SlideShare a Scribd company logo
1 of 35
Download to read offline
FIST Conference November/Madrid 2008 @




           Risk Assessment ISM3-Style
                    Vicente Aceituno, 2008




1
About me

    Vice president of the FIST Conferences
    association.
      www.fistconference.org

    President of the ISSA Spain chapter.
      www.issa-spain.org

    Author of a number of articles:
      Google: vaceituno wikipedia

    Director of the ISM3 Consortium
      The consortium promotes ISM3, an ISMS standard.
      ISM3 is the main source for this presentation.
      www.ism3.com




2
Standards
                                     Magerit
       BS 7799-3:2005
                               AS 4360          ISO 27005
      Canadian Risk Management
                                         ISF method
                Guide
                            Octave
                                           SP800-30
    Marion
                ISO 13335-2            Mehari
       Ebios
                        Dutch A&K analysis

             Cramm

3
RA Method Design

    Likelihood    Threats
                                       Frequency


                  Weaknesses

     Cost
                 Countermeasures

                                        Value
                   Assets
    Impact
                            Exposure
4
Complexity

    Likelihood * Threats * Vulnerabilities *
    Countermeasured * Asset Value * Exposure = N6




5
RA Method Design

    Threat Taxonomy
    Countermeasures Taxonomy
    Model
    Scope
    Depth
    Threat Likelihood
    Asset Value
    Correct? Useful?


6
Threat Taxonomy
    Pretty Long Lists
    Magerit: Accidental Natural, Accidental Industrial, Accidental Error,
    Deliberada, etc…
    Against Confidenciality, against Integrity, againts Availability et al.
    ISM3-RA uses:
    1.   Destruction /Corruption /Loss of valid information or systems.
    2.   Aging of information &Outdated systems
    3.   Underperformance OR Interruption of valid system services &Failure of
         authorized access
    4.   Failure to destroy expired information or systems &Failure to stop
         systems at will
    5.   Unauthorized access, eavesdropping, theft and disclosure of information
         or systems AND Improper use of authorized access to information or
         systems
    6.   Improper recording of access to information or systems / (anon or
         otherwise)
7
Countermeasures Taxonomy

    ISO 27001 Controls
    PCI DSS Controls
    Cobit Controls
    Custom Made Lists
    Etc…
    ISM3-RA uses ISM3 Processes


8
Model

    No Model
    Assets (Mostly Technical)
    Servers, Databases,
    Networks, etc (Purely
    Technical)
    ISM3-RA uses
    Environments and
    Business Functions



9
ISM3-RA Environments

      Environments




             WiFi     Internal   Internal   Mobile
     DMZ
           Networks   Network     Users     Users



10
Production
ISM3-RA Business Model




                                              Administration
                                              Relationships
                                                         IT
                                                      Legal
                                                 Financing /
                                                Accounting
                                              Infrastructure
                                               Maintenance
                                                   Logistics
                         Business Functions




                                                    Human
                                                 Resources
                                               Procurement
                                                   Business
                                                Intelligence
                                                Advertising
                                                      Sales
                                               Governance
                                                  Research




                                                               11
Scope

     The more choice on the side of the
     certificate aspirant, the less value in
     the certification.
     The wider the scope, the higher the
     cost.
     ISM3-RA uses the scope of whole
     companies.




12
Depth

     The higher the level of detail, the more
     complex and costly.
     The depth should match the kind of
     decisions we want to support.
     ISM3-RA uses management-level
     depth.


                                         Environments




13
Threat Likelihood

     Normally there is no data enough to
     know how likely is a threat.
     The multiplicity and evolution of
     threats make likelihood of threats very
     difficult to model.
     ISM3-RA uses a qualitative scale of
     likelihood. (from very high to very low)




14
Asset Value

     Euros
     High – Medium – Low
     Magerit: Disponibilidad, integridad,
     confidencialidad, autenticidad,
     trazabilidad.
     ISM3-RA uses “The more important
     Business Functions depend on
     Environments, the more valuable”


15
Correct? Useful?

     Anyone can create a “correct” RA
     method.
     But, is it useful?




