CIS RAM Version 1.0
CIS RAM Version 1.0
CIS RAM Version 1.0
0
Center for Internet Security®
Risk Assessment Method
As with all CIS work, we welcome your feedback, and we also welcome volunteers who wish to
participate in the evolution of this and other CIS products.
CIS gratefully acknowledges the contributions provided by HALOCK Security Labs and the
DoCRA Council in developing CIS RAM and the CIS RAM Workbook.
Principal Author:
Chris Cronin. Partner, HALOCK Security Labs
Contributing Authors:
Jim Mirochnik, Terry Kurzynski, and David Andrew, Partners, HALOCK Security Labs. Erik Leach
and Steve Lawn, HALOCK Security Labs. Paul Otto, Attorney, Hogan Lovells US LLP.
Review and vetting was provided by multiple members of the CIS staff.
Cybersecurity risk assessments are important tools for organizations that help them evaluate and
prioritize their risks, but also to determine when their risks are acceptable. This risk assessment
method is designed to be practical for a broad population of users, whether they are novices to
cybersecurity issues, capable of recognizing cybersecurity concerns, or experts.
Organizations that must demonstrate “reasonable” safeguards and risk management for
regulatory, contractual, or security management purposes may benefit from the use of the
method. Additionally, the CIS RAM is designed to promote meaningful communications and
consensus among technicians, non-technical management, security experts, risk managers, as
well as legal and regulatory professionals.
The CIS RAM guides readers to conduct risk assessments in a way that match the expectations
stated in laws, regulations, and information security standards. The CIS RAM accomplishes this
by providing instructions, templates, examples, and exercises to demonstrate its methods. These
substantiate the framework of a risk assessment.
Using CIS RAM, the reader will be able to rapidly develop a risk register that communicates
reasonableness to many authorities and experts, but the reader will also need to bring their
professional judgment (theirs and the judgment of collaborating experts) to the task.
Professional judgment will help organizations determine the scope and boundaries of the risk
assessment, to define the organization’s mission, objectives, and obligations, to decide which
risks will be evaluated, to identify foreseeable threats, and to recommend risk treatment
safeguards.
Chris Cronin
Partner, HALOCK Security Labs
Chair, DoCRA Council
--
This guide includes references a selection of controls from CIS Controls V7 as examples of
safeguards that are specifically selected to help protect organizations. Since such resources
change from time to time, please contact CIS or refer to our website for the most recent
information. (www.cisecurity.org)
The reader will best develop an understanding of the risk assessment method by following
along with the workbook, and by entering their own examples in the spaces provided
within each sample worksheet.
April 2018
After completing Chapter 1, the reader will be directed to one of three chapters that provide
instructions for conducting risk assessments. Chapters 2, 3, and 4 present processes, materials,
and examples that are suitable for organizations with varying degrees of capability for conducting
risk assessments.
After completing the instructions chapters, all readers will benefit from the guidance, tips, and
deep dives presented in Chapter 5.
Laws, regulations, and information security standards do not expect that the public can or will
prevent all information security incidents. They instead make us responsible for looking ahead to
what might go wrong, and to use safeguards that are not overly burdensome to prevent that
harm. That is the essence of Duty of Care Risk Analysis4 (“DoCRA”) that the CIS RAM is based
on.
• Since 1993, all US regulations – whether or not they are related to information
security – require risk analysis to achieve a cost-benefit balance while achieving
compliance.5
• Information security standards have called on the public to use risk analysis when
designing security controls that match their environment.6
• Judges have used a “duty of care balance test” to determine liability in data breach
cases.7
• The Federal Trade Commission has consistently required that organizations use risk
assessments to determine the reasonableness of their security controls.8
• The General Data Protection Regulation (“GDPR”) that requires privacy protections
for EU residents, and bases its security requirements on risk analysis.9
Experts and authorities consistently require organizations to secure information and systems as
much as they can to prevent harm to others, but not to allow safeguards to be overly burdensome
to them or the public. And they point to risk assessments as the way to find the balance.
10 Executive Order 12866 – Regulatory Planning and Review, 58 FR 51735; October 4, 1993
11 Gramm Leach Bliley Act Safeguards Rule 16 CFR Part 314
12 HIPAA Security Rule 45 CFR Part 160 and Subparts A and C of Part 164
13 U.S. v. Carroll Towing, 159 F.2d 169 (2d Cir. 1947)
1. Risk analysis must consider the interests of all parties that may be harmed by the risk.
2. Risks must be reduced to a level that authorities and potentially affected parties would
find appropriate.
3. Safeguards must not be more burdensome than the risks they protect against.
Practices
1. Risk analysis considers the likelihood that certain threats could create magnitudes of
impact.
2. Risks and safeguards are evaluated using the same criteria so they can be compared.
3. Impact and likelihood scores have a qualitative component that concisely states the
concerns of interested parties, authorities, and the assessing organization.
4. Impact and likelihood scores are derived by a numeric calculation that permits
comparability among all evaluated risks, safeguards, and against risk acceptance criteria.
5. Impact definitions ensure that the magnitude of harm to one party is equated with the
magnitude of harm to others.
6. Impact definitions should have an explicit boundary between those magnitudes that
would be acceptable to all parties and those that would not be.
7. Impact definitions address; the organization’s mission or utility to explain why the
organization and others engage risk, the organization’s self-interested objectives, and the
organization’s obligations to protect others from harm.
8. Risk analysis relies on a standard of care to analyze current controls and recommended
safeguards.
9. Risk is analyzed by subject matter experts who use evidence to evaluate risks and
safeguards.
10. Risk assessments cannot evaluate all foreseeable risks. Risk assessments re-occur to
identify and address more risks over time.
Table 1 - CIS RAM Principles and Practices Alignment to Law, Regulations, and Security Standards
Security
CIS RAM and DoCRA Principles and Practices Law Regulations Standards
Risk analysis must consider the interests of all parties
that may be harmed by the risk.
Risks must be reduced to a level that authorities and
potentially affected parties would find appropriate.
Safeguards must not be more burdensome than the risks
they protect against.
Risk analysis considers the likelihood that certain threats
could create magnitudes of impact.
Risks and safeguards are evaluated using the same
criteria so they can be compared.
Impact and likelihood scores have a qualitative
component that concisely states the concerns of
interested parties, authorities, and the assessing
organization.
Impact and likelihood scores are derived by a numeric
calculation that permits comparability among all evaluated
risks, safeguards, and against risk acceptance criteria.
Impact definitions ensure that the magnitude of harm to
one party is equated with the magnitude of harm to
others.
Impact definitions should have an explicit boundary
between those magnitudes that would be acceptable to
all parties and those that would not be.
Impact definitions address; the organization’s mission or
utility to explain why the organization and others engage
risk, the organization’s self-interested objectives, and the
organization’s obligations to protect others from harm.
Risk analysis relies on a standard of care to analyze
current controls and recommended safeguards.
Risk is analyzed by subject matter experts who use
evidence to evaluate risks and safeguards.
Risk assessments cannot evaluate all foreseeable risks.
Risk assessments re-occur to identify and address more
risks over time.
Organizations that conduct risk assessments using the CIS RAM will have a plan for
implementing CIS Controls V7 that is reasonable, and defensible to authorities and experts alike.
The risk calculation used by CIS RAM resembles the structure below:
“Risk = Max (Mission Impact, Objectives Impact, Obligations Impact) x Likelihood.”
The instructions provided later in this document clearly describe how this calculation works.
Organizations that use this extended calculation will consistently consider the many ways that
information security risks can create harm.
In Figure 2 the inappropriately high risk is matched with a recommended safeguard to encrypt all
devices. Because a safeguard is evaluated using the same criteria as the risk, the organization is
evaluating the burden of the safeguard. In this case, they believe there is a small likelihood (‘1’) of
a notable cost impact (‘2’). As a result, the safeguard risk calculates as ‘2’ which is lower than the
observed risk it is addressing (‘6’). As a result, this safeguard is reasonable.
Propose Safeguards
• Propose Safeguards: Recommend safeguards from CIS Controls V7 that would reduce
unacceptable risks.
• Evaluate Proposed Safeguards: Risk-analyze the recommended safeguards to ensure that
they pose acceptably low risks without creating an undue burden.
Then the organization determined that a threat that is expected to occur (and to create harm)
must be avoided (as indicated in the red box in Table 5).
And finally, the organization combined these limits to express their acceptable risk in both plain
language, and in mathematical terms.
This document is designed to be useful for organizations with varying levels of security
management capabilities. These capability levels align with Framework Implementation Tiers
(“Tiers”) as defined by the NIST Cybersecurity Framework.14 The Tiers indicate “how an
organization views cybersecurity risk and the processes in place to manage that risk.”15 The Tiers
are defined by NIST in the following way (abbreviated).
Tier 1: Partial
• Risk Management Process – Informal and ad hoc.
• Integrated Risk Management Program – Limited awareness within the organization.
• External Participation – Not coordinating with external entities.
14Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0, National Institute of
Standards and Technology. February 12, 2014
15 Ibid, pg. 9.
Tier 3: Repeatable
• Risk Management Process – Enforced through policy, and updated with changes in the
environment and threats.
• Integrated Risk Management Program – Risk-informed policies and processes are used
enterprise-wide. Personnel are skilled and informed to work securely.
• External Participation – Receiving information from partners to make internal risk-based
decisions.
Tier 4: Adaptive
• Risk Management Process – Adaptive through lessons learned and continuous
improvement.
• Integrated Risk Management Program – Enterprise-wide culture of security awareness
and continuous improvement based on lessons learned and external information.
• External Participation – Sharing security and threat information with partners.
CIS RAM provides three sets of instructions, templates, exercises, and examples for conducting
risk assessments, each with increasing complexity. These three sets of materials are suitable for
Tier 1 organizations, Tier 2 organizations, and both Tier 3 and Tier 4 organizations. The reader
can determine which of these levels and documentation are best suited to them by reviewing the
characteristics provided below.
Tier 2 materials are well-suited to organizations that enjoy more collaboration with business
management, and have more resources and capabilities for analyzing security risks and planning
programs.
• NIST Tier: Tier 2 organizations. Tier 2 materials are best suited for organizations that
have at least some collaboration with non-technical business management to define risk
criteria.
• Expertise: The organization has resources and capabilities to analyze common security
threats, and to plan risk-appropriate safeguards. However, they do not have on-hand
skills to model how threats would operate within their organization.
Tier 3 or 4 materials are well-suited to organizations that receive security and threat information
from outside sources, that have significant knowledge of information security topics, and time to
evaluate threat scenarios that risk assessments are based on.
• NIST Tier: Tiers 3 and 4 organizations. Tiers 3 or 4 materials are best suited for
organizations that are using risk-based criteria for enterprise-wide policies and
processes.
• Expertise: The organization has resources and capabilities to analyze security threats,
and to plan risk-appropriate safeguards, including the on-hand skills to model how threats
would operate within their organization.
• Time: The organization is able to invest time to analyze risks at the level of specific
systems, devices, and applications within the context of specific threats.
The reader should determine which level materials are best suited to their organization, and
should follow the instructions that are provided in that level. They may also decide to learn and
use the methods described in other instruction sets, but should stay within their level as much as
possible until they are comfortable with their existing risk assessment processes.
This chapter is comprised of sections that each address a specific activity within a risk
assessment. Readers should engage this chapter by first reading the text in each section, and
then conducting the exercises that are recommended for each section. The material presented in
the CIS RAM is substantially different from many other risk assessment standards and models,
so the reader should first understand the aim of each section, and then practice what they learn
using templates that are provided in the supplementary document CIS_RAM_Workbook.
While conducting their first CIS RAM-based risk assessment, organizations should be careful to
not try to “boil the ocean.” Regulatory bodies and information security standards alike understand
that not all risks can be identified in a single assessment. Organizations should continuously and
regularly assess risks to identify, understand, and manage risks over time.
Risk assessments are projects with clear steps for preparing, conducting, and reporting risk
analysis. And while risk assessment projects can be modeled with a typical plan, each
organization’s project approach will vary depending on factors such as resource availability, and
will develop over time as organizations become more capable in their cybersecurity maturity. This
section will describe a risk assessment project, its components and variations, and will present
guidance for preparing the plan.
During Step 1 (Defining the Scope & Scheduling Sessions), the organization will determine which
information assets to include in their evaluation. They will also identify business owners and
technical stewards who will provide evidence and interviews to assess those assets. The risk
assessor will then schedule interview sessions with those owners and stewards.
In Step 2 (Defining Risk Assessment Criteria) the organization will define the rules by which they
assess and score risks. They will define their mission (the value they bring to others), and their
obligations (the potential for harm against others) to establish what they are trying to protect.
They will then define scoring schemas to be used for impact and likelihood estimation.
In Step 3 (Defining Risk Acceptance Criteria) the organization will establish their risk tolerance by
selecting a combination the likelihood of an impact that would be tolerable to all parties (the
organization and parties that may be harmed by realized risks).
In Step 4 (Risk Assessment – Control-Based) the risk assessor will evaluate the risks of the
information assets. For Tier 1 organizations, the analysis includes the following activities:
• “Gather Evidence” involves a review of documents, such as policies, procedures,
standards, and benchmarks. It also includes interviews with management and personnel.
Evidence gathering also entails observation of configurations, artifacts, facilities, records,
and work processes to determine whether they operate in secure or vulnerable ways.
Tier 1 organizations should also consider reviewing the configurations of controls and
looking for evidence of their effectiveness. This may be challenging for organizations at
this level. Vulnerability scanners and configuration scanners using SCAP policies may
provide efficient analysis of technical systems to assist in this analysis.
• “Model the Threats” entails the most variety in approaches that depend on the
cybersecurity maturity of the organization. Each organization, however, will model risks
with at least these components: considering the CIS Controls that should be in place to
protect information assets; determining whether those safeguards are effectively in place
to protect information assets; identifying vulnerabilities that may allow breaches of the
assets; and identifying threats that could take advantage of those vulnerabilities.
• During “Risk Evaluation” the organization will estimate the likelihood and impact of the
risks. The estimates will be based on the scoring and criteria that were established in
Step 2. The risk score will be automatically calculated to determine whether the current
implementations of CIS Controls are already reasonable.
During Step 5 (Propose Safeguards) the organization will consider how to address unreasonable
risks by selecting CIS Controls that should be implemented to address each risk, and specifically
Note: To best understand the content of this chapter, the reader should first read each section of
the chapter, then go through the recommended exercises at the end of each section to gain
practical knowledge of the section’s topics. The reader will be directed to use the templates that
are provided in the supplementary document CIS_RAM_Workbook to attempt their exercises.
Note that the scoping table includes business owner roles and steward roles. Business owners
are the (typically) non-technical managers who are responsible for the information and processes
that information assets support. Stewards are (typically) technical managers who are responsible
for the functionality and security of the information assets. By identifying information asset
ownership up front, the scoping table can be used to help plan interview sessions for the
remainder of the risk assessment.
Regardless of how the scope of the risk assessment is established, and how detailed the asset
listing is, there are a few helpful practices an organization should keep in mind as they identify
their information assets:
• Think of a set of similarly-situated assets as a single asset class. For example, all
database servers that use the same technology and the same maintenance and
administration methods may be considered one asset class. However, if one set of
database servers is different from others (for example, they hold sensitive information in
a DMZ while others process less-sensitive information in another zone), these may be
considered two assets because their inherent risks will be different, even if they are
managed identically.
• Information assets are not only technologies that store and transmit sensitive information.
