106
Scenario-based (IT) Risk Assessment & Management EuroCACS 2010 Session 214 Peter R. Bitterli, CISA, CISM, CGEIT http://www.bitterli-consulting.ch [email protected] Please observe the copyright: You are allowed to use and further distribute this presentation only with this copyright notice attached. If you use parts of this documentation in presentations or other diagrams you have to refer to the source. Any commercial use of this presentation is only allowed with written consent of the author.

Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

  • Upload
    vungoc

  • View
    221

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Scenario-based (IT) Risk Assessment & Management

EuroCACS 2010 Session 214

Peter R. Bitterli, CISA, CISM, CGEIT http://www.bitterli-consulting.ch [email protected] Please observe the copyright: You are allowed to use and further distribute this presentation only with this copyright notice attached. If you use parts of this documentation in presentations or other diagrams you have to refer to the source. Any commercial use of this presentation is only allowed with written consent of the author.

Page 2: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Abstract (I) Scenario-based (IT) Risk Assessment & Management

• Following the proliferation of regulations such as the Sarbanes-Oxley Act, Basel II or Solvency II, the possible approaches to (operational) risk management exploded – leading to a multitude of tools that are supposed to guarantee effective risk management. By this, however, seen from the speaker’s point of view, the know-how and experience of trained staff has been replaced by mechanistically following an approach enforced by an uncaring and inflexible tool, hardly suited for the specific issues found within IT.

Page 3: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Abstract (II) Scenario-based (IT) Risk Assessment & Management

• Scenario-based risk assessment – if designed and implemented correctly – enables a team of (IT) professionals to consistently identify, assess and treat risks using a combination of the experience of internal resources, collected through structured but creative risk identification workshops, with a demonstrably mature risk management process.

Page 4: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Abstract (II) Scenario-based (IT) Risk Assessment & Management

• The session will contain several short “hands-on” elements to explain some of the more important aspects.

• Although the approach presented is applicable to risks outside IT, it has primarily been used for identifying information/IT security related risks.

Page 5: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Learning Objectives The participants will learn about …

After this session, participants will be able to…

•  understand the advantages and disadvantages of scenario-based IT risk assessment

•  tailor a scenario-based approach to the specific needs of any company using a step-by-step process explained during the session

•  perform scenario-based risk assessments consistently and efficiently

•  link IT risk scenarios to ISO27001/2 for effective integration into an information security management system (ISMS)

•  combine this type of risk assessment with an overall (IT) risk management process

Page 6: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Contents

•  Introduction – Definitions – Risk analysis methodologies (examples)

•  First-time assessment: Step-by-step •  How to ensure completeness •  Applying the IT Risk Landscape •  SOP for maintenance of IT Risk Landscape •  Wrap up / Questions

Page 7: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Introduction: Definitions

Contains the most important definitions; should be worked out by oneself.

Page 8: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Risk management

Risk assessment

Terms for Risk Management Based on ISO Guide 73 and EN14971

Risk analysis

Risk evaluation

Risk control/treatment

Identification of risks, hazards and root causes This is a creative process

Risk estimation and evaluation This is a systematic process

Risk remediation/mitigation This is a project management issue

Must be em

bedded in overall context

Page 9: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Risk management (Assess and manage IT risks PO 9)

Risk assessment

Terms for Risk Management Based on COBIT PO 9

Risk analysis (Event identification PO 9.3)

Risk evaluation (Risk asssessment PO 9.4)

Risk treatment (Risk response PO 9.5) Maintenance and monitoring of a risk action plan (PO 9.6)

Identification of risks, hazards and root causes This is a creative process

Risk estimation and evaluation This is a systematic process

Risk remediation/mitigation This is a project management issue

Must be em

bedded in overall context (IT risk m

anagement fram

ework P

O 9.1)

(Establishm

ent of risk context PO

9.2)

Page 10: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Varied Approaches to RA Entry Points .

Vulnerability Assessment

Risk Assessment

Risk Management

Threat Assessment

Effective Risk Management

Original source: unknown

Page 11: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Important Terms (EN14971) An Introduction for IT Audit, IT Security and IT-Governance

Harm Physical injury or damage to health of people, property, environment

Hazard Potential source of harm Intended use Use of a product according to specifications, instructions and information by

the manufacturer Life cycle All phases of a medical device from conception to disposalResidual risk Risk remaining after risk control measures have been takenRisk Combination of the probability of occurance of a harm and the severity of that

harmRisk analysis Systematic use of available information to identify hazards and estimate the

riskRisk control Process in which decisions are made by which risks are reduced to, or

maintained within specified levelsRisk evaluation Process of comparing the estimated risk against given risk criteria to

determine the acceptability of the riskRisk management Systematic application of policies, procedures and practices to te task of

analyzing, evaluating and controlling risksSafety Freedom from unacceptable risksVerification Confirmation by the provision of objective evidence, that specifications have

been fulfilled

Page 12: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Terms Risk IT Framework

Source: Risk IT Framework, © ITGI

Page 13: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Introduction: Risk Analysis Methodologies (Examples)

Contains some typical examples to explain some of the many different

approaches to risk assessment that exist

Page 14: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Risk Analysis/Management Countless and Highly Divers Methodologies

CORAS Computer Safety, Reliability and SecurityCRAMM Centre for Information Systems Risk Analysis und Management MethodEBIOS Expression des Besoins et Identification des Objectifs de SécuritéETA Event Tree AnalysisFMEA Project: Mission Assurance Analysis Protocol (MAAP) FTA Fault Tree AnalysisHAZOP Hazard Operability AnalysisHACCP Hazard Analysis and Critical Control PointMAAP Mission Assurance Analysis Protocol (MAAP) MEHARI Méthode Harmonisée d’Analyse de RisquesOCTAVE Operationally Critical Threat, Asset, and Vulnerability Evaluation

Incomplete list of methods used for risk management (partly the methods cannot be separated from the product): @Risk, Analyse des Risques Programmes, AnalyZ, ARES, AROME+, ASRAM, BDSS, BIS RISK ASSESSOR, Buddy System, COBRA, CONTROL-IT, CONTMAT, CoP-IT, CORA, CORAS UML, CRAMM, CRITI CALC, DDIS, EBIOS, ETA, FMEA, FTA, GRA/SIS, HAZOP, HACCP, IS CASE, IST/RAMP, JANBER, LAVA, LRAM (& ALRAM), MAGHERIT, MAAP, MARION, MEHARI, MELISA, MicroSecure Self Assessment, MINIRISK, Octave, Octave-s, PREDICT, PRISM, Proteus, PSICH, R1, RA/SYS, RANK-IT, RISAN, Risiko, RiskCALC, RiskPAC, Riskwatch, Security by Analysis, SISSI, XRM, …