16
Utility



      HIGH
     MEDIUM
      LOW
17
Utility



     300
     200
     100
18
Utility – Added Value

     What are we learning that we don’t know
     already? (Non-Banal Analysis)
     What are important threats to the
     organization?
     What should I do?
     How safe am I? / How likely is that an
     incident will happen?
     How much will I lose this year?
     How much should I invest this year?
19
Limitaciones de validez




20
Quantitative RA

     Risk = Impact * Probability




                           Probability
              Risk




             Impact




21
Quantitative RA
             Expected Loss
                  [$]
     Accounting
     value of the
     company



       Last year’s
       losses




                         $ per year

                 0                                   Probability
                                                     [% / year]
                     0
                                                   100
                              Probability of
                              discontinuation of
                              the company per
                              year

22
ISO27005
                                   Establish Context


                          Risk Assessment


                               Risk Analysis




                                                                     Risk Monitoring and Review
                                                                     Risk Monitoring and Review
     Risk Communication
     Risk Communication




                                     Risk Identification


                                      Risk Estimation


                                      Risk Evaluation


                                               Acceptable results?

                                    Risk Treatment

                                               Accept risk?

                                   Risk Acceptance

23
Utility Challenges

     • Lack of real data
     • Are opinions valid data?
     • Mixing opinions with arithmetics is a bit
       like mixing magic and physics.
     • The higher the investment, the lower the
       risk.
     • Return of investment is always positive.
     • Risk Assessment can be difficult and
       expensive.
24
Production
ISM3-RA




          Administration
                           Mobile
                           Users




          Relationships
                      IT
                  Legal
                           Internal
                            Users

             Financing /
            Accounting
          Infrastructure
           Maintenance

                           Network
                           Internal
               Logistics
                Human
             Resources
           Procurement




                           Networks
               Business




                             WiFi
            Intelligence
            Advertising
                  Sales
           Governance




                             DMZ
              Research




                                      25
Production
ISM3-RA




          Administration
                           Mobile
                           Users




          Relationships
                      IT
                  Legal
                           Internal
                            Users

             Financing /
            Accounting
          Infrastructure
           Maintenance

                           Network
                           Internal
               Logistics
                Human
             Resources
           Procurement




                           Networks
               Business




                             WiFi
            Intelligence
            Advertising
                  Sales
           Governance




                             DMZ
              Research




                                      26
27
                    G
                     ov




                                        0
                                            20
                                                 40
                                                      60
                                                           80
                                                                100
                                                                      120
                           er
                              na
                                nc
                                   e
                       R
                           es
                              ea
                                 rc
                                    h
        B           Ad
         us            ve
            ine            r ti
                ss              si
                                  ng
                   In
                     te
           H            li
                           ge
             um
                 an             nc
     In                            e
       fo           Re
          rm            so
             at             ur
               io
                 n               ce
                                    s
                   Te
                      ch
                         no
                               log
                                   y

                             Le
                  R            ga
                   el
                      a          l
                          tio
                             ns
                A               hip
                  dm                s
                                                                            Relative Weight of Business Functions




      Fi
        na            in
           nc            is
              in            tra
                g               tio
                   /A               n
                      cc
                          ou
                              nt
                 In              in
                    fra             g
                        st
                           ru
                              ct
                                ur
                                    e
                       Lo
                           gi
                              st
                  M             i cs
                     ai
                        nt
                          en
                              an
                 P                 ce
                   ro
                      cu
                          re
                             m
                                en
                    P               t
                       ro
                          du
                              ct
                                io
                                    n

                             S
                              al
                                 es
                                                                                                                    Ejemplo ISM3-RA
Ejemplo ISM3-RA

           Relative Protection per Environment

1,2000
1,0000
0,8000
0,6000
0,4000
0,2000
0,0000
         Internet   SSCC      Oficinas     Host   SSAA   Terceros   Usuarios   Personal
                                                                    Mobiles




28
29
                           G




                                                           0
                                                               5000
                                                                      10000
                                                                              15000
                                                                                      20000
                                                                                              25000
                            ov
                               er
                                  na
                                     n           ce
                                R
                                     es
                                       ea
                                               rc
                                                  h
                             Ad
          B                     ve
              us                   rti
                in                    s         in
                   e   ss                          g
                             In
                                  te
                                    l li
               H                           ge
                   um                        nc
                     an                        e
     In                        R
          fo                       es
               rm                    ou
                 at                          rc
                      io                       es
                         n
                             Te
                               ch
                                 no
                                               lo
                                                  g    y

                                         Le
                                               ga
                       R                         l
                           el
                                                                                                      Relative Reliance on Environments




