts in Mumbai Available 24/7Call Girls Mumbai🔥9910780858🔥Premium Escorts in Mumbai Available 24/7
Call Girls Mumbai🔥9910780858🔥Premium Escorts in Mumbai Available 24/7
yashika sharman06
 
一比一原版美国旧金山艺术大学毕业证如何办理
一比一原版美国旧金山艺术大学毕业证如何办理一比一原版美国旧金山艺术大学毕业证如何办理
一比一原版美国旧金山艺术大学毕业证如何办理
qywqoy
 
一比一原版(mizzou毕业证书)美国密苏里大学毕业证如何办理
一比一原版(mizzou毕业证书)美国密苏里大学毕业证如何办理一比一原版(mizzou毕业证书)美国密苏里大学毕业证如何办理
一比一原版(mizzou毕业证书)美国密苏里大学毕业证如何办理
ghyke
 
Personal Growth Unleashed: Key Strategies from Tim Han’s LMA Course
Personal Growth Unleashed: Key Strategies from Tim Han’s LMA CoursePersonal Growth Unleashed: Key Strategies from Tim Han’s LMA Course
Personal Growth Unleashed: Key Strategies from Tim Han’s LMA Course
Tim Han Success Insider
 
Call Girls Ahmedabad ☎️ +91-7426014248 😍 Ahmedabad Call Girl Beauty Girls Ahm...
Call Girls Ahmedabad ☎️ +91-7426014248 😍 Ahmedabad Call Girl Beauty Girls Ahm...Call Girls Ahmedabad ☎️ +91-7426014248 😍 Ahmedabad Call Girl Beauty Girls Ahm...
Call Girls Ahmedabad ☎️ +91-7426014248 😍 Ahmedabad Call Girl Beauty Girls Ahm...
zoyat9250
 
Call Girls Delhi🔥9873777170🔥Top Escorts in Delhi Available 24/7
Call Girls Delhi🔥9873777170🔥Top Escorts in Delhi Available 24/7Call Girls Delhi🔥9873777170🔥Top Escorts in Delhi Available 24/7
Call Girls Delhi🔥9873777170🔥Top Escorts in Delhi Available 24/7
yashika sharman06
 

Recently uploaded (9)

Stealth attraction for mens gets her with your words
Stealth attraction for mens gets her with your wordsStealth attraction for mens gets her with your words
Stealth attraction for mens gets her with your words
 
Writing skills English language Teaching.pptx
Writing skills English language Teaching.pptxWriting skills English language Teaching.pptx
Writing skills English language Teaching.pptx
 
maths class 10 practice sheet boards important.pdf
maths class 10 practice sheet boards important.pdfmaths class 10 practice sheet boards important.pdf
maths class 10 practice sheet boards important.pdf
 
Call Girls Mumbai🔥9910780858🔥Premium Escorts in Mumbai Available 24/7
Call Girls Mumbai🔥9910780858🔥Premium Escorts in Mumbai Available 24/7Call Girls Mumbai🔥9910780858🔥Premium Escorts in Mumbai Available 24/7
Call Girls Mumbai🔥9910780858🔥Premium Escorts in Mumbai Available 24/7
 
一比一原版美国旧金山艺术大学毕业证如何办理
一比一原版美国旧金山艺术大学毕业证如何办理一比一原版美国旧金山艺术大学毕业证如何办理
一比一原版美国旧金山艺术大学毕业证如何办理
 
一比一原版(mizzou毕业证书)美国密苏里大学毕业证如何办理
一比一原版(mizzou毕业证书)美国密苏里大学毕业证如何办理一比一原版(mizzou毕业证书)美国密苏里大学毕业证如何办理
一比一原版(mizzou毕业证书)美国密苏里大学毕业证如何办理
 
Personal Growth Unleashed: Key Strategies from Tim Han’s LMA Course
Personal Growth Unleashed: Key Strategies from Tim Han’s LMA CoursePersonal Growth Unleashed: Key Strategies from Tim Han’s LMA Course
Personal Growth Unleashed: Key Strategies from Tim Han’s LMA Course
 
Call Girls Ahmedabad ☎️ +91-7426014248 😍 Ahmedabad Call Girl Beauty Girls Ahm...
Call Girls Ahmedabad ☎️ +91-7426014248 😍 Ahmedabad Call Girl Beauty Girls Ahm...Call Girls Ahmedabad ☎️ +91-7426014248 😍 Ahmedabad Call Girl Beauty Girls Ahm...
Call Girls Ahmedabad ☎️ +91-7426014248 😍 Ahmedabad Call Girl Beauty Girls Ahm...
 
