ISMS Manual
ISMS Manual
ISMS Manual
1
ISMS Implementation
Objective
To understand
– The concepts of assets, threats and Vulnerabilities
– Components of Risk Assessment
– Their inter-relationship
– The Risk assessment and management Process
Risk Assessment and Management – Risk assessment Methodologies
To Carry out Risk assessment
Ver2.2 Module: Risk Assessment and Management 3 Ver2.2 Module: Risk Assessment and Management 4
Ver2.2 Module: Risk Assessment and Management 5 Ver2.2 Module: Risk Assessment and Management 6
Vulnerabilities Threats
Ver2.2 Module: Risk Assessment and Management 7 Ver2.2 Module: Risk Assessment and Management 8
Ver2.2 Module: Risk Assessment and Management 9 Ver2.2 Module: Risk Assessment and Management 10
Security Risk
?
Ver2.2 Module: Risk Assessment and Management 11 Ver2.2 Module: Risk Assessment and Management 12
Ver2.2 Module: Risk Assessment and Management 13 Ver2.2 Module: Risk Assessment and Management 14
Implementation issue
The Purpose of Risk Assessment ISO27001: 2005 Clause 4.2.1. Requires that
To identify the security requirements for the The organization needs to have
organization's information assets – Identify a risk assessment methodology that is suited
To review the consequences of the risks i.e. to the ISMS, and the identified business information
impact to the business security, legal and regulatory requirements.
To make decisions on how to manage the risks – Develop criteria for accepting risks and identify the
– accept or tolerate acceptable levels of risk.
– avoid The risk assessment methodology selected shall ensure
– transfer the responsibility that risk assessments produce comparable and
– reduce or control reproducible results.
Ver2.2 Module: Risk Assessment and Management 17 Ver2.2 Module: Risk Assessment and Management 18
Risk Assessment and management Process Risk Assessment and management Process
contd…
Risk
Riskassessment
assessment Risk
Riskassessment
assessmentactivities
activities
&& management
management Risk
Risk Risk
Riskassessment
assessmentactivities
activities
tasks
tasks assessment
assessment &&
Asset Identify management
Asset Identifyand
andlist
listall
allassets,
assets,define
defineaavalue
valuescale
scaleand
andfor
foreach
each management
identification tasks
identificationand
and asset
assetassign
assignvalues
valuesfrom
from this
thisscale
scale tasks
valuation
valuation Risk
RiskCalculation
Calculation Calculate
Calculatethetherisk
riskas
asaafunction
functionofofthe
theassets,
assets,threats
threats
Threat Identify and
andvulnerabilities
vulnerabilitiesusing
usingsuitable
suitablemethod
Threat Identifyall
all threats
threatsassociated
associatedwith
withthe
thelist
listofofassets
assetsandand method
assessment assign Identification
Identification&& Identify
Identifythe
thesuitable
suitablerisk
risktreatment
treatmentaction
actionfor
foreach
eachofofthe
assessment assignaavalue
valueto tothem
them according
accordingtototheir
theirlikelihood
likelihoodof of the
occurrence Evaluation
Evaluationof identified
identifiedrisks
risksfrom
from the
thedifferent
differentavailable
availablerisk
risktreatment
occurrenceand andseverity
severity Risk
of treatment
Vulnerability
Vulnerability Identify
Identifyall
all vulnerabilities
vulnerabilitiesassociated
associatedwith
withthethelist
listof
ofassets
assets RiskTreatment
Treatment options
options
Options
Options
assessment
assessment and
andassign
assignaavalue
valuetotothem
them according
accordingto tohow
howeasily
easilythey
they
might Selection
Selectionofof Select
Selectsuitable
suitablesecurity
securitycontrols
controlstotoreduce
reducethetherisks
risksto
to
mightbebeexploited
exploitedby bythe
thethreats
threats Security
SecurityControls
Controls acceptable
acceptablelevel
level
&&Risk
Risk
Reduction
Reduction&&
Acceptance
Acceptance
Ver2.2 Module: Risk Assessment and Management 19 Ver2.2 Module: Risk Assessment and Management 20
The organization shall demonstrate that it has identified The organization shall need to demonstrate that it
the information assets covered by the scope as defined has established the value(s) of the information
by the organization. assets.
