Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
15 views49 pages

CRISCd-All Files

Uploaded by

Fares Salman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views49 pages

CRISCd-All Files

Uploaded by

Fares Salman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 49

CRISCc

Risk Response and Reporting


The Scope of Enterprise Architecture

o Risk practitioners need to understand


the scope of network and information
architecture
o Enterprise view of the architecture
allows you to see the link between IT
and the company’s strategic objectives
o Organizations commonly use EA
frameworks to help make it easier
The ”Four Are’s”

o Are we doing the right things?


o Are we doing them the right
way?
o Are we getting them done well?
o Are we seeing expected benefits?
Enterprise Architecture Categories

o Documentation
o Notation
o Process
o Organization
Architecture Frameworks

o TOGAF
o Zachman Framework
o DODAF
o FEAF
o SABSA
Hardware And Software In Operations Management

o Risk practitioners do not need to be


technical experts in the design,
implementation and support of IT
systems and applications
o Practitioners should have a general
understanding of networking,
applications, and IT systems
o There are certain areas that require
more attention than others
Hardware Concerns
o Obsolescence
o Misconfiguration
o Lack of secure configurations
o Physical loss or theft
o Physical access
o Network “sniffing”
o Component or system failure
o Supply chain management
Software Concerns

o Logic flaws or semantic errors


o Lack of patching
o Disclosure of sensitive
information
o Lack of version control
o Unnecessary services and
protocols running
o Lack of security software
updates
Areas Of Software Risk

o Applications
o Databases
o Operating Systems
o Software Utilities
Networking Fundamentals

o Computers abilities to communicate to


one another is fundamental to
Information Systems (IS)
o Most modern networks are digital
which are more resilient than analog
o Networks are special in the world of IT
risk management.
o Because they move data back and
forth, they are prime targets by threat
actors
Protocols and TCP/IP
o Networks use signals to transmit
data in small pieces that are put
back together at the receiving end
o The most important protocol to
understand is TCP/IP
o TCP/IP predates the OSI model
o The premise is still the same in
that you move down the model to
transmit and back up as you
receive it
Cabling and Infrastructure

o While wireless is hugely popular,


physical cabling is still very
useful
o Devices in the networking
infrastructure:
o Switches
o Wireless Access Point
o Routers
o Firewalls
Software Based Networking

o Domain Name System (DNS)


o Dynamic Host Configuration
Protocol (DHCP)
o Virtual Local Area Networks
(VLANs)
o Quality of Service (QoS)
Other Networking Terms

o Software Defined Networking


(SDN)
o Demilitarized Zones (DMZs)
o Virtual Private Networks (VPNs)
Project Management

o Project management is all about


communication, managing
stakeholders, and risk
o Large amounts of risk are involved in
scheduling, cost and quality
o Many IT projects fail due to unclear or
changing requirements, problems with
technology
Risk Responses For Project Management
o Project management
methodologies from waterfall to
Agile are well established
o Common risk responses:
o Change control boards
o Project task prioritization
o Risk management process
o Large projects can be aggregated
into Programs to help with
resource management
Disaster Recovery And Business Continuity

o Risk management considers the full


spectrum of risk from minor to
catastrophic impacts
o The business continuity process creates
a Business Continuity Plan (BCP) to
help with mitigating the risk
o BCPs provide sufficient levels of
functionality in operations when
disaster strikes
Business Continuity Plans
o BCPs come out of the Business
Impact Analysis
o The BIA establishes the recovery
point objectives (RPOs) and
recovery time objectives (RTOs)
o Environments with low RTOs have
high availability systems
o Environments with low RPOs have
high availability data architectures
Disaster Recovery

o Disaster recovery refers to the


recovery of business and IT
services following a disaster
o Completed within a defined
schedule and budget
o Flows from RTOs established by BIA
and built into BCP
o Should be a primary and alternate
for every activity
Risk In The Data Life Cycle

o Data typically follows a six-phase


lifecycle
o There are many caveats to the lifecycle
o For example, creation can be original
collection or synthesis from other data
Data Management Lifecycle

Creation

Destruction Storage

Archiving Use

Sharing
Data Management
o Data is one of business’ most
valuable assets
o To protect data you must first
identify it in terms of use and then
classify it in terms of value
o Data validation can be done with a
whitelist or blacklist
o Most important is control over the
permissions and authorization
levels
Risk In The System Development Lifecycle

o Systems exist in all organizations


o There is a lifecycle associated with
systems and their development
o SDLC can stand for Software
Development Lifecycle as well
o A SDLC is a methodology intended to
support effective project management
System Development Lifecycle

