Risk Management: ISEC 4340
Risk Management: ISEC 4340
ISEC 4340
What Is Risk?
Risk: The likelihood that a loss will occur. Losses occur when a threat exposes a
vulnerability.
Vulnerability: A weakness.
Tangible
Intangible
Risk management process
• Threat assessment what could be the threat? It could be viruses or
hacker
• Vulnerability assessment what is the weaknesses
• Impact assessment what is the impact
• Risk mitigation strategy development who to mitigate the risk
Threat Assessment
• Process of formally evaluating the degree of threat to an information
system or enterprise and describing the nature of the threat.
• Threats are the tactics, techniques, and methods used by threat actors that
have the potential to cause harm to an organization's assets.
• Threat: An attacker performs an SQL injection
• Vulnerability: unpatched (update)
• Asset: web server (college web, visit web through URL)
• Consequence: to steal customers' private data.
• The process of threat assessment begins with the initial assessment of a
threat. It is then followed by a review of its seriousness, and creation of
plans to address the underlying , Finally, a follow-up assessment and plans
for mitigation. In the last phase,.
Vulnerability assessment
• The vulnerability assessment analyzes how vulnerable, susceptible,
and exposed a business or system is to a particular threat.
• it is useful to know that a system is vulnerable to a threat that has a
90% chance of occurring, a 50% chance of occurring, or a 1% chance
of occurring. The vulnerability and the likelihood of the event are
closely related, and the results are used as inputs to the impact
assessment.
• A server that is outside the firewall is far more vulnerable to external
attacks than a server that is inside the firewall.
Impact assessment
• The impact assessment analyzes how great or small the impact of a
threat occurrence will be on the business or system.
• An earthquake has an enormous impact on a business that is in or
near the epicenter of the quake; it has a lesser impact on businesses
further from the epicenter.
Risk mitigation strategy development
• You can reduce, avoid, accept, or transfer risks. Each strategy comes
with an associated cost. It’s far more expensive in many cases to
completely avoid a risk than it is to reduce the impact of the risk.
• Most businesses are more likely to build in state-of the art fire
suppression systems rather than construct a building with absolutely
no flammable materials. The cost of building a completely fireproof
building is far higher than installing a high-quality fire system.
• Some risks are worth accepting We drive cars, we cross busy
intersections on foot, we eat unhealthy food.
What is Risk Management?
• It is a process to:
• Identify all relevant risks
• Assess / rank those risks
• Address the risks in order of
priority
• Monitor risks & report on
their management
Promotes good
management
Implement and
test
Implement and test controls
1 2 3
Identify threats Identify Estimate
vulnerabilities likelihood of a
threat exploiting a
vulnerability
Organization-wide Risk Management
Avoidance
Transfer
Mitigation
Acceptance
Residual Risk
Cost-Benefit Analysis
Risk Avoidance
• Risk avoidance is a way for businesses to reduce their level of risk by not
engaging in certain high-risk activities. While it’s impossible to eliminate all
risks, a risk avoidance strategy can help prevent some losses from happening.
• An example: A retailer discontinues collection of personal data such as
customer information, ages and telephone numbers to avoid the risk
that such data would be stolen in an information security incident.
• The key advantage of this technique is that it’s the most successful
method of mitigating risk. You eliminate the possibility of suffering
losses by stopping the threat altogether.
Risk Avoidance
Risk Transfer
• You can transfer all or part of the risk to a third party. The two main
types of transfer are insurance and outsourcing. For example a
company may choose to transfer a collection project risk by out
sourcing the project.
• The advantage here is that you can take some or most of the burden
from risks and share it with a third party.
Mitigate the Risk
Acceptan
• Residual Risk: Risk treatments don’t necessarily reduce risks to zero. Remaining risk after
treatment is known as residual risk.
ce and
• Residual risk is the level of risk remaining after applying risk controls.
Residual
Risk
Best Practices for Managing Threats
• Financial
• Reduction in funding
• Failure to safeguard assets
• Poor cash flow management
• Lack of value for money
• Fraud / theft
• Poor budgeting
Categories of Risks
• Operational
• These risks result from failed or inappropriate policies, procedures,
systems or activities e.g.