                             at
                                   io
                                     ns
                                       hi
                      A                  ps
                          dm
     F                          in
      in                           i   st
         an                               ra
            c      in                          ti o
                      g                            n
                           /A
                             cc
                               ou
                                 nt
                                                in
                                                  g
                          In
                               fra
                                     st
                                        ru
                                             ct
                                                u   re
                                Lo
                                       gi
                                         st
                                            i cs
                          M
                           ai
                                  nt
                                     e   na
                                           nc
                                             e
                          Pr
                            oc
                                     ur
                                       em
                                                en
                                                   t
                               P
                                ro
                                   d     uc
                                           tio
                                                    n

                                         S
                                             al
                                               es
                                                                                                                                          Ejemplo ISM3-RA
Ejemplo ISM3-RA
             Relative Environment Criticality

35000
30000
25000
20000
15000
10000
 5000
     0
         Internet     SSCC       Oficinas       Host   SSAA   Terceros   Usuarios   Personal
                                                                         Mobiles




30
31
                     G
                      ov




                                                 0,000000
                                                            0,000050
                                                                       0,000100
                                                                                  0,000150
                                                                                             0,000200
                                                                                                         0,000250
                                                                                                                    0,000300
                                                                                                                               0,000350
                                                                                                                                           0,000400
                                                                                                                                                      0,000450
                        er
                                     na
                                        nc
                                           e
                         R
                          es
                               ea
                                    rc
                      Ad               h
         Bu
            si           ve
               ne             r ti
                   ss              si n
                      In               g
            H           te
              um           l lig
                   an             en
     In                               ce
        fo            R
           rm            es
               at            ou
                  io               rc
                    n                 es
                      Te
                          ch
                               no
                                    lo
                                       gy

                                     Le
                   R                      ga
                       el
                          a                  l
                              ti o
                         ns
              Ad             hi
     Fi          m              ps
       na           in
          nc           is
            in           tr a
              g              ti o
                                                                                                                                                                 Risk per Business Function




                 /A               n
                     cc
                         ou
                            nt
                In              in
                   fra             g
                       st
                          ru
                             ct
                                ur
                                   e
                     Lo
                         gi
                            st
               M               ic s
                   ai
                     nt
                        en
                            an
               P                 ce
                  ro
                     cu
                         re
                            m
                               en
                   P               t
                     ro
                        du
                            ct
                               io
                                  n
                                     Sa
                                       le
                                         s
                                                                            Host
                                                                                                        SSAA



                                                                            SSCC
                                                                            Oficinas
                                                                                                                        Personal

                                                                                                        T erceros
                                                                                                                        Usuarios Mobiles
                                                                                                                                                                                              Ejemplo ISM3-RA
Ejemplo ISM3-RA
                                                                                       Improper r ec or ding of acc es s to

                                Risk to Technical Environment per Threat               inf or mation or sy stem /
                                                                                        ( anon or otherw is e)
                                                                                                               s




                                                                                       Unauthor ized acc ess , eav es dropping,
                                                                                       thef t and disc los ure of information or
0,00600000                                                                             sy stem AND
                                                                                                s
                                                                                       Improper use of author iz ed ac cess to
                                                                                       inf or mation or sy stem s

0,00500000                                                                             Failure to destroy expired information or
                                                                                       sy stem &
                                                                                               s
                                                                                       Failure to s top sy stem at w ill
                                                                                                               s

0,00400000
                                                                                       Under perf or m e OR Interr uption of
                                                                                                       anc
                                                                                       valid s y stem s erv ic es &

0,00300000                                                                             Failure of authorized acc es s



                                                                                       Aging of inf or mation &
0,00200000                                                                             Outdated s y stems



0,00100000                                                                             Des truction /
                                                                                       Cor ruption /
                                                                                       Loss of v alid information or s ys tems
0,00000000
             SS CC   Oficinas         Host      S SAA    Terceros   Usuarios Mobiles




32
References

     1.   Viable System Model http://en.wikipedia.org/wiki/Viable_System_Model
     2.   RA Method Inventory http://www.enisa.europa.eu/rmra/rm_home.html
     3.   EL CISNE NEGRO: EL IMPACTO DE LO ALTAMENTE IMPROBABLE, NICHOLAS
          TALEB, NASSIM, ISBN: 9788449320774
     4.   Magerit, Canadian Risk Management Guide, SP800-30, AS 4360, Marion, Ebios,
          Cramm, ISO 13335-2, ISF method, Mehari, Octave, Dutch A&K analysis
     5.   Scales of Measuremente - Wikipedia




33
Creative Commons
                                                      Attribution-NoDerivs 2.0
     You are free:
     •to copy, distribute, display, and perform this work
     •to make commercial use of this work
     Under the following conditions:

                                      Attribution. You must give the original author credit.



