Sunday, May 8, 2016

Week 8 - Using Risk management tools.

     While researching the last two assignments about Threat Modeling and Threat Analysis, I did some reading on Risk Management tools and came across several.  The one that stood out more to me is the OCTAVE method which stands for "Operationally Critical Threat, Asset and Vulnerability Evaluation".  It was designed and developed at the CERT Coordination Center at Carnegie Mellon University and is a very good method to Assess and manage risks in any size organization.


slideshare.net



This risk based security assessment planning approach can help all businesses to get a better understanding of what threats and risks they are faced with (Please see NIST-SP 800-30. Risk Management Guide for Information Technology Systems) .  It is a self-directed method that requires the business to oversee and maintain the threat evaluation process and make informed and unbiased decisions that will strengthen the organization’s security presence. 

   To get started, an analysis team is put together; this team includes people from many different areas of the business.   Some of the functions of this team is to:
  • Identify IT related assets.
  • Target the critical assets that the business has judged to be crucial.
  • Determine the Risks that are associated with the assets.
  • Evaluate and protect the key assets.
  • Communicate a plan to safeguard the assets.


Itgovernanceusa.com. 2003


 There are normally 8 processes in the OCTAVE method but it has been broken down to 3 phases to simplify the process.

Phase 1 – Initial security planning is designed and developed.
o   What is important?
o   What is the current state of asset?
o   How are the assets being protected?
o   Describe the requirements needed for securing critical assets.
o   Create the threat profile per asset.
               
Phase 2 – Identify Infrastructure risks and vulnerabilities.
o   Evaluate the IT infrastructure.
o   Identify classes of IT equipment relevant to each critical asset.
o   Team can now evaluate the asset and how resistant it is to potential attacks.

Phase 3 – Design and implement security planning.
o   Decide what to do about the identified risks for each asset.
o   Create and design an asset protection scheme for the network.
o   Create a risk mitigation plan for each asset and for the network as a whole.

       It isn’t possible for any business to fully be risk free, but they can take steps to minimize and even mitigate the threats that are facing them.  Utilizing Risk Management techniques and programs, businesses can identify, categorize, assess and implement strategic planning to help alleviate potential vulnerabilities and threats within their networks to minimize losses. 

No comments:

Post a Comment