Security Risk Management Jamie Sharp CISSP Security Advisor Microsoft Australia.

Slides:



Advertisements
Similar presentations
Web Security for Network and System Administrators1 Chapter 1 Introduction to Information Security.
Advertisements

PROJECT RISK MANAGEMENT
Session 3: Security Risk Management Eduardo Rivadeneira IT Pro Microsoft Mexico.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Service Design – Section 4.5 Service Continuity Management.
Security Controls – What Works
Security Risk Management Steve Lamb Technical Security Advisor
Introducing Computer and Network Security
By: Ashwin Vignesh Madhu
Managing Project Risk.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Quantitative.
Security Risk Management Paula Kiernan Ward Solutions.
Introduction to Network Defense
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
1 Security Risk Management Liping Cai 02/01/2006.
SEC835 Database and Web application security Information Security Architecture.
S/W Project Management
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Project Risk Management. The Importance of Project Risk Management Project risk management is the art and science of identifying, analyzing, and responding.
Chapter 11: Project Risk Management
EQAA 11th Session Jamil Kalat-Malho Jong Ho Lee
1 Introduction to Security Chapter 5 Risk Management: The Foundation of Private Security.
Information Systems Security Risk Management. © G. Dhillon All Rights Reserved Alignment Glenmeade Vision To provide a personalized experience to our.
Discussing “Risk Analysis in Software Design” 1 FEB Joe Combs.
Chapter 10 Contemporary Project Management Kloppenborg
Security Risk Management
Centro de Estudos e Sistemas Avançados do Recife PMBOK - Chapter 4 Project Integration Management.
Risk Management Project Management Digital Media Department Unit Credit Value : 4 Essential Learning time : 120 hours.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
Risk Assessment and Management. Objective To enable an organisation mission accomplishment, by better securing the IT systems that store, process, or.
RISK MANAGEMENT Copyright (c) 2011 FutureSoft ( 1.
Management & Development of Complex Projects Course Code MS Project Management Perform Qualitative Risk Analysis Lecture # 25.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Lecture # 17 PRM 702 Project Risk Management Ghazala Amin
Risk Management CS5493. Risk Management The process of ● identifying, ● assessing, ● prioritizing, and ● mitigating risks.
Lesson 20-Risk Management. Background  Risk management can be described as a decision-making process.  Effective risk management avoids costly oversights.
Introducing Project Management Update December 2011.
Chapter 11: Policies and Procedures Security+ Guide to Network Security Fundamentals Second Edition.
Introduction to Information Security
Microsoft Belgium Security Summit Georges Ataya S olvay B usiness S chool, ISACA Belux Detlef Eckert Microsoft EMEA.
Project Risk Management Planning Stage
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Introduction to Project Management Chapter 9 Managing Project Risk
(c) 2007 Charles G. Gray1 IT Risk Management, Planning and Mitigation TCOM 5253 / MSIS 4253 Detailed Risk Analysis 18 October 2007 Charles G. Gray.
Information Security Governance and Risk Chapter 2 Part 2 Pages 69 to 100.
Chapter 3: Business Continuity Planning. Planning for Business Continuity Assess risks to business processes Minimize impact from disruptions Maintain.
Info-Tech Research Group1 Manage the IT Portfolio World Class Operations - Impact Workshop.
COST BENEFITS OF IMPLEMENTING CREDIT CARD DATABASE TOKENIZATION USING FAIR CASE STUDY SHARED COURTESY OF RISKLENS CONFIDENTIAL - FAIR INSTITUTE
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Info-Tech Research Group1 Manage IT Budgets & Cost World Class Operations - Impact Workshop.
Company LOGO. Company LOGO PE, PMP, PgMP, PME, MCT, PRINCE2 Practitioner.
RISK MANAGEMENT: CONTROLLING RISK IN INFORMATION SECURITY By Collin Donaldson.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Business Continuity Planning 101
Info-Tech Research Group1 1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition.
CompTIA Security+ Study Guide (SY0-401)
11.1 Plan Risk Management The process of defining how to conduct risk management activities for a project Detailed risk planning enhances the overall probability.
TOPIC 3 RISK MANAGEMENT.
Security Threats Severity Analysis
Project Management Process Groups
Cybersecurity Threat Assessment
Effective Risk Management in Decision Making Process
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

