neupart webinar 1: four shortcuts to better risk assessments

28
Webinar: 4 shortcuts to professional IT risk assessments Presented by Lars Neupart Founder, CEO of Neupart Informa9on Security Management [email protected] twiBer @neupart

Upload: lars-neupart

Post on 18-Nov-2014

95 views

Category:

Technology


1 download

DESCRIPTION

At this webinar, you will learn how to perform risk assessments and risk analysis based on the most commonly used standards for information security. You will learn about ● Business Impact Assessments ● Vulnerability Assessments ● Threat Catalogues ● Risk Reporting ● Carrying out a risk assessment project ● Responsible shortcuts to better risk assessments Language: English For a full list of Neupart's webinars and other events visit www.neupart.com/events

TRANSCRIPT

Page 1: Neupart webinar 1: Four shortcuts to better risk assessments

 Webinar:  4  shortcuts  to  professional  IT  risk  assessments  

Presented  by  Lars  Neupart    Founder,  CEO  of  Neupart    Informa9on  Security  Management  [email protected]  twiBer  @neupart    

Page 2: Neupart webinar 1: Four shortcuts to better risk assessments

About  Neupart  •  ISO  27001  certified  company.  

•  Provides  SecureAware®,    an  all-­‐in-­‐one,  efficient  ISMS  solution  allowing  organizations  to  automate  IT  governance,  risk  and  compliance  management.    

•  “The  ERP  of  Security”  

•  HQ  in  Denmark,  subsidiary  in  Germany  and  a  200+  customer  portfolio  covering  a  wide  range  of  private  enterprises  and  governmental  agencies.    

IT  GRC  =  IT  Governance,    

Risk  &  Compliance  Management  

Page 3: Neupart webinar 1: Four shortcuts to better risk assessments

Program  Introduc9on  

Business  Impact  Assessments  

Threat  Catalogues  

Vulnerability  Assessments  

Carrying  out  a  risk  assessment  project  

Summary  of  shortcuts  to  beBer  risk  assessments    

Page 4: Neupart webinar 1: Four shortcuts to better risk assessments

Selected  ISO  2700x  standards  

ISO  27000  • Overview  and  vocabulary  

ISO27001  • Informa9on  Security  Management  Systems  –  Requirements  

ISO27002  • Code  of  prac9ce  for  informa9on  security  management  

ISO  27003    • ISMS  Implementa9on  Guidelines  

ISO  27004  • Informa9on  Security  Management  -­‐  Measurement    

ISO27005  • Informa9on  Security  Risk  Management  

ISO27006  • Requirements  for  bodies  providing  audit  and  cer9fica9on    

+  +  +  +    

Page 5: Neupart webinar 1: Four shortcuts to better risk assessments

ISO  31000  Enterprise  Risk  Management  

Plan  

Do  

Check  

Act  

Page 6: Neupart webinar 1: Four shortcuts to better risk assessments

Comparing  ISO  27005,  NIST  SP800-­‐30  ISO  27005   NIST  SP800-­‐30  

Context  establishment              

Identification  of  assets   System  Characterization  Identification  of  threats   Threat  Identification  

Identification  of  existing  controls   Vulnerability  Identification  Identification  of  vulnerabilities   Control  Analysis  Identification  of  consequences      

       Assessment  of  consequences   Likelihood  Determination  

Assessment  of  incident  likelihood   Impact  Analysis  Risk  estimation   Risk  Determination  

       Risk  evaluation      

       Risk  treatment   Control  Recommendations  Risk  acceptance      

Risk  communication   Results  Documentation  

Page 7: Neupart webinar 1: Four shortcuts to better risk assessments

ISO  27005  is:  •  A  threat  based  risk  

management  guidance  •  Considered  best  practice  •  Well  aligned  with  other  

risk  frameworks  •  A  method  to  comply  

with  ISO  27001  risk  management  requirements  

ISO  27005  

Page 8: Neupart webinar 1: Four shortcuts to better risk assessments

Business  Impact  Assessment  ISO  27005:  Estimate  the  business  impact  from  breaches  on  CIA  (confidentiality,  integrity,  availability)    •  Financial  terms    

– Revenue,  cash  flow,  costs,  liabilities  •  Non-­‐financial  terms:  

–  Image,  non-­‐compliance,  competitiveness,  service  level  

Page 9: Neupart webinar 1: Four shortcuts to better risk assessments

Example:  Business  Impact  Assessment  

Example  from  SecureAware  

Page 10: Neupart webinar 1: Four shortcuts to better risk assessments

Threats  

Page 11: Neupart webinar 1: Four shortcuts to better risk assessments

Example:  Threat  Catalogue  

Example  from  SecureAware  

Page 12: Neupart webinar 1: Four shortcuts to better risk assessments

Not  all  assets  burn  (hint:  link  your  threats  to  asset  types)  

Example  from  SecureAware  

Page 13: Neupart webinar 1: Four shortcuts to better risk assessments

Reduce Likelihood Proactive

Security IT Security Policy Compliance & Awareness Change Management Operating Procedures Access Control Monitoring System Redundancy Firewall Antivirus