Information assets are any information, technology, process, people, or facilities that may
impact the confidentiality, integrity, or availability of information.
• Include in the scope all information assets that are within the same zones (networks,
facilities, etc.) as any other in-scope information asset.
Risk assessment criteria are the numerical and plain-language statements that an organization
uses to evaluate their cybersecurity risk. The most familiar form of risk calculations, “Risk =
Likelihood x Impact,” is the basis for risk analysis in the CIS RAM. But it is just the starting point
for risk analysis.
Risk assessment criteria must be meaningful to the organizations that use them, so they must be
tied to the potential benefit and harm that the organization may create. The impact of a
cybersecurity breach may harm the organization itself, it may harm the organization’s ability to
successfully achieve its mission, or it may harm others.
Because cybersecurity failures may harm parties both inside and outside an organization, risk
assessment criteria must be universally meaningful and must address the interests of all
potentially affected parties. Additionally, risk assessment criteria must demonstrate to authorities
that the organization considers the risk of harm to others as much as the risk of harm to
themselves, as stated in Principle 1.
While these requirements may seem complex, the method presented in this section will
sufficiently address them while using a technique that is simple to develop and use.
Notice a few things right away with the model risk analysis in Figure 3.
• While organizations typically evaluate the observed risk to determine whether they should
address or accept it, this risk statement deliberately compares the observed risk to a
proposed safeguard.
• The criteria that evaluates the risk also evaluates the safeguard.
• The impact of the risk estimates the potential of harm to the organization and the
potential harm against others.
Risk assessors compare risks to their proposed safeguards to determine whether those
safeguards would create a foreseeably lower risk than the current state. To accomplish this, the
assessor evaluates the current state risk (or “observed risk”) and the proposed safeguard using
the same criteria to ensure comparability.
This comparison prevents organizations from implementing safeguards that are overly
burdensome, or that create new, unacceptable risks. For example, an organization that uses
software that is no longer supported by the vendor, but relies on that software for critical business
A risk assessor should then recommend and evaluate a safeguard to reduce the unacceptably
high security risk, as illustrated in Table 10. Here, the organization would realize that the
likelihood of a negative impact to their mission is greater than the current state risk. This is an
obvious case of the burden being greater than the risk, and a recommended safeguard being
unacceptable.
When faced with this analysis, the organization must then find another way to address the risk.
This process will be described later in this chapter in the section Risk Treatment
Recommendations.
But what should be apparent is that without a definition of risk assessment criteria the likelihood
and impact scores are not meaningful. What would impacts or likelihoods of ‘1’, ‘2’, or ‘3’ mean,
anyway? The organization will need to create definitions for their likelihood and impact scores so
that they are meaningful to all interested parties, and so that they provide a consistent method for
risk evaluation.
Impact Definitions
Tier 1 organizations do not have a high degree of attention from management in operating
cybersecurity risk. In such organizations, risk assessment criteria can be developed in simple
terms that are business appropriate, but that do not use the business justifications that managers
often need in order to make decisions.
Risk assessment criteria are composed of impact definitions and likelihood definitions. In its
simplest form, an impact definition should consider the organization’s mission (the value the
organization provides others) and its obligations (the harm that it may cause others without
appropriate safeguards). A simple impact model for the example organization described in
Chapter 1 can look like Table 11.
Note that this example organization, a health technology manufacturer and service provider, has
defined the impact to their service as their “mission” and the impact to others as their “obligation.”
They are defining their mission in terms of their value to their constituency (patients who use their
service) and their obligations to prevent harm to those patients due to an information breach.
Also note that the impact score of ‘1’ (which is shaded grey to separate it from the higher scores)
describes impacts that would be generally understood as acceptable. If a breach led to a situation
where patients continued to access helpful information, and there was no foreseeable harm to
patients, then of course that would be interpreted as an acceptable impact. The organization
should not be satisfied with a breach that had no impact (its incident response procedures should
identify a root cause and address it so the breach does not re-occur), but in terms of risk
planning, such a risk could be considered “acceptable.”
The impact score of ‘2’ would be used to estimate a risk in which harm would come to the mission
of helping remote patients, or if some harm could come to the patients who rely on the
confidentiality, integrity, and availability of information. An impact at a level of ‘2’ would be
considered ‘not acceptable’ by the organization, its customers, regulatory agencies, or litigators.
Likelihood Definitions
This risk assessment method describes likelihood in terms of foreseeability. While risk likelihood
is often described in terms of statistical probability, CIS RAM favors foreseeability because it uses
simple terminology that aligns with common business practice, as well as the legal and regulatory
language used to determine reasonableness of safeguards that reduce risks. Recommendations
for aligning this likelihood model to probability methods are provided in the “Risk Analysis
Techniques” chapter. By combining probability with foreseeability, organizations may benefit from
both data-driven analysis and due care analysis.
The likelihood definition for a Tier 1 organization could be simply constructed, similar in structure
and depth to the impact definitions as shown in Table 12.
Likelihood Foreseeability
Score
1 Not foreseeable. This is not plausible in the environment.
2 Foreseeable. This is plausible, but not expected.
• “Not Foreseeable” implies that a threat is not plausible in the environment that is being
assessed. Loss of portable media may not be foreseeable during a risk assessment of a
hosted application.
• “Foreseeable” implies something that is plausible, but the organization would be
surprised if it occurred. A founding executive taking copies of sensitive data to
competitors may be considered foreseeable, even if it is not expected.
• “Expected” implies a threat that is not common, but that would eventually happen.
Phishing attacks or other social engineering attacks may be expected in many
environments.
When risk assessors estimate the likelihood of a threat, they will select scores ‘1’, 2’, or ‘3’ using
the foreseeability definition as their guidance. Organizations may add time-based limits to their
foreseeability definitions (i.e. “Foreseeable within planning thresholds,” “Expected within the five-
year plan” or “Not foreseeable in the next fiscal year”). If organizations do introduce time limits to
their likelihood definitions they should prioritize risk treatment investments to meet these
Exercise:
The reader should develop their organization’s risk assessment criteria using the “Criteria -
Tier 1” worksheet that is provided in the supplementary document CIS_RAM_Workbook.
The risk assessor will need to use their professional judgment to define impact types, and to
describe levels of impact that the organization must manage to. Because risk assessment criteria
are a declaration by the organization of what they will manage to in terms of harm to themselves
and harm to others, organizations should consult with legal counsel before finalizing these criteria
and making risk decisions based on them.
Because risk assessments are essentially questions of balance, the criteria for accepting risk
should help determine whether balance was achieved. In CIS RAM risk acceptance has two
components:
• Appropriate risk: That the likelihood of an impact must be acceptable to all foreseeably
affected parties
• Reasonable risk: That the risk posed by a safeguard must be less than or equal to the
risk it protects against.
While these components have been demonstrated briefly in Chapter 1, the “appropriate risk” will
be described in more detail in this section. “Reasonable risk” will be described later in the Risk
Treatment Recommendations section further on.
Recall that impact definitions were worded so that the acceptable impact definitions would seem
appropriate to any person who read them. For Tier 1 organizations that use an impact score
range of ‘1’ through ‘3’ the range of acceptable impact scores is simply ‘1’. Definitions for impacts
that would score at least a ‘2’ would therefore represent impacts that an organization, and
presumably its interested parties, would find unacceptable.
Similarly, likelihood scores for Tier 1 organizations ranged from ‘1’ through ‘3’ where the score of
‘2’ represented the lowest “foreseeability” score.
Likelihood Foreseeability
Score
1 Not foreseeable. This is not plausible in the environment.
Tier 1 organizations should determine that they would safeguard against risks that reached a
threshold of unacceptability; for example, risks that could foreseeably (likelihood is ’2’) prevent
patients from getting access to information (impact is ‘2’) or cause a breach that may harm
patients (impact is ‘2’). So if Risk = Impact x Likelihood, then the organization would invest
against risks that are scored ‘4’ or greater. All lower risks can be accepted!
Consider how a reasonable risk would be described: If a risk cannot foreseeably (likelihood is ‘1’)
prevent the organization from providing helpful information to patients (impact is ‘3’) then that is
acceptable. It sounds acceptable to reasonable people, and 1 x 3 = 3 which is less than 4.
Also see how the calculation works when an acceptable impact of no harm to patients (‘1’) is
expected to occur (‘3’). 1 x 3 = 3, which is again less than ‘4’. This is an acceptable risk. While
risk heat maps are not used in CIS RAM, organizations can now consider that heat maps can
represent actual risk acceptability based on organizational requirements, and a duty of care to
others.
Impact
1 2 3
3
Likelihood
2
1
Exercise:
The reader should define their organization’s risk acceptance criteria using the “Criteria - Tier
1” worksheet that is provided in the supplementary document CIS_RAM_Workbook.
The risk assessor will need to use their professional judgment to identify levels of acceptable risk.
Because risk acceptance criteria are a declaration by the organization of what they will tolerate in
terms of harm to themselves and harm to others, organizations should consult with legal counsel
before finalizing these criteria and making risk decisions based on them.
Tier 1 organizations that use the CIS Controls, but that have not established a strong capability
for managing cybersecurity risk will find that control-based risk assessments are well-suited to
their needs.
This CIS Risk Assessment Method is designed to help organizations responsibly use the CIS
Controls to the degree that they are able, even if the controls cannot be implemented completely.
The risk assessment method helps Tier 1 organizations:
1. Model safeguards based on CIS Controls V7 that addresses their risks, while working
within their constraints.
2. Prioritize the safeguards they should implement, based on their organization’s risks.
B C D E G
The risk register for Tier 1 organizations is a listing of identified risks and their recommended risk
treatments, also known as “safeguards.” Each row represents one risk and risk treatment
recommendation. The parts of the risk register are:
A. The column headers and guiding text help the reader or risk assessor understand the
information that is contained in the column.
B. The CIS Controls help the risk assessor consider controls that should be in place to
protect information assets.
C. The in-scope information assets or asset classes are identified.
D. The “threat model” includes the following three items:
a. How the organization implements the CIS Control (if they do) to protect the
information asset or asset class.
b. The vulnerability that may exist if the control is not fully implemented.
The Process
The risk assessor will analyze each risk by taking the following steps as diagrammed in Figure 6.
1. Using the risk register template for Tier 1 organizations that is provided in
CIS_RAM_Workbook, read and consider the CIS Control that is stated in one of the risk
register rows.
2. Select information assets or asset classes that are listed in the asset inventory. Record
the selected assets in the “Information Asset” cell in that row.
a. If there are multiple information assets or asset classes to consider for each CIS
Control, either list them all in one cell in the information asset column, or add
multiple rows for the CIS Control so that each information asset is analyzed
separately. The decision should be based on how granular the risk assessor is
prepared to be in their analysis and planning, and how useful the distinction
between assets would be.
3. Gather evidence for how well the CIS Control is applied against the selected information
assets.
a. Evidence may be in the form of interviews, a review of configurations, or a review
of evidence, such as records and logs. This step requires knowledge and
experience in detecting vulnerabilities and understanding security threats.
Methods for gathering evidence are provided in the chapter “Risk Analysis
Techniques.”
4. Describe the safeguard that implements the CIS Controls and how the safeguard is
applied at the organization in the “Current Control” cell of that row.
5. Consider the difference between the CIS Control and the currently used safeguard and
determine whether there is a deficiency in how the control is currently deployed and
operating. If the current control is not implemented as described, how would this be
described as a vulnerability?
CIS Description
Control
1.1 Utilize an active discovery tool to identify devices connected to the
organization's network and update the hardware asset inventory.
The risk assessor considers the information asset that the control would protect. In this case, they
would apply an asset inventory discovery tool to all network attachable devices. They could focus
purely on a class of assets, such as portable workstations, “headless” or “internet-of-things”
devices, smart phones, laptops, or devices in a specific network such as the corporate VLAN that
is used to connect wireless devices. But to make things simple for their first assessment, they
decide that the asset class they will assess will be “all devices.”
Information Asset
All devices.
Next, they must think through and record what their current control is, what resulting
vulnerabilities may exist, and what threats would be of concern to them. They realize that they
don’t have an automated tool that provides a regular inventory, but they do have a vulnerability
scanning tool that they occasionally use. That may be useful here.
But the control clearly has an objective, which is the automatic detection of all systems that
appear on the network. If the organization occasionally uses a vulnerability scanner, then a
vulnerability related to this control would be that new systems could join the network and not be
detected until the next vulnerability scan occurred. The resulting threat would be obvious:
Compromised systems may operate on the network between scans.
So the next three columns would look like this:
Now that the threat has been modeled, the risk assessor should estimate the likelihood and
impact of the risk. The organization must consider the likelihood that an impact would occur if the
threat were successful. Risk assessors should think of the likelihood and impact as a dependent
pairing. In this example, the organization may believe that multiple systems will join and leave
their network without detection. That is a highly likely scenario for them. But they may also
believe that the risk is foreseeable but unexpected for an undetected system to cause an impact if
the visitors they receive are employees of well-secured partner organizations.
In terms of the impact that people may suffer, the risk assessor considers how harm could be
done in this foreseeable but unlikely scenario. If an employee of a secured partner were to bring
in a laptop that was infected with malware that could spread to other systems on the network,
what harm could that do? If these partner employees join a network that contains a mix of
systems, some with highly sensitive information, then is it foreseeable but not expected that the
scenario could expose records that could cause harm to few patients, or many patients? Would
the mission be reduced to the point that some patients could not get information that could
improve health outcomes?
The organization determines that it is foreseeable but not expected that records for many patients
may be exposed in the risk scenario they modeled. They do not believe that the risk scenario
would affect their mission. So now they will add this information to their risk register to see how
the risk evaluates.
Recall the definitions for the impact and likelihood scores that the organization created. Impact
scores were defined earlier as shown in Table 19.
Impact score ‘1’ is shaded to indicate that it is considered an acceptable impact to all parties. Also
recall that likelihood was defined with this next table.
Likelihood Foreseeability
Score
1 Not foreseeable. This is not plausible in the environment.
2 Foreseeable. This is plausible, but not expected.
A risk that is foreseeable but not expected to occur (likelihood = 2) in a way that creates no
impact to the mission (mission impact = 1), but that would create harm to many patients
(obligations impact = 3) would appear as below.
The risk score is the product of the likelihood score and the higher of the two impact scores,
which in this case is ‘2 x 3 = 6’.
Also recall that the risk acceptance criteria for the Tier 1 organization looked like this:
So the organization realizes, based on its own criteria for scoring and accepting risk, that their
occasional use of vulnerability scans is not sufficient for addressing the risk of infected systems
joining the network. This risk is not acceptable because it is not “appropriate” (its risk is higher
than the acceptable score of “less than 4.”)
But they are not sure what to do about this risk, because they don’t know whether they will be
able to afford the time or budget to implement a more robust solution for CIS Control 1.1 (such as
a network access control appliance) and they have many more controls and risks to consider.
The method for identifying reasonable ways to implement safeguards will be addressed in the
Risk Treatment Recommendations section later in this chapter.
First, however, we will examine a few more of the CIS Controls and see how the Tier 1
organization analyzes them.
The Tier 1 organization has determined that its risk associated with CIS Control 3.4, at least in its
production environment, is acceptable because the risk is “appropriate” (it’s score is less than ‘4’).
This allows the organization to keep their current processes in place, and to focus on higher risks
first.