Security Risk Management Jamie Sharp CISSP Security Advisor Microsoft Australia

Session Overview Security Risk Management Concepts Security Risk Management Prerequisites Assessing Risk Conducting Decision Support Implementing Controls and Measuring Program Effectiveness

Agenda Security Risk Management Concepts Security Risk Management Prerequisites Assessing Risk Conducting Decision Support Implementing Controls and Measuring Program Effectiveness

Why Develop a Security Risk Management Process? Security risk management –A process for identifying, prioritizing and managing risk to an acceptable level within the organization A formal security risk management process can address the following: –Threat response time –Regulatory compliance –Infrastructure management costs –Risk prioritization and management

Critical Success Factors Executive sponsorship Well defined list of stakeholders Organizational maturity Open communication and teamwork Holistic view of the organization Security risk management team authority

Risk Management Strategies Reactive –A process that responds to security events as they occur Proactive –A process that reduces the risk of new vulnerabilities in your organization

Risk Assessment Methodologies BenefitsDrawbacks Quantitative Risks prioritized by financial impact; assets prioritized by their financial values Results facilitate management of risk by return on security investment Results can be expressed in management-specific terminology Impact values assigned to risks are based upon subjective opinions of the participants Very time-consuming Can be extremely costly Qualitative Enables visibility and understanding of risk ranking Easier to reach consensus Not necessary to quantify threat frequency Not necessary to determine financial values of assets Insufficient granularity between important risks Difficult to justify investing in control as there is no basis for a cost-benefit analysis Results dependent upon the quality of the risk management team that is created

Microsoft Security Risk Management Process Implementing Controls 3 Conducting Decision Support 2 Measuring Program Effectiveness 4 Assessing Risk 1

Agenda Security Risk Management Concepts Security Risk Management Prerequisites Assessing Risk Conducting Decision Support Implementing Controls and Measuring Program Effectiveness

Risk Management vs. Risk Assessment Risk ManagementRisk Assessment Goal Manage risks across business to acceptable level Identify and prioritize risks Cycle Overall program across all four phases Single phase of risk management program ScheduleScheduled activity Continuous activity Alignment Aligned with budgeting cycles Not applicable

Communicating Risk Well-Formed Risk Statement (Exposure) Well-Formed Risk Statement (Exposure) Impact What is the impact to the business? Probability How likely is the threat given the controls? Asset What are you trying to protect? Threat What are you afraid of happening? Vulnerability How could the threat occur? Mitigation What is currently reducing the risk?

Starting Points NIST –Security Self-Assessment Guide for Information Technology Systems (SP ) IT Governance Institute –Control Objectives for Information and Related Technology (CobiT) ISO –ISO ISO Code of Practice for Information Security Management SAI Global –AS/NZS 4360: Risk Management –AS/NZS : Information Security Management Microsoft Security Risk Management Guide –

Risk Management Maturity Self- Assessment LevelState 0 Non-existent 1 Ad hoc 2 Repeatable 3 Defined process 4 Managed 5 Optimized

ExecutiveSponsor “What's important?” IT Group “Best control solution” Information Security Group “Prioritize risks” Roles and Responsibilities Operate and support security solutions Operate and support security solutions Design and build security solutions Define security requirements Measure security solutions Measure security solutions Assess risks Assess risks Determine acceptable risk Determine acceptable risk

Agenda Security Risk Management Concepts Security Risk Management Prerequisites Assessing Risk Conducting Decision Support Implementing Controls and Measuring Program Effectiveness

Overview of the Assessing Risk Phase Implementing Controls 3 Conducting Decision Support 2 Measuring Program Effectiveness 4 Assessing Risk 1 Plan risk data gatheringPlan risk data gathering Gather risk dataGather risk data Prioritize risksPrioritize risks

Understanding the Planning Step The primary tasks in the planning step include the following: –Alignment –Scoping –Stakeholder acceptance –Setting expectations

