Stuff to Actually Memorise

What is GRC?

  • Set of processes and procedures used by an organisation to achieve business objectives, reduce uncertainty and act with integrity
  • Maintains the overall GRC of an organisation

NIST SP 800-30

Risk Identification

  1. System Characterisation
  2. Threat Identification
  3. Vulnerability Identification

Risk Assessment

  1. Control Analysis
  2. Likelihood Determination
  3. Impact Analysis
  4. Risk Determination

Risk Control

  1. Control Recommendations
  2. Result Documentation

Detailed Risk Identification

  1. Plan and organise the process
  2. Categorise system components
  3. Identify and categorise assets
  4. Classify and prioritise assets
  5. Identify and prioritise threats
  6. Specify system vulnerabilities

Risk Control Strategies

  1. Avoid/Defend — Prevent exploitation through ways such as implementing policies, conducting training and applying technology
  2. Transfer — Transfer the risk to another process, asset or organisation (i.e.: hiring a consultant; hiring a risk management firm)
  3. Mitigate — Reduce the impact of the vulnerability through planning & preparation (i.e.: IRP, DRP, BCP)
  4. Accept — Don’t do anything; Done when proven the most cost-effective option through ways such as CBA
  5. Terminate — Stop the business activity that introduces risk

Benefits of Effective IS Governance

  • Increase in share value
  • Optimises the allocation of limited security resources
  • Assurance that critical decisions are not based on faulty information
  • Protection from civil/legal liabilities

Outcomes of Effective IS Governance

  1. Strategic Alignment — Business strategies are aligned with objective
  2. Risk Management — Risk is kept to an acceptable level
  3. Value Delivery — Optimal IS investments to ensure reasonable profits
  4. Performance Measurement — Continuous monitoring to ensure objectives are met
  5. Resource Management — Effective management of limited resources
  6. Integration — External factors are integrated into processes; Smooth running from end-to-end

Risk Control Cycle

  1. Identify information assets
  2. Prepare RVR worksheet
  3. Develop control strategy and plan
  4. Implement control
  5. Access control
  6. Check if controls are adequate
  7. Plan for maintenance
  8. Measure risk to information assets
  9. Check if risk levels are acceptable

Formulas

Cost-Benefit Analysis

Risk

Risk Assessment

TVA Worksheet

  • Combines identified & prioritised information assets with identified & prioritised threats and identifies potential vulnerabilities in “triples”
  • Incorporates existing and planned controls

RVR Worksheet

  • Ranked Vulnerability Risk Worksheet
  • Assigns risk ratings to each uncontrolled asset-vulnerability pair

WFA Worksheet

  • Prioritises/ranks information assets according to their impact on certain criterias

Information Asset Classification Worksheet

  • List of all information assets with their values/impact on the organisation

Roles & Responsibilities

Board of Directors

  • Establish tone of risk / risk appetite

CISO

  • Conduct risk assessments
  • Develop security policies

Security Steering Committee

  • Reviews and advises security initiatives to ensure they align with business objectives
  • Improve current security strategies

Executive Management Team

  • Implement and integrate security policies with business objectives

Risk Assessment

Factors for Likelihood Determination

  • Threat-source motivation and capability
  • Nature of vulnerability
  • Effectiveness and existence of current control measures

Factors for Impact Determination

  • Loss of tangible assets or resources
  • Violate, harm or impede an organisation’s mission, reputation or interests
  • Injury/Loss of life (for medium and high only)

Risk Control

Control Methods

  • Technical — Safeguards implemented into software, firmware or hardware
  • Non-technical — Management and operational controls

Control Categories

  • Preventive — Stops security violation attempts
  • Detective — Alerts when a security violation is attempted

Qualitative vs Quantitative Assessments

  • Qualitative — Uses characteristics and non-numerical measures; Uses scales to remove the need for determining/estimating values
  • Quantitative — Uses values/estimates for assessment; i.e.: CBA

Cost-Benefit Analysis

  • Evaluates the planned control to see if it’s worth the cost incurred

Best Practices

  • Security efforts that provide a superior level of information protection

Benchmarking

  • Seeking out, studying and adopting practices by other companies
  • Metric-based or process-based measurements
  • 2 categories — Standard of due care & best practices

Problems w. Benchmarking

  • Organisations do not talk with each other (biggest issue)
  • No two organisations are identical
  • Best practices are constantly evolving
  • Best practices might not be future-proof