Security +: The Risk Formula
Security +: The Risk Formula
Risk Management
Confidentiality
• Protecting the data from being accessed by unauthorized people
Integrity
• Data loss, destruction, non-repudiation, authenticity
Availability
• Timely reliable access to and use of information
Key Vocabulary
Risk
• The probability of a threat actor causing damage to an asset
• A combination of likelihood and impact
• As an equation risk = probability * impact
Risk Management
• The science of identifying, assessing, and categorizing risks
• Balancing resources in the best way as to mitigate risk
• Minimize the probability of negative impact on an organization
Probability
• Likelihood - over a period of time - of someone or something damaging
assets
Reference Architecture
• Standardized vocabulary for IT security to help structure communications
Infrastructure
• Aspects of an organization including:
◦ Computers
◦ Networks
◦ Employees
◦ Departments
◦ Organizational hierarchy
◦ Physical security
◦ Third-party access
◦ Legal staff
◦ Contracts
◦ Policies
Threat Actor
• Anything or anyone that can cause damage such as:
◦ Malicious person
◦ Untrained person
◦ Natural disaster
Vulnerability
• A weakness in an asset that leaves it open to a threat
Asset
• Part of an organization's infrastructure that has value such as:
◦ Servers
◦ Workstations
◦ Other IT infrastructure
◦ Physical infrastructure
◦ Software applications
◦ Data
◦ Personnel
◦ Services to customers
Vulnerability Reporting
• A communication channel for exchanging information about vulnerabilities
and threats
Attack
• An attempt to take advantage of a vulnerability
Incident
• When the target recognizes an attack
Laws
• Many laws affect the design and implementation of security controls such
as:
• Health Insurance Portability and Accountability Act (HIPPA)
◦ (1996) which safeguards privacy of medical records
• Sarbanes Oxley (SOX)
◦ (2002) Requires that companies retain critical financial records for specific
periods of time
Standards
• Often required for participation in industry such as:
• PCI-DSS Payment Card Industry Data Security Standard
◦ Which provides several highly detailed security controls to mitigate credit
card fraud
◦ See: https://www.pcisecuritystandards.org/
◦ See: https://www.youtube.com/channel/UC7cPVL_HdnX4ZEGdYJMjOew
Best Practices
• Ruleset provided by a manufacturer on how their product should be used
• Software vendors also provided detailed best practices
Security Policies
• Documented rules determine what actions and attitudes an organization will
take for certain critical aspects of their infrastructure
Security Controls
• Directed actions to protect part of the infrastructure
• For example, policies such as password complexity or scheduled password
changes
Baseline reporting
• Assessment of all parts of the network such as:
◦ Software installed
◦ Open ports and services
◦ Network schematic
◦ Hardware, OS, software
Code review
• A type of security assessment of examining software source code to
determine how secure it is
Architecture description
• Design and organization of the information systems being used by the
organization
Organizational inputs
• The sources of security controls such as laws, standards, best practices, and
security policies
Security Controls
• Security controls are actions to mitigate risk of vulnerabilities being
attacked
• NIST SP 800-53 includes detailed descriptions of security controls
• Many security controls span across multiple categories
Phase Controls
• Phase controls describe in which phase of an attack a control is aimed at
penetrating
• These activity phase control types are:
◦ Deterrent
◦ Preventative
◦ Detective
◦ Corrective
◦ Compensating / alternative controls
• Some security controls can cross phases
• For example, a security camera can be classified as a deterrent and
detective control
Control Types
• Technical Controls
◦ Security controls that use technology to prevent or reduce impact of a
vulnerability or attack
◦ For example encryption, antivirus, firewalls, IDS/IPS, backups, requiring a
minimal level of SSL/TLS, HPKP, file permissions
• Administrative Controls
◦ Are applied to people and are built from organizational policies,
guidelines, contracts, laws, etc.