The value(s) shall be measured in terms of impact on
This shall include the method for ensuring that the the organization.
assets defined are appropriate to the proposed Consider business impacts in terms of
information security management system and that they – Financial loss
are complete. – Loss of sales/market share
– Service unavailability & disruption to operations
– Processing capability & productivity loss
– Damage to image and reputation
Ver2.2 Module: Risk Assessment and Management 21 Ver2.2 Module: Risk Assessment and Management 22
Confidentiality(C)
Confidentiality(C) Integrity(I)
Integrity(I)
Asset
Asset Class
Class Description
Description Asset
Asset Class
Class Description
Description
Value
Value Value
Value
11 Publicly
Publicly Non-sensitive
Non-sensitive, ,available
availableto
tothe
thepublic
public 11 Very
Verylow
low Business
Businessimpact
impactisisnegligible
negligible
available
available integrity
integrity
22 Low
Low Business
Businessimpact
impactisisminor
minor
22 For
Forinternal
internaluse
use Non-sensitive
Non-sensitiveinformation
informationrestricted
restrictedto
tointernal
internal
only use integrity
integrity
only useonly
only
33 Medium
Medium Business
Businessimpact
impactisissignificant
significant
33 Restricted
Restricteduse
use Varying
Varyingrestriction
restrictionwithin
withinthe
theorganization
organization integrity
integrity
only
only
44 High
High Business
Businessimpact
impactisismajor
major
44 In-Confidence
In-Confidence Available
Availableon
onaaneed-to-know
need-to-knowbasis
basis integrity
integrity
55 Very
Veryhigh
high Business
Businessimpact
impactcould
couldlead
leadto
toserious
seriousor
or
integrity
integrity total
totalfailure
failureof
ofbusiness
businessapplication
application
55 Strictest-In-
Strictest-In- Available
Availableon
onaastrict
strictneed-to-know
need-to-knowbasis
basis
Confidence
Confidence
Ver2.2 Module: Risk Assessment and Management 23 Ver2.2 Module: Risk Assessment and Management 24
Ver2.2 Module: Risk Assessment and Management 25 Ver2.2 Module: Risk Assessment and Management 26
Ver2.2 Module: Risk Assessment and Management 27 Ver2.2 Module: Risk Assessment and Management 28
Ver2.2 Module: Risk Assessment and Management 29 Ver2.2 Module: Risk Assessment and Management 30
Vulnerability Valuation
Risk Assessment
Assess the level of weakness
Risk is function of Asset value, Threat value and
– How likely is it that a vulnerability will be exploited
Vulnerability value
– How good are the security controls in place
Assign values for vulnerabilities R=ƒ (A,T,V)
R= Risk Value (RC/RI/RA) T= Threat Value (TC/TI/TA)
A= Asset value (AC/AI/RA) V= Vulnerability value (VC/VI/VA)
Example :
Score Rating Organization is free to chose the function ‘ƒ’ as
1 Very Secure
long as the out put of Risk Assessment is relevant
2 Security is present but needs to improve
Sometimes threats and vulnerabilities are commonly called as
3 Security is clearly inadequate at present and needs to improve strongly
Security concern and assessed as single entity S(SC/SI/SA)
Ver2.2 Module: Risk Assessment and Management 31 Ver2.2 Module: Risk Assessment and Management 32
Transfer Avoid
Accept Reduce
Probability
Ver2.2 Module: Risk Assessment and Management 33 Ver2.2 Module: Risk Assessment and Management 34
Ver2.2 Module: Risk Assessment and Management 35 Ver2.2 Module: Risk Assessment and Management 36
Evaluate the information assets in a pre-defined qualitative THREAT LOW MEDIUM HIGH
scale from its quantitative / qualitative value
VULNERABILITY L M H L M H L M H
Evaluate the level of threat in a pre-defined qualitative scale
from its likelihood of occurrence, for each asset VL 1 2 3 2 3 4 3 4 5
ASSET VALUE