                                      No Derivative Works. You may not alter, transform, or build upon this
                                      work.

     For any reuse or distribution, you must make clear to others the license terms of this work.

     Any of these conditions can be waived if you get permission from the author.

     Your fair use and other rights are in no way affected by the above.

     This work is licensed under the Creative Commons Attribution-NoDerivs License. To view a copy of
     this license, visit http://creativecommons.org/licenses/by-nd/2.0/ or send a letter to Creative
     Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA.


34
@
     www.fistconference.org




             THANK YOU


             Vicente Aceituno
             Madrid, November 2008
35

More Related Content

What's hot

What's hot (16)

Return on Security Investment
Return on Security InvestmentReturn on Security Investment
Return on Security Investment
 
Dod IA Pen Testing Brief
Dod IA Pen Testing BriefDod IA Pen Testing Brief
Dod IA Pen Testing Brief
 
2013 SOPAC presentation understanding hidden risks
2013 SOPAC presentation understanding hidden risks2013 SOPAC presentation understanding hidden risks
2013 SOPAC presentation understanding hidden risks
 
Riskpro brief introduction
Riskpro brief introductionRiskpro brief introduction
Riskpro brief introduction
 
Riskpro security audit
Riskpro security auditRiskpro security audit
Riskpro security audit
 
People Risk Collateral
People Risk CollateralPeople Risk Collateral
People Risk Collateral
 
People Risk Collateral
People Risk CollateralPeople Risk Collateral
People Risk Collateral
 
Risk Management: One CRO’s thoughts
Risk Management: One CRO’s thoughtsRisk Management: One CRO’s thoughts
Risk Management: One CRO’s thoughts
 
Risk eng
Risk engRisk eng
Risk eng
 
Riskpro Brief Introduction
Riskpro Brief IntroductionRiskpro Brief Introduction
Riskpro Brief Introduction
 
Convergence of Security Risks
Convergence of Security RisksConvergence of Security Risks
Convergence of Security Risks
 
Enabling Embedded Business Continuity
Enabling Embedded Business ContinuityEnabling Embedded Business Continuity
Enabling Embedded Business Continuity
 
People risk collateral 2013
People risk collateral 2013People risk collateral 2013
People risk collateral 2013
 
MITIGATING OPERATIONAL RISK: RISK TRANSFER SOLUTIONS
MITIGATING OPERATIONAL RISK: RISK TRANSFER SOLUTIONSMITIGATING OPERATIONAL RISK: RISK TRANSFER SOLUTIONS
MITIGATING OPERATIONAL RISK: RISK TRANSFER SOLUTIONS
 
Massbiz Consulting Crede Sed Proba
Massbiz Consulting Crede Sed ProbaMassbiz Consulting Crede Sed Proba
Massbiz Consulting Crede Sed Proba
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber security
 

Viewers also liked

Viewers also liked (16)

Analisis Forense Memoria RAM
Analisis Forense Memoria RAMAnalisis Forense Memoria RAM
Analisis Forense Memoria RAM
 
Exploiting Web Applications PHP
Exploiting Web Applications PHPExploiting Web Applications PHP
Exploiting Web Applications PHP
 
Durabilidad
DurabilidadDurabilidad
Durabilidad
 
Network Access Protection
Network Access ProtectionNetwork Access Protection
Network Access Protection
 
Ataques Mediante Memorias USB
Ataques Mediante Memorias USBAtaques Mediante Memorias USB
Ataques Mediante Memorias USB
 
Business Outsourcing to Asia
Business Outsourcing to AsiaBusiness Outsourcing to Asia
Business Outsourcing to Asia
 
Antivirus Gateways Architecture Design
Antivirus Gateways Architecture DesignAntivirus Gateways Architecture Design
Antivirus Gateways Architecture Design
 
Security Metrics
Security MetricsSecurity Metrics
Security Metrics
 
Assessment presentation
Assessment presentationAssessment presentation
Assessment presentation
 
Beyond Awareness
Beyond AwarenessBeyond Awareness
Beyond Awareness
 
Integrity and Security in Filesystems
Integrity and Security in FilesystemsIntegrity and Security in Filesystems
Integrity and Security in Filesystems
 