Note: This is an incomplete listing of tools and methodologies that can be used for risk identification, assessment and management

Page 15: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Risk Analysis Annual Planning of (IT) Audit for Different Locations

Criteria and Tool © Bitterli Consulting AG

Note: This is an example - ratings are for demonstration purposes only

Page 16: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

0%

20%

40%

60%

% o

f eva

luat

ed a

pplic

atio

ns

life threatening serious

significant low

none

Security requirements

Impact on business if requirements are not met

Risk Analysis (Diagram) Critical Applications and Potential (Negative) Impact

SourceESF 1997Method Sprint163 critical business applications;Thereof classified 65% as “life threatening”

Page 17: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Sour

ceG

AO: I

nfor

mat

ion

Secu

rity

Ris

k As

sess

men

t - P

ract

ices

of L

eadi

ng

Org

aniz

atio

ns (G

AO/A

IMD

-00-

33)

Operational Risks Criteria: based on GAO Study

Note: This is an example - ratings are for demonstration purposes only

Page 18: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Project Requirements Analysis Criteria: COBIT Information Criteria

Landscape of Security Requirements

Security (K1: Confidentiality, K2: Availability, K3: Integrity)

Qua

lity

(K

4: E

ffect

iven

ess,

K5:

Effi

cien

cy)

low medium high

low

m

ediu

m

high

Orderliness (K6: Compliance, K7: Reliability)

low medium high

Solution domains B2B, B2C

Applications Infrastructure

© Bitterli Consulting AG

Note: This is an example - ratings are for demonstration purposes only

Page 19: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Project Risks Total

1 2 3 CM

S

War

ehou

se

Tolli

ng

Sal

ary

VA

Tplu

s

Sec

ureI

T

HR

2

360

ZV 2

005

Inve

st+

Sal

aryI

I

Dire

kcB

illin

g

Info

2000

Sig

natu

r

Add

ress

Team

Tim

eRep

ort

Mig

ratio

nZIP

E-S

hop

Rol

ebas

ed A

Cou

rseR

epor

t

Cha

nge

Ber

mud

a

Bill

ing

You

Ban

k

Gua

rdia

n

SO

X-li

ght

Net

Enc

rypt

Car

eerP

lan

1 1

Confidentiality low medium high 3 3 1 3 1 1 2 3 1 1 3 1 1 1 2 2 1 2 1 2 2 1 1 3 1 2 1 2 1.71

Availability low medium high 3 2 3 2 3 2 1 2 3 2 2 3 2 3 2 3 3 2 3 1 3 2 1 2 2 3 1 3 2.29

Integrity low medium high 2 1 2 2 1 1 1 1 2 1 2 3 1 3 2 1 1 2 1 2 1 1 1 1 2 1 1 1 1.46

Effectiveness low medium high 1 2 1 2 2 1 2 1 3 1 2 1 1 2 2 2 1 2 2 1 2 1 1 2 2 1 2 1 1.57

Efficiency low medium high 1 2 1 2 2 1 2 1 1 1 2 1 1 1 2 3 2 1 3 1 2 1 1 1 2 2 1 1 1.50

Reliability low medium high 2 2 2 2 2 1 1 1 1 2 1 2 2 1 2 1 2 1 2 2 2 1 2 1 2 3 2 3 1.71

Compliance low medium high 1 1 2 2 1 1 1 1 2 1 1 1 1 1 1 2 1 2 1 1 1 1 1 2 1 1 2 1 1.25

Total per Application 13 13 12 15 12 8 10 10 13 9 13 12 9 12 13 14 11 12 13 10 13 8 8 12 12 13 10 12

Evaluation 13 13 12 15 12 8 10 10 13 9 13 12 9 12 13 14 11 12 13 10 13 8 8 12 12 13 10 12

Selected Projects X X X X X X X X X

Risk Assessment Project

Project Requirements Analysis Criteria: COBIT Information Criteria

Note: This is an example - ratings are for demonstration purposes only

© Bitterli Consulting AG

Page 20: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

01234 3.1

4.14.2

4.35.1

5.2

6.1

6.2

6.3

7.1

7.2

7.3

8.1

8.2

8.38.4

8.58.6

8.79.1

9.29.3

9.4

9.5

9.6

9.7

9.8

10.1

10.2

10.3

10.4

10.5

11.112.1

12.212.3

Full target level Minimal target level Milestone 3 Milestone 2 Milestone 1 Start

Analysis Target Achievement Criteria ISO27002

•  Current State (green area)

•  State at Milestone 1 •  State at Milestone 2 •  State at Milestone 3

•  Minimal Target Level (Rating 3)

•  Maximal Target Level (Rating 4)

Note: This is an example - ratings are for demonstration purposes only

© Bitterli Consulting AG

Page 21: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Analysis Security Aspects Criteria based on ISO27002; Tool © Bitterli Consulting

Note: This is an example - ratings are for demonstration purposes only

© Bitterli Consulting AG

Page 22: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Presentation of Results Example: Expected benefit vs. actual maturity level

ISO 17799:2005 SELF ASSESSMENT

2.40

2.33

2.23 3.07

2.97

2.40

2.472.13

2.602.70

2.40

3.50

2.65

3.80

2.40

2.25

2.20

2.40

1.79

3.40

2.632.11

2.53

1.62

1.87

1.60

1.83

1.88

3.40

2.90

2.80

1.67

1.63

1.57

3.10

1.72

1.78

1.89

1.00

1.50

2.00

2.50

3.00

3.50

4.00

1.50 2.00 2.50 3.00 3.50 4.00

LEVEL

NU

TZ

EN

5.1

6.1

6.2

7.1

8.1

8.2

8.3

9.1

9.2

10.1

10.2

10.3

10.4

10.5

10.6

10.7

10.8

10.9

10.10

11.1

11.2

11.3

11.4

11.5

11.6

11.7

12.1

12.2

12.3

12.4

12.5

12.6

13.1

13.2

14.1

I II

III IV

Need for improvement !