• Failure of an IT system
• Poor quality of services delivered
• Lack of succession planning
• Health & Safety risks
• Staff skill levels
• No process to track contractual commitments
Categories of Risks
• Reputational
• Organization engages in activities that could threaten it’s good name
• Through association with other bodies
• Staff / members acting in a criminal or unethical way
• Poor stakeholder relations
Risk Register
• a) What is it?
• b) Components
• c) How to report on it
Risk Register
• A Risk Register is a management tool used to record relevant details
relating to risks.
• It is a database of information on risks.
• Best kept simple to begin with!
Business Impact
Analysis
ISEC 4340
Learning Objective and Key Concepts
Learning Objective
• Perform a business impact analysis.
Key Concepts
• Purpose of BIA
• Critical success factors of BIA
• Steps involved in implementing a BIA
• BIA best practices
What Is a Business Impact Analysis?
35
Understanding impact criticality
• Criticality categories
• Category 1: Critical functions ---mission-critical
• Category 2: Essential functions ---vital
• Category 3: Necessary functions ---Important
• Category 4: Desirable functions ---Minor
36
Understanding impact criticality
37
Understanding impact criticality
• Essential Functions ---Vital
• Vital systems might include those that interface with mission-critical systems
• Systems may include e-mail, Internet access, databases, and other business
tools
38
Understanding impact criticality
• Desirable functions---Minor
39
Recovery Time Requirements
• Maximum tolerable downtime (MTD):
• the maximum downtime a business can tolerate the absence or unavailability of a particular
business function. The higher the criticality the shorter the MTD is likely to be
• Downtime consists of two elements:
• systems recovery and the work recovery time
• Recovery Time Objective (RTO)
• : time available to recover disruptive systems
• Work Recovery Time (WRT):
• second segment of the MTD
• Recovery Point Objective:
• the amount or extent of data loss to be tolerated
40
Recovery Time Objective (RTO)
• The Recovery Time Objective (RTO) is the targeted duration of time and a
service level within which a business process must be restored after a disaster
(or disruption) in order to avoid unacceptable consequences associated with a
break in business continuity.
41
Recovery point objective (RPO)
42
43
MTD -MAO
• Maximum tolerable period of disruption (MTPOD), also known as maximum tolerable
downtime (MTD), maximum tolerable outage (MTO), or maximum allowable outage
(MAO),
44
Methodological steps for developing a business impact
analysis
Define the boundaries of the BIA
• The starting point prior to the development of the BIA is the identification of the scope.
• Top management should have identified the scope, considering the products and services of
the organization. Several key criteria could be considered to decide the products and services
of the organization that need to be protected to assure continuity; including:
• a) market pressure,
• b) specific company sites,
• c) products and services profitability.
• Once the scope has been established, it is strategically recommended that its boundaries are
outlined and precisely defined in terms of with what activity they initiate and with which one
they terminate.
Identify activities that support the scope
• An activity is considered a process or set of processes undertaken by an
organization (or on its behalf) that produces or supports one or more
products or services.
• When the scope is delimited, the organization should identify all the activities
involved in the scope that directly contribute to the generation of its
products and services. A good tool that helps in this step is a flowchart.
Assess Financial and operational impacts
• The next step is to assess the financial and operational impacts that would
affect the organization in the event of a disruption of the activities identified
in the preceding step.
• A financial impact assessment is carried out for each activity. The question to
be asked is “What would the magnitude and severity of financial loss be if the
activities were interrupted following a disruption?” The losses are estimated
on a daily basis.
Financial losses for a specific scope.
The second part of the financial impact assessment ranks each impact
in a severity level based on its monetary loss value. The following
scale is recommended:
•Severity level 0: No impact
•Severity level 1: Minor impact
•Severity Level 2: Intermediate level
•Severity level 3: Major impact
Operational Impacts
Identify Critical Activities
• This step identifies the activities that have to be performed in order
to deliver the key products and services, which enable an organization
to meet its most important and time sensitive objectives. The
financial and operational impact rankings assigned in step three
provide a basis for identifying critical activities. An activity is
considered critical if any of the following is true:
Identify critical activities (continued)
• A severity level of 2 or 3 is assigned to its financial impact;
• A ranking of high is assigned to at least three of its operational impacts;
• A ranking of high is assigned to at least two of its operational impacts and a ranking of
highest is assigned to at least one;
• A ranking of highest is assigned to at least two of its operational impacts.