Call Girls Delhi🔥9873777170🔥Top Escorts in Delhi Available 24/7
Call Girls Delhi🔥9873777170🔥Top Escorts in Delhi Available 24/7Call Girls Delhi🔥9873777170🔥Top Escorts in Delhi Available 24/7
Call Girls Delhi🔥9873777170🔥Top Escorts in Delhi Available 24/7
 

800-30.pptx

  • 2. INTRODUCTION  The NIST SP 800 30 provides guidance for conducting risk assessments of information systems and organizations.  The NIST 800 30 is designed in such a way that it can translate complex cyber threats in a language easy to understand for the board .  Any organization, be it private or public is heavily dependent on information systems to successfully carry out its day-to-day operations. Information systems may include a plethora of entities from office networks to personnel systems to very specialized systems.  To mitigate risks, one needs to create recommendations, and implementation plans This helps with reducing the likelihood of a threat and hence mitigating the risk impact of a cyber event. 2
  • 4. CONT’D I. First, Frame risk or establish a risk context to produce a risk management strategy that addresses how organizations intend to assess risk, respond to risk, and monitor risk. II. The second component of risk management addresses how organizations assess risk within the context of the organizational risk frame. The purpose of the risk assessment component is to identify: • Threats • Vulnerabilities • Impact • Likelihood 4
  • 5. CONT’D III. The third component of risk management addresses how organizations respond to risk once that risk is determined based on the results of a risk assessment. IV. The fourth component of risk management addresses how organizations monitor risk over time. 5
  • 6. RISK ASSESSMENT  The NIST SP 800 30 is used to do a risk assessment within the parameters of the NIST framework to identify, estimate and prioritize risk to the operation of organizations. The purpose of risk assessment is to inform the decision-makers and support their risk responses by knowing: •Both internal and external vulnerabilities •Relevant threats to the organization •Impact on their organization •Likelihood of harm to occur  Risk assessments are not simply one-time activities that provide permanent and definitive information for decision makers to guide and inform responses to information security risks. Rather, organizations employ risk assessments on an ongoing basis throughout the system 6
  • 7. CONT’D development life cycle and across all of the tiers in the risk management hierarchy with the frequency of the risk assessments and the resources applied during the assessments, commensurate with the expressly defined purpose and scope of the assessments.  In particular, SP 800-30 guides execute the following steps of the risk assessment process. • Preparing for the risk assessment • Conducting the assessment • Communicating the results of the assessment • And maintaining it 7
  • 8. KEY RISK CONCEPTS  Threats - A threat is any circumstance or event with the potential to adversely impact organizational operations and assets, individuals, other organizations, or the Nation through an information system via unauthorized access, destruction, disclosure, or modification of information, and/or denial of service.  Vulnerability - A vulnerability is a weakness in an information system, system security procedures, internal controls, or implementation that could be exploited by a threat source.  Likelihood - The likelihood of occurrence is a weighted risk factor based on an analysis of the probability that a given threat is capable of exploiting a given vulnerability (or set of vulnerabilities). 8
  • 9. CONT’D  Impact - The level of impact from a threat event is the magnitude of harm that can be expected to result from the consequences of unauthorized disclosure of information, unauthorized modification of information, unauthorized destruction of information, or loss of information or information system availability.  Risk - Risk is a function of the likelihood of a threat event’s occurrence and potential adverse impact should the event occur.  Aggregation - Organizations may use risk aggregation to roll up several discrete or lower-level risks into a more general or higher-level risk. Organizations may also use risk aggregation to efficiently manage the scope and scale of risk assessments involving multiple information systems and multiple mission/business processes.  Uncertainty - Uncertainty is inherent in the evaluation of risk. 9
  • 10. CONDUCTING RISK ASSESSMENTS WITHIN ORGANIZATIONS The process of assessing information security risk including: I. a high-level overview of the risk assessment process; II. the activities necessary to prepare for risk assessments; III. the activities necessary to conduct effective risk assessments; IV. the activities necessary to communicate the assessment results and share risk- related information; and V. the activities necessary to maintain the results of risk assessments on an ongoing basis. 10
  • 12. CONT’D The risk assessment process is composed of four steps: I. prepare for the assessment; II. conduct the assessment; III. communicate assessment results; and IV. maintain the assessment. Previous assessment plays a key role in understanding the vulnerabilities and assisting in with the current requirements. This whole exercise helps with understanding the weakness of the information system which one can use as a starting point to improve upon. 12