Import issues well done

Efficient? Unimportant issues not done

Note: This is an example - ratings are for demonstration purposes only

© Bitterli Consulting AG

Page 23: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Monitoring of State Useful for Managers with Need for Detailed Information

Note: This is an example - ratings are for demonstration purposes only

© Bitterli Consulting AG

Page 24: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Building a Scenario-based (IT) Risk Landscape the 1st time

This section explains the reasoning behind building an (IT) Risk Landscape and shows

a step-by-step approach for the first-time development of such a landscape

Page 25: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Classical Approach to Risk Analysis Bottom-up Approach

•  Identification, exploration and assessment of operational risks on a detailed level is an extensive and tedious task that takes considerable time and effort. After having completed such risk assessments in all relevant areas on a detailed level, the information could be aggregated to achieve a gross and well substantiated overview of the risk situation of the whole organization.

Page 26: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Classical Approach to Risk Analysis Bottom-up Approach

•  This bottom-up approach is rarely practical, because complete, detailed and up-to-date information about all risks is normally not available and would require too much time to generate and collect.

Page 27: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Overall Goals of our Approach Scenario-based Risk Analysis

•  Establishing a high-level IT risk landscape with about 20 top risks

•  Implementing a Standard Operation Procedure (SOP) for maintaining the IT risk landscape

© Bitterli Consulting AG

Page 28: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Scenario-based Risk Analysis Top-down Approach

•  The method follows a top-down approach to establish a top level view of the risk situation in absence of a complete account of detailed studies. It relies on the available data about weaknesses and incidents, on prior findings from audits and reviews as well as on the knowledge and imagination of experienced (IT) security specialists.

Page 29: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Approach to Build IT Risk Landscape

•  1st Compilation by core team •  Regular/periodic reassessment

– Effects of security projects can be shown (i.e. target state)

– Reassessment shows changes (i.e. actual state) •  Permanent amendment through input from:

– Risk Controlling –  (IT) Security –  (IT) Audit

Page 30: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Building the 1st IT Risk Landscape Pragmatic Approach Using Available Knowledge & Experience

•  First round with (internal) IT staff, without involvement of business

•  Support by internal/external “consultant” to ensure quality and correct scoping

•  Definition of a SOP for future maintenance •  Involvement of business through a structured

process

Page 31: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Define “Trivialities” Clearly Determine Fundamental Issues

1.  Direction of axes 2.  Scale of axis “Probability” 3.  Scale of axis “Severity” 4.  Defining acceptable Risk Levels 5.  Scenario types 6.  Information to be collected

Page 32: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Definition Risk

A risk is defined as: •  a threat directed at a

specific object, which has been assessed in regard to the probability and impact (i.e. severity).

Page 33: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

1: Direction of Axes Clearly Determine Fundamental Issues

•  Most common way of labeling the axes

•  Compatible to the typical internally used methodologies for operational risk management

Prob

abili

ty

Severity

Page 34: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

2: Scale of Axis Probability Useful Logarithmic Scaling

Prob

abili

ty

Frequent = 1 per day Probable = 1 per 10 days Occasional = 1 per 100 days Remote = 1 per 1,000 days Improbable = 1 per 10,000 days

Page 35: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

3: Scale of Axis Severity Useful Logarithmic Scaling (see next slide)

Min

or

Mod

erat

e

Con

side

rabl

e

Crit

ical

Cat

astr

ophi

c Severity

Each of the severity categories is defined in terms of •  operational impact, •  intangible impact •  financial impact

(see next slide)

Page 36: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Severity Operational Impact Intangible Impact Financial Impact1 Minor No significant impact Only few internal staff notice

incidentNo significant costs (e.g. below 10‘000)

2 Moderate Slight disturbance of business operations

(back to normal < 1 day)

Incident is only noticed by internal staff and few externals. General public is not informed. Minor regulatory issues

Potential costs are noticeable but don‘t threaten profit

(e.g. 10‘000 -100‘000)

3 Considerable Substantial disturbance of business operations

(back to normal < 1 week)

Incident noticed by external parties and media coverage. Regulatory compliance threatened, i.e. warning letter

Potential costs have significant influence on profit

(e.g. 100‘000 - 1 Mio.)

4 Critical Extensive efforts required to recover and restore normal business operations (back to normal < 1 month)

Incident has significant impact on external parties and makes headlines. Regulatory compliance at stake

Potential costs reach the order of magnitude of yearly profit

(e.g. 1 Mio - 10 Mio.)

5 Catastrophic Recovery procedures not sufficient to fully restore business operations for a longer time span (back to normal > 1 month)

The confidence of affected parties is likely to be lost.

Regulatory compliance definitively lost.

Potential costs surmount financial reserves

(e.g. above 10 Mio.)

3: Scale of Axis Severity Useful Logarithmic Scaling

red italics: must be calibrated to risk appetite of enterprise

Page 37: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

3: Scale of Axis Severity Using Examples from the Risk IT Framework

Source: Risk IT Framework, © ITGI

Page 38: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

4: Defining Acceptable Risk Levels Using Examples from the Risk IT Framework

Source: Risk IT Framework, © ITGI

?

Page 39: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

4: Defining Acceptable Risk Levels Using Examples from the Risk IT Framework

Source: Risk IT Framework, © ITGI

Page 40: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

4: Defining Acceptable Risk Levels Typical IT Risk Landscape

Prob

abili

ty

Severity

Page 41: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

4: Scenario Types Need to be Clearly Determined to Avoid Difficulties

•  Which risk is going to be measured?

–  Inherent risk (i.e. the maximal possible risk if all measures fail)

–  Current risk (i.e. actual residual risk, taking into consideration the implemented measures)

–  Target risk (i.e. residual risk after implementing further security measures)

Within our scenario-based risk analysis we evaluate typical and reasonable scenarios while considering the currently implemented (security) measures

Severity

Pro

babi

lity

16

16

inherent

current

target

1616 16

Page 42: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

• Your turn now!

