risk assessment rolf sture normann cisa, crisc, 27001 lead implementer secretary for information...

24
Risk assessment Rolf Sture Normann CISA, CRISC, 27001 Lead implementer Secretary for information security in HE Norway, UNINETT

Upload: benjamin-reynard-thornton

Post on 19-Jan-2016

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Risk assessment Rolf Sture Normann CISA, CRISC, 27001 Lead implementer Secretary for information security in HE Norway, UNINETT

Risk assessmentRolf Sture Normann CISA, CRISC, 27001 Lead implementer

Secretary for information security in HE Norway, UNINETT

Page 2: Risk assessment Rolf Sture Normann CISA, CRISC, 27001 Lead implementer Secretary for information security in HE Norway, UNINETT

Risk assessment?

Identify wich assets we have and what can happens to them that have a negative impact on the informations

• Confidentiality

• Integrity

• Availability

Assess the risk – combination of impact and likelihood (asset value) for each event

Evaluate and treat the risk by implementing proper controls that reduce likelihood and/or impact the incident will cause

Bring the risk to a accepted level

Page 3: Risk assessment Rolf Sture Normann CISA, CRISC, 27001 Lead implementer Secretary for information security in HE Norway, UNINETT

Why do risk assessment?

Comply with regulations and laws

To keep a trust between the registrant and the registered

Quality

Know witch assests you have

Important part of the information security!

Page 4: Risk assessment Rolf Sture Normann CISA, CRISC, 27001 Lead implementer Secretary for information security in HE Norway, UNINETT

We do it every day…

What is our descision based on?..not documented and structured

Page 5: Risk assessment Rolf Sture Normann CISA, CRISC, 27001 Lead implementer Secretary for information security in HE Norway, UNINETT

Challenges

Time- and resource consuming

Need special knowledge or expensive consultant

Support from the management

Delivering services is more important than securing them?

Page 7: Risk assessment Rolf Sture Normann CISA, CRISC, 27001 Lead implementer Secretary for information security in HE Norway, UNINETT

Important topics in white paper

As easy as possible (but not easyer)

Get started, dont wait until you think you have the perfect system

Risk assessment for endusers and highly technical personell

Practical

• Planning

• Leadership

• Workshop

• Do methods really matter

• Report

Risk treatment

Page 8: Risk assessment Rolf Sture Normann CISA, CRISC, 27001 Lead implementer Secretary for information security in HE Norway, UNINETT

Risk process in the ISMS

Improvement

Planned activities

SCOPE GoalSTRATEGI Organizing

Accept criteria

Requirements/guidelines

Risk assesment

Risk managementControls/SOA

TrainingAssets

Year plan for CISOCourse/training AuditsROS Security culture

Security audit

Incidents

Incidents

Top 10 incidents

Managements review

Corrective decisions / actions

Governance documents

Impl

emen

ting

docu

men

ts a

nd ta

sks

Controlling activities

Yearly report for managements

rewiew

Corrections

Status report from CISO

Page 9: Risk assessment Rolf Sture Normann CISA, CRISC, 27001 Lead implementer Secretary for information security in HE Norway, UNINETT

Risk assessments different level

The business

Process 1 Process 2 Process 3 Process 4

System 1 System 2 System 3 System 4 System 5 System 6 System 7 System 8

OverallRisk assessment

Risk assessment for business processes

Risk assessment for systems

Infrastructure

Page 10: Risk assessment Rolf Sture Normann CISA, CRISC, 27001 Lead implementer Secretary for information security in HE Norway, UNINETT

The business

Helicopterview

What is the «built in» risks in our sector

What kind of information do we have

Facilities

Regions

Page 11: Risk assessment Rolf Sture Normann CISA, CRISC, 27001 Lead implementer Secretary for information security in HE Norway, UNINETT

Business processes

Assessing a specific business process

Ex. The research and development process

Different participants on different stages

Page 12: Risk assessment Rolf Sture Normann CISA, CRISC, 27001 Lead implementer Secretary for information security in HE Norway, UNINETT

Business systems

Scope

Usage og the system

What information

End users or superusers

Technical staff/operations

Administrators

System n

User perspective

Technical perspective

Page 13: Risk assessment Rolf Sture Normann CISA, CRISC, 27001 Lead implementer Secretary for information security in HE Norway, UNINETT

ROS-workshop

Workshop to find what events can occure and theirs impact.

Not to many participants.

One person with experience in risk assessments should facilitate the workshop.

A secretary who takes notes of the events

Try to involve persons witch makes a representative of your organisations use of the system/process

To avoid invole people that should have been involved can makes «enemies»

Page 14: Risk assessment Rolf Sture Normann CISA, CRISC, 27001 Lead implementer Secretary for information security in HE Norway, UNINETT

Workshop-planning

The scope

Who should attend

Dont create «enemies»

All types of users

Create a preparing document

Can be an eye opener (awareness)

Page 15: Risk assessment Rolf Sture Normann CISA, CRISC, 27001 Lead implementer Secretary for information security in HE Norway, UNINETT

Workshop - the meeting

What are risk assessment

Participant are important

Discuss the provided examples

One should write down the incidents coming up

Try to find out when to end this part

Likelihood and impact

Risk matrix and the values

Acceptable criteria

Page 16: Risk assessment Rolf Sture Normann CISA, CRISC, 27001 Lead implementer Secretary for information security in HE Norway, UNINETT

How often?

Should be done on a regular basis

ROS should be done after each changes in the system or environements that can affect the information security

Once a thorough ROS is done it is more effecient to use the last assessment as a base it will become less timeconsuming

Page 17: Risk assessment Rolf Sture Normann CISA, CRISC, 27001 Lead implementer Secretary for information security in HE Norway, UNINETT

Risk treatment

After the ROS is done it is crucial to treat the newly discovered risks. A Risk treatmentplan should be made. There should be based on the policy for treating risk.

Methods

Reduce (Mitigate)

Accept

Transfer

Avoid

Risk should be treated until it is acceptable due to accept criteria set by the management

Page 18: Risk assessment Rolf Sture Normann CISA, CRISC, 27001 Lead implementer Secretary for information security in HE Norway, UNINETT
Page 19: Risk assessment Rolf Sture Normann CISA, CRISC, 27001 Lead implementer Secretary for information security in HE Norway, UNINETT

Risikomatrisen

Page 20: Risk assessment Rolf Sture Normann CISA, CRISC, 27001 Lead implementer Secretary for information security in HE Norway, UNINETT

Likelihood scale

Page 21: Risk assessment Rolf Sture Normann CISA, CRISC, 27001 Lead implementer Secretary for information security in HE Norway, UNINETT

Impact scale

Page 22: Risk assessment Rolf Sture Normann CISA, CRISC, 27001 Lead implementer Secretary for information security in HE Norway, UNINETT

Workshop results

Page 23: Risk assessment Rolf Sture Normann CISA, CRISC, 27001 Lead implementer Secretary for information security in HE Norway, UNINETT

The report

Page 24: Risk assessment Rolf Sture Normann CISA, CRISC, 27001 Lead implementer Secretary for information security in HE Norway, UNINETT

ISMS HE sector in Norway