NIST SP Guidebook
NIST SP Guidebook
NIST SP 800-30 is a publication that provides guidance on performing risk assessments. It outlines
strategies for identifying, analyzing, and remediating risks. Organizations use NIST SP 800-30 to gain
insights into the potential likelihood and severity of risks—helping them make informed decisions
about allocating resources, implementing controls, and prioritizing remediation efforts.
This four page document is adapted from NIST SP 800-30 Rev. 1. The term "Rev. 1" signifies that it is
the first updated version of this publication. NIST occasionally revises its documents to incorporate
new information, reflect changes in technology and regulatory requirements, or address feedback.
Note: NIST's Computer Security Resources Center contains more information on SP 800-30 Rev. 1.
Threat sources
NIST SP 800-30 defines and categorizes threat sources as entities or circumstances that can
negatively impact an organization's information systems. This information is useful for identifying and
assessing potential risks. When referencing it, consider the intent/capabilities of either internal and
external threat sources.
Note: The following table lists a few possible threat sources that could compromise a publicly
accessible database server.
1
● Hacktivist
● Advanced persistent threat
(APT)
Threat events
NIST SP 800-30 defines and categorizes threat events as actual instances where a threat source
exploits a vulnerability and causes damage or harm to an organization's information systems. This
information is useful for gaining insights into the types of risks that assets face. More effective
controls and countermeasures can be identified by understanding possible threat events,
Note: The following table lists just a few possible threat events that could compromise a publicly
accessible database server.
Examples Description
Perform reconnaissance and surveillance of Threat source examines and assesses the
organization company's vulnerabilities over time using various
tools (e.g., scanning, physical observation).
Obtain sensitive information via exfiltration Threat source installs malicious software on
organizational systems to locate and acquire
2
sensitive information.
Install persistent and targeted network sniffers Threat source installs software designed to
on organizational information systems. collect (sniff) network traffic over a continued
period of time.
Conduct Denial of Service (DoS) attacks. Threat source sends automated, excessive
requests to overwhelm the system's operating
capabilities.
Consider the intent/capabilities of a threat source and potential threat events when producing a
likelihood score.
3
High 3 Threat source is almost certain to initiate a security
event. An event could have multiple, severe, or
catastrophic effects on business operations and
assets.
Consider the business impact of threat events when producing a severity score.