Page 43: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Flooding Scenario A

water height 8m

Page 44: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Flooding A – The Truth

Page 45: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Earth Quake Scenario B

1 2

Page 46: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Earth Quake Scenario B – the Truth

1 2

Page 47: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Airplane Crash Scenario C

1 2

Page 48: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Airplane Crash Scenario C – The Truth

1 2

Page 49: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

4: Defining Acceptable Risk Levels Possible Results for Our Case Study A–C

Prob

abili

ty

Severity

C AB

Page 50: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

In Case of Difficulties: Be Smart Compare with other Risks – or Vote

Severity/Impact

Prob

abili

ty

EFrequent

D Probable

COccasional

BRemote

1Minor

2Moderate

3Considerable

4Critical

5catastrophic

every day

every 10 days

every 100 days

every 1000 days

every 10000 daysA

Improbable

C Number of risk scenario

© Bitterli Consulting AG

A

B C

Page 51: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

5: Scenario Description (I) Information to be Collected/Determined

•  Scenario Number •  Scenario name and (short) term/title •  Scenario description •  Summary of the set of related risks and

potential events that are considered in the scenario

•  Agent (cause) and trigger that lead to the existence of this risk and make the damaging events occur

Page 52: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

5: Scenario Description (II) Information to be Collected/Determined

•  Nature: physical, technical, logical •  Source: internal, external •  Description of the effects that may result

from the damaging events (direct/indirect, immediate/future, tangible/intangible)

•  Description of (one or more) typical versions of the scenario that where specifically considered for pinning down the assessment

•  Examples, if possible from within enterprise

Page 53: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

5: Scenario Description (III) Information to be Collected/Determined

•  Assessment of probability category (i.e. assessment of the probability of occurrence of a typical event; incl. justification)

•  Assessment of severity category (i.e. assessment of the amount of damage that may typically be caused; incl. justification) Remarks:

–  A risk scenario may be split into two or more sub-scenarios that share the same descriptions for points 2 to 6 above but come in several versions with different severity and probability categories.

–  The sub-scenarios of scenario N are numbered Na, Nb, et cetera.

Page 54: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

5: Scenario Description (IV) Information to be Collected/Determined

Source: Risk IT Framework, © ITGI

Page 55: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Analysis of Risk Scenarios Typical IT Risk Landscape

Severity/Impact

Prob

abili

ty

EFrequent

D Probable

COccasional

BRemote

1Minor

2Moderate

3Considerable

4Critical

5catastrophic

every day

every 10 days

every 100 days

every 1000 days

every 10000 daysA

Improbable

6

14

1

11 7

12

15

4 5 13

8

10 3 9

1 Number of risk scenario

Typical IT Risk Scenarios:

1 Half-day power outage 2 Flooding of data center

site 3 “Loss” of confidential

client information 4 Malicious code 5 Access Management 6 Telebanking (Phishing) 7 Patch Management 8 Non-compliance to rules 9 Network outage 10 Legal issues 11 Loss of key staff 12 Handling of passwords 13 Application of new

technologies 14 Application dependent

controls 15 Insufficient BCM/BCP 16 Internal Sabotage

Note: Ratings are for demon-stration purposes only

16

2

© Bitterli Consulting AG

Page 56: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

IT Risk Landscape Example from the Risk IT Framework

Source: Risk IT Framework, © ITGI

Page 57: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

How to Ensure the Completeness of a Scenario-based (IT) Risk Landscape

This section explains which techniques and tools can be used

to ensure that the (IT) risk landscape is complete

Page 58: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Reasoning

•  The (first version of the) Risk Landscape has been put together through a creative process

•  This helps to identify realistic scenarios typical for the enterprise in question

•  But – there is absolutely no indication whether the risk landscape is complete (too much bias of “experts”)

•  We therefore need an approach for finding additional scenarios possibly missing

Page 59: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Completeness of Scenarios Identification of all Relevant Risks

•  General sources: –  Institutions, public authorities, associations

•  E.g. CERT, SANS, … – Known threats, own experience

•  E.g. disasters, flood, power/network outage, viruses, •  Norms •  ISO/IEC 27002 •  ISO/IEC 27005 (BS 7799-3): Appendix C, D •  COBIT: Management Guidelines, Quickstart, Control

Objectives, … •  BSI-Grundschutzhandbuch: Threat List

Page 60: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Completeness of Scenarios Identification of all Relevant Risks: Additional Sources

•  Additional Sources – Regional Threats, e.g.

•  Earthquake •  Mud slides •  Nuclear accidents

– Threats specific to single locations, e.g. •  Transport routes (trains, roads, airline crash, ...) •  Companies in the direct neighborhood

Much information is available from local authorities – but with varying level of detail and of quality

Page 61: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Using Local Risk Maps

Page 62: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Completeness of Scenarios Additional Sources: Loss Categories of Basel II

Page 63: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Completeness of Scenarios Additional Sources: Swiss Risk Report 2004

You will find something similar for your own country / region / district / …

Page 64: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Completeness of Scenarios Additional Sources: ISO27005

•  Acts of terrorism •  Air conditioning failure •  Airborne particles / dust •  Bomb attack •  Breach of legislation or

regulations •  Breaches of contractual

obligations •  Compromise of assets •  Compromise of security •  ...

•  Disruption to business processes

•  Dust •  Earthquake •  Eavesdropping •  Environmental

contamination •  Equipment failure •  Errors •  Failure of communication

services •  ...

Page 65: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Completeness of Scenarios Additional Sources: Threats Catalogue of German Manual

Page 66: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Example: Grundschutzhandbuch Description of Threat T 1.2

Page 67: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

How does our Approach (Tool) Work? Ensuring Completeness of IT Risk Landscape

1. Copy threats catalogue of BSI Grundschutzhandbuch (one line per threat)

2. Evaluate threats based on predefined criteria 3. If threat is not in “green area”:

•  Consider threat for possible addition to risk landscape •  If threat fits an existing scenario:

»  note its number (as the threat is already covered)

•  All remaining threats need to be reevaluated for addition to the risk landscape

Page 68: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Excel Tool used for Verification Template based on the BSI Grundschutzhandbuch

© Bitterli Consulting AG

Page 69: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Excel Tool used for Verification Assessment of Threats Catalogue

