CRISC 6e Domain 1-2017
CRISC 6e Domain 1-2017
11 ©Copyright
©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
Task to Knowledge Statements
How does Task 1.1 relate to each of the following knowledge statements?
6.6 Threats and vulnerabilities A project will be directly impacted by the assets involved
related to project and and the degree of protections that are required to safeguard
program management the asset from known vulnerabilities and threats.
12 ©Copyright
©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
Task to Knowledge Statements
How does Task 1.1 relate to each of the following knowledge statements?
14. Organizational structures Organizational structure, both within the risk management
function as well as in the enterprise overall, play a role in
how an organization goes about determining the assets and
what vulnerabilities exist and threats are possible.
13 ©Copyright
©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
Task to Knowledge Statements
How does Task 1.1 relate to each of the following knowledge statements?
16. Organizational assets (e.g., The asset inventory should include people, processes and
people, technology, data, technology. Processes and technology may be either
trademarks, intellectual tangible or intangible.
property) and business
processes, including enterprise
risk management (ERM)
17. Organizational policies and Managerial assets/controls include company policies and
standards standard operating procedures.
14 ©Copyright
©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
A Structured Methodology
The process of IT risk management should follow a structured
methodology based on good practices and a desire to seek
continuous improvement.
When beginning a risk management effort, the risk
practitioner should review the current risk management
practices of the organization in relation to the processes of risk
identification, assessment, response and monitoring.
Use of good practices can assist in the development of a
consistent, enterprisewide risk management program.
• Insurance companies
26 ©Copyright
©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
Discussion Question
An enterprise expanded operations into Europe,
Asia and Latin America. The enterprise has a
single-version, multiple-language employee
handbook last updated three years ago. Which of
the following is of MOST concern?
A. The handbook may not have been correctly translated
into all languages.
B. Newer policies may not be included in the handbook.
C. Expired policies may be included in the handbook.
D. The handbook may violate local laws and regulations.
27 ©Copyright
©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
Discussion Question
Which of the following is the BEST approach
when conducting an IT risk awareness
campaign?
A. Provide technical details on exploits.
B. Provide common messages tailored for different
groups.
C. Target system administrators and help desk staff.
D. Target senior managers and business process
owners.
28 ©Copyright
©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
Task 1.2
Risk factors A condition that can influence the frequency and magnitude
and, ultimately, the business impact of IT-related events or
scenarios
6.2 Threats and vulnerabilities An enterprise must identify potential threats and
related to third-party vulnerabilities introduced through relationships with all
management third parties. This has become especially important given
the continued growth of outsourcing and off-shoring, along
with the increased scrutiny being placed on third parties by
regulators.
6.3 Threats and vulnerabilities Data classification is foundational to data protection and
related to data management determination of the best protection is based on a solid data
management program.
32 ©Copyright
©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
Task to Knowledge Statements
How does Task 1.2 relate to each of the following knowledge statements?
6.6 Threats and vulnerabilities Every project schedule should contain work breakdown
related to project and sections (WBS) to ensure that project-related
program management vulnerabilities and threats are identified and assessed.
33 ©Copyright
©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
Task to Knowledge Statements
How does Task 1.2 relate to each of the following knowledge statements?
6.9 Threats and vulnerabilities Having a process in place to assess emerging technologies
related to emerging to identify threats and vulnerabilities before the
technologies organization invests in their deployment is key to
providing more secure solutions.
34 ©Copyright
©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
The Risk Environment
An enterprise needs to know its own weaknesses, strengths,
vulnerabilities and the gaps in the security fabric.
To determine this, the entire risk environment must be evaluated.
Elements to consider include the following:
– The context, criticality and sensitivity of the system or process being
reviewed
– The dependencies and requirements of the system or process being reviewed
– The operational procedures, configuration and management of the system or
technology
– The training of the users and administrators
– The effectiveness of the controls and monitoring of the system or business
process
– The manner in which data and system components are decommissioned
The likelihood
or probability
of an attack
is influenced by the
following:
– The attacker’s
level of
motivation
– The skills and
tools available to
an attacker
– The presence of a
vulnerability
44 ©Copyright
©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
Discussion Question
The likelihood of an attack being launched
against an enterprise is MOST dependent
upon:
A. The skill and motivation of the potential attacker.
B. The frequency that monitoring systems are
reviewed.
C. The ability to respond quickly to any incident.
D. The effectiveness of the controls.
45 ©Copyright
©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
Discussion Question
Risk scenarios should be created
PRIMARILY based on which of the
following?
A. Input from senior management
B. Previous security incidents
C. Threats that the enterprise faces
D. Results of the risk analysis
46 ©Copyright
©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
Task 1.3
24. Characteristics of inherent Inherent risk is the risk by design of a given process or
and residual risk technology. Current risk is the risk of an adverse event
occurring despite the current controls in place
28. Information security Risk scenarios must consider the impacts to a given asset
concepts and principles, should the requirements of confidentiality (excessive or
including confidentiality, inappropriate access), integrity (unapproved or
inappropriate alteration or removal) and/or availability
integrity and availability of
(unscheduled downtime, system lockouts or failures)
information cannot be met.