• The critical activities listed in the next Figure were obtained by applying the above
selection criteria to the impact rankings of business activities presented in figures two
and three
Critical Assets
Assess MTPDs and prioritize critical activities:
• “The maximum tolerable period of disruption (MTPD) is the duration after which the viability of the
organization will be irrevocably threatened if product and service delivery cannot be resumed”.
• The estimates of MTPD can be based on either financial or operational impacts. The personnel
responsible for assessing the financial and operational impacts are asked the following question:
“What is the maximum period of time that can be tolerated for this process based on the financial
and operational impact levels?” Let’s imagine that the financial loss of US $25,000 per day becomes
unacceptable when it exceeds US $50,000.
• Therefore, the MTPD is two days, since then the financial losses will exceed US $50,000, if the
disruption continues for a longer period of time. This example assumes that the operational impacts
are insignificant relative to the financial losses.
Assess MTPDs and prioritize critical activities
(continued)
• Usually the analysis requires revising the financial and operational impacts of the disruption
to estimate the MTPD.
• Once the MTPDs are calculated, a priority for their recovery should be established. A critical
activity that has a shorter MTPD compared with another critical activity is assigned a higher
recovery priority.
• Considering today’s connectivity and the dependency on information technology, the trend
of MTPDs is to shrink in terms of duration and probably they will be close to zero in the near
future.
MTPDs and recovery priorities
Estimate the resources that each critical activity will
require for resumption
• In this step, the organization needs to estimate the resources required for resumption
at the level of each critical activity. Previously, the firm should have identified the
minimum level at which each critical activity needs to be performed upon
resumption.
• The sources that a business can use to determine the minimum levels of performance
acceptable are the contractual agreements and service level agreements for the key
products and services involved in the scope. The minimum resources needed for each
activity can be classified as:
• (a) critical IT systems and applications, and
• (b) critical non IT resources.
• This second category can be subdivided in: ‘physical areas’, ‘human competences’,
‘equipment’ and ‘documents’.
Critical activities and resources needed for
resumption
Determine RTOs for critical activities
• “The recovery time objective (RTO) is the target time set for resumption of product, service
or activity delivery after an incident” (Fullick, 2013). The RTO, which is the length of time
between a disruptive event and the recovery of resources, indicates the time available to
recover disrupted resources. The MTPD value expresses the maximum limit for the RTO
value.
Maintain focus on
objectives
• Hackers are regularly trying to attack an online book selling company and 2.6 such attacks are
successful every year. Each successful hack attack results in a loss of about $10000 to the
company. The current firewall is an outdated one. A consulting company suggested to replace the
firewall with a new one.
• A company XYZ proposed a firewall at a cost of $9000 and a maintenance cost of $5,000. The
estimated useful life of the firewall is 5 years. The company guarantees that the chance that an
attacker break through the firewall is reduced to 30%.
• Exposure – percentage loss that would occur from a given vulnerability being
exploited
Cost Benefit Analysis
• aka economic feasibility study - quantitative decision-making process that:
determines the loss in value if the asset remained unprotected
Cost Benefit
Analysis ACS (annual
cost of safe
guards)
• Technical feasibility
• Political feasibility
Disaster Recovery Plan
Introduction
• Business continuity planning (BCP) is a methodology used to create and validate a plan for
maintaining continuous business operations before, during, and after disasters and disruptive events.
• Disaster recovery is a part of business continuity and deals with the immediate impact of an event.
Recovering from a server outage, security breach, or hurricane, all fall into this category.
• Disaster recovery involves stopping the effects of the disaster as quickly as possible and addressing
the immediate aftermath. This might include shutting down systems that have been breached,
evaluating which systems are impacted by a flood or earthquake, and determining the best way to
proceed.
• Once the effects of the disaster or event have been addressed, business continuity activities typically
begin.
Components of Business
• People are the ones who do the actual planning and implementation of a
disaster plan.
• Every company is different, and therefore, every DR planning process will
have to be different. A small retail outlet’s IT planning for DR will be very
different from a college, hospital, accounting firm, or a manufacturing facility.