But they still have an internal network to consider. In this network they have an important
enterprise management application that relies on an older operating system, and that does not
work with more advanced patches to the operating system. The application vendor says they will
release a more secure version in the next year, and the Tier 1 organization knows that converting
They clearly have an unacceptable risk with how this control protects their corporate network (the
risk score of ‘6’ is inappropriately high). The enterprise management application is creating a risk
that should be addressed in some way. The organization will address this risk in the following
section, Risk Treatment Recommendations.
The Tier 1 organization suspects that they will need to invest in their log management and SIEM
technologies soon, but they are also aware that choosing which log messages to capture,
prioritize, and alert on will require careful thought and lots of experience. Their main concern
regarding log management is detecting abuse of systems and data access. Morale has been low,
and they are in a competitive business that may cause internal employees to steal sensitive data
from their enterprise management application and provide it to a competitor.
After having entered a few risks in the risk register, this analysis does not surprise them. They
were sure that by reviewing this control they would highlight a problem. And now they see that
this risk is both inappropriately high, and should be prioritized over the other risks that they
analyzed previously. By the time the risk assessment is complete, this risk will rank among the
first items that should be addressed (it has the maximum risk score of ‘9’). They will select and
design their risk treatment safeguard in the following step, Risk Treatment Recommendations.
The risk assessor will need to use their professional judgment to select the controls and
information assets and to model threats that should be analyzed in the risk assessment.
Information security experts may need to be included in the process to ensure that the risk
analysis is conducted appropriately.
The risk treatment recommendation exercises that are demonstrated in this section examine the
unacceptable risks that were illustrated earlier in the document and will select CIS Controls that
A risk and its proposed safeguard are both evaluated using the same criteria. If a proposed
safeguard has a higher risk (its “safeguard risk”) than the risk acceptance criteria, then it’s not
appropriate. If the safeguard has a higher score than the observed risk, then it’s not reasonable.
The exercises in this section will focus on matching completed risk analyses (in blue) with newly
recommended safeguards (in green).
Risk assessors may reference the Community Attack Model to find controls that can be
complementary and alternative to the recommended safeguards they are assessing. If an
organization struggles to implement a sub-control, they could look for controls that play a similar
role in the Community Attack Model to find alternative controls that might help them meet the
same security objective. For example, if an organization cannot easily use audit logs to detect
delivery of a kind of threat, they may look to another control in the cell that intersects with the
Using a safeguard based on CIS Control 12.7 in this planned deployment still evaluates as
unacceptable. The risk assessor is certain that the IPS in terms of budget and potential disruption
of service will prevent the organization from properly servicing some of their patient user
population (Likelihood = ‘3’; Mission Impact = ‘2’; Safeguard Risk Score = ‘6’). For a Tier 1
organization especially, implementing a tool that may create disruptions to business would be
intolerable, and would likely lead to increased frustration by non-technical management with
information security.
So the risk assessor considers deploying an open-source IPS in detection and alert mode
(Intrusion Detection System, or IDS), rather than a commercial IPS in prevention mode. This
would allow the team to be aware of suspicious activities and to respond without creating a failure
of business functions. After becoming familiar and comfortable with the IPS and seeing what
actions it alerts on, the technology team may be able to selectively block access to high-risk
systems, such as the enterprise management system.
They find a corresponding CIS Control after reviewing the sub-controls under CIS Control 12. The
risk assessor reads CIS Control 12.6 that states, “Deploy network-based Intrusion Detection
Systems (IDS) sensors to look for unusual attack mechanisms and detect compromise of these
systems at each of the organization's network boundaries.” This control can be the initial
safeguard, allowing the organization to improve the safeguard to an IPS (CIS Control 12.7) when
the organization is ready to block traffic that they understand better.
Table 29 models a variation to this recommended safeguard.
Table 29 - Example Risk Treatment Recommendation CIS Control 12.6 to reduce CIS Control 3.4 risk.
The assessor is certain that the impact to the mission and obligations will not be affected using
the IPS as an IDS (in detect mode versus prevention mode). At this point, the risk assessor is
confident that they have a plan for implementing a safeguard that aligns with CIS Control 12.6
that would reduce the risk that was evaluated by their review of CIS Control 3.4.
The organization is now comfortable that their risk treatment recommendations are reasonable
and appropriate, even though the plans do not include a complete implementation of all CIS
Controls to all in-scope assets.
Moreover, the organization knows that they have a basis to explain and defend their plan to
interested parties and authorities, and to defend the basis by which they accept certain risks.
Exercise:
The reader should use the template Risk Register – Tier 1 that is provided in the
supplementary document CIS_RAM_Workbook to enter risk treatment recommendations for
each risk that evaluated as unacceptably high.
The risk assessor will need to use their professional judgment to design and recommend
information security safeguards, and to evaluate prospectively the risk that they may pose.
Risk assessments are projects with clear steps for preparing, conducting, and reporting risk
analysis. And while risk assessment projects can be modeled with a typical plan, each
organization’s project approach will vary depending on factors such as resource availability, and
will develop over time as organizations become more capable in their cybersecurity maturity. This
section will describe a risk assessment project, its components and variations, and will present
guidance for preparing the plan.
During Step 1 (Defining the Scope & Scheduling Sessions), the organization will determine which
information assets to include in their evaluation. They will also identify business owners and
technical stewards who will provide evidence and interviews to assess those assets. The risk
assessor will then schedule interview sessions with those owners and stewards.
In Step 2 (Defining Risk Assessment Criteria) the organization will define the rules by which they
assess and score risks. They will define their mission (the value they bring to others), their
objectives (their organizational definitions for success and failure), and their obligations (the
potential for harm against others) to establish what they are trying to protect. They will then define
scoring schemas to be used for impact and likelihood estimation.
In Step 3 (Defining Risk Acceptance Criteria) the organization will establish their risk tolerance by
selecting a combination of the likelihood of an impact that would be tolerable to all parties (the
organization and parties that may be harmed by realized risks).
In Step 4 (Risk Assessment – Asset-Based) the risk assessor will evaluate the risks of the
information assets. For Tier 2 organizations, the analysis includes the following activities:
• “Gather Evidence” involves a review of documents, such as policies, procedures,
standards, and benchmarks. It also includes interviews with management and personnel.
Evidence gathering also entails observation of configurations, artifacts, facilities, records,
and work processes to determine whether they operate in secure or vulnerable ways.
The levels of evidence gathering will be directly associated with the maturity of the
organization.
• In the “Model the Threats” activity, the organization will model risks with at least these
components; CIS Controls that should be in place to protect information assets,
safeguards that effectively protect information assets as described by the CIS Controls,
and vulnerabilities that result if safeguards are not sufficiently effective. The order in
which these components are considered depends on the maturity of the organization, as
will be described later in this document.
• During “Risk Evaluation” the organization will estimate the likelihood and impact of the
risks. The estimates will be based on the scoring and criteria that were established in
Step 2. The risk score will be automatically calculated to determine whether the current
implementations of CIS Controls are already reasonable.
During Step 5 (Propose Safeguards) the organization will consider how to address unreasonable
risks by selecting CIS Controls that should be implemented to address each risk, and specifically
how the controls will be implemented. These safeguards may include security devices, physical
safeguards, training, oversight processes, or other methods. The risk assessor then will test the
reasonableness of the safeguards during “Evaluate Proposed Safeguards.” The risk assessor will
evaluate the proposed safeguards using the same criteria that were used to evaluate the risks.
A project plan template is available in the supplementary document CIS_RAM_Workbook.
Note: The reader should use the worksheets provided in the supplementary document
CIS_RAM_Workbook while reading these instructions. The reader will best understand the
concepts and their use by practicing the methods described in this chapter.
Note that the scoping table includes the business owner roles and steward roles. Business
owners are the (typically) non-technical managers who are responsible for the information and
processes that information assets support. Stewards are (typically) technical managers who are
responsible for the functionality and security of the information assets. By identifying information
asset ownership up front, the scoping table can be used to help plan interview sessions for the
remainder of the risk assessment.
Regardless of how the scope of the risk assessment is established, and how detailed the asset
listing is, there are a few helpful practices an organization should keep in mind as they identify
their information assets:
• Think of a set of similarly-situated assets as a single asset class. For example, all
database servers that use the same technology and the same maintenance and
administration methods may be considered one asset class. However, if one set of
database servers is different from others (for example, they hold sensitive information in
a DMZ while others process less-sensitive information in another zone), these may be
considered two assets because their risks will be different, even if they are managed
identically.
• Information assets are not only technologies that store and transmit sensitive information.
Information assets are any information, technology, process, people, or facilities that may
impact the confidentiality, integrity, or availability of information.
• Include in the scope all information assets that are within the same zones (networks,
facilities, etc.) as any other in-scope information asset.
The reader should develop their own scoping table using the scoping table template in the
supplementary document CIS_RAM_Workbook.
Risk assessment criteria are the numerical and plain-language statements that an organization
uses to evaluate their cybersecurity risk. The most familiar form of risk calculations, “Risk =
Likelihood x Impact,” is the basis for risk analysis in the CIS RAM. But it is just the starting point
for risk analysis.
Risk assessment criteria must be meaningful to the organizations that use them, so they must be
tied to the potential benefit and harm that the organization may create. The impact of a
cybersecurity breach may harm the organization itself, it may harm the organization’s ability to
successfully achieve its mission, or it may harm others.
Because cybersecurity failures impact parties both inside and outside an organization, risk
assessment criteria must be universally meaningful and must address the interests of all
potentially affected parties. Additionally, risk assessment criteria must demonstrate to authorities,
such as regulators and litigators, that the organization considers the risk of harm to others as
much as the risk of harm to themselves.
While these requirements may seem complex, the method presented in this section will
sufficiently address them while using a technique that is simple to develop and use.
Risk Assessment Criteria Foundations
The risk analysis provided in the CIS RAM is at its root a question of balance between the
potential of future harm against the certain burden of a safeguard. Regulators and litigators have
Notice a few things right away with the model risk analysis in Figure 9.
• While organizations typically evaluate the observed risk to determine whether they should
address or accept it, this risk statement deliberately compares the observed risk to a
proposed safeguard.
• The criteria that evaluates the risk also evaluates the safeguard.
• The impact of the risk estimates the potential of harm to the organization and the
potential harm against others.
Risk assessors compare risks to their proposed safeguards to determine whether those
safeguards would create a foreseeably lower risk than the current state. To accomplish this, the
assessor evaluates the current state risk (or “observed risk”) and the proposed safeguard using
the same criteria to ensure comparability.
This comparison prevents organizations from implementing safeguards that are overly
burdensome, or that create new, unacceptable risks. For example, an organization that uses
software that is no longer supported by the vendor, but relies on that software for critical business
purposes, should find alternative methods for identifying and controlling potential security risks
until they replace the software. If management recommends quickly changing out to inferior, but
secure software, the organization may suffer a greater impact to their mission than the security
risk they are trying to avoid.
While considering CIS Control 18: Application Software Security, a risk statement can be made to
estimate the foreseeability of an impactful threat. The risk can be stated as it appears in Table 33
(where the risk score ‘12’ is a product of the likelihood ‘3’ and the highest impact score ‘4’):
A risk assessor should then recommend and evaluate a safeguard to reduce the high security
risk, as illustrated in Table 34. Here, the organization would realize that the likelihood of a
negative impact to their mission is greater than the current state risk. This is an obvious case of
the burden being greater than the risk, and a recommended safeguard being unreasonable.
When faced with this analysis, the organization must then find another way to address the risk.
This process will be described later in this chapter in the section Risk Treatment
Recommendations.
But what should be apparent is that without a definition of risk assessment criteria the likelihood
and impact scores are not meaningful. What would impacts or likelihoods of ‘1’, ‘2’, ‘3’, ‘4’, or ‘5’
mean, anyway? The organization will need to create definitions for their likelihood and impact
scores so that they are meaningful to all interested parties, and so that they provide a consistent
method for risk evaluation.
Impact Definitions
Tier 2 organizations generally benefit from more business involvement in managing cybersecurity
risk than Tier 1 organizations. Because of that increased involvement, the risk assessment
criteria can be – and should be – more explicit and detailed than those used by Tier 1
organizations. Advanced organizations can consider more nuance in terms of business impacts
and tolerance, and can employ organizational objectives with more authority.
An impact definition for Tier 2 organizations can have at least three impact types, and five impact
scores (magnitudes) like the definition depicted in Table 35.
Tier 2 organizations that previously used Tier 1 risk analysis processes may build on their simpler
risk assessment criteria that used three levels of impact scoring. For the purposes of reference to
our example organization – a health information provider – they have gone through a year or two
of risk management and have gained the attention and confidence of business managers and
executives. As a result, their ability to assess cybersecurity risk using business criteria will also
improve.
We can see by comparing the risk assessment criteria for Tier 1 organizations in Chapter 2 to
Table 35 that the detailed descriptions of impacts have increased in two dimensions; the number
of impact scores (magnitudes) increased from three to five, and there is an additional impact type
for business objectives.
Tier 2 organizations will find that using a range of five impact scores (magnitudes) increases the
utility of risk prioritization at the end of the risk assessment. A three-by-three risk assessment
criteria model provides organizations with six possible risk scores; 1, 2, 3, 4, 6, and 9. This leads
to a somewhat course grouping that may cause risks of somewhat different urgencies to be
indistinguishable.
A five-by-five risk assessment criteria model allows for 14 possible risk scores of; 1, 2, 3, 4, 5, 6,
8, 9, 10, 12, 15, 16, 20, and 25. Now risks of somewhat different urgencies will likely be classified
into different risk scores and will be more easily distinguished while prioritizing them.
Also note that the impact scores of ‘1’ and ‘2’ in Table 35 are shaded grey to separate them from
the higher scores. Scores ‘1’ and ‘2’ describe impacts that would be generally thought of as
acceptable. The risk acceptance criteria process will be explained later in the document, but it is
useful to consider now that the scores ‘1’ and ‘2’ are consistent in their definition of impact scores
across all three impact types, and that the impact scores of ‘3’, ‘4’, or ‘5’ could consistently be
thought of as unacceptably high for all three impact types.
The example health information provider also has a new impact to consider in Table 35 to help
them include their business objectives in their risk analysis. Business objectives are more self-
focused than missions and obligations, and are aligned with success criteria commonly found in
business. Some examples include profitability, growth, maintaining accreditations, customer
satisfaction, or retaining a position in the marketplace.
Organizations are well-served with this model because business management, technicians,
compliance personnel, and legal counsel all have their interests addressed in risk analysis that
uses these criteria.
An in-depth explanation of how to develop impact definitions with multiple examples is provided in
the chapter “Risk Analysis Techniques.”
Likelihood Definitions
The likelihood definition for a Tier 2 organization should also increase in nuance from the simpler
Tier 1 definition, and can do so by adding two more scores to the table as shown in Table 36.
Likelihood Foreseeability
Score
1 Not foreseeable. This is not plausible in the environment.
2 Foreseeable. This is plausible, but not expected.
3 Expected. We are certain this will eventually occur.
4 Common. This happens repeatedly.
5 Current. This may be happening now.
• “Not Foreseeable” implies that a threat is not plausible in the environment that is being
assessed. Loss of portable media may not be foreseeable during a risk assessment of a
hosted application.
Role Perspective
Chief Executive Officer To ensure that the mission, objectives, and obligations of the
Chief Operations Officer organization are appropriately defined, and to ensure that a
distinction between acceptable and unacceptable impacts are
appropriately delineated.
Chief Compliance Officer To ensure that the interests of regulatory agencies are
appropriately included in risk definitions.
Chief Financial Officer To ensure that objectives are appropriately defined, particularly
the distinction between acceptable and unacceptable impacts.