© Bitterli Consulting AG

Note: This is an example - ratings are for demonstration purposes only

Page 70: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

How to effectively use/apply a Scenario-based

(IT) Risk Landscape

This section explains to which purposes one can use an (IT) risk landscape

Page 71: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

How to use a Scenario-based (IT) Risk Landscape effectively

Some examples 1.  Showing the effects of planned/actual

security activities on risks over time 2.  Explaining effects of initiatives on scenarios 3.  Mitigating risk scenarios with measures

correlated to ISO27002

Page 72: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

1: Showing Changes over Time E.g. By Animating the “Movement” of Scenarios

7

10

6 14

9

20

2111

19 12

3

15

4

5

16

17 18 8

1

2

2 6 14

20

1

2111

7

12

15

4

5

13

17 18 8 13

10

16

3

9

19

Severity

Prob

abili

ty

EFrequent

D Probable

C Occasional

B Remote

1Minor

2Moderate

3Considerable

4Critical

5Catastrophic

1 per day

1 per 10 days

1 per 100 days

1 per 1000 days

1 per 10000 daysAImprobable

© Bitterli Consulting AG

Page 73: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Severity

Prob

abili

ty

EFrequent

D Probable

C Occasional

B Remote

1Minor

2Moderate

3Considerable

4Critical

5Catastrophic

1 per day

1 per 10 days

1 per 100 days

1 per 1000 days

1 per 10000 daysAImprobable

2: Explaining Effects of Initiatives By Looking at Individual Risk Scenarios

2 6 14

20

1

2111

7

12

15

4

5

13

17 18 8

10

16

3

9

1916

Risk Scenario 16: Remote Access will be reduced by security initiatives: A: Remote Access Server, Single Sign On B: Awareness C: Policies & Procedures

(fictitious example*)

© Bitterli Consulting AG

Page 74: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

3: Mitigating risk scenarios with measures correlated to ISO27002

1.2

SLA

s

1.3

Proj

ect

initi

atio

n

1.4

Ana

lysi

s an

d de

sign

1.5

Proj

ect

exec

utio

n

1.6

Dat

a m

igra

tion

2.1

Mgn

t. o

f pr

ogra

m

chan

ges

2.2

SLA

s2.

3 D

ocum

enta

tion

of

chan

ges

2.4

App

rova

l of

chan

ges

2.6

Dep

loym

ent

of

chan

ges

2.7

Emer

genc

y ch

ange

s

3.4

App

licat

ions

inte

grity

3.5

Syst

ems

a. in

fras

tr.

sec.

4.1

SLA

Nr. scenario name

scenario description

1.1.

1

1.1.

2

1.1.

3

1.2.

1

1.3.

1

1.4.

1

1.5.

1

1.6.

1

1.7.

1

1.7.

2

1.7.

3

1.7.

4

1.8.

1

1.8.

2

2.1.

1

2.2.

1

2.3.

1

2.4.

1

2.5.

1

2.5.

2

2.6.

1

2.7.

1

2.8.

1

2.8.

2

3.1.

1

3.1.

2

3.1.

3

3.2.

1

3.2.

2

3.2.

3

3.2.

4

3.2.

5

3.3.

1

3.3.

2

3.4.

1

3.5.

1

3.6.

1

3.6.

2

3.7.

1

3.7.

2

4.1.

1

4.2.

1

4.2.

2

4.3.

1

4.3.

2

4.3.

3

4.4.

1

4.4.

2

4.4.

3

1 Blabla sdsd lkj dsaljsd ofiawh dosansdolfij k jlsajkdl fdkjlsdaj dlsfkjsad

X X X X X X X X X X2 sdfljkjln skld ldskj dslakmaldskmf

ljwoeiewfosdsd lsdk flsdkj dsfljksdf X X X X X X X X X X X X X X

3 sadf lksdjlds kjdlkjd flsd,d,msf X X X X X4 as kldskjdsl dskj,sdfam sdlfdkssj flds X X X X X X X X X X X X X X X X X5 sdfew jdsh kfdjhdf ksdjsd X X X X X X X X X X X X X X X X X X6 Blabla sdfa d ads hdksafjhdskdhj ksdahj

kdsjhX X X X

7 dfgs lkjsd lfjkdsl jds.,adsmsd foldfkj X X X X X X X X8 dsf lksdj ldfjdslms,.as,mfmlasdkjsdl X X X X X9 zh fdadsfads sdfsd adsjkh

sdakjhwekerhkash das kfsjahX X X X X X X X

10 Blabla sa dldsjlsdfakjweljk falds.,sdfm sdlksdj X X X11 dd ddssd dssds dafjlsdfk sdflasdkjfl fjfasl

sladfj lj sdlksdf ldfsjkdsf lsadf lsdf l X X X X X X X

12 Blabla sk hskds kd hkwjehkehsdk jfhk sdh fkjsdfhk dsh kdsjhwekrhj ewrkh ewrkj

X X X X X X13 sda lkjsdldjfkflwenllkj lksfdjf lsdkj

dfslkdjslsdaf ksdfjl sdjldsfj kddX X X X X X X

14 sdsafdwe ioweur oweri uo uiwer erwoi weroiewru weroui ewro wer

X X X X X X X X15 swert kjlds ldskj lsdkj sdwee X X X X X X X

4.4

Back

up a

nd r

ecov

ery

3.6

Net

wor

k se

curit

y

3.7

Phys

ical

sec

urity

4.2

Job

sche

dulin

g

4.3

Inci

dent

s m

anag

emen

t

2.8

Doc

umen

tatio

n an

d tr

aini

ng

3.1

Info

rmat

ion

secu

rity

man

agem

ent

3.2

Acc

ess

to

appl

icat

ions

3.3

Priv

ilege

acc

ess

to

syst

ems

and

data

1.1

Prog

ram

de

velo

pmen

t m

etho

dolo

gy

1.7

Test

ing

and

acce

ptan

ce

1.8

Doc

umen

tatio

n an

d tr

aini

ng

2.5

Test

ing

and

acce

ptan

ce

Version 1: “Just” showing which measures will reduce specific risk scenarios

Page 75: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

3: Mitigating risk scenarios with measures correlated to ISO27002

1.2

SLA

s

1.3

Proj

ect

initi

atio

n

1.4

Ana

lysi

s an

d de

sign

1.5

Proj

ect

exec

utio

n

1.6

Dat

a m

igra

tion

2.1

Mgn

t. o

f pr

ogra

m

chan

ges

2.2

SLA

s2.