• According to a survey completed in 2010, human error is responsible for 40%
of all data loss, as compared to just 29% for hardware or system failures.
People are responsible for designing, implementing, and monitoring
processes intended to safeguard data. However, people make mistakes every
single day.
People in DR planning
• Another key aspect to people in DR planning is that it’s critical to remember
that if a disaster hits your company, people will have a wide variety of
responses. Some people, especially those with emergency preparedness
training, will rise to the occasion and start taking effective action through
leadership roles. As was seen in many natural disaster responses over the
years, people are often without food, shelter, power, or cellular service.
Question
• The processes your company uses to run the day-to-day business are key to the long-term success
of the business. These processes are developed (and hopefully documented) in order to manage
the recurring business tasks. Things outside the normal recurring tasks typically are handled as
exceptions until they recur often enough to create a new process, and the cycle continues.
• Despite the high likelihood that a company will go out of business after a disaster, more than
90% of small businesses lack a disaster recovery plan.
• Even though many companies say they understand the need for a disaster recovery plan,
very few actually make it a priority.
• There may be substantial financial and legal implications for failing to plan and for failing to
take reasonable precautions. This can add to a company’s burdens after a disaster strikes.
Types of Disasters
• Threats or hazards come in three basic categories: Natural hazards, Human-caused hazards , Accidents and
technological hazard.
• Natural hazards include weather problems in both hot and cold climates as well as geological hazards such as
• Human-caused hazards can be accidental or intentional. Some intentional human-caused hazards fall under the
category of terrorism, and some are less severe and may be “simply” criminal or unethical. • Human-caused
hazards include cyber-attacks, rioting, protests, product tampering, bombs, explosions, and terrorism, to name
a few.
• Accidents and technological hazards include such issues as transportation accidents and failures, infrastructure
• You might conscientiously make backups, verify the backups, and store them
securely but leave them on-site. The single point of failure could be as minor
as something falling on the rack holding your tape backups or as major as a
serious fire in the server room or building.
Disaster Recovery Planning Basics.
The basic steps in any Disaster Recovery plan include:
• Project initiation
• Risk assessment
• Business impact analysis
• Mitigation strategy development
• Plan development
• Training, testing, and auditing
• Plan maintenance
Project initiation
• Project initiation is one of the most important elements in Disaster Recovery
planning because without full organizational support, the plan will be
incomplete. As an IT professional, there may be limits to what you can do to
create an organization-wide functional DR plan. For example, If the application
server is destroyed and you have data backups, do you also have a way to
access those backups? Do you have a way to allow users to connect to the
application securely? Where are users located? How will business resume? Can
it resume without that application in the near term or not? You will not likely
be able to answer these questions.
Risk assessment
• Risk assessment is the process of sitting down with key members of your company
and looking at the potential risks your company faces. These risks run from ordinary
to extraordinary—from a fire or minor flood in a server room to a catastrophic loss
such as an earthquake or major hurricane and everything in between.
• An IT professional, you can certainly lend your expertise to this process by helping
define the likely impact to technology components in various types of disasters or
events, but you can’t do it alone. For example, it’s likely that your transportation
manager understands the potential business impact of bad weather around the
country, not just in your local area. Your marketing manager might best understand
the potential business risk of a contaminated product or a Web site breach.
Business impact analysis
• Once you’ve outlined your risks, you need to turn your attention to the
potential impact of these various risks.
• For example, you might determine that your Enterprise Resource Planning or
your Electronic Medical Record application cannot be down. Period. E-mail,
Web servers, and reporting tools, however, can go down, even though both
events would be disruptive. Once you understand these parameters, you can
develop an IT-based strategy to meet the requirements that result from this
analysis
Mitigation strategy development
• Once the plan has been developed, people need to be trained on how
to implement it. In many cases, scenario-based case studies can be a
good first step. Running through appropriate drills, exercises, and
simulations can be of great help, especially for disasters or events
that rank high on the list of “likely to occur.
Plan maintenance
• Finally, plan maintenance is the last step in the DR planning process, and in
many companies, it is “last and least.” Without a plan to maintain your
plan, it will become just another project document on a file server or
sitting in a binder on a shelf. If it doesn’t get maintained, updated, and
revalidated from time to time, you’ll find that the plan may be rendered
useless if a disaster does strike. Maintenance doesn’t have to be an
enormous task, but it is one that must be done.