Chief Information Officer To ensure that technical performance, service, and capabilities
Chief Technology Officer are considered, and to include all types of information processes
beyond technology.
General Counsel To ensure that obligations are appropriately defined and that they
compare well with the mission and objectives.
Outside Counsel
Internal Audit To ensure that the concerns of interested parties are well
Audit Committee represented in all impact definitions and scores.
Key Customers / Clients To ensure that their interests are included in the obligations
Key Constituents definition.
The risk assessor will need to use their professional judgment to define impact types, and to
describe levels of impact that the organization must manage to. Because risk assessment criteria
are a declaration by the organization of what they will manage to in terms of harm to themselves
and harm to others, organizations should consult with legal counsel before finalizing these criteria
and making risk decisions based on them.
Because risk assessments are essentially questions of balance, the criteria for accepting risk
should help determine whether balance was achieved. In CIS RAM risk acceptance has two
components:
• Appropriate risk: That the likelihood of an impact must be acceptable to all foreseeably
affected parties
• Reasonable risk: That the risk posed by a safeguard must be less than or equal to the
risk it protects against.
While these components have been demonstrated briefly in Chapter 1, the “appropriate risk” will
be described in more detail in this section. “Reasonable risk” will be described later in the Risk
Treatment Recommendations section further on.
After establishing the impact and likelihood definitions, Tier 2 organizations are now well
positioned to state their risk acceptance criteria. Recall that impacts were defined within impact
scores that ranged from ‘1’ to ‘5’. Acceptable impact scores ‘1’ and ‘2’ were defined in a manner
that would appear appropriate to interested parties (and are shaded grey to indicate their
acceptability), and the impact score ‘3’ was the lowest unacceptable score.
And similarly, likelihood scores were within a range of ‘1’ to ‘5’ as below. Once our example
organization develops their risk management maturity and are ready to refine their risk
distinctions, they may decide to not tolerate unacceptable impacts if they are foreseeable but not
expected (‘2’), or if they are expected to occur (’3’). This would be a decision best made by their
executives, and especially their compliance team, general counsel, and interested parties. But in
this case, the model will assume that they selected an unacceptable likelihood score of ‘3’.
Likelihood Foreseeability
Score
1 Not foreseeable. This is not plausible in the environment.
2 Foreseeable. This is plausible, but not expected.
3 Expected. We are certain this will eventually occur.
4 Common. This happens repeatedly.
5 Current. This may be happening now.
Impact
1 2 3 4 5
5
4
Likelihood
3
2
1
Exercise:
The reader should define their organization’s risk acceptance criteria using the “Criteria - Tier
2” worksheet that is provided in the supplementary document CIS_RAM_Workbook.
The risk assessor will need to use their professional judgment to identify levels of acceptable risk.
Because risk acceptance criteria are a declaration by the organization of what they will tolerate in
terms of harm to themselves and harm to others, organizations should consult with legal counsel
before finalizing these criteria and making risk decisions based on them.
As organizations assess their risk using the CIS Controls V7 (modeled in the following section)
they will be able to automatically determine whether the risk evaluates as acceptable or not
without needing to consider the question differently in each case. A simple estimation of the
likelihood and impact will automatically determine how the organization should prioritize each risk,
and whether the organization can safely accept the risk as appropriate.
B C D E F
The risk register for Tier 2 organizations is a listing of identified risks and their recommended risk
treatments, also known as “safeguards.” Each row represents one risk and its accompanying risk
treatment recommendation. The parts of the risk register are:
A. The column headers and guiding text help the reader or risk assessor understand the
information that is contained in the column.
B. The information assets identify the items and processes that are being analyzed.
C. The CIS Controls help the risk assessor consider controls that should be in place to
protect information assets.
D. The “threat model” includes the following items:
a. A description of how the CIS control is implemented in the environment.
b. The vulnerability that may exist if the control is not fully implemented.
c. The threat that may compromise the asset because of the vulnerability.
E. The risk evaluation estimates the likelihood that the threat would succeed, and the
impacts to the mission, objectives, and obligations if it did. The evaluation includes the
resulting risk score, calculated as a product of the likelihood and the highest of the three
impact scores.
F. Risk treatments are recommended for risks that are evaluated as unacceptably high.
Safeguards that are based on the CIS Controls are described, and they are in turn
evaluated for the risk that they may pose to the mission and objectives. A “safeguard risk”
score is calculated which should be lower than the risk acceptance criteria, and the risk
that it is meant to address.
The Process
The Tier 2 risk assessor will analyze risks using an asset-based approach, starting the
assessment by considering the information assets that they intend to protect. Because this
process will invariably create more detail in the risk register (in the form of multiple rows on the
risk register for each asset and each applicable CIS Control) organizations may wish to start their
risk analysis using the Tier 1, control-based method. This method first analyzes how the CIS
Controls are generally applied to the environment. The Tier 2 risk assessor can then examine the
information assets that are protected differently from the standard practice in a separate row.
The asset-based risk assessment process for Tier 2 organizations is meant to ensure that each
information asset is protected by CIS Controls in ways that are appropriate for their particular risk.
This asset-based analysis is accomplished by following the steps listed below:
1. Select information assets or asset classes that are listed in the asset inventory. Record
the selected assets in the “Information Asset” cell in that row.
a. If the Tier 2 organization has already completed a risk register that evaluated all
of the CIS Controls as they are applied generally to the organization, then the
risk analysis may start by selecting assets that are listed in the risk register.
b. Organizations may wish to evaluate asset classes rather than individual assets
for efficiency. As an example, there are often a set of similar technologies that
are identically configured and managed. In such circumstances, listing these as
asset classes is appropriate because each of these items will be similar to the
set. Unique items like a core router, a load balancer, a single instance of an
application, or a one-off operating system should be analyzed on its own.
2. Model threats using the following approach:
a. Consider each information asset or asset class one-by-one.
b. Pair each information asset or asset class to the CIS Controls that are
appropriate to protect them. This is aided by the “Asset Type” categorization of
CIS Controls V7. For example, user desktops, application servers, multi-function
printers, and tablet computers are systems that can be paired with CIS Controls
that are categorized for “Systems.”
c. Add one row to the risk register for each pairing of a CIS Control and the
information asset or asset class.
d. Note: It will likely be too time-consuming to evaluate all suitable pairings between
information assets and applicable CIS Controls. While such analysis would be
optimal, it is more fitting for organizations to prioritize the pairing of information
assets and asset classes with the top five CIS Controls, and other controls that
may be of concern to the organization. Risk management is a continuous cycle
that will allow organizations to address more risks over time as their security
program matures.
3. Gather evidence for how well each asset is protected by its paired CIS Control.
a. Evidence may be in the form of interviews, a review of configurations, a
vulnerability test, a penetration test, an evaluation of a system or device using
SCAP policies, or a review of evidence such as records and logs.
4. Describe how the control is applied to the information asset or asset class in the “Current
Control” cell of that row.
Information Asset
Diary device controllers
CIS Description
Control
15.9 Disable wireless peripheral access of devices (such as Bluetooth and NFC),
unless such access is required for a business purpose.
The risk assessor must then think through and record the threat model for this risk. Recall that the
threat model considers their current control, what resulting vulnerabilities may exist, and what
threats would be of concern to them. While the diary device controllers must pair with the diary
devices, the organization realizes that their Bluetooth-enabled diary device controllers and the
files located on them are likely accessible by attackers using readily available attacks methods.
So the next three columns of the risk register would look like this:
But this may not be the only risk that can be considered in this scenario. Another plausible risk
could be that the hacker could put compromised firmware on the diary device controllers to allow
them to control the devices after firmware upgrades. Denial of Service attacks may also happen.
Man-in-the-Middle attacks are also possible. Risk assessors may be concerned that an endless
number of threat models could be created for any pairing between information assets and CIS
Controls, making the risk assessment exercise never-ending. Of course, the risk assessor should
limit the amount of theorizing they do while modeling threats, focusing primarily on the most
plausible threat pairings given the security environment. As a Tier 2 organization, they should rely
on capable personnel and resources that help them focus on the most plausible threats for their
environment.
The threat model is now clearly stated and makes it possible for the organization to estimate the
likelihood and impact of the scenario. Recall the definitions for the impact and likelihood scores
that the Tier 2 organization created. Impact scores are restated in Table 44.
Also recall that impact definitions for Tier 2 organizations include criteria for the organization’s
objectives because those organizations generally benefit from collaboration with business
management who are invested in the success of the information security program. These
managers often bring to the discussion the organization’s strategic and tactical goals for success.
But also note that this impact definition contains five magnitudes of impact. Five impact scores
help Tier 2 organizations refine their impact estimates in more tangible terms then tables with
three scoring levels, and help them refine their risk scoring to better distinguish between risks of
varying priority. Acceptable impact scores of ‘1’ and ‘2’ are shaded to set them apart from higher,
unacceptable impact scores.
Likelihoods were similarly defined with five potential scores for similar reasons, as shown in Table
45.
Likelihood Foreseeability
Score
1 Not foreseeable. This is not plausible in the environment.
2 Foreseeable. This is plausible, but not expected.
3 Expected. We are certain this will eventually occur.
4 Common. This happens repeatedly.
5 Current. This may be happening now.
The organization believes that the threat model they documented above – that hackers could
hack into diary device controllers using something similar to a Blueborne attack - is foreseeable,
and perhaps may be expected to occur. While the scenario would likely not be expected for most
organizations, our example organization operates in environments where competitors and
The risk score is the product of the likelihood score and the higher of the three impact scores,
which in this case is ‘3 x 4 = 12’.
Also recall that the risk acceptance criteria for the Tier 2 organization looks like this:
An acceptable risk would be one that evaluates to anything below ‘9’. But the risk for how the
organization protects their diary device controllers using their implementation of CIS Control 15.9
is ‘12’ and is unacceptably high.
This risk analysis is demonstrated in Table 48 in a single table to bring all of these elements
together. For document display purposes, this one risk analysis is shown in vertical format rather
than horizontal as it would appear in a risk register. The examples that are described in this
section are contained in the workbook CIS_RAM_Workbook.
So while there is a documented business need for these devices to operate Bluetooth services,
the risk of doing so with this device is still inappropriately high (since risk acceptance criteria is
less than ‘9’ and the observed risk score is ‘12’). The organization will want to address this with a
risk treatment safeguard, which will be demonstrated in the Risk Treatment Recommendations
section further in this chapter.
Because the risk assessment process for Tier 2 organizations starts at the asset, though, we do
have other opportunities to consider how other controls may protect the asset in a manner that
may reduce the risk we just observed.
We can examine how this process provides the Tier 2 organization with deeper risk insight with
the next two examples.
Table 49 - Example Risk Analysis for Devices Protected by CIS Control 16.3
Given this method for two-factor authentication, the threat model for hackers acquiring patient
records from diary device controllers is no longer foreseeable using the threat model that the Tier
2 organization evaluated. And if that’s the case for the two-factor authentication control, then it
should also influence the risk associated with CIS Control 15.9 that was evaluated earlier. So the
risk assessor re-evaluates that risk again while referring to the controls identified for CIS Control
16.3 to see if they understand the risk differently. Again, note that the risk assessor described the
control with more detail than the first attempt, and added a condition to the threat against CIS
Control 16.3.
As expected, the risk associated with CIS Control 15.9 is reduced because the likelihood of its
threat model is reduced when taking into account the implausibility of hackers accessing files on
the diary device controllers. In fact, the likelihood of the threat scenario is so low that the risk is
acceptable.
The asset-based approach to risk analysis clearly presents an advantage to organizations by
providing a more comprehensive and more realistic picture of the actual risk that an information
asset is exposed to.
Table 51 - Example Risk Analysis for Devices Protected by CIS Control 8.1
This looks more serious to the organization than they would have originally thought. Still
concerned about attacks they have seen in the past, the organization realizes it is as likely for
them to be attacked through a web application vulnerability as it would be through a Bluetooth
vulnerability. Implanting a usable virus through a Bluetooth exploit or arbitrary file upload would
Exercise:
The reader should refer to the template Risk Register – Tier 2 that is provided in the
supplementary document CIS_RAM_Workbook. They may use the risk register template to
enter a set of risks that are associated with the CIS Controls and information assets that are in
scope of their assessment.
The risk assessor will need to use their professional judgment to select the controls and
information assets and to model threats that should be analyzed in the risk assessment.
Information security experts may need to be included in the process to ensure that the risk
analysis is conducted appropriately.
A risk and its proposed safeguard are both evaluated using the same criteria. If a proposed
safeguard has a higher risk (its “safeguard risk”) than the risk acceptance criteria, then it’s not
appropriate. If the safeguard has a higher score than the observed risk, then it’s not reasonable.
The exercises in this section will focus on matching completed risk analyses (in blue) with newly
recommended safeguards (in green).
The organization has evaluated that management’s recommendation to install the anti-malware
agents is just as risky as the observed risk that they are trying to address. The estimated
safeguard risk equals that of the observed risk, but based on the organization’s concern that the
vendor was expected to force re-imaging on the diary device controllers meant that they expected
to compromise their mission and objectives.
The risk assessor can now advise management against installing the security software directly,
but then should provide alternatives.
Risk assessors may reference the Community Attack Model to find controls that can be
complementary and alternative to the recommended safeguards they are assessing. If an
organization struggles to implement a sub-control, they could look for controls that play a similar
role in the Community Attack Model to find alternative controls that might help them meet the
same security objective. For example, if an organization cannot easily use audit logs to detect
delivery of a kind of threat, they may look to another control in the cell that intersects with the
detect row and the delivery column to find similar controls – and to eventually see network
intrusion detection controls, which may be more useful in their environment.
Given the objectives of CIS Control 8.1 to protect systems against malware and identifiable
intrusions, the risk assessor reviews the Community Attack Model and finds anti-malware in cells
that address protecting against delivery, and for protecting against and detecting initial
compromise. Detecting delivery of malware seems to be a good place to start their defenses as it
is closest to the threat they are addressing in their risk analysis, so they review the CIS Controls
that are in the cell at the intersection of Detect and Delivery to consider options.
Network Intrusion Detection systems and Network Intrusion Prevention Systems (“IDS/IPS”) are
interesting to the organization as a network-layer protection. The risk assessor reviews the sub-
controls within CIS Control 12 “Boundary Defense” to see how IDS is described. CIS Control 12.6
“Deploy Network-based IDS Sensor” presents a compelling option for them because their current
use of the diary device controllers during clinical visits is within mobile wireless LANs that they
own and control. A lightweight IDS would be a plausible option in that case.
But would a lightweight IDS/IPS in those portable wireless LANs reduce their malware and
intrusion risk on their diary device controllers? They model CIS Control 12.6 as a safeguard
against this same risk to see if it would be reasonable.
Even though CIS Control 12.6 does not present a direct anti-malware solution this scenario does
present an acceptable risk, and a reasonable risk. The recommended risk treatment reduces the
likelihood of a successful attack on diary device controllers while not eliminating it in this case.
Management is satisfied that the recommended safeguard is appropriate, but that are also
interested in another option presented by CIS Control 12.11 to use two-factor authentication to
log into terminal sessions at the diary device controllers. If two-factor authentication provides
even lower risk, and the diary device controller vendor supports the option, then this may be a
better safeguard than the lightweight IDS/IPS.
Recall that diary devices already store encrypted soft-certs to help authenticate the devices to
their accounts on the controllers. Checking with the vendor, the organization sees that the soft-
cert option is available for administrator systems that connect to the controllers as well. When the
organization’s site administrators connect to the diary device controllers while on site, they
access terminal sessions using SSH, the only protocol available to them. Multiple soft-certs can
be used to both authenticate the SSH sessions, and to execute commands at the controllers.