3 D

ocum

enta

tion

of

chan

ges

2.4

App

rova

l of

chan

ges

2.6

Dep

loym

ent

of

chan

ges

2.7

Emer

genc

y ch

ange

s

3.4

App

licat

ions

inte

grity

3.5

Syst

ems

a. in

fras

tr.

sec.

4.1

SLA

Nr. scenario name

scenario description

1.1.

1

1.1.

2

1.1.

3

1.2.

1

1.3.

1

1.4.

1

1.5.

1

1.6.

1

1.7.

1

1.7.

2

1.7.

3

1.7.

4

1.8.

1

1.8.

2

2.1.

1

2.2.

1

2.3.

1

2.4.

1

2.5.

1

2.5.

2

2.6.

1

2.7.

1

2.8.

1

2.8.

2

3.1.

1

3.1.

2

3.1.

3

3.2.

1

3.2.

2

3.2.

3

3.2.

4

3.2.

5

3.3.

1

3.3.

2

3.4.

1

3.5.

1

3.6.

1

3.6.

2

3.7.

1

3.7.

2

4.1.

1

4.2.

1

4.2.

2

4.3.

1

4.3.

2

4.3.

3

4.4.

1

4.4.

2

4.4.

3

1 Blabla sdsd lkj dsaljsd ofiawh dosansdolfij k jlsajkdl fdkjlsdaj dlsfkjsad

S S P S S S S P S S2 sdfljkjln skld ldskj dslakmaldskmf

ljwoeiewfosdsd lsdk flsdkj dsfljksdf S S P S S S S S S P S S S S

3 sadf lksdjlds kjdlkjd flsd,d,msf S S S S S4 as kldskjdsl dskj,sdfam sdlfdkssj flds S S S S S P S S P S S S S S S S S5 sdfew jdsh kfdjhdf ksdjsd S S S P S S S P S S S S S S S S S S6 Blabla sdfa d ads hdksafjhdskdhj ksdahj

kdsjhS P S S

7 dfgs lkjsd lfjkdsl jds.,adsmsd foldfkj S S S S S S S P8 dsf lksdj ldfjdslms,.as,mfmlasdkjsdl S S S S S9 zh fdadsfads sdfsd adsjkh

sdakjhwekerhkash das kfsjahS S S S S P S S

10 Blabla sa dldsjlsdfakjweljk falds.,sdfm sdlksdj S S S11 dd ddssd dssds dafjlsdfk sdflasdkjfl fjfasl

sladfj lj sdlksdf ldfsjkdsf lsadf lsdf l S S P S S S S

12 Blabla sk hskds kd hkwjehkehsdk jfhk sdh fkjsdfhk dsh kdsjhwekrhj ewrkh ewrkj

S S S S S S13 sda lkjsdldjfkflwenllkj lksfdjf lsdkj

dfslkdjslsdaf ksdfjl sdjldsfj kddS S S S S P S

14 sdsafdwe ioweur oweri uo uiwer erwoi weroiewru weroui ewro wer

S S S S S S P S15 swert kjlds ldskj lsdkj sdwee S S P S P S S

1.1

Prog

ram

de

velo

pmen

t m

etho

dolo

gy

1.7

Test

ing

and

acce

ptan

ce

1.8

Doc

umen

tatio

n an

d tr

aini

ng

2.5

Test

ing

and

acce

ptan

ce

2.8

Doc

umen

tatio

n an

d tr

aini

ng

3.1

Info

rmat

ion

secu

rity

man

agem

ent

3.2

Acc

ess

to

appl

icat

ions

3.3

Priv

ilege

acc

ess

to

syst

ems

and

data

4.4

Back

up a

nd r

ecov

ery

3.6

Net

wor

k se

curit

y

3.7

Phys

ical

sec

urity

4.2

Job

sche

dulin

g

4.3

Inci

dent

s m

anag

emen

t

Version 2: Distinguish between primary and secondary measures

Page 76: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

1.2

SLAs

1.3

Proj

ect

initi

atio

n

1.4

Anal

ysis

and

des

ign

1.5

Proj

ect

exec

utio

n

1.6

Data

mig

ratio

n

2.1

Mgn

t. o

f pro

gram

ch

ange

s2.

2 SL

As2.

3 Do

cum

enta

tion

of

chan

ges

2.4

Appr

oval

of c

hang

es

2.6

Depl

oym

ent

of

chan

ges

2.7

Emer

genc

y ch

ange

s

3.4

Appl

icat

ions

inte

grity

3.5

Syst

ems

a. in

fras

tr.

sec.

4.1

SLA

Nr. scenario name

scenario description

1.1.

1

1.1.

2

1.1.

3

1.2.

1

1.3.

1

1.4.

1

1.5.

1

1.6.

1

1.7.

1

1.7.

2

1.7.

3

1.7.

4

1.8.

1

1.8.

2

2.1.

1

2.2.

1

2.3.

1

2.4.

1

2.5.

1

2.5.

2

2.6.

1

2.7.

1

2.8.

1

2.8.

2

3.1.

1

3.1.

2

3.1.

3

3.2.

1

3.2.

2

3.2.

3

3.2.

4

3.2.

5

3.3.

1

3.3.

2

3.4.

1

3.5.

1

3.6.

1

3.6.

2

3.7.

1

3.7.

2

4.1.

1

4.2.

1

4.2.

2

4.3.

1

4.3.

2

4.3.

3

4.4.

1

4.4.

2

4.4.