◦ For example, requiring testing and assessments, user-training,
certification requirements, conducting risk and vulnerability
assessments, penetration testing, incident response and other planning,
requiring employees to log off anytime they leave their office
◦ Some administrative controls are related to software development such
as SDLC, Secure DevOps, change management
◦ Administrative controls are also known as operational controls or
management controls
• Physical Controls
◦ Are applied to protect physical areas and are also physical things
◦ Fences, door locks, key-cards, elevator floor blockers, biometric retina
scanners, signage, HVAC, fire-suppression
◦ Physical controls are often closely related to technical controls since they
may employ technology such as alarms
Control Diversity
• Using combined types of controls together to provide better security
• Do not only rely on deterrent controls, you should also use some level of
detection controls
User Training
• Ensure users have received information about critical issues in order to
prevent problems caused by lack of knowledge or awareness
• This may relate to any area of the organization such as:
◦ Do not allow unauthorized people to tailgate
◦ Do not open malicious attachments
◦ Do not use your username as your password
Risk Assessment
• Create a map of risk in order to allocate resources in the more
effective way possible
• Effectiveness means getting the most value out of the available resources
• NIST SP 800-30 describes four main steps:
◦ Prepare for assessment
◦ Conduct assessment:
1. Identify threat sources and events
2. Identify vulnerabilities and predisposing conditions
3. Determine likelihood of occurrence
4. Determine magnitude of impact
5. Determine risk
◦ Communicate results
◦ Maintain assessment
Quantitative Impact
◦ Numerical value assigned such as dollar value
Qualitative Impact
• Intangible and generally incalculable value such as loss of brand sentiment
• When qualitative data provides limitations such as lack of data or subjective
data, or when an issue has an inherently incalculable risk such as loss of
reputation
• Can be scaled into a semi-quantitative value
Risk Register
• Scatter plot of probability and impact used to help identify threats and sort
them according to value
Asset Value
• The value of the asset can be calculated to include the replacement costs
and should also include associated costs of downtime, such as loss of
revenue when production is halted or reduced
Risk Response
• Selecting security controls depends on factors such as cost, expected
effectiveness, and impact on preserving value. The cost of the security
control will determine if the security control will be implemented
• Risk Mitigation
◦ Aims to reduce expected losses by reducing likelihood, through reducing
exposure or reducing potential negative impact if a negative event does
occur
• Risk Transfer
◦ Is sharing burden of risk such as by purchasing insurance. Does not
reduce the likelihood
• Risk Acceptance
◦ Is after the security control has been implemented and some residual
risk still exists
• Risk Avoidance
◦ Is to change activities to not participate in some activities that present
excessive risk
Types of Impact
• The types of impact caused by down time can be categorized into at least
five areas as follows:
• Financial
◦ Lost or delayed sales, increased expenses, overtime, outsourcing, and
fines
• Reputation
◦ Lost sentiment in the customer, user, or employee, or greater community
(translates to financial)
• Property
◦ Loss of any type of physical property such as security cameras, real-
estate, intellectual property (data)
• Safety / Life
◦ Be careful, your employees and customers lives depend on you
• Privacy
◦ Legal responsibility to secure personal data properly
◦ Privacy Impact Assessment's (PIA)
▪ Goal is to ensure the system is complying with local laws, regulations,
and guidelines and privacy threshold assessment (PTA)
▪ Locate personal data within the organization and workflow in order to
identify the legal requirements and develop a control to manage the
risk
◦ The goal is to ensure the system is in compliance throughout it’s lifecycle
with the regulations with respect to any PII or PHI that the organization
holds
Calculating Downtime
• MTBF Mean time between failure
◦ Average time between failures
◦ Assumes product will be repaired
• MTTF Mean time to failure
◦ Total operation time / lifecycle
• MTTR Mean time to recovery / repair
◦ Total amount of corrective time to recover from failure
◦ Includes shipping and repair time
◦ In fault-tolerant design includes the latent time before the fault is
discovered
• RTO Recovery time objective
◦ Is the maximum amount of time that a resource may remain unavailable
before an unacceptable negative impact affects other business critical
system resources
• RPO Recovery point objective
◦ Is the difference between the time of the incident and the time
represented by the most recent backup
◦ The backups should be scheduled such that the data recovery point does
not cause extra-ordinary actions (such as re-doing much work, or calling
customers)
◦ The lower the recovery point objective the better
Roles
• Data owner
◦ Legal ownership of the dataset, copyrights, trademarks
• Data custodian
◦ Technical aspect of the data set are in good order
• Data Steward
◦ Data steward creates the data schematics, makes sure data
requirements are met in terms of schematics, define metadata
requirements, and defined access portals
• Privacy Officer
◦ Performs due diligence to conform to all laws and regulations
Impacts
• Loss of life
• Loss of property
• Reduction in safety for personnel or property
• Potential financial losses to the organization
• Losses to the organizations reputation
Recovery Sites
• Hot site
◦ Available 24/7 as a backup location site, can take over full functionality
quickly
• Warm site
◦ Between hot and cold sites designed to meet the organizations specific
priorities and save costs
◦ Configuration of the site can vary widely between organizations
• Cold site
◦ Power and internet connectivity
◦ The organization brings all system infrastructure to the site upon
activation
• Mobile site
◦ Self-contained transportable unit with outfitted with specific systems to
meet requirements of an impacted system / function
• Mirrored site
◦ Are identical to the primary location and provide 100 percent availability
• Order of restoration
◦ Organizations would restore the most critical functions first
• DRP Disaster recovery plan
◦ Includes a hierarchal list of critical systems and instructions to restore
functionality
◦ Activate the disaster recovery plan
◦ Implement contingencies
◦ Recover critical systems
◦ Test recovered systems
◦ Test recovered systems
◦ After action report
Testing Plans
• Tabletop exercise (desktop exercise / structured -walk-though)
◦ Meeting based approach to reviewing the stages of the recovery
• Functional exercise
◦ Simulated operational environment is used to test the continuity
BCP/DRP