Using IPS for Web Protection
Using IPS for Web ProtectionUsing IPS for Web Protection
Using IPS for Web Protection
 
Oissg
OissgOissg
Oissg
 
Seguridad Windows Server 2008
Seguridad Windows Server 2008Seguridad Windows Server 2008
Seguridad Windows Server 2008
 
Exploiting Layer 2
Exploiting Layer 2Exploiting Layer 2
Exploiting Layer 2
 
IDS with Artificial Intelligence
IDS with Artificial IntelligenceIDS with Artificial Intelligence
IDS with Artificial Intelligence
 

Similar to Analisis de Riesgos O-ISM3

Security Patterns How To Make Security Arch Easy To Consume
Security Patterns   How To Make Security Arch Easy To ConsumeSecurity Patterns   How To Make Security Arch Easy To Consume
Security Patterns How To Make Security Arch Easy To ConsumeJeff Johnson
 
From technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontierFrom technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontierRamsés Gallego
 
Uncovering Fraud Dilemmas - cVidya in London May 2012
Uncovering Fraud Dilemmas - cVidya in London May 2012Uncovering Fraud Dilemmas - cVidya in London May 2012
Uncovering Fraud Dilemmas - cVidya in London May 2012cVidya Networks
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By DesignNalneesh Gaur
 

Similar to Analisis de Riesgos O-ISM3 (20)

Security Patterns How To Make Security Arch Easy To Consume
Security Patterns   How To Make Security Arch Easy To ConsumeSecurity Patterns   How To Make Security Arch Easy To Consume
Security Patterns How To Make Security Arch Easy To Consume
 
From technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontierFrom technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontier
 
Sap risk advisory presentation
Sap risk advisory presentationSap risk advisory presentation
Sap risk advisory presentation
 
Sap Risk Advisory Presentation
Sap Risk Advisory PresentationSap Risk Advisory Presentation
Sap Risk Advisory Presentation
 
Riskpro insurance advisory services 2013
Riskpro insurance advisory services 2013Riskpro insurance advisory services 2013
Riskpro insurance advisory services 2013
 
Riskpro information risk management 2013
Riskpro information risk management 2013Riskpro information risk management 2013
Riskpro information risk management 2013
 
Riskpro information risk management 2013
Riskpro information risk management 2013Riskpro information risk management 2013
Riskpro information risk management 2013
 
Bi risk services 2013
Bi risk services 2013Bi risk services 2013
Bi risk services 2013
 
Bi risk services 2013
Bi risk services 2013Bi risk services 2013
Bi risk services 2013
 
Bi risk services 2013
Bi risk services 2013Bi risk services 2013
Bi risk services 2013
 
People risk collateral 2013
People risk collateral 2013People risk collateral 2013
People risk collateral 2013
 
Bi Risk Services
Bi Risk ServicesBi Risk Services
Bi Risk Services
 
Bi Risk Services
Bi Risk ServicesBi Risk Services
Bi Risk Services
 
Uncovering Fraud Dilemmas - cVidya in London May 2012
Uncovering Fraud Dilemmas - cVidya in London May 2012Uncovering Fraud Dilemmas - cVidya in London May 2012
Uncovering Fraud Dilemmas - cVidya in London May 2012
 
Riskpro Insurance Advisory Services
Riskpro Insurance Advisory ServicesRiskpro Insurance Advisory Services
Riskpro Insurance Advisory Services
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By Design
 
Bi risk services 2013
Bi risk services 2013Bi risk services 2013
Bi risk services 2013
 
Bi risk services 2013
Bi risk services 2013Bi risk services 2013
Bi risk services 2013
 
Riskpro Security Audit
Riskpro Security AuditRiskpro Security Audit
Riskpro Security Audit
 
Riskpro Security Audit
Riskpro Security AuditRiskpro Security Audit
Riskpro Security Audit
 

More from Conferencias FIST

Seguridad en Entornos Web Open Source
Seguridad en Entornos Web Open SourceSeguridad en Entornos Web Open Source
Seguridad en Entornos Web Open SourceConferencias FIST
 
Las Evidencias Digitales en la Informática Forense
Las Evidencias Digitales en la Informática ForenseLas Evidencias Digitales en la Informática Forense
Las Evidencias Digitales en la Informática ForenseConferencias FIST
 
Evolución y situación actual de la seguridad en redes WiFi
Evolución y situación actual de la seguridad en redes WiFiEvolución y situación actual de la seguridad en redes WiFi
Evolución y situación actual de la seguridad en redes WiFiConferencias FIST
 