3

maturity 1 1 2 1 2 3 2 3 2 2 1 2 3 2 1 2 1 2 3 2 1 2 1 1 2 1 2 1 0 2 1 2 1 2 2 3 2 1 2 1 2 1 1 1 2 3 2 1 2

1 Blabla sdsd lkj dsaljsd ofiawh dosansdolfij k jlsajkdl fdkjlsdaj dlsfkjsad

X X X X X X X X X X2 sdfljkjln skld ldskj dslakmaldskmf

ljwoeiewfosdsd lsdk flsdkj dsfljksdf X X X X X X X X X X X X X X

3 sadf lksdjlds kjdlkjd flsd,d,msf X X X X X4 as kldskjdsl dskj,sdfam sdlfdkssj flds X X X X X X X X X X X X X X X X X5 sdfew jdsh kfdjhdf ksdjsd X X X X X X X X X X X X X X X X X X6 Blabla sdfa d ads hdksafjhdskdhj ksdahj

kdsjhX X X X

7 dfgs lkjsd lfjkdsl jds.,adsmsd foldfkj X X X X X X X X8 dsf lksdj ldfjdslms,.as,mfmlasdkjsdl X X X X X9 zh fdadsfads sdfsd adsjkh

sdakjhwekerhkash das kfsjahX X X X X X X X

10 Blabla sa dldsjlsdfakjweljk falds.,sdfm sdlksdj X X X11 dd ddssd dssds dafjlsdfk sdflasdkjfl fjfasl

sladfj lj sdlksdf ldfsjkdsf lsadf lsdf l X X X X X X X

12 Blabla sk hskds kd hkwjehkehsdk jfhk sdh fkjsdfhk dsh kdsjhwekrhj ewrkh ewrkj

X X X X X X13 sda lkjsdldjfkflwenllkj lksfdjf lsdkj

dfslkdjslsdaf ksdfjl sdjldsfj kddX X X X X X X

14 sdsafdwe ioweur oweri uo uiwer erwoi weroiewru weroui ewro wer

X X X X X X X X15 swert kjlds ldskj lsdkj sdwee X X X X X X X

1.1

Prog

ram

de

velo

pmen

t m

etho

dolo

gy

1.7

Test

ing

and

acce

ptan

ce

1.8

Docu

men

tatio

n an

d tr

aini

ng

2.5

Test

ing

and

acce

ptan

ce

2.8

Docu

men

tatio

n an

d tr

aini

ng

3.1

Info

rmat

ion

secu

rity

man

agem

ent

3.2

Acce

ss t

o ap

plic

atio

ns

3.3

Priv

ilege

acc

ess

to

syst

ems

and

data

4.4

Back

up a

nd re

cove

ry

3.6

Netw

ork

secu

rity

3.7

Phys

ical

sec

urity

4.2

Job

sche

dulin

g

4.3

Inci

dent

s m

anag

emen

t

3: Mitigating risk scenarios with measures correlated to ISO27002

Version 3: Relating needed security measures to maturity levels of ISO27002 topics

01234 3.1

4.14.2

4.35.1

5.2

6.1

6.2

6.3

7.1

7.2

7.3

8.1

8.2

8.38.4

8.58.6

8.79.1

9.29.3

9.4

9.5

9.6

9.7

9.8

10.1

10.2

10.3

10.4

10.5

11.112.1

12.212.3

Full target level Minimal target level Milestone 3 Milestone 2 Milestone 1 Start

Page 77: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

SOP for Maintenance of the Scenario-based (IT) Risk Landscape

This section shows a step-by-step Standard Operating Procedure (SOP) for

maintaining an (IT) risk landscape

Page 78: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Reasoning for SOP A Standard Operating Procedure to Ensure a Mature Process

•  All risks as presented in an (IT) risk landscape are subject to (constant) change

•  We therefore need a standard approach to consistently reevaluate the known scenarios and to possibly “catch” new scenarios evolving

Page 79: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Interfaces of SOP Linking the IT Risk Landscape to Overall Risk Management

•  The current IT Risk Landscape is an important source of information for the overall IT Risk Management Process.

•  Every time a new version of the IT Risk Landscape is published it will trigger the IT Risk Management Process.

Page 80: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Interfaces of the SOP Linking the IT Risk Landscape to Overall Risk Management

Risk Management Process Topic of this session

Monitoring

Reporting

Planning

Tracking

Analysis

Triage

Data collection

Status Report (quarterly)

Process: Scenario-based

risk analysis

Risk Treatment

Plan

IT Risk Landscape

Open Items

Varied information

sources

Key Risk Indicators

Open Item Management

ISMS Key Indicators

Updating

A C

D

B © Bitterli Consulting AG

Page 81: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Purpose of the Standard Operating Procedure

This SOP •  defines the process of maintaining an

IT Risk Landscape; •  explains the intention and benefit of the

IT Risk Landscape; •  defines the interfaces to the

IT Risk Management process; •  …?

Page 82: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Table of Contents of the SOP for Maintaining the IT Risk Landscape

•  Definitions •  Roles & Responsibilities •  Process Steps

Page 83: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Operational Risk & IT Risk Clear Definitions help to Ensure Consistent Risk Assessment

•  An operational risk is the risk of loss resulting from inadequate or failed internal processes, people and systems or from external events.

•  An IT risk is an operational risk related to the development, operation and use of information technology.

Page 84: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

IT Risk Scenario Clear Definitions help to Ensure Consistent Risk Assessment

•  An IT risk scenario is a description of a class of related IT risks together with their possible causes, triggers and effects.

Page 85: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

IT Risk Landscape Clear Definitions help to Ensure Consistent Risk Assessment

•  An IT risk landscape is a collection of IT risk scenarios together with assessments of their severities and probabilities. The severity and probability categories of the IT risk scenarios are graphically represented by positioning the scenario numbers in a two-dimensional diagram.

Page 86: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Scope of the Standard Operating Procedure

•  The stipulations in this SOP apply to the entire company / the XXXX Division.

•  Functional Scope The IT Risk Landscape covers all operational risks related to the development, operations and use of information technology

•  Out of Scope Excluded are risks that are exclusively related to business / to …

Page 87: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Roles & Responsibilities of the Standard Operating Procedure

•  Risk Landscape Team •  Risk Landscape Secretary •  Risk Landscape Manager •  (?) IT Quality Manager •  …

Page 88: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

3. Roles and Responsibilities IT Risk Landscape Team

•  The IT Risk Landscape Team is responsible for – collecting, updating and assessing any

information about threats, vulnerabilities and incidents;

– defining IT risk scenarios and sub-scenarios; – assessing the expected damages and

probabilities of occurrence of the risk scenarios; –  reviewing and including feedback.

Page 89: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

3. Roles and Responsibilities IT Risk Landscape Secretary

•  The IT Risk Landscape Secretary is a member of –  the IT Risk Landscape Team and responsible for – keeping records during the scenario workshops; – keeping the documentation of the IT Risk

Landscape up-to-date; – making the documentation available to the

members of the team and other selected parties; – collecting feedback from team members;

management, business and experts.