Recovery plan considerations
• The recovery point objective (RPO) describes the age of files that
must be recovered from backup storage for normal operations to
resume.
Types of disaster recovery plans
• Virtualized disaster recovery plan - Virtualization provides opportunities to implement disaster
recovery in a more efficient and simpler way. A virtualized environment can spin up new virtual
machine (VM) instances within minutes and provide application recovery. Testing can also be easier
to achieve, but the plan must include the ability to validate that applications can be run in disaster
recovery mode and returned to normal operations within the RPO and RTO.
• Network disaster recovery plan - Developing a plan for recovering a network gets more
complicated as the complexity of the network increases. It is important to detail the step-by-step
recovery procedure, test it properly and keep it updated. Data in this plan will be specific to the
network, such as in its performance and networking staff.
Types of disaster recovery plans
• Cloud disaster recovery plan - Cloud disaster recovery (cloud DR) can range from a file backup in the
cloud to a complete replication. Cloud DR can be space, time and cost-efficient, but maintaining the
disaster recovery plan requires proper management. The manager must know the location of physical
and virtual servers. The plan must address security, which is a common issue in the cloud that can be
alleviated through testing.
• Data center disaster recovery plan - This type of plan focuses exclusively on the data center facility
and infrastructure. An operational risk assessment is a key element in data center DRPs. It analyzes key
components such as building location, power systems and protection, security, and office space. The plan
must address a broad range of possible scenarios.
Disaster recovery plan checklist
• Stay Up to Date.
Example
• The DR plan for a modern Company, running 200 physical servers and virtual
servers in an on-premises data center. The company relies on its production
environment being available 24/7 to customers, which is why their DR
strategy needs to function perfectly with minimal downtime. This company
uses Amazon Web Service (AWS) as their target DR infrastructure in order to
cut costs and improve their RTO and RPO.
RTO: 5 minutes
RPO: 0 Minutes
Recovery Point is near Zero because the business cannot
tolerate any loss. This is why data is continuously
replicated from the on-premise environment to Cloud
Required Documents:
-stakeholder Register
• Risk Register
• Communication Plan.
Incident Response Plan
Introduction
• Incident response is the process that gets triggered when
something unexpected happens in such a way that the
continuity is threatened.
• Disaster recovery comes into play when an incident is so
huge that the business cannot continue its operations.
Necessary Prerequisites
• Prior to building the incident response program, specific capabilities
must exist. Examples of these capabilities include:
• Access-control processes and restriction of elevated privileges
• Protection from misuse of data in motion, in use, and at rest
• Hardening of hardware, based on established standards
• Understanding and management of vulnerabilities
• Existence of communication and control network protections
(firewalls, etc.)
Incident Response plan
Incident Response Frameworks
• The National Institute of Standards and Technology (NIST) publishes many
documents available for cybersecurity practitioners, specifically, the NIST
(SP) 800-61 Computer Security Incident Handling Guide.
The elements of NIST 800-61 include the following:
• Organizing a Computer Incident Response Capability
• Handling an Incident
• Identify
• Contain
• Eradicate
• Recover
• Post-incident
Organizing a Computer Incident Response
Capability
• Organizing an incident response program requires that an incident be
defined. Not everything that is unusual is an incident. Prior to
defining anomalies as incidents, these occurrences must be analyzed
and triaged as events.
• Policies and procedures
• The team
• Goals, strategy, and objectives
• The incident response plan
• Tactical procedures
Incident Response Definitions
• Event is an observable occurrence in a system or network.
An example of an event is quarantined e-mail that appears to be
suspicious. A security analyst assesses the e-mail and decides either to
release it to the recipient or eradicate it.
• Adverse Event: Event resulting in negative consequences
System outages, whether malicious or accidental, fall into the adverse
event bucket.
• Incident: Violation of policies
Insider threats that remove data without authorization trigger a full-
fledged incident response.
The team
• The incident response plan identifies the individuals who make up the
incident response team and their roles.
• Usually, someone from cybersecurity, at the manager
or director level, owns incident response.