50 ©Copyright
©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
The Risk Scenario
A risk scenario is a description of a possible
event whose occurrence will have an uncertain
impact on the achievement of the enterprise’s
objectives.
Risk scenario development provides a way of
conceptualizing risk useful in the process of risk
identification.
Risk scenarios are also used to document risk in
relation to business objectives or operations
impacted by events, making them useful as the
basis for quantitative risk assessment.
51 ©Copyright 2015 ISACA. All rights reserved.
Risk Scenario Structure
57 ©Copyright
©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
Discussion Question
When developing IT-related risk scenarios
with a top-down approach, it is MOST
important to identify the:
A. Information system environment
B. Business objectives
C. Hypothetical risk scenarios
D. External risk scenarios
58 ©Copyright
©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
Discussion Question
Risk scenarios enable the risk assessment
process because they:
A. cover a wide range of potential risk.
B. minimize the need for quantitative risk analysis
techniques.
C. segregate IT risk from business risk for easier risk
analysis.
D. help estimate the frequency and impact of risk.
59 ©Copyright
©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
Task 1.4
23. Principles of risk and Each risk scenario should be assigned to a risk owner to
control ownership make sure the scenario is thoroughly analyzed.
36. IT risk management best Using risk management practices like risk scenarios bring
practices clarity to the risk management process. The effectiveness
of practices such as the development of risk scenarios
relies on participation by all the parties that engage in a
given process under review.
63 ©Copyright
©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
Stakeholder Roles
Defining the roles of stakeholders involved in risk
management aids in creating a foundation for risk
management across the enterprise.
Individuals involved in the risk management process
may fill one of four roles, referred to with the acronym
“RACI.” A given stakeholder may be designated as
follows:
– Responsible for managing the risk
– Accountable for the risk management effort
– Consulted to provide support and assistance to the risk
management effort
– Informed so they may evaluate or monitor the effectiveness
of the risk management effort
64 ©Copyright 2015 ISACA. All rights reserved.
Who Owns Risk?
Ownership of risk is the responsibility of the owners of
the assets, which, in most cases is senior management.
Management must often evaluate and accept risk when
they make a decision to:
– Invest.
– Take on a new line of business.
– Develop a new product.
– Open a new office.
– Hire a new employee.
– Invest in new hardware or software.
– Upgrade existing applications.
– Implement new controls.
65 ©Copyright 2015 ISACA. All rights reserved.
The RACI Model
The purposes of the RACI model are to clearly
show:
– The relationships between the various stakeholders
– The interaction between the stakeholders
– The roles that each stakeholder plays in the
successful completion of the risk management
effort
R – Responsible
A – Accountable
C – Consulted
I – Informed
Collect risk
I A C R
data
Deliver the
I A I R
risk report
Prioritize risk
A I R C
response
Monitor risk I A R C
Task 1.4
Identify key stakeholders
The Big Picture
for IT risk scenarios to help Effective risk
establish accountability. governance
ensures that risk
management practices
are fully embedded in
the enterprise.
Activity 1
Activity 2
Activity 3
Activity 4
Activity 5
71 ©Copyright
©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
Discussion Question
Which of the following activities provides the
BEST basis for establishing risk ownership?
A. Documenting interdependencies between
departments
B. Mapping identified risk to a specific business
process
C. Referring to available RACI charts
D. Distributing risk equally among all asset owners
72 ©Copyright
©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
Discussion Question
Which of the following is MOST important
for effective risk management?
A. Assignment of risk owners to identified risk
B. Ensuring compliance with regulatory
requirements
C. Integration of risk management into operational
processes
D. Implementation of a risk avoidance strategy
73 ©Copyright
©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
Task 1.5
7. Methods to identify risk Several sources that can aid in risk identification include:
vendor documents, industry bulletins, policy and procedure
review, press releases, breach and vulnerability reporting
services, and many more.
10. Risk events/incident When building risk scenarios, one must not only consider a
concepts (e.g., contributing single asset being impacted by a single event, but also
conditions, lessons learned, cascading and considering incidents. Include these
complex scenarios in the risk register.
loss result)
77 ©Copyright
©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
The Risk Register
A risk register is a listing of all risk identified
for the enterprise.
The risk register records:
– All known risk
– Priorities of risk
– Likelihood of risk
– Potential risk impact
– Status of the risk mitigation plans
– Contingency plans
– Ownership of risk
78 ©Copyright 2015 ISACA. All rights reserved.
Risk Register Purpose
The purpose of a risk register is to consolidate
risk data into one place and permit the tracking
of risk.