Facilitated Data Gathering Elements collected during facilitated data gathering include: –Organizational assets –Asset description –Security threats –Vulnerabilities –Current control environment –Proposed controls Keys to successful data gathering include: –Meet collaboratively with stakeholders –Build support –Understand the difference between discussing and interrogating –Build goodwill –Be prepared

Identifying and Classifying Assets An asset is anything of value to the organization and can be classified as one of the following: –High business impact –Moderate business impact –Low business impact

Organizing Risk Information Use the following questions as an agenda during the facilitated discussions: –What asset are you protecting? –How valuable is the asset to the organization? –What are you trying to avoid happening to the asset? –How might loss or exposures occur? –What is the extent of potential exposure to the asset? –What are you doing today to reduce the probability of the extent of damage to the asset? –What are some actions that you can take to reduce the probability in the future?

Estimating Asset Exposure Exposure: The extent of potential damage to an asset Use the following guidelines to estimate asset exposure: –High exposure: severe or complete loss of the asset –Medium exposure: limited or moderate loss –Low exposure: minor or no loss

Estimating Threat Probability Use the following guidelines to estimate probability for each threat and vulnerability identified: –High threat: Likely—one or more impacts expected within one year –Medium threat: Probable—impact expected within two to three years –Low threat: Not probable—impact not expected to occur within three years

Scenario 1: Facilitating a Risk Discussion at Woodgrove Bank Woodgrove Bank is a consumer financial institution in the process of conducting a Security Risk Management project –Task One: Determining Organizational Assets and Scenarios Interest Calculation Systems Customer Personally Identifiable Information (PII) Reputation Consumer financial data—High Business Impact (HBI)

Scenario 1: Facilitating a Risk Discussion at Woodgrove Bank Woodgrove Bank is a consumer financial institution in the process of conducting a Security Risk Management project –Task Two: Identifying Threats Threat of a loss of integrity to consumer financial data

Scenario 1: Facilitating a Risk Discussion at Woodgrove Bank Woodgrove Bank is a consumer financial institution in the process of conducting a Security Risk Management project –Task Three: Identifying Vulnerabilities Theft of financial advisor credentials by trusted employee abuse using non-technical attacks, for example, social engineering or eavesdropping Theft of financial advisor credentials off local area network (LAN) hosts through the use of outdated security configurations Theft of financial advisor credentials off remote, or mobile, hosts as a result of outdated security configurations

Scenario 1: Facilitating a Risk Discussion at Woodgrove Bank Woodgrove Bank is a consumer financial institution in the process of conducting a Security Risk Management project –Task Four: Estimating Asset Exposure Breach of integrity through trusted employee abuse: –Damaging, but not severe. Each financial advisor can only access customer data that he/she manages. Breach of integrity through credential theft on LAN hosts: –May result in a severe, or high, level of damage. Breach of integrity through credential theft on mobile hosts: –Could have a severe, or high, level of damage. The discussion group notes that the security configurations on remote hosts often lag behind LAN systems.

Scenario 1: Facilitating a Risk Discussion at Woodgrove Bank Woodgrove Bank is a consumer financial institution in the process of conducting a Security Risk Management project –Task Five: Identifying Existing Controls and Probability of Exploit Agreement that their remote hosts, or mobile hosts, do not receive the same level of management as those on the LAN.

Scenario 1: Facilitating a Risk Discussion at Woodgrove Bank Woodgrove Bank is a consumer financial institution in the process of conducting a Security Risk Management project –Task Six: Summarizing the Risk Discussion Risk Assessment Facilitator summarizes the discussion and highlights the assets, threats, and vulnerabilities discussed.

Scenario 1: Facilitating a Risk Discussion at Woodgrove Bank Woodgrove Bank is a consumer financial institution in the process of conducting a Security Risk Management project –Task One: Determining Organizational Assets and Threats –Task Two: Identifying Threats –Task Three: Identifying Vulnerabilities –Task Four: Identifying Asset Exposure –Task Five: Identifying Existing Controls and Probability of Exploit –Task Six: Summarizing the Risk Discussion

Defining Impact Statements Impact data includes the following information:

Scenario 2: Defining an Impact Statement For Woodgrove Bank Asset Name Asset Class DID Level Threat Description Vulnerability Description ER (H,M,L) IR (H,M,L) Consumer financial investment data HBIHost Unauthorized access to consumer data through theft of Financial Advisor credentials Theft of credentials of managed LAN client via outdated security configurations HH Consumer financial investment data HBIHost Unauthorized access to consumer data through theft of Financial Advisor credentials Theft of credentials off managed remote client via outdated security configurations HH Consumer financial investment data HBIData Unauthorized access to consumer data through theft of Financial Advisor credentials Theft of credentials by trusted employee abuse, via non-technical attacks LM

Understanding Risk Prioritization End of risk prioritization Detailed level risk prioritization Conduct detailed- level risk prioritization Review with stakeholders Summary level risk prioritization Conduct summary- level risk prioritization Start risk prioritization

Conducting Summary-Level Risk Prioritization The summary-level prioritization includes the following: 1.Determine impact level 2.Estimate summary-level probability 3.Complete the summary-level risk list 4.Review with stakeholders 1 High. Likely—one or more impacts expected within one year Medium. Probable—impact expected within two to three years Low. Not probable—impact not expected to occur within three years 2 4 3

Scenario Three: Summary-Level Risk Prioritization at Woodgrove Bank Task One: Determine Impact Level –Trusted Employee Theft Impact HBI asset class *Low Exposure = Moderate Impact –LAN Host Compromise Impact HBI asset class *High Exposure = High Impact –Remote Host Compromise Impact HBI asset class *High Exposure = High Impact

Scenario Three: Summary-Level Risk Prioritization at Woodgrove Bank Task Two: Estimate Summary-Level Probability –Trusted Employee Theft Probability Low –LAN Host Compromise Probability Medium –Remote Host Compromise Probability High

Scenario Three: Summary-Level Risk Prioritization at Woodgrove Bank Task Three: Complete the Summary-Level Risk List –Trusted Employee Theft Risk Moderate Impact *Low Probability = Low –LAN Host Compromise Risk High Impact *Medium Probability = High –Remote Host Compromise Risk High Impact *High Probability = High –Enter Results in the Impact Statement Spreadsheet

Scenario Three: Summary-Level Risk Prioritization at Woodgrove Bank Task Four: Review With Stakeholders –Trusted Employee abuse risk is rated as Low in the summary level risk list and does not need to graduate to the detailed level risk prioritization step –LAN and remote host compromise risks are both rated as high and so are then prioritized at the detailed level

Scenario Three: Summary-Level Risk Prioritization at Woodgrove Bank Task One: Determine Impact Level Task Two: Estimate Summary Level Probability Task Three: Complete the Summary-Level Risk List Task Four: Review With Stakeholders

Conducting Detailed-Level Risk Prioritization The following four tasks outline the process for building a detailed-level list of risks: 1.Determine impact and exposure 2.Identify current controls 3.Determine probability of impact 4.Determine detailed risk level Use the Detailed-Level Risk Prioritization template (SRJA3-Detailed Level Risk Prioritization.xls)

Scenario Four: Detailed-Level Risk Prioritization at Woodgrove Bank Task One: Determine Impact and Exposure –LAN Host Compromise Exposure Rating: 4 (80%) HBI = 10 Impact Rating: 10 *80% = 8 –Remote Host Compromise Exposure Rating: 4 (80%) HBI = 10 Impact Rating: 10 *80% = 8 –Impact Range = Between 7-10 which compares to High

Scenario Four: Detailed-Level Risk Prioritization at Woodgrove Bank Task Two: Identify Current Controls –Financial Advisors can only access accounts they own; thus, the exposure is less than 100 percent. – notices to patch or update hosts are proactively sent to all users. –Antivirus and patch updates are measured and enforced on the LAN every few hours. This control reduces the time window when LAN hosts are vulnerable to attack.