Page 90: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

3. Roles and Responsibilities

IT Risk Landscape Manager

•  The IT Risk Landscape Manager is responsible for – staffing the IT Risk Landscape Team; – ensuring the availability of information about

threats, vulnerabilities and incidents; – scheduling and moderating the workshops; – deciding about the distribution of the

documentation; –  liaising with the IT Risk Management Process; –  reporting to management.

Page 91: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

3. Roles and Responsibilities

IT Quality Function

•  The IT Quality Function is responsible for – approving the documentation of the IT Risk

Landscape.

Page 92: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Process Steps of the Standard Operating Procedure

1.  Convene the workshop 2.  Prepare the workshop 3.  Perform the workshop 4.  Document scenarios 5.  Verify scenarios 6.  Versioning of risk landscape 7.  Communicate results

Convene Workshop

Prepare Workshop

Perform Workshop

Document Scenario

Verify Scenario

Process Steps

Landscape Versioning

Communicate Results

Page 93: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Step 1: Convene the Workshop Trigger

•  1–2 times a year the IT Risk Landscape Manager schedules a regular scenario workshop, where the IT Risk Landscape Team meets to discuss and update the risk landscape.

•  In case of urgency, the IT Risk Landscape Manager may convene the team in an exceptional workshop to discuss specific matters such as conflicting views on previously released documents.

Convene Workshop

Prepare Workshop

Perform Workshop

Document Scenario

Verify Scenario

Process Steps

Landscape Versioning

Communicate Results

Page 94: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Step 2: Prepare the Workshop

•  Between the scheduled workshops, all members of the IT Risk Landscape Team collect relevant information.

•  Sources for such information include: –  actual security related incidents and ITSM

problems that occur internally or elsewhere; –  reports of internal or external audits or security

reviews (including penetration tests); –  standards, checklists and other literature; –  feedback on the current or previous versions of

the risk landscape.

Convene Workshop

Prepare Workshop

Perform Workshop

Document Scenario

Verify Scenario

Process Steps

Landscape Versioning

Communicate Results

Page 95: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Step 2: Prepare the Workshop

•  The members of the IT Risk Landscape Team prepare their input to the workshop as proposals to create, modify, merge or delete risk scenarios.

•  The IT Risk Landscape Secretary redistributes this information to the IT Risk Landscape Team.

•  The IT Risk Landscape Manager makes sure that input from the IT Risk Management Process is appropriately handled.

Convene Workshop

Prepare Workshop

Perform Workshop

Document Scenario

Verify Scenario

Process Steps

Landscape Versioning

Communicate Results

Page 96: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Step 3: Perform the Workshop

•  The IT Risk Landscape Manager moderates the scenario workshop and determines which topics will be discussed.

•  For every new or modified scenario the required information is recorded by the IT Risk Landscape Secretary.

•  Finally, the probability and severity rating of each scenario are agreed by the members of the IT Risk Landscape Team.

Convene Workshop

Prepare Workshop

Perform Workshop

Document Scenario

Verify Scenario

Process Steps

Landscape Versioning

Communicate Results

Page 97: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Step 4: Document all Scenarios

•  The scenario descriptions and the graphical representation of the IT risk landscape are updated immediately after the workshop by the IT Risk Landscape Secretary.

•  The updated documentation is forwarded to all members of the IT Risk Landscape Team by the IT Risk Landscape Secretary for verification and feedback.

Convene Workshop

Prepare Workshop

Perform Workshop

Document Scenario

Verify Scenario

Process Steps

Landscape Versioning

Communicate Results

Page 98: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Step 5: Verify the Scenarios

•  Feedback from team members and other persons is collected by the IT Risk Landscape Secretary and made available to all members of the IT Risk Landscape Team.

•  The IT Risk Landscape Manager decides whether certain changes and new scenarios need to be forwarded to other persons for verification.

Convene Workshop

Prepare Workshop

Perform Workshop

Document Scenario

Verify Scenario

Process Steps

Landscape Versioning

Communicate Results

Page 99: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Step 5: Verify the Scenarios

•  Purely editorial or straight-forward proposals resulting from the feedback are immediately included into the documen-tation by the IT Risk Landscape Secretary.

•  In case of substantial changes that may require further discussion, the IT Risk Landscape Manager decides on the urgency of the matter. The topic may either be scheduled for the next regular workshop or an exceptional workshop may be convened.

Convene Workshop

Prepare Workshop

Perform Workshop

Document Scenario

Verify Scenario

Process Steps

Landscape Versioning

Communicate Results

Page 100: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Step 6: Version the Risk Landscape

•  Upon considering the feedback of the verification step, the IT Risk Landscape Manager decides whether the documented and verified results of the scenario workshop become the new version of the risk landscape replacing the current published version.

•  Otherwise the current version stays valid at least until after the next scenario workshop.

Convene Workshop

Prepare Workshop

Perform Workshop

Document Scenario

Verify Scenario

Process Steps

Landscape Versioning

Communicate Results

Page 101: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Step 7: Communicate the Results

•  The new version of the IT Risk Landscape is provided as input to the IT Risk Management Process and presented to management by the IT Risk Landscape Manager to reflect the overall IT risk situation.

Convene Workshop

Prepare Workshop

Perform Workshop

Document Scenario

Verify Scenario

Process Steps

Landscape Versioning

Communicate Results

Page 102: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Wrap up

Page 103: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Wrap up (I)

•  Using scenario-based (IT) risk landscape is one of many approaches to (IT) risk assessment

•  The value of this approach lies in the appropriate use of internally available knowledge and experience

•  The creative process of identifying risks must be supplement by a systematic verification of the completeness of the risks found

Page 104: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Wrap up (II)

•  The main difficulty of this approach that it needs consistent application of a mature Standard Operating Procedure

•  The results of the IT Risk Landscape Process must be integrated into the overall approach for –  IT Risk Management (!) – Operational Risk Management (?)

Page 105: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

For More Information:

Peter R. Bitterli, CISA, CISM, CGEIT

Bitterli Consulting AG ITACS Training AG BPREX Consulting Group AG

[email protected] www.bitterli.com / www.itacs.com / www.bprex.ch

Page 106: Scenario-based (IT) Risk Assessment & Management · Abstract (I) Scenario-based (IT) Risk Assessment & Management • Following the proliferation of regulations such as the Sarbanes-Oxley

Thank you!