El Information Security Forum
El Information Security ForumEl Information Security Forum
El Information Security ForumConferencias FIST
 
Inseguridad en Redes Wireless
Inseguridad en Redes WirelessInseguridad en Redes Wireless
Inseguridad en Redes WirelessConferencias FIST
 
Mas allá de la Concienciación
Mas allá de la ConcienciaciónMas allá de la Concienciación
Mas allá de la ConcienciaciónConferencias FIST
 
Riesgo y Vulnerabilidades en el Desarrollo
Riesgo y Vulnerabilidades en el DesarrolloRiesgo y Vulnerabilidades en el Desarrollo
Riesgo y Vulnerabilidades en el DesarrolloConferencias FIST
 
Demostracion Hacking Honeypot y Análisis Forense
Demostracion Hacking Honeypot y Análisis ForenseDemostracion Hacking Honeypot y Análisis Forense
Demostracion Hacking Honeypot y Análisis ForenseConferencias FIST
 

More from Conferencias FIST (20)

Seguridad en Open Solaris
Seguridad en Open SolarisSeguridad en Open Solaris
Seguridad en Open Solaris
 
Seguridad en Entornos Web Open Source
Seguridad en Entornos Web Open SourceSeguridad en Entornos Web Open Source
Seguridad en Entornos Web Open Source
 
Spanish Honeynet Project
Spanish Honeynet ProjectSpanish Honeynet Project
Spanish Honeynet Project
 
Seguridad en Windows Mobile
Seguridad en Windows MobileSeguridad en Windows Mobile
Seguridad en Windows Mobile
 
SAP Security
SAP SecuritySAP Security
SAP Security
 
Que es Seguridad
Que es SeguridadQue es Seguridad
Que es Seguridad
 
Las Evidencias Digitales en la Informática Forense
Las Evidencias Digitales en la Informática ForenseLas Evidencias Digitales en la Informática Forense
Las Evidencias Digitales en la Informática Forense
 
Evolución y situación actual de la seguridad en redes WiFi
Evolución y situación actual de la seguridad en redes WiFiEvolución y situación actual de la seguridad en redes WiFi
Evolución y situación actual de la seguridad en redes WiFi
 
El Information Security Forum
El Information Security ForumEl Information Security Forum
El Information Security Forum
 
Criptografia Cuántica
Criptografia CuánticaCriptografia Cuántica
Criptografia Cuántica
 
Inseguridad en Redes Wireless
Inseguridad en Redes WirelessInseguridad en Redes Wireless
Inseguridad en Redes Wireless
 
Mas allá de la Concienciación
Mas allá de la ConcienciaciónMas allá de la Concienciación
Mas allá de la Concienciación
 
Security Metrics
Security MetricsSecurity Metrics
Security Metrics
 
PKI Interoperability
PKI InteroperabilityPKI Interoperability
PKI Interoperability
 
Wifislax 3.1
Wifislax 3.1Wifislax 3.1
Wifislax 3.1
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
 
Riesgo y Vulnerabilidades en el Desarrollo
Riesgo y Vulnerabilidades en el DesarrolloRiesgo y Vulnerabilidades en el Desarrollo
Riesgo y Vulnerabilidades en el Desarrollo
 
Demostracion Hacking Honeypot y Análisis Forense
Demostracion Hacking Honeypot y Análisis ForenseDemostracion Hacking Honeypot y Análisis Forense
Demostracion Hacking Honeypot y Análisis Forense
 
Security Maturity Model
Security Maturity ModelSecurity Maturity Model
Security Maturity Model
 
Cisco Equipment Security
Cisco Equipment SecurityCisco Equipment Security
Cisco Equipment Security
 

Recently uploaded

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Recently uploaded (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Analisis de Riesgos O-ISM3