• Management: Management owns incident response: It funds, allocates
resources, and controls policy decisions.
• IT support: Not everyone in IT will respond to incidents. Unique events call
for others to participate, based on expertise.
• Legal department: The general counsel’s presence on the extended team or
executive response team is expected. Engaging the legal department earlier
should be expected in certain situations.
• Public affairs and media relations: Large breaches garner media attention,
and involvement of personal information requires disclosure.
• Human resources: This group’s input becomes necessary when employee
involvement is suspected.
How Vulnerabilities Become Risks
• Vulnerabilities represent weaknesses in information systems. Threat
actors seek to uncover and exploit these in a successful attack. Weak
passwords, default accounts with default passwords, and unpatched
systems are examples of vulnerabilities commonly exploited.
• For a risk to be present, a threat and a vulnerability must exist.
Vulnerabilities that no threat actor or scenario would exploit are not a
cybersecurity risk.
• A threat actor, in this case a malicious insider, exploits a
vulnerability—default admin credentials—creating a risk to the
confidentiality, integrity, or availability of customer data
Detection and Identification of Event
• Incident response begins with the detection and identification of events.
Detection should be deployed based on risks identified and potential attack
patterns of known threats.
• Several provide automated detection and identification. Automation is
desirable when it lowers costs, increases efficiency and is more reliable
than manual processes. A significant use case for automation exists when
technology correlates and detects behavior patterns and activity not
always seen easily with the human eye.
• Not all detection requires technology. End users are an example of how the
human element can be very effective, such as noticing phishing e-mails first
when other employees do not observe good e-mail hygiene
Detection and Identification of Event
• End Point Detection and Response
End point detection and response is a capability used to detect
changes made to end points consistent with known indicators of
attack or behavior and inconsistent baselines of normal behavior.
These solutions act in a front-line detection capacity and are valuable
during containment
These solutions allow the team to quickly respond to the event and
take appropriate action.
Example : FireEye Endpoint Security and Symantec Endpoint Protection
Detection and Identification of Event
• Analyzing Traffic
Packet capture aids incident response teams’ need to confirm
whether suspected events exist. Organizations implement these
solutions based on the incident response and monitoring strategy.
Example is NetFlow developed by Cisco, which allows entities to
capture data on the origination, destination, and amount of traffic.
• Security Incident and Event Management (SIEM)
Security Information and Event Management (SIEM) is a set of tools and services offering a
holistic view of an organization's information security. SIEM tools provide: Real-time visibility
across an organization's information security systems.
Containment
• Containment comes after identifying an event and concluding that action is
required to limit its impact.
• Containment is about limiting the damage done by attackers. This is
achieved by keeping the attacker away from key assets not yet
compromised. Containing an event or incident requires identifying
indicators of the attack and identifying them in other systems
• Once a system is suspected of being compromised, it should be isolated.
Some ways to do this includes : Unplugging the network cable, Putting the
machine in sleep mode (Powering it off causes volatile memory loss and
the loss of forensic evidence.) or Isolating the machine, so that it cannot
receive data via changes to DNS and firewall rules.
Containment
• Denial of Service
Denial of service (DoS) and distributed denial of service (DDoS) attacks aim to shut down
services and disrupt business operations. The attacks target web-facing applications, and
DNS service.
Attempting to contain these attacks involves the following important steps:
1. Assess firewalls, routers, servers, and other affected device logs.
2. Pinpoint how the traffic for the DDoS attack differs from nonthreatening ones and
review network traffic looking for DDoS traffic.
3. Block traffic with perimeter devices.
4. Block outbound traffic responding to the DDoS.
5. Blackhole malicious IPs attributed to the attacker.
6. Temporarily disable applications and services affected by the attack.
7. contact the Internet service provider to confirm if it sees the attack
containment
• Lost Assets
Assets can be misplaced or stolen by end users and employees, and
when these events occur, several questions must be answered.
Assets can be laptops, tablets, mobile phones, desktops, printers,
hard drives, and other types of removable or portable storage.
Attempting to contain these attacks involves the following important
steps:
1. Reporting to Policy
2. Wiped remotely
Eradication, Recovery, and Post-incident
Review
• Eradication is the process of removing all the remnants of a
cyberattack. This starts once systems known to be compromised are
available to be taken offline so that eradication can occur. Removing
files and reversing registry and configuration changes malware and
attackers made during the attack are addressed.