They model this alternative risk treatment below.
Table 54 - Example Risk Treatment Recommendation for CIS Control 8.1 using CIS Control 12.11
It appears that the safeguard risk obtained while using CIS Control 12.11 is much lower than the
safeguard risk modeled by the option to use CIS Control 12.6. And because the vendor already
supports multi-factor authentication, the solution is almost already configured. The organization
chooses to use CIS Control 12.11 as their risk treatment control to protect their diary device
controllers against malware until the vendor provides a more robust solution.
The risk assessor will need to use their professional judgment to design and recommend
information security safeguards, and to evaluate prospectively the risk that they may pose.
Information security experts may need to be included in the process to ensure that the risk
analysis is conducted appropriately.
Risk assessments are projects with clear steps for preparing, conducting, and reporting risk
analysis. And while risk assessment projects can be modeled with a project plan, each
organization’s project approach will vary depending on factors such as resource availability, and
will develop over time as organizations become more capable in their cybersecurity maturity. This
section will describe a basic risk assessment project, its components and variations, and will
present guidance for preparing the project plan.
Risk assessment criteria are the numerical and plain-language statements that an organization
uses to evaluate their cybersecurity risk. The most familiar form of risk calculations, “Risk =
Likelihood x Impact,” is the basis for risk analysis in the CIS RAM. But it is just the starting point
for risk analysis.
Risk assessment criteria must be meaningful to the organizations that use them, so they must be
tied to the potential benefit and harm that the organization may create. The impact of a
cybersecurity breach may harm the organization itself, it may harm the organization’s ability to
successfully achieve its mission, or it may harm others.
Because cybersecurity failures impact parties both inside and outside an organization, risk
assessment criteria must be universally meaningful and must address the interests of all
potentially affected parties. Additionally, risk assessment criteria must demonstrate to authorities,
Notice a few things right away with the model risk analysis in Figure 16.
• While organizations typically evaluate the observed risk to determine whether they should
address or accept it, this risk statement deliberately compares the observed risk to a
proposed safeguard.
• The criteria that evaluates the risk also evaluates the safeguard.
• The impact of the risk estimates the potential of harm to the organization and the
potential harm against others.
Risk assessors compare risks to their proposed safeguards to determine whether those
safeguards would create a foreseeably lower risk than the current state. To accomplish this, the
assessor evaluates the current state risk (or “observed risk”) and the proposed safeguard using
the same criteria to ensure comparability.
This comparison prevents organizations from implementing safeguards that are overly
burdensome, or that create new, unacceptable risks. For example, an organization that uses
software that is no longer supported by the vendor, but relies on that software for critical business
purposes, should find alternative methods for identifying and controlling potential security risks
until they replace the software. If management recommends quickly changing out to inferior, but
secure software, the organization may suffer a greater impact to their mission than the security
risk they are trying to avoid.
While considering CIS Control 18: Application Software Security, a risk statement can estimate
the foreseeability of an impactful threat. The risk can be stated as it appears in Table 55 (where
the risk score ‘12’ is a product of the likelihood ‘3’ and the highest impact score ‘4’):
A risk assessor should then recommend and evaluate a safeguard to reduce the high security
risk, as illustrated in Table 56. Here, the organization would realize that the likelihood of a
negative impact to their mission is greater than the current state risk. This is an obvious case of
the burden being greater than the risk, and a recommended safeguard being unreasonable.
When faced with this analysis, the organization must then find another way to address the risk.
This process will be described later in this chapter in the section Risk Treatment
Recommendations.
But what should be apparent is that without a definition of risk assessment criteria the likelihood
and impact scores are not meaningful. What would impacts or likelihoods of ‘1’, ‘2’, ‘3’, ‘4’, or ‘5’
mean, anyway? The organization will need to create definitions for their likelihood and impact
scores so that they are meaningful to all interested parties, and so that they provide a consistent
method for risk evaluation.
Impact Definitions
Tier 3 and Tier 4 organizations generally benefit from more business involvement in managing
cybersecurity risk than Tier 1 organizations. Because of that increased involvement, the risk
assessment criteria can be – and should be – more explicit and detailed than those used by Tier
1 organizations. Advanced organizations can consider more nuance in terms of business impacts
and tolerance, and can employ organizational objectives with more authority.
An impact definition for Tier 3 and Tier 4 organizations can look like the one depicted in Table 57.
Organizations should also consider having more than three impact types in their impact
definitions if they have more than one mission, multiple objectives, and many obligations that
they need to consider in their risk analysis. While this expansion may create an increasingly
wide risk register, it can help organizations feel comfortable all relevant interests were
considered in their risk analysis.
Tier 3 and Tier 4 organizations that previously used Tier 1 risk analysis processes may build on
their simpler risk assessment criteria that used three levels of impact scoring. For the purposes of
reference to our example organization – a health information provider – they have gone through a
year or two of risk management, have gained the attention and confidence of business managers
and executives. As a result, their ability to assess cybersecurity risk using business criteria will
also improve.
Organizations are well-served with this model because business management, technicians,
compliance personnel, and legal counsel all have their interests addressed in risk analysis that
uses these criteria.
Likelihood Definitions
The likelihood definition for a Tier 3 and Tier 4 organization should also increase in nuance from
the simpler Tier 1 definition, and can do so by adding two more scores to the table as shown in
Table 58.
Likelihood Foreseeability
Score
1 Not foreseeable. This is not plausible in the environment.
2 Foreseeable. This is plausible, but not expected.
3 Expected. We are certain this will eventually occur.
4 Common. This happens repeatedly.
5 Current. This may be happening now.
• “Not Foreseeable” implies that a threat is not plausible in the environment that is being
assessed. Loss of portable media may not be foreseeable during a risk assessment of a
hosted application.
• “Foreseeable” implies something that is plausible, but the organization would be
surprised if it occurred. A founding executive taking copies of sensitive data to
competitors may be considered foreseeable, even if it is not expected.
• “Expected” implies a threat that is not common, but that would eventually happen.
Phishing attacks or other social engineering attacks may be expected in many
environments.
• “Common” implies something that happens repeatedly, such as mis-addressed emails
with sensitive information, malware attacks, or loss of laptops and mobile devices.
• “Current” implies threats that are rarely not present, such as port scanning on perimeter
devices, or sharing of information in quasi-public spaces such as pharmacy counters or
bank tellers.
When risk assessors estimate the likelihood of a threat, they will select scores ‘1’, 2’, ‘3’, ‘4’, or ‘5’
using the foreseeability definition as their guidance. Organizations may add time-based limits in
their foreseeability definitions (i.e. “Foreseeable within planning thresholds,” “Expected within the
five-year plan” or “Not foreseeable in the next fiscal year”). If organizations do introduce time
limits in their likelihood definitions they should prioritize risk treatment investments to meet these
timelines. That may be excessively challenging to many organizations, so they should proceed
with caution.
Role Perspective
Chief Executive Officer To ensure that the mission, objectives, and obligations of the
organization are appropriately defined, and to ensure that a
Chief Operations Officer
distinction between acceptable and unacceptable impacts are
appropriately delineated.
Chief Compliance Officer To ensure that the interests of regulatory agencies are
appropriately included in risk definitions.
Chief Financial Officer To ensure that objectives are appropriately defined, particularly
the distinction between acceptable and unacceptable impacts.
Chief Information Officer To ensure that technical performance, service, and capabilities
Chief Technology Officer are considered, and to include all types of information processes
beyond technology.
General Counsel To ensure that obligations are appropriately defined and that they
compare well with the mission and objectives.
Outside Counsel
Internal Audit To ensure that the concerns of interested parties are well
Audit Committee represented in all impact definitions and scores.
Key Customers / Clients To ensure that their interests are included in the obligations
definition.
Key Constituents
Exercise:
The reader may develop their organization’s risk assessment criteria using the “Criteria - Tier
3 & 4” worksheet that is provided in the supplementary document CIS_RAM_Workbook.
The risk assessor will need to use their professional judgment to define impact types, and to
describe levels of impact that the organization must manage to. Because risk assessment criteria
are a declaration by the organization of what they will manage to in terms of harm to themselves
and harm to others, organizations should consult with legal counsel before finalizing these criteria
and making risk decisions based on them.
Because risk assessments are essentially questions of balance, the criteria for accepting risk
should help determine whether balance was achieved. In CIS RAM risk acceptance has two
components:
• Appropriate risk: That the likelihood of an impact must be acceptable to all foreseeably
affected parties
• Reasonable risk: That the risk posed by a safeguard must be less than or equal to the
risk it protects against.
While these components have been demonstrated briefly above, the first component will be
described in more detail in this section. The second component will be described later in the Risk
Treatment Recommendations section further on.
After establishing the impact and likelihood definitions, Tier 3 and Tier 4 organizations are now
well positioned to state their risk acceptance criteria. Recall that impacts were defined within
scores that ranged from ‘1’ to ‘5’. Acceptable impact scores ‘1’ and ‘2’ were defined in a manner
that would appear appropriate to interested parties (and are shaded grey to indicate their
acceptability), and the impact score ‘3’ was the lowest unacceptable score.
And similarly, likelihood scores were within a range of ‘1’ to ‘5’ as below. Once our example
organization develops their risk management maturity and are ready to refine their risk
distinctions, they may decide to not tolerate unacceptable impacts if they are foreseeable but not
expected (‘2’), or if they are expected to occur (’3’). This would be a decision best made by their
executives, and especially their compliance team, general counsel, and interested parties. But in
this case, the model will assume that they selected a threshold score of ‘3’.
Likelihood Foreseeability
Score
1 Not foreseeable. This is not plausible in the environment.
2 Foreseeable. This is plausible, but not expected.
3 Expected. We are certain this will eventually occur.
4 Common. This happens repeatedly.
5 Current. This may be happening now.
So Tier 3 and Tier 4 organizations would define their risk acceptance like this:
An example of the heat map for this assessment criteria is shown below. Note that this heat map
is defined not just by numbers and colors, but now by a set of criteria that address business
issues and a duty of care to protect others.
Impact
1 2 3 4 5
5
4
Likelihood
3
2
1
The risk assessor will need to use their professional judgment to identify levels of acceptable risk.
Because risk acceptance criteria are a declaration by the organization of what they will tolerate in
terms of harm to themselves and harm to others, organizations should consult with legal counsel
before finalizing these criteria and making risk decisions based on them.
As organizations assess their risk using CIS Controls V7 (modeled in the following section) they
will be able to automatically determine whether the risk evaluates as acceptable or not without
needing to consider the question differently in each case. A simple estimation of the likelihood
and impact will automatically determine how the organization should prioritize each risk, and
whether the organization can safely accept the risk as a “reasonable” option.
Tier 3 and Tier 4 organizations benefit from collaboration with business management. They also
have refined knowledge of how cyberattacks work. And due to their contact with outside parties
have considerably more data about on-the-ground effectiveness of their security safeguards.
Because Tier 3 and Tier 4 organizations have these advantages, their ability to analyze and
respond to risk should be more refined than their peers with less maturity.
The risk analysis method described in this section is based on an “attack path” model. An attack
path, sometimes called a “kill chain,” is the route that an attack takes to compromise information
assets. For example, ransomware attacks involve many attack stages, starting from the hacker’s
reconnaissance, through preparation and delivery of exploits, initial compromise, privilege abuse,
through to the final control of the targeted storage volume and data.
And while not all attacks are planned (some are automated, drive-by attacks, and some are
accidental) they can be modeled in an attack path to understand what chain of safeguards would
fail in order for a threat to successfully compromise an asset.
The attack path for the ransomware example above would start with the attacker targeting an
organization that would likely pay a ransom to access their critical information. They would
research key personnel in the organization to refine their target, and then would develop an
exploit for that personnel. They may place the exploit on an Internet server that is accessible to
the victim, and would craft an email message for the victim that links to the exploit. When the
victim interacts with the email message, they would download the ransomware which then would
run on their computer. The attacker could then use the ransomware to encrypt the hard drive, and
depending on the variation of ransomware, either lock the information, or copy it to an Internet
server that the attacker controls.
Using the risk analysis steps that were previously described for Tier 1 and Tier 2 organizations, a
risk assessor can use risk analysis to determine how well prepared each information asset is for
preventing or detecting specific attacks as they are in play.
This “attack path” approach to risk analysis requires a preliminary analysis step before working in
the risk register. That analysis step – attack path modeling – documents the lifecycle of an attack,
and identifies information assets or asset classes that would be involved in the attack. The
information developed in this preliminary analysis provides the risk assessor with a list of
information assets that would be involved in a type of attack, and allows the assessor to evaluate
the risks they face based on how well their safeguards align with the CIS Controls.
This section will describe and work through a Tier 3 and Tier 4 organization’s attack path analysis
and risk register using the CIS Controls to model risk-appropriate safeguards. The risk register
and attack path model worksheet described in this section are available as templates in the
supplementary document CIS_RAM_Workbook.
B C D E F G
The risk register for Tier 3 and Tier 4 organizations is a listing of identified risks and their
recommended risk treatments, also known as “safeguards.” Each row represents one risk and its
risk treatment recommendation. The parts of the risk register are:
A. The column headers and guiding text to help the reader or risk assessor understand the
information that is contained in the column.
B. Attack models and threats that are actions within an attack path.
C. The information assets within the attack path that are being analyzed.
D. The CIS Controls text that helps the risk assessor consider controls that should be in
place to protect information assets in the context of the attack path.
E. How the organization implements the CIS Control (if they do) to protect the information
asset, and any vulnerabilities that would allow the threat to compromise the asset.
F. The risk evaluation, including the likelihood that the threat would succeed, the impacts to
the mission, objectives, and obligations if it did, and the resulting risk score.
G. The recommended implementation of CIS Controls that would reduce risks to an
acceptable level, and the safeguard risk calculation to estimate the risk of that
recommendation.
The attack path models worksheet is made up of two main parts; the Community Attack Model at
the top, and the attack path models at the bottom. The Community Attack Model above depicts
the stages of an attack as they relate to CIS Controls that could prevent or detect each stage.
The attack path models below list types of information security incidents that may occur, and
identify what actions and information assets would be involved in each stage of the incident.
The Process
The risk assessor will start their assessment by modeling attack paths in the attack path model
worksheet. The worksheet will result in a set of attack path models (one row per model), and will
state the actions and assets that may be involved in each attack.
The risk assessor will then use the risk register to analyze each attack path (one stage in the
attack path per row in the risk register). The assessor will evaluate each stage of an attack path
just as they would analyze each risk in Tier 1 and Tier 2 assessments.
Tier 3 and Tier 4 organizations may wish to start their risk analysis by first analyzing risks using
the processes described for Tier 1 or Tier 2 organizations, then by examining specific threats on
an attack path basis. This ensures that all in-scope information assets and all CIS Controls will be
addressed in the risk register, along with the more specific and detailed risks that are analyzed
using this threat-based process.
The risk assessment process for Tier 3 and Tier 4 organizations ensures that information assets
are analyzed in terms of the risk they pose when multi-phase attacks occur in the environment.
This threat-based analysis is accomplished by following the steps listed below:
1. Using the Attack Path Model worksheet, the risk assessor creates a new row in the
worksheet to name a type of cybersecurity attack or security incident, such as “Data
seizure through web application,” or “Mis-delivery of patient information.”
2. The risk assessor then moves right across the new row to describe each stage of the
attack or incident. The description would include an affected information asset, and how
the attack would compromise the asset at each stage.