Reactive Security

Reduce Consequence

IT Service Continuity Teams IT Service Continuity Strategy

IT Service Continuity Plans Disaster Recovery Procedures

Emergency Operations Flexibility

Standby Equipment Virtualization

Backup

IT  Risk  Management  -­‐  Explained  

Risk

Prioritization

Incident Likelihood

Incident Consequence

Threat Frequency

Threat Effect

Threats

Preventive Measures

Corrective Measures

Page 14: Neupart webinar 1: Four shortcuts to better risk assessments

Vulnerability  &  control  environment  assessment  

Administra9ve  Measures  

Physical  /  Technical  Measures  

Preven9ve  Measures  

Correc9ve  Measures  

Firewalls   An9virus  

Server  Clusters  

RAID   Backup/Restore  Standby  

Equipment  Virtualiza9on  

Security  Policy  

System  Documenta9on  

Awareness  

Compliance  Checks  

Alarm  System  

Fire  Suppression  

Logging  Change  

Management  

IT  Service  Con9nuity  Plan  

Disaster  Recovery  Procedures  

Business  Con9nuity  Strategy  

Redundancy  

Access  Control  System  

Standby  Site  

Server  snapshots  

Recommenda9on:  Base  assessments  on  a  maturity  level  scale  

Monitoring  

Assess  how  well  your  controls  addresses  relevant  threats  

Page 15: Neupart webinar 1: Four shortcuts to better risk assessments

Example:  Vulnerability  Assessments  

Example  from  SecureAware  

Page 16: Neupart webinar 1: Four shortcuts to better risk assessments

Assets:  Dependency  Hierarchy  Business  Impact  values  are  inherited  downwards  

Vulnerability  values  are  inherited  upwards  

Server  01  Virtual  Server  

SAN  01  Data  Staorage  

HP  DL380  Hardware    unit  

Data  Center  Oslo  Datacenter  

Finance  DB  Database  

ERP  IT  Service  

Dynamics  AOS  Business  system  

HP  DL380  Hardware  unit  

Server  02  Virtual  Server  

Finance  

Business  Process  

Page 17: Neupart webinar 1: Four shortcuts to better risk assessments

Business  Processes  &  IT  Services  

Business Process 1

IT Services (on premise)

Business Process 2

IT Services from vendor, e.g.

cloud

Business  Impact  Scores  Inherits  Downwards  

Vulnerability  Scores  Inherits  Upwards  

Page 18: Neupart webinar 1: Four shortcuts to better risk assessments

High  level  assesments  •  You  can  postpone  the  more  

detailed  assessments  and  analysis.  

•  Begin  at  the  top:  –  High  level  BIA  can  combine  

different  impact  types  e.g.  revenue,  cost,  cashflow,  image  in  a  single  question.  

–  High  level  vulnerability  assessments  can  combine  different  threats  in  a  single  question  

Page 19: Neupart webinar 1: Four shortcuts to better risk assessments

An  assessment  project  step-­‐by-­‐step  

What  business  processes,  IT  

Services,  etc.  to  include  (assets)?  

Who  to  involve  in  the  assessments?  

Perform  interviews  /  collect  data  

Repor9ng  and  communica9on  

Page 20: Neupart webinar 1: Four shortcuts to better risk assessments

Risk  Management  •  Risk  Owner  •  (Assets)  •  Threats  •  Business  Impact  

Assessment  •  Vulnerability  Assessment  •  Reporting  &  evaluating  •  Treating  (Accept,  Reduce,  Share,  

Avoid)  

Page 21: Neupart webinar 1: Four shortcuts to better risk assessments

Keep  it  simple:  

Risk  Management    =  

Risk  Assessments    +    

Risk  Treatment  

Page 22: Neupart webinar 1: Four shortcuts to better risk assessments

Neuparts  4  responsible  short-­‐cuts.    PS!  They  also  apply  to  the  2013  edition  of  ISO  27001  J  

Do  not  use  complete  threat  catalogue  on  each  of  your  assets  (relevant  threats  

depends  on  asset  type)  

1:  Not  all  threats  

• Inheritance:  Business  impact  values  inherits  downwards  

• Vulnerability  scores  inherits  upwards  

• Asset  dependencies  /  Hierarchy  

2:  Inheritance  

Assess  your  most  important  assets  first    (you  can  add  more  

later)  

3:  Not  all  assets  

• Make  overall  assessment  first  –  refine  later  

• Example:  Assess  threats  combined  first  –  individually  later  

4:  High  level  first  

Page 23: Neupart webinar 1: Four shortcuts to better risk assessments

Ressources    •  White  papers  and  presentations  at  Neupart  blog    

–  treatingrisk.blogspot.com    

•  Educational  Webinars  and  SecureAware  Live  Demos  at  our  website:  –  neupart.com/events      

 •  SecureAware  ISMS  tool  

–  www.neupart.com/products    –  ISO  27001  Policy  &  Compliance  Management  ,  IT  Risk  Management  –  Out  of  the  box  solution;  Free  trial  

Page 24: Neupart webinar 1: Four shortcuts to better risk assessments

More  webinars:  Treating  Risks  -­‐    today  4pm  CET:    

SecureAware  Live  Demo  –  tomorrow  2pm  neupart.com/events  

     

INFORMATION SECURITY MANAGEMENT

Page 25: Neupart webinar 1: Four shortcuts to better risk assessments

Asset  Management  

Page 26: Neupart webinar 1: Four shortcuts to better risk assessments

Your  best  and  worst  assets    

Example  from  SecureAware  

Page 27: Neupart webinar 1: Four shortcuts to better risk assessments

Risk  Management  Projects  

Example  from  SecureAware  

Page 28: Neupart webinar 1: Four shortcuts to better risk assessments

Key  features  summary  –  Risk  TNG  •  Business  impact  assessment    •  Vulnerability  assessment  •  Role  based  interviews  •  Flexible  asset  inventory  for  any  type  of  asset,  i.e.  

business  processes,  IT  services,  and  their  relationships  •  Customizable  threat  catalogue    •  Risk  dash  boards  &  flexible  reporting  options  •  Risk  treatment  processes  •  API