Evaluate the level of vulnerability in a pre-defined qualitative L 2 3 4 3 4 5 4 5 6
scale from the ease of exploitation by the threats to cause
adverse impact, for each asset M 3 4 5 4 5 6 5 6 7
Find out risk as a function of the corresponding value of assets, H 4 5 6 5 6 7 6 7 8
threats & vulnerabilities, from the risk matrix with predefined
values VH 5 6 7 6 7 8 7 8 9
Ver2.2 Module: Risk Assessment and Management 37 Ver2.2 Module: Risk Assessment and Management 38
VL 1 2 3 2 3 4 3 4 5
ASSET VALUE
L 2 3 4 3 4 5 4 5 6
M 3 4 5 4 5 6 5 6 7
H 4 5 6 5 6 7 6 7 8
VH 5 6 7 6 7 8 7 8 9
Ver2.2 Module: Risk Assessment and Management 39 Ver2.2 Module: Risk Assessment and Management 40
Ver2.2 Module: Risk Assessment and Management 41 Ver2.2 Module: Risk Assessment and Management 42
Ver2.2 Module: Risk Assessment and Management 43 Ver2.2 Module: Risk Assessment and Management 44
Risk Assessment Output :Risk Grading Commercial Off the Shelf Tools
7 8 9 10 11
3
The organization may use a commercial-off-the-shelf
concern
Value of Security
1 2 3 4 5
will determine the vulnerabilities, threats and
0
probabilities of threats to the defined assets,
1 2 3 4 5 Is repeatable and sustainable and
will provide the organization with a usable measure of
Asset value (C/A/I)
Decision: risk.
If Risk value ≥ 9 : Immediate action to be taken
If 9 >Risk value ≥ 7 :Some action to be taken Examples of Risk Assessment Tools :COBRA, CRAMM, BSI-RA Tools etc.
If Risk value < 7 : Accept the risk
Ver2.2 Module: Risk Assessment and Management 45 Ver2.2 Module: Risk Assessment and Management 46
Managing the risks : Options for the Risk Risk Reduction Possibilities
Treatment
Reduce the Risk by applying appropriate Controls Reduce the vulnerabilities
Risk avoidance – Reduce/eliminate the weaknesses
– Not performing the activity Reduce the likelihood of occurrence
– Moving assets away from an area of risk
– Reduce/eliminate the cause
– Deferring a decision until more information is obtained
– Minimize the probability by preventive measures
Risk transfer
– By contracting-out Reduce the consequences of impact
– Take out an insurance – Taking steps to prevent, minimize or contain impact
Risk Acceptance
– Do nothing and accept the risk as it is
– Situation is unavoidable
– Risk is tolerable
Ignoring the risk
– Where their impact is judged to be minimal
Ver2.2 Module: Risk Assessment and Management 47 Ver2.2 Module: Risk Assessment and Management 48
ISO 27001 clause 4.2.1c states “Determine criteria for No control can ever offer ABSOLUTE assurance, there
accepting the risks and identify the acceptable levels of will always be a residual risk.
risk.”
Management, having defined the degree(s) of
assurance required from the ISMS must accept these
residual risks and be accountable if subsequently a
security breach occurs, and it was not through a
breakdown in the authorized ISMS.
Ver2.2 Module: Risk Assessment and Management 49 Ver2.2 Module: Risk Assessment and Management 50
Ver2.2 Module: Risk Assessment and Management 51 Ver2.2 Module: Risk Assessment and Management 52
«
Ver2.2 Module: Risk Assessment and Management 53 Ver2.2 Module: Risk Assessment and Management 54
Summary
« «
Ver2.2 Module: Risk Assessment and Management 57 Ver2.2 Module: Risk Assessment and Management 58
Computer equipment (Processors, monitors, laptops, Modems) Computing and Communication Services
Communication equipment ( Routers, PABXs, fax machines) General Utilities e.g. Heating, lighting, Power, air conditioning.
Magnetic Media (tapes and Disks)
Other technical equipment( Power supplies, Airconditioning
units), Furniture, accomodation
« «
Ver2.2 Module: Risk Assessment and Management 59 Ver2.2 Module: Risk Assessment and Management 60