3. The risk assessor can then refer to each cell across an attack path row to populate a risk
register. The risk assessor can copy the attack path model name, threats, and
information assets that are in each attack path model row to the risk register, with one
row per model / threat / asset grouping.
4. While considering the controls that should be addressed in each row of the risk register,
the risk assessor should refer to the Community Attack Model grid at the top of the Attack
Path Model worksheet to determine which controls should be in place to detect or prevent
the threat.
5. The risk assessor will then review the CIS Controls listed in each risk register row, and
will gather evidence for how well each asset is protected by safeguards that are
associated with the CIS Control.
a. Evidence may be in the form of interviews, a review of configurations, or a review
of records and logs.
6. The risk assessor will then describe how the control is applied to the information asset or
asset class in the “Current Control” cell of that row.
7. Next, the assessor will consider the difference between the CIS Control and the currently
applied safeguard to determine whether there is a deficiency in how the control is
currently deployed and operating. If the current safeguard is not implemented as
described or in a way that is likely deficient against the threat, then the assessor will state
this as a vulnerability.
a. Risk assessors should consider the objective of the CIS Control as they analyze
risks. For example, CIS Control 16.11 states “Automatically lock workstation
sessions after a standard period of inactivity.” The control’s objective is to
prevent unauthorized people from using unattended user sessions. If the current
control does not meet the objective, then the assessor should state the gap as a
vulnerability in the vulnerability cell, such as: “Unattended workstations may be
used by personnel who are not authorized access to those systems, or to
applications that are assigned to the absent user.”
8. Now consider the threat that could occur because of the vulnerability.
19 This document will only explore how the first attack path model will be defined and risk
assessed. However, the other two scenarios are provided in the Attack Path Model worksheet as
further examples of the attack path modeling process.
As a result of this detailed description of the attack path, the risk assessor can now itemize each
of these stages in the risk register as the basis of their risk analysis. So they create a set of rows
in their risk register that include the information as displayed in the partial risk register shown in
Table 64 and provided more fully in CIS_RAM_Workbook.
Each row in this risk register establishes a relationship between the attack path model (in this
case, “Ransomware”), a threat that could occur at each stage of the ransomware attack, and the
information asset or asset class it would occur on. Note that items labeled “Not applicable” and
“Not in our control” in Table 63 are not provided rows in the partial risk register in Table 64. This
is because there is little the organization can do to address these steps in the attack path for the
ransomware scenario.
Also note that many information assets and many kinds of threats can be considered within an
attack path. The risk assessor must determine the amount of detail and variety of asset/threat
pairings they intend to include in their assessment. Attack path modeling can take significant
time. Because of this, risk assessors will need to consider the amount of time and resources they
have available to conduct their analysis, and must select a degree of detail based on that
This risk was identified in the attack path model in Table 63 in the “delivery’ stage, so while
assessing the risk the risk assessor will review the email server and SMTP gateway because of
their delivery role in the attack, and will name them as assets in the risk register, as shown in
Table 64. As the assessor references the Community Attack Model, they will look at the
intersection between the Delivery column and the Protect row to find “Continuous vulnerability
assessment,” “firewall,” “mail gateway filtering,” “web filtering,” “secure remote access,” and
“NIPS (network intrusion prevention system).”
Considering the threat of email targeting specific users, and the organization’s use of email
filtering and sandboxing on their corporate server, the risk assessor reviews sub-controls under
CIS Control 7 “Email and Web Browser Protections.” Among those sub-controls the risk assessor
considers CIS Control 7.8 “Implement DMARC and Enable Receiver-Side Verification” and CIS
Control 7.10 “Sandbox all Email Attachments.” They know that DMARC controls related to CIS
Control 7.8 rely on more community cooperation before they can be reliable, and even then could
be by-passed by determined attackers. They also know that determined attackers can get past
Note that the assessor has not yet evaluated this risk. Rather, the risk assessor will evaluate
each risk in the attack path after considering how that set of risks affect each other. For our
example attack path model in Table 63, all nine risks will be written out before each one is
evaluated. This is done to ensure that the likelihood and impact of each risk is based on a
foreseeable scenario, and not in isolation of each asset which may cause some risks to be
estimated arbitrarily high or low.
Working further down the attack path model in Table 63, the organization next considers the risk
they may suffer at desktop email clients which are targeted during the Initial Compromise in this
ransomware attack path. After considering the vulnerability in the previous risk analysis that end-
users may still receive phishing messages through their personal email accounts, email client
risks are fresh in the risk assessor’s mind. The risk assessor reviews the Community Attack
Model in Figure 24 to identify CIS Controls that intersect between Initial Compromise and Protect
and they see that for this stage anti-malware and CIS Control 8.1 is again an appropriate control
to include in their evaluation. They describe the risk associated with their implementation of CIS
Control 8.1 at desktop email clients in Table 66.
Table 66 - Example Risk Analysis for Email Client in a Ransomware Attack Path Model
Table 67 - Example Risk Analysis for Proxy Server in a Ransomware Attack Path Model
The risk assessor sees that the proxy server appears more robust than the end-point protection
at end-user systems, but it still has shortcomings. The proxy server is not able to enforce URL
blocking on systems that are not on the corporate network when a ransomware phishing attack
occurs.
While all nine risks in the attack path would be evaluated as a set for the actual risk assessment,
this section will evaluate the three example risks to demonstrate the group evaluation process.
The remainder of the risks are fully evaluated in the worksheet “Risk Register – Tier 3 & 4” in the
CIS_RAM_Workbook.
Recall the definitions for the impact and likelihood scores that the Tier 2, and Tier 3 and Tier 4
organizations created. The impact scores are shown in Table 68.
Likelihoods were similarly defined with five potential scores, as shown in Table 69.
Likelihood
Foreseeability
Score
1 Not foreseeable. This is not plausible in the environment.
2 Foreseeable. This is plausible, but not expected.
The organization will now go back and review the risks associated with the ransomware attack
path to estimate the likelihood and impact of each threat, but in consideration of the other
ransomware risks.
The risk assessor will review those risks side-by-side in the abbreviated table below.
After evaluating each of the risks in the attack path model, the risk assessor (and by extension,
their organization) is comfortable with the ability of the SMTP gateway to protect users from
ransomware phishing attacks that pass through the corporate email server. But they are less
comfortable with the risk of those attacks coming in from personal email accounts while end-
users use their laptops away from the office. The risk analyses for the email client and proxy
server are identical in this case and are shown in Table 71.
The risk score is the product of the likelihood score and the higher of the three impact scores,
which in this case is ‘3 x 4 = 12’.
Also recall that the risk acceptance criteria for the Tier 3 and Tier 4 organization looks like this:
An acceptable risk would be one that evaluates to anything below ‘9’. But the risk of ransomware
is as high as ‘12’ and is therefore unacceptable.
By analyzing additional risks in the ransomware attack path, such as protections at the end-user’s
operating system or storage volume, the organization may further mitigate these three risks by
other safeguards, such as timely and reliable data backups, or logical controls that prevent
sensitive data from being accessed by laptops. But what is known is that in terms of ransomware,
there is a continuing risk to the organization that has not been resolved by the SMTP gateway
and proxy server.
The risk assessor will need to use their professional judgment to select the controls and
information assets and to model threats that should be analyzed in the risk assessment.
Information security experts may need to be included in the process to ensure that the risk
analysis is conducted appropriately.
Introduction
Organizations often think of security safeguards as obstacles to business and productivity.
Safeguards often cause personnel to take extra steps to get access to systems or information, or
to get approval for normal business activities. Safeguards require investments in time and money,
which compete with other priorities. And if they become too disruptive to an organization’s
mission and objectives, security safeguards can become disliked and avoided.
In fact, disruptive safeguards often cause personnel to work around them just to get their jobs
done, which creates more risk.
But risk treatment recommendations can and should result in safeguards that are demonstrably
reasonable. And while obtaining a clear definition for “reasonable safeguards” has been a
challenge in the legal, regulatory, and information security communities, the CIS RAM provides a
practical solution. Risk assessors evaluate risk treatment recommendations to determine whether
a security safeguard is reasonable by; comparing the safeguard to the risk it is meant to reduce,
and by comparing the safeguard to the risk acceptance criteria.
Risk treatment recommendations are simple to evaluate once the risk assessment criteria and
initial risk analysis have been established. The process occurs over the following steps:
1. While examining an unacceptably high risk, review the CIS Control that corresponds with
the risk and recommend a feasible way for the organization to implement or improve that
control.
2. If that control is not feasible in the near-term, recommend other CIS Controls related to
the risk that can be used to reduce it.
3. Evaluate the risk of the recommended safeguard to understand the burden it would pose
to the organization. Then compare that safeguard risk to the risk acceptance criteria to
determine whether it is appropriate.
4. Also compare the evaluated risk of the recommended safeguard to the observed risk to
determine whether the safeguard is reasonable (safeguards with lower risk scores than
the observed risk are reasonable.)
5. Sort the risks by their risk score to prioritize the risks and risk treatments that the
organization will invest in.
This section demonstrates these steps in detail by describing the process, then by modeling risk
treatments for the unacceptably high risks that were evaluated in previous sections.
A risk and its proposed safeguard are both evaluated using the same criteria. If a proposed
safeguard has a higher risk (its “safeguard risk”) than the risk acceptance criteria, then it’s not
appropriate. If the safeguard has a higher score than the observed risk, then it’s not reasonable.
The exercises in this section will focus on matching completed risk analyses (in blue) with newly
recommended safeguards (in green).
The Tier 3 and Tier 4 organization identified two unacceptable risks by modeling a ransomware
attack path over several information assets. The first of these unacceptable risks involved email
clients that personnel use to access personal email, and how that exposed the organization to
ransomware phishing attacks. The risk is shown again in Table 73.
Table 73 - Example Risk Analysis for Email Client in a Ransomware Attack Path Model
But because this risk was identified while evaluating an attack path, the organization considers
the recommended safeguards in that same context. They compare this risk with the other
unacceptable risks in the attack path in Table 74 to determine whether one safeguard would
address both risks in the attack. Both risks have the same risk score, but for different reasons:
Laptops are not protected against advanced malware through the end-point protection software,
and laptops do not benefit from the proxy server while out of the office.
They can either add advanced malware protection to their endpoints, or they can extend the
proxy server to the DMZ and force laptops to resolve network queries through that proxy server
while out of the office.
So they model these options below.
Note: The risk assessor will record how they will address their risk by stating either “Accept,”
“Reduce,” “Transfer,” or “Avoid.” Accepting and reducing risks will be intuitive to the reader. An
organization may transfer a risk by contracting a third party that may handle the risk better, or by
acquiring an insurance policy against the risk. The organization may also avoid the risk by no
longer engaging in the processes, or handling the information assets that cause the risk
The Tier 3 and Tier 4 organization now has the information it needs to determine and document
why their recommended safeguard is to add advanced malware prevention at their laptops first,
then desktops in the following fiscal year. Desktops will be covered well by the proxy server when
operated in their permanent home – the office network.
The risk assessor will need to use their professional judgment to design and recommend
information security safeguards, and to evaluate prospectively the risk that they may pose.
Information security experts may need to be included in the process to ensure that the risk
analysis is conducted appropriately.
The example risk assessment processes described in this document are broadly applicable to
many cases and environments. However, there are many reasons why an organization will
modify the processes and templates that are provided in the CIS RAM.
Methods for estimating likelihood or probability, assessing safeguards and policies, considering
risks of non-technical safeguards, and determining which risks to assess or to ignore all present
opportunities for customizing risk assessments to specific environments.
This section describes several customization methods for analyzing risks that organizations may
consider as part of their cybersecurity risk assessments.
Perhaps the most important early step in the risk assessment is to develop effective impact
definitions. The CIS RAM is based on Duty of Care Risk Analysis principles to enable
organizations to make conscientious evaluations of their current and intended risk. A risk
assessment that results from the CIS RAM should show whether information security safeguards
are appropriate to the public, while being reasonable to the organization. The core of this analysis
is the impact definitions, and the balance and consensus that they are meant to establish.
This section will provide guidance for defining impact types effectively.
Table 75 – Summary Evaluation of Impact Definition
Benefits Limits
- Consistent method to evaluate risk - Poorly defined impact definitions can
impacts. frustrate risk assessors.
- Satisfies “cost-benefit” analysis that - Poorly “balanced” impact definitions
regulators use. may not reduce legal liabilities.
- Satisfies “duty of care balance test”
that courts rely on.
- Balances business interests with
public interest.
The primary purpose of impact definitions is to provide risk assessors with a consistent method
for scoring risks that is fair to all potentially affected parties. A risk evaluation should demonstrate
as much concern for the organization as it does for others.
To make this possible, impact definitions should be designed with the concept of balance firmly in
mind.
Recall the impact definitions used for Tier 1 organizations shown in Figure 26. Two columns
address the interests of the organization’s purpose and the parties who may be effected by
Now consider the impact scores, and the red boundary that separates score ‘1’ from scores ‘2’
and ‘3’. This boundary marks the division between impacts that would presumably be acceptable
to all parties, and those that would not be.
Consider how impacts for score ‘1’ would appear to the organization, patient customers, and legal
authorities. The organization using this impact definition is stating that they would accept impacts
from threats if they result in conditions similar to how score ‘1’ is defined. This would indicate that;
patients would continually be able to access the information they needed, and patients would not
be foreseeably harmed as a result of a threat.
Then consider how impacts for score ‘2’ are defined. Threats that would foreseeably result in an
impact score of ‘2’ could mean that some patients who cannot access information may not
maintain good health outcomes. That scenario is clearly an unacceptable impact to the
organization’s mission, and would not make it worthwhile for patients to entrust their information
with that organization. The impact score of ‘2’ for obligations would be unacceptable because
some of the patient customers could foreseeably be harmed financially or reputationally as a
result of an incident – presumably because of identity theft or a system outage.
All of these features of an impact definition make it effective for estimating risk in a way that is
equitable to all potentially affected parties, and even for driving consensus within the organization
that uses it. After all, the interests and purpose of the organization are addressed as well as the
interests of the public.
Organizations can build effective impact definitions by thoughtfully defining their impact areas,
and then by carefully defining their impact scores.
Example 1: A custom manufacturer uses their customers’ intellectual property to quickly make
components that are perfect upon delivery. Their mission definition may be, “To provide
customers with products that meet their unique specifications, without fail.” The message is
simple, it can be measured, and the organization likely recognizes this as something that they
manage to. Moreover, the definition can be useful when a risk assessor tries to determine what
core values may be harmed is a risk were to occur, or if a safeguard is too burdensome to the
mission. If the risk assessor recommends a control that prevents customers from sending their
intellectual capital, or that prevents the manufacturer from storing it or sharing it among drafter
and engineers, then the mission would clearly be negatively impacted.
Example 2: A community bank states their mission as, “We promote opportunities to households
and small businesses by providing affordable financial products and advisory services.” They
could say that their mission is to lend and borrow money, but they are thinking ahead to what they
do not want to compromise about that mission, and that is to serve their community. But again,
they have a concise definition that states why others would enjoin in risk with them, that states a
simple, observable, and measurable fact, and that would be familiar to personnel who work at the
bank.
Example 3: A telecommunications company is heavily relied upon to provide communication
services that are now considered fundamental to a functioning society. Additionally, they carry
tremendous amounts of private information about their customers, often at considerable
perceived risk by the public. But consumers subscribe to these services for considerable benefit.