Scenario Four: Detailed-Level Risk Prioritization at Woodgrove Bank Task Three: Determine Probability of Impact –LAN and remote hosts: Likely that all vulnerability attributes in the High category will be seen inside and outside Woodgrove’s LAN environment in the near future. Vulnerability value = 5 for both risks –Control Effectiveness: LAN: Result of Control Effectiveness Questions = 1 Remote: Result of Control Effectiveness Questions = 5 –Total Probability Rating: (Sum of Vulnerability and Control Effectiveness) LAN = 6 Remote = 10

Scenario Four: Detailed-Level Risk Prioritization at Woodgrove Bank Task Four: Determine Detail Risk Level –Impact Rating *Probability Rating LAN: 8 *6 = 48 Remote Hosts: 8 *10 = 80 Both rate an overall risk of High

Scenario Four: Detailed-Level Risk Prioritization at Woodgrove Bank Task One: Determine Impact and Exposure Task Two: Identify Current Controls Task Three: Determine Probability of Impact Task Four: Determine Detail Risk Level

Quantifying Risk The following tasks outline the process for determining the quantitative value: –Assign a monetary value to each asset class –Input the asset value for each risk –Produce the single-loss expectancy value (SLE) –Determine the annual rate of occurrence (ARO) –Determine the annual loss expectancy (ALE)

Scenario Five: Quantifying Risk For Woodgrove Bank Task One: Assign Monetary Values to Asset Classes –Using 5% Materiality Guideline for valuing assets –Net Income: $200 Million annually –HBI Asset Class: $10 Million (200 *5%) –MBI Asset Class: $5 Million (based on past spending) –LBI Asset Class: $1 Million (based on past spending)

Scenario Five: Quantifying Risk For Woodgrove Bank Task Two: Identify the Asset Value –Consumer financial data = HBI Asset Class –HBI = $10 Million –Asset Value = $10 Million

Scenario Five: Quantifying Risk For Woodgrove Bank Task Three: Produce the Single Loss Expectancy Value (SLE) 80% Exposure Value $8 SLE 4 4 Exposure Rating $10 Asset Class Value LAN Host Risk ($ in millions) Remote Host Risk ($ in millions) Risk Description High Business Impact Value = $MExposure RatingExposure Factor % 5100 Asset Class480 HBI Value$ M360 MBI Value$ M / 2240 LBI Value$ M / 4120 Estimated Risk Value =Asset Class Value * Exposure Factor % = SLE

Scenario Five: Quantifying Risk For Woodgrove Bank Task Four: Determine the Annual Rate of Occurrence (ARO) –LAN Host ARO: Based on the qualitative assessment of Medium probability, the Security Risk Management Team estimates the risk to occur at least once in two years; thus, the estimated ARO is 5. –Remote Host ARO: Based on the qualitative assessment of High probability, the Security Risk Management Team estimates the risk to occur at least once per year; thus, the estimated ARO is 1. Qualitative Rating DescriptionARO rangeDescription Examples HighLikely>=1 Impact once or more per year MediumProbable.99 to.33 At least once every 1-3 years Low Not probable.33 At least once greater than 3 years

Scenario Five: Quantifying Risk For Woodgrove Bank Task Five: Determine the Annual Loss Expectancy (ALE) (SLE *ARO) Risk Description Asset Class Value Exposure Rating Exposure Value SLEAROALE LAN Host Risk ($ in millions) $10480%$80.5$4 Remote Host Risk ($ in millions) $10480%$81

Scenario Five: Quantifying Risk For Woodgrove Bank Task One: Assign Monetary Values to Asset Classes Task Two: Identify the Asset Value Task Three: Produce the Single Loss Expectancy Value (SLE) Task Four: Determine the Annual Rate of Occurrence (ARO) Task Five: Determine the Annual Loss Expectancy (ALE) (SLE *ARO)

Assessing Risk: Best Practices Analyze risks during the data gathering process Conduct research to build credibility for estimating probability Communicate risk in business terms Reconcile new risks with previous risks

Agenda Security Risk Management Concepts Security Risk Management Prerequisites Assessing Risk Conducting Decision Support Implementing Controls and Measuring Program Effectiveness

Overview of the Decision Support Phase Implementing Controls 3 Conducting Decision Support 2 Measuring Program Effectiveness 4 Assessing Risk 1 1.Define functional requirements 2.Identify control solutions 3.Review solution against requirements 4.Estimate degree of risk reduction 5.Estimate cost of each solution 6.Select the risk mitigation strategy

