Risk Management
General guidelines regarding risk management used by NC3 are taken from the ISO/IEC 27005 standard, part of the ISO/IEC 27000 family of standards. ISO/IEC 27001 governs the implementation of an information security management system which must include a risk management procedure. Risk management is the approach specified in ISO/IEC 27001 which forms the basis of the security policy for the organisation concerned.
The diagram below outlines the risk management process.
Definition of the Context
To produce a risk analysis, first, you need to specify the basic criteria (risk assessment, impact, acceptance of risks, availability of resources, etc.), then you need to define the objective and the scope of the analysis. The definition of the context describes the environment and the subject of the risk management process.
The risk assessment criteria include:
- the strategic values of the processes
- asset criticality
- legal and contractual requirements
- the importance of CAI (confidentiality, availability, integrity)
- the expectations of the invested parties and their reputation
For a registration service, for example, the confidentiality criterion is less important than the integrity criterion. In certain business lines, some risks must be avoided at all costs. In others, some assets must be protected at all costs. These contextual values are defined during the assessment phase. They must be applied throughout the whole risk analysis.
The basic criteria must also be determined:
-
Impact criteria:
- How to express the degree of damage and the associated costs?
- How to express damage in terms of reputation or damage caused by legal consequences?
- What is the qualitative and quantitative scale?
- Risk acceptance criteria:
- Define acceptable levels of risk (potentially different for confidentiality, integrity, and availability).
- Define the objective and the scope of the risk analysis:
- Which assets must be included?
- What is the scope of the risk analysis?
- How to deal with risks within the scope?
- Definition of the organisation’s values:
- business line
- missions
- values
- structure
- sociocultural values
- limitations…
Then, the organisation of the risk analysis must be defined:
- management process
- actors and their respective roles
- escalation mechanisms
- relationships between actors and stakeholders
- records that need to be kept and are used to document the risk management process
Risk Identification
The purpose of risk identification is to determine the causes of impacts and understand how, where, and why this damage can occur. This is the preparation phase for the risk estimation itself. It proceeds as follows:
- Identification of assets:
- primary assets, such as business line processes and information
- secondary assets or support assets
- Identification of threats
- Identification of existing security measures
- Identification of vulnerabilities (inherent to the identification of risk specifics)
- Identification of impacts (consideration of impact criteria: see also classification)
As a result, it is possible to draw up a list of assets which require risk management.
Risk Estimation
Risk estimation is comprised of several phases:
- the choice of methodology
- estimation of the impacts
- estimation of the likelihood of occurrence
- estimation of the risk level
It involves calculating a value, in other words, an approximative level for identified risks, based on the method used (which must guarantee repeatability), by estimating the impacts as well as the likelihood of occurrence. (For example, an approximate impact (qualitative scale) is multiplied by the likelihood of occurrence (qualitative scale) to determine the risk estimation).
Asset ID | Asset name | Asset type | Imp. level | Threat | Threat name | threat level | Vulnerability | Vulnerability name | Vulne. level | Risk level | Comment |
---|---|---|---|---|---|---|---|---|---|---|---|
ASB01 | Administration premises. | Premises | 2 | ME11 | Fire | 1 | V001 | No emergency plan (evacuation, DRP possibility, etc.) | 2 | 4 | |
V002 | Vestry buildings (flooring, electrical plumbing, etc.) | 1 | 2 | ||||||||
V003 | Lack of fire-fighting facilities (extinguishers, sprinklers, gas, etc.) | 2 | 4 | ||||||||
ME12 | Water damage or flood zone | 2 | V002 | Vestry buildings (flooring, electrical plumbing, etc.) | 1 | 4 | |||||
V007 | Flood zone (river, valley, historic flood, etc.) | 2 | 8 |
Risk Assessment
During this stage, you will need to use the knowledge of the risk obtained from the risk analysis, and also take the entity’s contractual, legal and regulatory obligations into consideration. The estimated risks are prioritised in order of importance, based on the decisions made when defining the context of the risk analysis.
Asset ID | Asset name | Asset type | Imp. level | Threat | Threat name | threat level | Vulnerability | Vulnerability name | Vulne. level | Risk level | Comment |
---|---|---|---|---|---|---|---|---|---|---|---|
ASB01 | Administration premises | Premises | 2 | ME11 | Fire | 1 | V001 | No emergency plan (evacuation, DRP possibility, etc.) | 2 | 4 | |
V002 | Old buildings (flooring, electricity, plumbing, etc.) | 1 | 2 | ||||||||
V003 | Lack of fire-fighting facilities (extinguishers, sprinklers, gas, etc.) | 2 | 4 | ||||||||
ME12 | Water damage or flood zone | 2 | V002 | Old buildings (flooring, electricity, plumbing, etc.) | 1 | 4 | |||||
V007 | Flood zone (river, valley, historic flood, etc.) | 2 | 8 |
Risk Treatment
This final stage suggests the measures to be put in place. For this, the security measures need to be organised depending on:
- the measures to be considered;
- the order of importance and priorities.
The whole system is based on the ‘Return on Security Investment’ calculation – the income obtained from the implementation of risk reduction solutions. These calculations are based on the previously calculated ALE (‘Annualised Loss Expectancy’) and on the calculation of costs incurred to implement the solution.
The risk analysis method ends with the choice of treatment. The analysis must still be implemented and the methods applied. However, it does help with the implementation of an action plan.
There are four risk treatment options:
- ‘Risk reduction’, which consists of reducing the risk by choosing the appropriate security objectives and measures (See: Sectoral risk analysis – risk treatment);
- ‘Risk conservation’, which consists of accepting current risks without taking further action;
- ‘Risk refusal’, which consists of giving up the activity or domain at the source of the risk;
- ‘Risk transfer’ to a third party, using insurance coverage, for example.
Any resulting residual risk must be approved by the management board of the entity concerned.
Active number | Active label | Type of asset | Implication level | Threat | Libel threat | Threat level | Vulnerability | Vulnerability label | Vulnerability level | Risk level | Comment | Type of treatment | Measure 27002 | Risk targets |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
ASB01 | Administration premises | Premises | 2 | ME11 | Fire | 1 | V001 | No emergency plan (evacuation, DRP possibility, etc.) | 2 | 4 | ||||
V002 | Old buildings (flooring, electricity, plumbing, etc.) | 1 | 2 | |||||||||||
V003 | Lack of fire-fighting facilities (extinguishers, sprinklers, gas, etc.) | 2 | 4 | |||||||||||
ME12 | Water damage or flood zone | 2 | V002 | Old buildings (flooring, electricity, plumbing, etc.) | 1 | 4 | ||||||||
V007 | Flood zone (river, valley, historic flood, etc.) | 2 | 8 | T001 | x.y.z | 4 |
Risk Acceptance
Risk acceptance is the approval given by the management board of choices made during the risk treatment. The management board, therefore, agrees to the treatment plan, as well as to the residual risks.
Information Sharing
This is a continuous process that allows the exchange and sharing of information on the risks between the decision-makers and the stakeholders. The purpose of risk communication is to:
- reduce misunderstandings with decision-makers
- improve coordination for incident response
- share the results of the risk assessment and present the treatment plan
- gain new knowledge about security
- improve security awareness
Monitoring and re-examination
This process consists of monitoring and re-examining elements of the risk:
- asset values and categories
- impacts, threats, vulnerabilities, likelihoods of occurrence
- external elements (legal or environmental context)
- modification of the risk assessment approach (impact, assessment, risk acceptance criteria)
- etc.