Download presentation
Presentation is loading. Please wait.
Published byDelphia Jordan Modified over 9 years ago
1
Managing Risk in Information Systems Strategies for Mitigating Risk
Lesson 5 Strategies for Mitigating Risk
2
Learning Objectives Describe concepts for planning risk mitigation throughout an organization. Describe concepts for implementing a risk mitigation plan.
3
Key Concepts Identifying the scope of a risk management plan
Best practices for planning risk mitigation Ways to prioritize risk management requirements Developing an organizational risk mitigation plan Best practices for implementing a risk mitigation plan
4
DISCOVER: CONCEPTS
5
Strategies of Risk Mitigation
Identify the cost of risk mitigation Determine loss if threat exploits vulnerability Conduct business impact analysis (BIA) Calculate maximum acceptable outage (MAO) Establish service level agreements Develop disaster recovery plan (DRP) National Institute of Standard and Technology Risk can be eliminated from the organization but at a high cost. Cost is an important factor of risk management. Before we can look at risk we must first know what will be lost if a threat exploits a vulnerability, which will result in a loss to an organization. To do this a risk assessment must be undertaken starting with an asset inventory, followed by a business impact analysis (BIA). The maximum acceptable outage (MAO) must also be calculated. Service level agreements and operational level agreements must be drawn up. Mission critical applications must be identified and disaster recovery plan (DRP’s) need to be developed. Many template are available to accomplish this National Institute of Standard and Technology(NIST) has many relating to organizational risk.
6
Scope of Risk Management
Critical business operations Customer service delivery Mission-critical business systems, applications, and data access Seven domains of a typical IT infrastructure Information systems security gap
7
Compliance Issues CIPA requires a TPM
Children's Internet Protection Act (CIPA) requires that K-12 schools and libraries in the United States use Internet filters and implement other measures to protect children from harmful online content as a condition for federal funding. It was signed into law on December 21, 2000, and was found to be constitutional by the United States Supreme Court on June 23, Other laws may require other controls
8
Creating a Risk Mitigation Plan
Complete a risk assessment Identify costs Perform cost-benefit analysis (CBA) Implement plan
9
Creating a Risk Mitigation Plan
High-level review of risk assessment Identify and evaluate relevant threats Identify and evaluate relevant vulnerabilities Identify and evaluate countermeasures Develop mitigating recommendations
10
Reviewing Risk Assessment Countermeasures
In-place countermeasures Planned countermeasures Approved countermeasures Overlapping countermeasures
11
Calculating Costs Initial purchase Facility Installation Training
12
Calculating Costs Look for hidden costs
Is extra power required to eliminate a single point of failure?
13
Time to Implement Simple configurations can be implemented in a shorter time period
14
Time to Implement Complex configurations More planning and time
15
DISCOVER: PROCESS 15
16
Identifying Critical Business Functions (CBFs)
Making a purchase
17
Identifying CBFs Receiving funds
18
Identifying CBFs Shipping products
19
Performing a Cost-Benefit Analysis
Identify losses you expect before, or without, a countermeasure Identify the losses you expect after implementing the countermeasure Calculating projected benefits: Loss Before Countermeasure ─ Loss After Countermeasure = Projected Benefits Determining value of countermeasure: Projected Benefits ─ Cost of Countermeasure = Countermeasure Value
20
DISCOVER: ROLES 20
21
Key Roles Involved with a Risk Management Plan
Chief executive officer (CEO) Chief operating officer (COO) Chief financial officer (CFO) Data owners and custodians IT management Human resources (HR) professionals Industry-specific management Corporate legal department Auditors
22
DISCOVER: CONTEXT 22
23
Risk Within the Seven Domains
User Domain— Risk here is a failure to follow or develop user policies relating to acceptable use policy (AUP) or Polices Workstation Domain— Risk here is a failure to follow or develop policies regarding the use of computing devices Local Area Network (LAN ) Domain—The risk involved here include the lack of controls placed on the LAN environment LAN-to-WAN Domain—A big risk here is the lack of controls on the organizations firewall or lack of controls in the demilitarized zone (DMZ) Remote Access Domain— Risk with access controls Wide-Area Network (WAN Domain)— Risk from a weak virtual private network (VPN) policy or controls System/Application Domain— Lack of controls placed on applications or systems
24
Risk Mitigation Best Practices
Review historical documentation Although risks change, many of the threats and vulnerabilities will be the same Include both a narrow and broad focus Identify specific risks and mitigation strategies and broaden the focus to include the entire organization
25
Risk Mitigation Best Practices
Ensure that governing laws are identified If you don’t know what laws apply, you won’t be in compliance Redo RAs when a control changes If a control changes, the original RA is no longer valid Include a cost-benefit analysis CBAs provide justification for controls and help determine their value
26
Implementing a Risk Mitigation Plan
Stay within budget Ensure costs calculated accurately Stay on schedule Use tools to manage project
27
DISCOVER: RATIONALE 27
28
Prioritizing and Analyzing Risk
Cost associated with the loss of a business component or process Loss of customer confidence Lack of compliance Lack of insurance to mitigate or transfer risk
29
Monitoring Implementation
Use project management tools
30
Summary Identifying the scope of a risk management plan
Best practices for planning risk mitigation Ways to prioritize risk management requirements Developing an organizational risk mitigation plan Best practices for implementing a risk mitigation plan
31
4/17/2017 OPTIONAL SLIDES
32
Assessing How Security Countermeasures/Safeguards Can Assist with Risk Mitigation
Controls are implemented at a point in time to reduce the risks at that time A control will attempt to mitigate risk by: Reducing the impact of threats to an acceptable level Reducing a vulnerability to an acceptable level Risk assessment (RA) is a point-in-time assessment
33
Identifying Risk Mitigation and Risk Reduction Elements
Account management controls Access controls Physical access Personnel policies Security awareness and training
34
Operational Impact Tradeoff with security:
The more secure a system, the harder it is to use The easier it is to use, the less secure it is Firewall implicit deny philosophy
35
Prioritizing Risk Elements
36
Following Up on the Risk Mitigation Plan
Ensure countermeasures are implemented POAM Ensure security gaps have been closed
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.