The risk register allows management to refer
to a single document to do the following:
– Gain insight into the outstanding risk issues.
– Learn about the status of risk mitigation efforts.
– Become aware of the emergence of newly
identified and documented risk.
Task 1.5
Establish an IT risk register to The Big Picture
help ensure that identified IT risk The IT risk management
function benefits from
scenarios are accounted for and continuous improvement.
incorporated into the The risk register documents
enterprisewide risk profile. current knowledge about an
identified risk, useful for
future consideration.
Risk owner
Event
Asset/Resource
Timing
85 ©Copyright
©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
Discussion Question
Which of the following statements BEST
describes the value of a risk register?
A. It captures the risk inventory.
B. It drives the risk response plan.
C. It is a risk reporting tool.
D. It lists internal risk and external risk.
86 ©Copyright
©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
Discussion Question
Which of the following information in the risk
register BEST helps in developing proper risk
scenarios? A list of:
A. potential threats to assets.
B. residual risk on individual assets.
C. accepted risk.
D. security incidents.
87 ©Copyright
©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
Task 1.6
Risk capacity The objective amount of loss an enterprise can tolerate without
risking its continued existence
Risk tolerance The acceptable level of variation that management is willing to allow
for any particular risk as the enterprise pursues its objectives
Enterprise A further development of the enterprise goals into tactical targets and
objectives desired results and outcomes
12. Risk appetite and tolerance Risk appetite is the amount of risk a company is willing to
achieve in pursuit of reaching its organizational goals. Risk
tolerance, determined by the risk owner, is the acceptable
degree of variation that an organization may accept for a
particular asset at a particular point in time.
24. Characteristics of inherent Residual risk is the risk remaining after mitigation and is
and residual risk the risk upon which management will base final risk
acceptance.
91 ©Copyright
©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
Risk Appetite
In an organization, risk appetite is used in the
following ways:
– It is defined and communicated by senior
management.
– It serves to set the boundary around satisfactory
levels of risk.
– It is translated into standards and policies designed
to ensure that the risk level is contained within the
boundaries set by the risk appetite.
Task 1.6
Identify risk appetite and tolerance The Big Picture
defined by senior leadership and Effective IT risk
key stakeholders to ensure management maintains
alignment with business a focus on enterprise
objectives. mission, goals and
objectives.
95 ©Copyright
©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
Discussion Question
It is MOST important that risk appetite be
aligned with business objectives to ensure that:
A. resources are directed toward areas of low risk
tolerance.
B. major risk is identified and eliminated.
C. IT and business goals are aligned.
D. the risk strategy is adequately communicated.
96 ©Copyright
©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
Discussion Question
Who is accountable for business risk related to
IT?
A. The chief information officer (CIO)
B. The chief financial officer (CFO)
C. Users of IT services—the business
D. The chief architect
97 ©Copyright
©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
Task 1.7
15. Organizational culture, An organization’s culture, ethics and behavior toward risk
ethics and behavior taking, compliance and negative events needs to be
factored into how the risk awareness program is built,
marketed, delivered and managed over time.
101 ©Copyright
10 ©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
Risk Awareness
Knowledge of information security policies, standards and
procedures across the enterprise builds a risk-aware culture.
Awareness is a powerful tool in creating the culture, forming
ethics and influencing the behavior of the members of an
organization.
In a risk-aware culture, the following is likely to occur:
– Components of risk will be discussed openly
– Acceptable levels of risk will be better understood and
maintained
– All levels within an enterprise will be aware of how to respond to
adverse events
Task 1.7
Collaborate in the The Big Picture
development of a risk awareness A key objective of risk
program, and conduct training to governance is the
ensure that stakeholders integration of risk
understand risk and to promote a management across the
risk-aware culture. enterprise.
108 ©Copyright
10 ©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
Discussion Question
Which of the following is a PRIMARY
consideration when developing an IT risk
awareness program?
A. Why technology risk is owned by IT
B. How technology risk can impact each attendee’s
area of business
C. How business process owners can transfer
technology risk
D. Why technology risk is more difficult to manage
compared to other risk
109 ©Copyright
10 ©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
Discussion Question
Which of the following is the GREATEST
benefit of a risk-aware culture?
A. Issues are escalated when suspicious activity is
noticed.
B. Controls are double-checked to anticipate any
issues.
C. Individuals communicate with peers for
knowledge sharing.
D. Employees are self-motivated to learn about costs
and benefits.
110 ©Copyright
11 ©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
Learning Objective 1
119 ©Copyright
11 ©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.
Discussion Question
Which of the following is MOST important to
determine when defining risk management
strategies?
A. Risk assessment criteria
B. IT architecture complexity
C. An enterprise disaster recovery plan (DRP)
D. Organizational objectives
120 ©Copyright
12 ©Copyright
20152015
ISACA.
ISACA.
All rights
All rights
reserved.
reserved.