• Once all the affected machines are identified and isolated and
forensic backups are completed, the company can address
weaknesses exploited by the attackers. These vulnerabilities are
patched, and insecure configurations repaired.
Eradication, Recovery, and Post-incident
Review
• Eradication Techniques.
• Malware Artifacts
Antivirus solutions removed files and fixed changes made to
operating systems by malicious software.
Some Malware can only be removed by:
1. Taking the machine offline by removing the network cable
2. Booting the machine in safe mode
3. Using the Malware removal tool
4. Rebooting the machine and confirming that the infection is gone
Business continuity
STRATEGY
Introduction
• BCM strategy should be aligned with business and IT strategies to ensure
that regulatory and legal requirements are met. BCM policies and
procedures should incorporate the necessary controls to ensure that data
integrity and privacy are not compromised during recovery efforts.
• While developing business continuity strategy, the following should be
focused:
1. Business processes and operations
2. Users
3. Data center
4. Networks
5. Facilities
6. Supplies
7. Data (off-site storage of backup data and applications)
Introduction
• The following factors pose a large challenge in the choice of appropriate
BCM strategies:
1. Presence in multiple locations
2. Availability of recovery options such as owned, leased, shared or mobile facilities
3. Increasing number of threats, risks and vulnerabilities
4. Complexity of external dependencies on supply chain channel
Since data centers face a significant risk from fire, they typically have sophisticated fire suppression systems, generally one of two
types: gas-based systems and water-based systems.
The Auditor should Ensure that fire suppression systems are protecting the data center from fire. All data centers should have a fire
suppression system to help contain fires. Most systems are gas-based or water-based and often use multistage processes, in which
the first sensor (usually a smoke sensor) activates the system and a second sensor (usually a heat sensor) causes a discharge of
either water or gas.
• Gas-Based Systems Varieties of gas-based fire suppression systems include CO2 FM-200 and CEA-410. Gas-based systems are
expensive and often impractical, but their use does not damage electronic equipment.
• Water-Based Systems Water-based systems are less expensive and more common but can cause damage to computer
equipment. To mitigate the risk of damaging all the computer equipment in a data center or in the extended area of a fire, fire
suppression systems are designed to drop water from sprinkler heads only at the location of the fire
Test Steps for Auditing Data Centers
Data Center Operations Effective data center operations require strict
adherence to formally adopted policies, procedures, and plans.
the areas that should be covered include the following:
• Roles and responsibilities of data center personnel
• Segregation of duties of data center personnel
• Facility and equipment maintenance
Test Steps for Auditing Data Centers
Data Center Operations Effective data center operations require strict adherence
to formally adopted policies, procedures, and plans. The areas that should be
covered include the following:
• Roles and responsibilities of data center personnel
The Auditor should ensure that roles and responsibilities of data center personnel
are clearly defined.
• Segregation of duties of data center personnel
The Auditor should verify that duties and job functions of data center personnel are
segregated appropriately.
• Facility and equipment maintenance
The Auditor should verify that data center facility-based systems and equipment
are maintained properly by reviewing maintenance logs for critical systems and
equipment
Test Steps for Auditing Data Centers
Disaster Recovery Planning: The goal of disaster recovery planning is to reconstitute systems efficiently following a disaster, such as a
hurricane or flood .
• The Auditor should ensure that a disaster recovery plan (DRP) exists and is comprehensive and that key employees are aware of their roles
in the event of a disaster. If a disaster strikes your only data center and you don’t have a DRP, the overwhelming odds are that your
organization will suffer a large enough loss to cause bankruptcy. Disaster recovery, therefore, is a serious matter.
• An auditor who is auditing an organization’s disaster recovery plan should also interview personnel who participate in Disaster Recovery
• The Auditor should verify that the DRP covers all systems and operational areas. It should include a formal schedule outlining the order in
which systems should be restored and detailed step-by-step instructions for restoring critical systems.
• The Auditor should verify that the DRP identifies a critical recovery time period during which business processing must be resumed before
suffering significant or unrecoverable loss. Validate that the plan provides for recovery within that time period.