  • 1. FIST Conference November/Madrid 2008 @ Risk Assessment ISM3-Style Vicente Aceituno, 2008 1
  • 2. About me Vice president of the FIST Conferences association. www.fistconference.org President of the ISSA Spain chapter. www.issa-spain.org Author of a number of articles: Google: vaceituno wikipedia Director of the ISM3 Consortium The consortium promotes ISM3, an ISMS standard. ISM3 is the main source for this presentation. www.ism3.com 2
  • 3. Standards Magerit BS 7799-3:2005 AS 4360 ISO 27005 Canadian Risk Management ISF method Guide Octave SP800-30 Marion ISO 13335-2 Mehari Ebios Dutch A&K analysis Cramm 3
  • 4. RA Method Design Likelihood Threats Frequency Weaknesses Cost Countermeasures Value Assets Impact Exposure 4
  • 5. Complexity Likelihood * Threats * Vulnerabilities * Countermeasured * Asset Value * Exposure = N6 5
  • 6. RA Method Design Threat Taxonomy Countermeasures Taxonomy Model Scope Depth Threat Likelihood Asset Value Correct? Useful? 6
  • 7. Threat Taxonomy Pretty Long Lists Magerit: Accidental Natural, Accidental Industrial, Accidental Error, Deliberada, etc… Against Confidenciality, against Integrity, againts Availability et al. ISM3-RA uses: 1. Destruction /Corruption /Loss of valid information or systems. 2. Aging of information &Outdated systems 3. Underperformance OR Interruption of valid system services &Failure of authorized access 4. Failure to destroy expired information or systems &Failure to stop systems at will 5. Unauthorized access, eavesdropping, theft and disclosure of information or systems AND Improper use of authorized access to information or systems 6. Improper recording of access to information or systems / (anon or otherwise) 7
  • 8. Countermeasures Taxonomy ISO 27001 Controls PCI DSS Controls Cobit Controls Custom Made Lists Etc… ISM3-RA uses ISM3 Processes 8
  • 9. Model No Model Assets (Mostly Technical) Servers, Databases, Networks, etc (Purely Technical) ISM3-RA uses Environments and Business Functions 9
  • 10. ISM3-RA Environments Environments WiFi Internal Internal Mobile DMZ Networks Network Users Users 10
  • 11. Production ISM3-RA Business Model Administration Relationships IT Legal Financing / Accounting Infrastructure Maintenance Logistics Business Functions Human Resources Procurement Business Intelligence Advertising Sales Governance Research 11
  • 12. Scope The more choice on the side of the certificate aspirant, the less value in the certification. The wider the scope, the higher the cost. ISM3-RA uses the scope of whole companies. 12
  • 13. Depth The higher the level of detail, the more complex and costly. The depth should match the kind of decisions we want to support. ISM3-RA uses management-level depth. Environments 13
  • 14. Threat Likelihood Normally there is no data enough to know how likely is a threat. The multiplicity and evolution of threats make likelihood of threats very difficult to model. ISM3-RA uses a qualitative scale of likelihood. (from very high to very low) 14
  • 15. Asset Value Euros High – Medium – Low Magerit: Disponibilidad, integridad, confidencialidad, autenticidad, trazabilidad. ISM3-RA uses “The more important Business Functions depend on Environments, the more valuable” 15
  • 16. Correct? Useful? Anyone can create a “correct” RA method. But, is it useful? 16
  • 17. Utility HIGH MEDIUM LOW 17
  • 18. Utility 300 200 100 18
  • 19. Utility – Added Value What are we learning that we don’t know already? (Non-Banal Analysis) What are important threats to the organization? What should I do? How safe am I? / How likely is that an incident will happen? How much will I lose this year? How much should I invest this year? 19
  • 21. Quantitative RA Risk = Impact * Probability Probability Risk Impact 21
  • 22. Quantitative RA Expected Loss [$] Accounting value of the company Last year’s losses $ per year 0 Probability [% / year] 0 100 Probability of discontinuation of the company per year 22
  • 23. ISO27005 Establish Context Risk Assessment Risk Analysis Risk Monitoring and Review Risk Monitoring and Review Risk Communication Risk Communication Risk Identification Risk Estimation Risk Evaluation Acceptable results? Risk Treatment Accept risk? Risk Acceptance 23
  • 24. Utility Challenges • Lack of real data • Are opinions valid data? • Mixing opinions with arithmetics is a bit like mixing magic and physics. • The higher the investment, the lower the risk. • Return of investment is always positive. • Risk Assessment can be difficult and expensive. 24