The telecommunications company defines their mission this way, “To instantaneously and
transparently connect our customers with the people, organizations, information, and
communication platforms that they care about.” This mission definition is less concise, but it may
be as concise as they could get, considering the complexity of typical telecommunications
services. The definition is measurable, and it would very likely be recognizable by their personnel
as an important value.
Defining Obligations
Definition: An organization’s obligations, at least in terms of information security, are to prevent
foreseeable harm that may come to others as a result of an information security compromise.
These types of harm are commonly associated with identify theft, theft of funds, or lost services
Impact
Guidance
Score
1 An impact that would be acceptable to the mission, objectives, and obligations. An
impact would be noticeable, but is likely unavoidable even after significant investment
in controls. It would be considered tolerable by all affected parties.
2 An impact that would be considered unacceptable by any party. While the impact may
be recoverable through additional efforts, investment, or time, the organization could
have reduced the risk of that impact with security controls.
3 The impact would be catastrophic. The mission, objectives, and/or obligations would
no longer be feasible.
Score ‘1’ is shaded to indicate that these impacts should be defined in a way that would be
acceptable to all parties.
As impact score definitions are written, the organization should think through how impacts to their
mission and obligations would appear at each of these levels.
The manufacturer’s impact score definitions are shown below to illustrate the point.
When reading an impact definition horizontally across one score, note that the impact definition in
each impact area are equally harmful to all parties. This is a critically important feature of Duty of
Care risk analysis. It ensures that risk analysis is equitable. No party’s harm is considered more
or less tolerable than any other party’s harm. What’s acceptable to one equates to what is
Perhaps the most important early step in the risk assessment is to develop effective impact
definitions. The CIS RAM is based on Duty of Care Risk Analysis principles to enable
organizations to make conscientious evaluations of their current and intended risk. A risk
assessment that results from the CIS RAM should show whether information security safeguards
are appropriate to the public, while being reasonable to the organization. The core of this analysis
is the impact definitions, and the balance and consensus that they are meant to establish.
This section will provide guidance for defining impact types effectively.
Benefits Limits
- Consistent method to evaluate risk - Poorly defined impact definitions can
impacts. frustrate risk assessors.
- Satisfies “cost-benefit” analysis that - Poorly “balanced” impact definitions
regulators use. may not reduce legal liabilities.
- Satisfies “duty of care balance test”
that courts rely on.
- Balances business interests with
public interest.
The primary purpose of impact definitions is to provide risk assessors with a consistent method
for scoring risks that is fair to all potentially affected parties. A risk evaluation should demonstrate
as much concern for the organization as it does for others.
To make this possible, impact definitions should be designed with the concept of balance firmly in
mind.
Recall the impact definitions used for Tier 2, Tier 3 and Tier 4 organizations shown in Figure 27.
Three columns address the interests of the parties who may be effected by information security
risk. Each of these columns is considered an “impact type.” The organization itself is considered
by evaluating the potential impacts to their ability to succeed in the “Impact to Objectives” column.
The safety of the organization’s patient customers is considered in the “Impact to Obligations”
column. And the “Impact to Mission” column addresses the main purpose for the two parties to
enjoin in the risk … the beneficial reason for customers and the organization to share information.
Now consider the impact scores, and the red boundary that separates scores ‘1’ and ‘2’ from
scores ‘3’, ‘4’, and ‘5’. This boundary marks the division between impacts that would presumably
be acceptable to all parties, and those that would not be.
Consider how impacts for scores ‘1’ and ‘2’ would appear to the organization, patient customers,
and legal authorities. The organization using this impact definition is stating that they would
accept impacts from threats if they result in conditions similar to how scores ‘1’ and ‘2’ are
defined. Threats that are scored with an impact as high as ‘2’ would indicate that; not all patients
would receive the information they needed, profits would be off-target, but within planned
variance, and patients would be concerned about a security incident, but would not suffer harm.
Then consider how impacts for scores of ‘3’ are defined. Threats that would foreseeably result in
an impact score of ‘3’ could mean that some patients who cannot access information may not
maintain good health outcomes. That scenario is clearly an unacceptable impact to the
organization’s mission, and would not make it worthwhile for patients to entrust their information
with that organization. In terms of the objectives, the organization’s profitability would be off-plan
and would require a fiscal year to recover. Again, this is unacceptable and should be invested
against so the scenario is avoided. And finally, the impact score of ‘3’ for obligations would be
unacceptable because some of the patient customers could foreseeably be harmed financially or
reputationally as a result of an incident – presumably because of identity theft.
All of these features of an impact definition make it effective for estimating risk in a way that is
equitable to all potentially affected parties, and even for driving consensus within the organization
that uses it. After all, the interests and purpose of the organization are addressed as well as the
interests of the public.
Organizations can build effective impact definitions by thoughtfully defining their impact areas,
and then by carefully defining their impact scores.
Defining Mission
Definition: An organization’s mission is the value it provides others, and that requires that they
engage in risk together to achieve that value. A college educates its students, but students must
give personal and financial information to those colleges in order to receive the education.
Retailers provide products to customers, but in many cases customers turn over their financial
information to those organizations to receive those products. Cloud service providers offer
Internet-based functionality to business customers, but those customers must turn over business
process or operations to those services as a result. So “mission” is a way of asking, “What’s in it
for the others?” who engage in risk with the organization.
Example Mission Definitions should have the following characteristics:
• Concisely state the benefit the organization provides that encourages others to enjoin
them in information security risk.
• Convey a simple fact that can be observed and measured.
• Describe something that the organization already manages to, and that personnel will
recognize as important to the organization.
Example 1: A custom manufacturer uses their customers’ intellectual property to quickly make
components that are perfect upon delivery. Their mission definition may be, “To provide
customers with products that meet their unique specifications, without fail.” The message is
simple, it can be measured, and the organization likely recognizes this as something that they
manage to. Moreover, the definition can be useful when a risk assessor tries to determine what
core values may be harmed is a risk were to occur, or if a safeguard is too burdensome to the
mission. If the risk assessor recommends a control that prevents customers from sending their
intellectual capital, or that prevents the manufacturer from storing it or sharing it among drafter
and engineers, then the mission would clearly be negatively impacted.
Example 2: A community bank states their mission as, “We promote opportunities to households
and small businesses in our community by providing affordable financial products and advisory
services.” They could say that their mission is to lend and borrow money, but they are thinking
ahead to what they do not want to compromise about that mission, and that is to serve their
community. But again, they have a concise definition that states why others would enjoin in risk
with them, that states a simple, observable, and measurable fact, and that would be familiar to
personnel who work at the bank.
Example 3: A telecommunications company is heavily relied upon to provide communication
services that are now considered fundamental to a functioning society. Additionally, they carry
tremendous amounts of private information about their customers, often at considerable
perceived risk by the public. But consumers subscribe to these services for considerable benefit.
The telecommunications company defines their mission this way, “To instantaneously and
transparently connect our customers with the people, organizations, information, and
communication platforms that they care about.” This mission definition is less concise, but it may
be as concise as they could get, considering the complexity of typical telecommunications
services. The definition is measurable, and it would very likely be recognizable by their personnel
as an important value.
Defining Objectives
Definition: An organization’s objectives are more inwardly focused and more selfish. As people
commonly think of the “burden” of a safeguard, they often think of “objectives” and most often of
20The success of the objectives may be dependent on the success of the mission, but the
definition of the of the objectives is not relying on the definition of the mission.
Defining Obligations
Definition: An organization’s obligations, at least in terms of information security, are to prevent
foreseeable harm that may come to others as a result of an information security compromise.
These types of harm are commonly associated with identify theft, theft of funds, or lost services
and data. But it is critical to keep in mind that obligations should explicitly state the harm that may
come to others so that risk assessors, management, and interested parties know that the
organization is careful to protect others from harm. So “obligations” are a way of asking, “What
foreseeable harm could come to others that we should prevent?”
A Good Obligations Definition should have the following characteristics:
• Concisely state the organization’s intent to prevent harm that information security
incidents may cause others.
• Convey a simple fact that can be observed and measured.
• Describe something that the organization already manages to, and that personnel will
recognize as important to the organization.
Example 1: The custom manufacturer is concerned about the harm that their customers may
suffer if their intellectual capital – their product designs – are leaked to the public and to the
customers’ competitors. Their customers often provide specifications for components that would
reveal secrets about new products. The manufacturer states their obligations this way, “Our
customers’ intellectual property must be kept confidential to preserve their market advantage.”
The definition is concise, it states a foreseeable harm to others that must be guarded against, t
could be measured, and personnel would know that protection of customers’ intellectual property
is important.
Example 2: The community bank knows that their customers are in a particularly vulnerable
position. They are often taking on risk while buying homes or starting businesses, and have less
room for error. A missed paycheck or even slight misuse of financial information could mean the
difference between success and failure for them. So the community bank uses this as their
obligations definition, “We must protect our customers’ reputation and financial future against
misuse of their financial or personal information.” Again, this definition is concise, it is
measurable, and it would be known and recognized by the bank’s personnel.
Example 3: The telecommunications company is a complex organization that can imagine
multiple kinds of harm that could result from an information security compromise. An organization
with many obligations (or missions or objectives) may state them in their definitions. For example,
the telecommunications company realizes that they may foreseeably breach personal
communications about their customers, and their communication services may fail when critical
applications depend on them. They will state two obligations, “We must protect our customers’
Impact
Impact to Our Mission Impact to Objectives Impact to Obligations
Score
To quadruple our
To provide customers with Our customers’ intellectual
production and profits in
products that meet their property must be kept
five years through
unique specifications, confidential to preserve
expansion into two new
without fail. their market advantage.
markets.
Impact
Guidance
Score
1 An impact that would be negligible for the mission, objectives, and obligations.
If any impact were to occur, it would not be noticeable.
2 An impact that would be acceptable to the mission, objectives and obligations. An
impact would be noticeable, but is likely unavoidable even after significant investment
in controls. It would be considered tolerable by all affected parties.
3 An impact that would be considered unacceptable by any party. While the impact may
be recoverable through additional efforts, investment, or time, the organization could
have reduced the risk of that impact with security controls.
4 An impact that would be considered large, but recoverable. Significant efforts and
investments would need to be made to recover for all parties.
5 The impact would be catastrophic. The mission, objectives, and/or obligations would
no longer be feasible.
Scores ‘1’ and ‘2’ are shaded to indicate that these impacts should be defined in a way that would
be acceptable to all parties.
As impact score definitions are written, the organization should think through how impacts to their
mission, objectives, and obligations would appear at each of these levels.
The manufacturer’s impact score definitions are shown below to illustrate the point.
Impact
Impact to Our Mission Impact to Objectives Impact to Obligations
Score
To quadruple our
To provide customers with Our customers’ intellectual
production and profits in
products that meet their property must be kept
Defined five years through
unique specifications, without confidential to preserve
expansion into two new
fail. their market advantage.
markets.
Customers receive excellent Our growth plan remains All intellectual property is
1
products, as needed. on target. protected.
Information about jobs may
Our annual targets are off
Occasional orders cannot be be known, but nothing that
2 year-by-year, but within
fulfilled. can harm customers'
planned variance.
market position.
Information about a job
Our growth is too low for leaks, and a customer
Contracted work for few
one year, but can be needs to investigate
3 customers cannot be
recovered to meet the whether it created harm.
completed as planned.
five-year goal. Even if direct harm would
not result.
Products are delivered outside A single customer
of spec and customers believe We cannot meet the five- experiences market
4
that we cannot produce year growth plan. repercussions based on a
custom products without fail. security incident.
Customers can no longer
We can no longer produce We cannot operate expect confidentiality
5
reliable, custom products. profitably. protection when working
with us.
When reading an impact definition horizontally across one score, note that the impact definition in
each impact area are equally harmful to all parties. This is a critically important feature of Duty of
Care risk analysis. It ensures that risk analysis is equitable. No party’s harm is considered more
or less tolerable than any other party’s harm. What’s acceptable to one equates to what is
acceptable to all (the shaded scores ‘1’ and ‘2’). What is catastrophic to one equates to what
would be catastrophic to all.
Example impact definitions for all three example organizations are provided in the supplementary
document CIS_RAM_Workbook in the tab “Example Impact Definitions” to assist the reader’s
comfort and familiarity with this subject.
The CIS RAM presents a standardized method for estimating the likelihood of an incident by
focusing on how a threat could interact with a vulnerability. This concept of foreseeability is easily
communicated to broad audiences, and is embedded in legal and regulatory language, so it is a
useful construct for likelihood estimation. However, some organizations need more rigor while
estimating likelihood and can achieve that by evaluating the characteristics of a successful or
failed attack in their environment.
Benefits Limits
- Consistent method to evaluate likelihood - Not based on an established standard
- Supports evidence-based estimation - Evidence-based criteria are optional
Borrowing from Binary Risk Analysis,21 “defense-readiness analysis” asks a series of questions
about attacks and safeguards to estimate the ability of a control to detect or prevent foreseeable
threats.22 A risk assessor can quickly evaluate defense-readiness by asking a set of questions
such as these:
1. Is this threat expected either because it is a common cause of incidents, or because the
skills and resources needed to enact the threat are common?
2. Does the control leave the asset exposed to this threat occasionally or partially?
3. Are there no other safeguards or conditions between the asset and the threat?
4. Is the vulnerability present on a frequent or consistent basis?
Organizations that use a 1 through 5 likelihood scale could then derive the likelihood score
reducing the maximum score of ‘5’ by ‘1’ for each ‘yes’ response that they provide to the fortitude
questions. Organizations that use a 1 through 3 likelihood scale may choose to assign .5 points
per response to arrive at scores between 1 and 3.
As an example of this analysis process, an organization is concerned that its software developers
have access to the production environment. CIS Control 18.9 states, “Maintain separate
environments for production and nonproduction systems. Developers should not have
unmonitored access to production environments.” The threat model they are evaluating relates to
promotion of unsecure or malfunctioning code to the production environment. The organization
currently has a policy that requires code review and approval prior to promoting code to
production, but many software developers have access to the production environment in case
they need to respond to emergencies.
To estimate the likelihood of the risk, they answer the defense-readiness analysis questions
below.
Response
Defense-Readiness Analysis Question
(1 = ”Yes”, 0 = ”No”)
Is this threat expected either because it is a common cause
of incidents, or because the skills and resources needed to 1
enact the threat are common?
The organization arrives at a likelihood score of ‘4’ after their analysis. If a careless or hurried
programmer is the threat in this scenario, then the organization responds with these scores for
the following reasons.
1. The threat is a common cause for breaches, and requires common skills to access the
production environment and promote code, so the organization responds with ‘1’.
2. The logical access safeguards that protect the production environment always permit
programmers to promote code, so the organization responds to this question with a ‘1’.
3. Because the programmers generally adhere to policies, secure coding practices, and
documented workflows, there are other safeguards that would prevent the promotion of
harmful code to the production environment. So the organization answers with a ‘0’.
4. And the vulnerability is consistently present so the organization responds again with a ‘1’.
Finally, they add the responses to achieve their likelihood score, which is in this case ‘4’.
Organizations should be aware that defense-readiness analysis is not necessarily evidence-
based, and does not comprehensively examine all aspects of control strength. The benefit of
defense-readiness analysis is to help organizations systematically, thoughtfully, and consistently
estimate their likelihood scores based on internal and external criteria.
For example, an organization can also consistently analyze defense-readiness by asking
questions similar to those below:
1. Is the asset in this threat scenario attractive to well-resourced hackers?
2. Is this attack a common cause for breaches in our industry?
3. Has this control been evaluated as effective using a penetration test, or other rigorous
test?