Identifying Output for the Decision Support Phase Key elements to gather include: –Decision on how to handle each risk –Functional requirements –Potential control solutions –Risk reduction of each control solution –Estimated cost of each control solution –List of control solutions to be implemented

Considering the Decision Support Options Options for handling risk: ATAM –Accept –Transfer –Avoid –Mitigate

Security risk management team Securitysteeringcommittee Step 1: Define Functional Requirements Select the risk mitigation Select the risk mitigationstrategy 6 Mitigationowner Identify control solutions Identify control solutions 2 2 Define Definefunctionalrequirements 1 Estimate Estimate cost of each solution 5 Estimate degree of risk reduction 4 Review solutions against requirements 3

Step 2: Identify Control Solutions Security risk management team Securitysteeringcommittee Select the risk mitigation Select the risk mitigationstrategy 6 Mitigationowner Identify control solutions Identify control solutions 2 Define Definefunctionalrequirements 1 Estimate Estimate cost of each solution 5 Estimate degree of risk reduction 4 Review solutions against requirements 3

Step 3: Review Solutions Against Requirements Security risk management team Securitysteeringcommittee Select the risk mitigation Select the risk mitigationstrategy 6 Mitigationowner Identify control solutions Identify control solutions 2 Define Definefunctionalrequirements 1 Estimate Estimate cost of each solution 5 Estimate degree of risk reduction 4 Review solutions against requirements 3

Step 4: Estimate Degree of Risk Reduction Security risk management team Securitysteeringcommittee Select the risk mitigation Select the risk mitigationstrategy 6 Mitigationowner Identify control solutions Identify control solutions 2 2 Define Definefunctionalrequirements 1 Estimate Estimate cost of each solution 5 Estimate degree of risk reduction 4 Review solutions against requirements 3

Step 5: Estimate Cost of Each Solution Security risk management team Securitysteeringcommittee Select the risk mitigation Select the risk mitigationstrategy 6 Mitigationowner Identify control solutions Identify control solutions 2 Define Definefunctionalrequirements 1 Estimate Estimate cost of each solution 5 Estimate degree of risk reduction 4 Review solutions against requirements 3

Step 6: Select the Risk Mitigation Strategy Security risk management team Securitysteeringcommittee Select the risk mitigation Select the risk mitigationstrategy 6 Mitigationowner Identify control solutions Identify control solutions 2 Define Definefunctionalrequirements 1 Estimate Estimate cost of each solution 5 Estimate degree of risk reduction 4 Review solutions against requirements 3

Conducting Decision Support: Best Practices Assign a security technologist to each risk Set reasonable expectations Build team consensus Focus on the amount of risk after the mitigation solution

Agenda Security Risk Management Concepts Security Risk Management Prerequisites Assessing Risk Conducting Decision Support Implementing Controls and Measuring Program Effectiveness

Implementing Controls 3 Conducting Decision Support 2 Measuring Program Effectiveness 4 Assessing Risk 1 Implementing Controls Seek a holistic approachSeek a holistic approach Organize by Defense- in-DepthOrganize by Defense- in-Depth

Organizing the Control Solutions Critical success determinants to organizing control solutions include: –Communication –Team scheduling –Resource requirements

Organizing by Defense-in-Depth Network Host Application Data Physical

Implementing Controls 3 Conducting Decision Support 2 Measuring Program Effectiveness 4 Assessing Risk 1 Measuring Program Effectiveness Develop scorecardDevelop scorecard Measure control effectivenessMeasure control effectiveness

Developing a Security Risk Scorecard for Your Organization A simple security risk scorecard organized by the Defense-in-Depth layers: FY05 Q1FY05 Q2FY05 Q3FY05 Q4 Physical HM Network MM Host MM Application MH Data LL Risk Levels (H, M, L)

Measuring Control Effectiveness Methods for measuring the effectiveness of implemented controls include: –Direct testing –Submitting periodic compliance reports –Evaluating widespread security incidents

Summary Decide on risk management methodology Determine your maturity level Conduct risk assessment Conduct decision support Implement controls & measure effectiveness

Next Steps Australia Security Portal Microsoft Security Risk Management Guide MOF - Security Management Additional security tools and content