  • 25. Production ISM3-RA Administration Mobile Users Relationships IT Legal Internal Users Financing / Accounting Infrastructure Maintenance Network Internal Logistics Human Resources Procurement Networks Business WiFi Intelligence Advertising Sales Governance DMZ Research 25
  • 26. Production ISM3-RA Administration Mobile Users Relationships IT Legal Internal Users Financing / Accounting Infrastructure Maintenance Network Internal Logistics Human Resources Procurement Networks Business WiFi Intelligence Advertising Sales Governance DMZ Research 26
  • 27. 27 G ov 0 20 40 60 80 100 120 er na nc e R es ea rc h B Ad us ve ine r ti ss si ng In te H li ge um an nc In e fo Re rm so at ur io n ce s Te ch no log y Le R ga el a l tio ns A hip dm s Relative Weight of Business Functions Fi na in nc is in tra g tio /A n cc ou nt In in fra g st ru ct ur e Lo gi st M i cs ai nt en an P ce ro cu re m en P t ro du ct io n S al es Ejemplo ISM3-RA
  • 28. Ejemplo ISM3-RA Relative Protection per Environment 1,2000 1,0000 0,8000 0,6000 0,4000 0,2000 0,0000 Internet SSCC Oficinas Host SSAA Terceros Usuarios Personal Mobiles 28
  • 29. 29 G 0 5000 10000 15000 20000 25000 ov er na n ce R es ea rc h Ad B ve us rti in s in e ss g In te l li H ge um nc an e In R fo es rm ou at rc io es n Te ch no lo g y Le ga R l el Relative Reliance on Environments at io ns hi A ps dm F in in i st an ra c in ti o g n /A cc ou nt in g In fra st ru ct u re Lo gi st i cs M ai nt e na nc e Pr oc ur em en t P ro d uc tio n S al es Ejemplo ISM3-RA
  • 30. Ejemplo ISM3-RA Relative Environment Criticality 35000 30000 25000 20000 15000 10000 5000 0 Internet SSCC Oficinas Host SSAA Terceros Usuarios Personal Mobiles 30
  • 31. 31 G ov 0,000000 0,000050 0,000100 0,000150 0,000200 0,000250 0,000300 0,000350 0,000400 0,000450 er na nc e R es ea rc Ad h Bu si ve ne r ti ss si n In g H te um l lig an en In ce fo R rm es at ou io rc n es Te ch no lo gy Le R ga el a l ti o ns Ad hi Fi m ps na in nc is in tr a g ti o Risk per Business Function /A n cc ou nt In in fra g st ru ct ur e Lo gi st M ic s ai nt en an P ce ro cu re m en P t ro du ct io n Sa le s Host SSAA SSCC Oficinas Personal T erceros Usuarios Mobiles Ejemplo ISM3-RA
  • 32. Ejemplo ISM3-RA Improper r ec or ding of acc es s to Risk to Technical Environment per Threat inf or mation or sy stem / ( anon or otherw is e) s Unauthor ized acc ess , eav es dropping, thef t and disc los ure of information or 0,00600000 sy stem AND s Improper use of author iz ed ac cess to inf or mation or sy stem s 0,00500000 Failure to destroy expired information or sy stem & s Failure to s top sy stem at w ill s 0,00400000 Under perf or m e OR Interr uption of anc valid s y stem s erv ic es & 0,00300000 Failure of authorized acc es s Aging of inf or mation & 0,00200000 Outdated s y stems 0,00100000 Des truction / Cor ruption / Loss of v alid information or s ys tems 0,00000000 SS CC Oficinas Host S SAA Terceros Usuarios Mobiles 32
  • 33. References 1. Viable System Model http://en.wikipedia.org/wiki/Viable_System_Model 2. RA Method Inventory http://www.enisa.europa.eu/rmra/rm_home.html 3. EL CISNE NEGRO: EL IMPACTO DE LO ALTAMENTE IMPROBABLE, NICHOLAS TALEB, NASSIM, ISBN: 9788449320774 4. Magerit, Canadian Risk Management Guide, SP800-30, AS 4360, Marion, Ebios, Cramm, ISO 13335-2, ISF method, Mehari, Octave, Dutch A&K analysis 5. Scales of Measuremente - Wikipedia 33
  • 34. Creative Commons Attribution-NoDerivs 2.0 You are free: •to copy, distribute, display, and perform this work •to make commercial use of this work Under the following conditions: Attribution. You must give the original author credit. No Derivative Works. You may not alter, transform, or build upon this work. For any reuse or distribution, you must make clear to others the license terms of this work. Any of these conditions can be waived if you get permission from the author. Your fair use and other rights are in no way affected by the above. This work is licensed under the Creative Commons Attribution-NoDerivs License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nd/2.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. 34
  • 35. @ www.fistconference.org THANK YOU Vicente Aceituno Madrid, November 2008 35