4. Is our time to detect-and-prevent this attack’s impact shorter than the time the attack
needs to create an impact?
Defense-readiness can take evidence into consideration by reviewing information security data
about their environment (if they have implemented the tools necessary to gather that information),
and by reviewing known causes for information security events, incidents, and breaches.
Some organizations have useful sources of data to conduct probability analysis to help them
determine the likelihood of risks. Probability analysis requires statistical methods, well-honed
estimation skills, and good data to determine the likelihood of an event, or of events with certain
impacts.
Benefits Limits
- Supports evidence-based estimation - Statistical estimates must address all
- Risk assessors may rely on professional impact types to properly evaluate each
rigor to improve risk estimation over time. risk on a due-care basis.
This section will propose an approach to link probability analysis to “duty of care” assessments,
but will not present a comprehensive method for doing so, nor will it provide an explanation of the
probability analysis that this section refers to. Readers who use probability analysis for
information security management are encouraged to explore integration methods like those
described here.
Probability analysis is complementary to the risk evaluation methods described in the CIS RAM,
but readers should understand their differences.
1. With the right guidance, applying probability models to individual cybersecurity risks is
(probably) simpler than the reader may imagine.23
2. Probability is evidence-based and can help organizations model increasingly realistic
threat scenarios, especially as the rigor of their methods increases.
3. Probability is built upon decades of sound methodology, driven by professional
statisticians, using universally recognized processes for reducing uncertainty.
Organizations that can use probability methods should do so.
4. Probability models often result in ranges or curves, rather than discrete scores such as
those produced by the RAM. Ranges of possible outcomes resemble “estimation” better
than a discrete value does. However, ranges and curves are more difficult to compare
and prioritize than discrete scores.
5. Cybersecurity threat scenarios are varied, and therefore require a variety of probability
methods to estimate their likelihood. This makes their raw results hard to compare and
rank. A Monte Carlo simulation that provides a single value (for example, a “22%” chance
an unencrypted laptop will be stolen) and a Bayes model that provides a curve describing
several possibilities of likelihoods of dollar impact (such as “13% chance of $750,000 loss
and 24% chance of 177,000 loss) are not readily comparable. And comparing them to a
single risk acceptance criterion will be similarly difficult.
6. Probability models on their own do not naturally align with duty of care questions posed
by regulations or litigation. Regulations and litigation insist on evaluating “due care” by
balancing different kinds of things (safety of customers versus the value of services
provided to them, for example). Statistical models that describe impact in terms of one
thing (i.e. cost of an impact) miss other real consequences of cybersecurity breaches,
such as harm to others, or the burden of too-stringent safeguards (i.e. reduction in
services, risks to personnel safety, difficulty in operating profitably, or the benefits that an
23Douglas Hubbard of Hubbard Research has published many books on the subject, the latest of
which focuses exclusively on cybersecurity. Hubbard, Douglas and Richard Seierson. How to
Measure Anything in Cybersecurity. Hoboken, NJ: John Wiley & Sons, Inc., 2016.
The organization’s probability of malware given their robust malware prevention system is 4.7%,
which is below 5% (the organization’s definition for “Foreseeable but not expected” likelihood).
This guides them to select the Likelihood value of ‘2’ for the risk of malware infection. They would
then select the impact scores for such a scenario to derive their risk score.
24Viscusi, W. Kip, “Jurors, Judges, and the Mistreatment of Risk by the Courts.” Journal of Legal
Studies, vol. XXX (January 2001).
25Note: The CIS RAM does not expect that readers understand or use probability analysis. This
calculation is shown only to demonstrate how probabilistic analysis can be coordinated with the
CIS RAM.
A benefit to such a probability range is that it estimates both the likelihood and impact values of a
risk. At its greatest likelihood, there appears to be about a 24.9% probability of a $1MM impact. At
its lowest likelihood, there appears to be below 1% probability of a cost of $20MM or greater. This
allows the client to either state a high likelihood of a lower cost, or a lower likelihood of a higher
cost. The organization could model both of these scenarios to determine which creates the
greater risk score to address that risk.
Pairing the probability curve to the modified likelihood definitions table (Table 86), the highest
probability score (less than 25%) appears to be at the upper edge of a likelihood score of ‘4’.
If the organization’s impact scoring table refers to cost or budget impacts (perhaps in the
Objectives column) then $1MM would be considered within the context of those impact values.
For example, the organization may determine that a $1MM loss would take more than one year to
recover from, indicating an impact value of ‘4’ under their Objectives column in Table 87. That
While organizations may be pleased with the ease by which they can align their probability
outputs to their due-care risk assessment criteria, probability should be modeled against all
impact criteria. Risk analysis that only considers financial impacts to the organization misses a
necessary component of cybersecurity risk analysis; estimating and taking responsibility for the
potential harm that others may suffer. As well, the organization must evaluate the risk of
safeguards using the same probability models.
For thorough and practical guidance on using probability analysis for cybersecurity decision-
making, consult the book, How to Measure Anything in Cybersecurity by Douglas Hubbard.26
Risk assessments provide organizations with insight into how security incidents and breaches will
foreseeably occur. This provides organizations with an opportunity to tie their risk register to their
processes for security log management and alerting, for incident response planning, and for
security awareness training. All these benefits can be added to a risk register by adding a single
column “Realized Risk.”
26Hubbard, Douglas W., Richard Seiersen. How to Measure Anything in Cybersecurity. Hoboken,
NJ: John Wiley & Sons, Inc., 2016
The organization now has a simple way to know what to look out for in terms of log-able events,
to add escalation indicators to their incident response plan document, and to use in information
security awareness training (especially for those realized risk indicators that are recognizable by
general personnel).
Using Realized Risk for Monitoring: In the case of the first “realized risk” notation, the
organization may decide to detect risks by comparing MAC addresses in ARP caches to those in
their vulnerability scan output. With the right tools or scripting skills, this may be simple to achieve
for them.
Using Realized Risk for Incident Response: The organization may note in their incident response
plan that they need to take action when a MAC address appears for an unknown device (which
would be hyper-vigilant in this case, but to illustrate the point).
Using Realized Risk for Training and Awareness: And the organization may use this as an
opportunity to describe to systems engineers and help desk personnel information that may help
them detect and investigate other unexpected activities on the network.
Many organizations use maturity models to evaluate the security capabilities in their environment.
Maturity model evaluations ask questions about specific security controls or control groups so
evaluators can determine how formalized an organization’s security program is. Maturity models
can be aligned to CIS RAM risk assessments by aligning a control in the maturity model with a
corresponding CIS control in a risk register to determine the risk acceptability of the maturity
score.
Table 89 - Summary Evaluation of Using Duty of Care Risk Analysis for Maturity Models
Benefits Limits
- Organizations may continue to - Some authorities who insist on
evaluate the formalization of their evaluating organizations solely with
security programs. maturity models may not accept
- Some moderate maturity scores may moderate maturity scores that align
be sufficient if aligned with reasonable with reasonable risk.
risks.
Maturity model evaluations generally ask organizations a set of control descriptions, and provide
multiple-choice values as optional responses to the control description. For example, control
descriptions for vulnerability management may state something similar to this:
Vulnerabilities are resolved within three business days.
Optional responses would be similar to this (though responses vary from one maturity model to
the next):
0 = Not in place
1 = Ad hoc
2 = Documented
3 = Consistently applied
4 = Tested and corrected
5 = Continuously improved.
If an organization applies this process and they check for success with subsequent weekly tests,
but do not improve their test, they would answer with a “4.”
If this organization also conducts a CIS RAM risk assessment, they will have examined this
control in a risk format in their risk register. In this case, they would have examined CIS Control
3.6 “Compare back-to-back vulnerability scans.” They may have determined that the likelihood
and impact of foreseeable threats is acceptably low. If their risk analysis tells the organization that
their existing review process is acceptable in terms of risk, then they can also note that in their
maturity evaluation this way.
By aligning a maturity score with a risk score, the organization can determine whether they need
to, or wish to, further formalize the control. In this way, the organization can continue to evaluate
their security program using maturity scores, but not feel compelled to continuously improve
unless there is a risk-related reason for doing so.
Interview Techniques
Risk assessment interviews are critical moments for understanding and modeling risk and should
be approached differently than for a compliance assessment or an audit. In a risk assessment,
assessors ask about existing safeguards, as in an audit, but in the context of how foreseeable
threats may compromise information assets given those safeguards.
Benefits Limits
- Increases risk awareness among - Personnel descriptions of safeguards
interviewees. and risks may not be accurate.
- Observes key personnel knowledge of
risk issues.
In a compliance assessment or audit, the assessor generally reports a “pass” or “fail” or even a
“partial pass” by observing whether a required control is present. An auto-closing door with an
auditable lock may be “compliant” with a security standard. An operating firewall may qualify as a
“pass” for an audit of the network perimeter. Encryption between an application server and a
database server may be marked as “green” or “low risk” on a report. But in a risk assessment, the
risk assessor brings knowledge to the interview (and later the control configuration review) that
stress-tests the described safeguards.
For example, does the firewall’s ruleset contain no more than the minimal rules and policies that
are required for business? Who gets to change the firewall’s policies and how is their access
tracked? Who has access to the firewall’s CLI and webadmin interfaces, and from what
networks? Is the webadmin interface even active? How is firmware upgraded? How are firewall
event logs reviewed and analyzed? Is access enforced through multi-factor methods? Does the
firewall fail open?
As respondents provide each answer, the risk assessor should then consider a corresponding
threat to help them model the risk. It may be appropriate to model risks with the respondent
present, or after the interview. This depends on a number of factors, including the risk assessor’s
comfort in improvising threat scenarios for each response about a safeguard. But ideally, the risk
assessment interview will involve discussions about threats so that full risk discussions inform
follow-up questions.
Consider how the interview questions above would play out when an interviewee’s responses are
paired with threats.
By responding to answers with plausible threats, the risk assessor can drive a more interesting
interview about whether a control is sufficiently designed, and can give them indicators of what
safeguards and configurations they would want to follow up on during subsequent configuration
reviews.
In addition to pairing interviewee responses with plausible threats, organizations should plan their
risk assessment discussions along the lines of a structure, or planned conversation. This helps
ensure that the risk assessor addresses a set of subjects that must be understood during a risk
assessment, and allows them to rely on a plan rather than to exhaust themselves with constant
improvisation.
Consider using one or more of these rubrics to set the rhythm of risk assessment interviews.
Rubric 1: “Full Lifecycle of Use,” or “Process Audit.” This method forces risk assessment
participants to think of information assets as something that changes over the course of its usage.
The process is generally useful for assessors who have experience in security operations,
because it requires them to have practical knowledge of how information assets are developed
and managed.
An example of a full lifecycle of use interview process will illustrate the point.
1. An information asset’s lifecycle starts with defining the business requirements that it is
being built for.
2. Then technical specifications are listed to prepare the information asset to satisfy the
business requirements.
3. A hardening standard would then be selected to build the asset from
Many assessments impose maturity models such as the one depicted above. In these
assessments, assessors often rely on the selection of a maturity score as their total description of
a safeguard. But without an understanding of an information asset’s resilience to foreseeable
threats, the acceptability of a control will be difficult to evaluate.
Despite this weakness, a maturity model can be useful in evaluating risk. For instance, while a
risk assessor is evaluating a control to determine its resilience against threats, they could use the
maturity model to understand the likelihood of current and future risk.
An example risk assessment conversation about server hardening demonstrates this process
below.
Some organizations are interested in understanding the “inherent risk” of a scope of information
assets. “Inherent risk” is defined in the Glossary as, “The likelihood of an impact when a threat
compromises an unprotected asset.” A risk register that evaluates “inherent risk” would be nearly
identical to the templates provided in the CIS_RAM_Workbook but would not note or consider
controls that are in place to protect information assets.
Organizations that look for inherent risk often want to determine things such as:
1. What potential liabilities do we face in Venture A versus Venture B?
2. If we move a business process into a cloud service, what is the risk/reward of option A
which uses all of our data, versus Option B with uses some of our data?
3. If we engage this business process / technology / facility, what new regulatory
requirements will we bear?
4. What is the current benefit of our existing security program?
Benefits Limits
- Aligns with some security evaluation - Assumes a fictional condition without
standards, such as the FFIEC controls.
Cybersecurity Assessment Tool. - Does not evaluate the potential
- Provides a basis for a quick estimation burdens (whether low or high) of
of potential liabilities of certain safeguards in business propositions,
ventures or technical architecture which be material to the attractiveness
decisions. of the proposition.
- May help raise awareness among non-
technical management of the need to
continue to invest in information
security programs, safeguards and
awareness.
If risk assessors do intend to add inherent risk analysis to their risk registers, they can do so in
the templates provided in the CIS_RAM_Workbook by adding columns to the left of the observed
risk columns. The risk register could then compare the potential of full and immediate
compromise of the assets to the current state of controls, and the proposed state of controls.
Organizations should first determine what value this analysis provides.
Because organizations will be identifying weaknesses in safeguards, and will propose risk
treatments to address those risks, they will need to understand the actual cause of the
vulnerabilities to ensure that the vulnerabilities do not re-occur. This process of identifying the
underlying causes for weaknesses or failures is called “root cause analysis.”
Benefits Limits
- Helps the organization reduce the - May be difficult to identify the actual root
likelihood of recurrence of the weakness. cause as the organization starts using
- Helps the organization simultaneously the process.
address other weaknesses that may - Root cause analysis may lead to one
result from the root cause. root cause when other root causes may
be missed.
A generally accepted practice for identifying root causes is to conduct a “five whys” exercise. This
entails the risk assessor to recurringly identify the underlying reason for a problem and the
causes of the problem, until a “root cause” of the problem is identified.
Root cause analysis looks similar to the diagram below.
While root cause analysis is classically conducted by asking, ”why” five times to more deeply
uncover the root cause of a problem, this example arrived at a plausible root cause after asking
“why” four times. This is because an organization may uncover the root cause with more or fewer
questions than five.
In this case, the risk assessor will have noted that a web page is vulnerable to a SQL injection
attack. If their recommended risk treatment was simply, “filter all form objects on the page to
prevent special characters, the application developers would fix the one identified error, and then
likely repeat the error the next time they had an emergency application change.
After this root cause analysis, however, the organization knows to both address the identified
weakness (the unfiltered input at the application page) and the root cause (the lack of security
coding during or immediately after emergency changes).
Root cause analysis should be part of all vulnerability assessments, whether they occur during a
risk assessment, an audit, or after a security incident as management determines lessons
learned.
DoCRA Council
The DoCRA Council maintains and educates risk practitioners on the use of the Duty of Care
Risk Analysis (DoCRA) Standard that CIS RAM is based on. While DoCRA is applicable to
evaluation of information security risk, it is designed to be generally applicable to other areas of
business that must manage risk and regulatory compliance. (www.docra.org)
Fair Institute
Fair Institute maintains and educates risk analysists on the use of Factor Analysis of Information
Risk. The FAIR method is similar to BRA in that it provides a consistent method for evaluating
information risk based on characteristics of the components of information risks.
https://www.fairinstitute.org/
All references to tools or other products in this document are provided for informational purposes only, and
do not represent the endorsement by CIS of any particular company, product, or technology.
Contact Information
CIS HALOCK Security Labs
31 Tech Valley Drive 1834 Walden Office Sq. Ste 200
East Greenbush, NY 12061 Schaumburg, IL 60173
518.266.3460 847.221.0200
[email protected] [email protected]