Initiation

Dev or
Disposal
Acquire

Operation Implement
Key Security Tasks

o Document the risk


o Security categorization
o What are the CIA requirements?
o Privacy impact assessment
o Vendor/Supplier risk assessment
o Waterfall or Agile methodology
Emerging Technologies And Risk

o Technology is constantly changing


and growing everywhere
o Pressure to implement new
technologies to “keep up” with the
competition is huge
o This can cause an organization to lose
track of its primary goals and
objectives
Emerging Technologies

o Omnipresent connectivity
o Bring Your Own Device (BYOD)
o Internet of Things (IoT)
o Deepfakes and AI
o Blockchain
Information Security Concepts

o The goal of risk management is to


make sure technology used in
organizations is:
o Adequately protected
o Reliable
o Secure
Information Security Concepts

o Risk based concerns include:


o Creating policies
o System identification for backups
o Assigning Risk ownership
o Reviewing regulatory needs
o Training your staff and admins
Information Security Concepts

o Practitioners should understand that


every system needs a system owner
o Most owners delegate down to
operations
o Transferrence of Responsibility DOES
NOT mean transferring accountability
o There can be different cultures within
an organization due to size and
complexity of groups/teams
Likelihood

o Likelihood (Probability) is the


measure of frequency of which
events occur
o Likelihood is affected by:
o Motivation
o Proximity
o Skill
o Volatility
o Visibility
The CIA Triangle (Iron Triangle)

o Practitioners need to understand the


CIA triad as all security risk derives
from these three principles
o Sometimes called the Iron Triangle
o There is a fourth principle in addition
to confidentiality, integrity and
availability: Nonrepudiation
o All are needed to perform successful
risk management
Confidentiality

o Confidentiality is all about the


secrecy and privacy of data
o Risk practitioners should be on the
lookout for policies or actions that
violate:
o Need to know
o Least privilege
Integrity

o All about protecting data from


improper modification, exclusion or
destruction
o Relies upon levels of error checking
and verification
o Principle of least privilege is critical
when identifying risk
Availability

o All about providing timely and


reliable access to information
o Systems and data need to be
highly available (HA)
o High availability can be expensive
and needs to be assessed with
CBA
o To identify potential risk, compare
current levels of availability to
desired levels (gaps=risk)
Other Aspects of CIA Triangle

o System Authorization
o Segregation of Duties (SoD)
o Cross-training and Job Rotation
Access Control

o Managing access to systems and data


is one of the most difficult risk areas
for a practitioner
o In order to help with this, there is the
concept of IAAA.
o Identification
o Authentication
o Authorization
o Accountability (Accounting)
Authentication

o The process of validating an


identity
o Something you know
o Something you have
o Something you are
o Changing passwords on a regular
basis is a risk response for this
part of IAAA
Authorization

o Authentication must occur first


o Systems then provide appropriate
authorized access
o Proper use of the “least privilege”
principle is vital here
o Isolation is important. Authorization
is typically granted for a limited
period and only from certain devices
or locations
Accountability

o Accountability is completed
through auditing
o Needs excellent systems logging
or recording activity
o Audit logs should NOT be
changeable by operations staff
(even admins)
What is Encryption?

o Mathematical means of altering data


from readable forms to unreadable
forms (ciphertext)
o Data encryption uses two forms:
o Symmetric
o Asymmetric
o Used primarily for confidentiality
Symmetric Key Cryptography

o Most common system in place is


Advanced Encryption Standard
(AES)
o Shorter keys are easier to crack
o Shares the same secret key
o Disadvantages:
oOne party delivers keys (SPOF)
oNo way to tell who orginated message
Asymmetric Key Cryptography
o Diffie and Hellman created a different
method called the Diffie-Hellman
model
o Two related keys are created: Private
and Public
o Public keys are freely distributed.
Private keys are only held by the
creators and receivers
o Disadvantages:
o Computer resource intensive
o Much slower than Symmetric
Digital Signatures

o Combines a hash function with


the ability of PKI to prove the
author’s identity
o Creates excellent nonrepudiation
o Digital signatures do NOT encrypt
the message…just the digest
o PKI uses Certificates to verify the
identity of the owner of a public
key
Core Concepts to Remember
o Symmetric keys are excellent for
confidentiality but difficult to manage
o Aysmmetric algorithms are much slower
but much more secure
o Using both is the secret
o Hashing algorithms can help make sure of
message integrity
o Certificates provide assurance that a public
key belongs to the right owner
Information Security Awareness and Training

o Familiarity with technology can help


reduce operation training costs but
increase security risk
o Threat actors know that human users
are the weakest link
o Social media has made people more
willing to share information openly
o Inadequate SoD and Least Privilege
has also caused risk
Best Practices For Security Awareness Training

o Practitioners need to review the


scope of information being trained
o Topics to cover:
o Social engineering
o How to alert internal security
o Policies and regulatory
requirements specific to certain job
roles
o Resilient people help create resilient
organizations
Data Privacy Fundamentals

o Practitioners should understand that


privacy is similar to confidentiality
o Difference between privacy and
confidentiality: Rights regarding the
handling and retention of a subject’s
PII (Personal Identifiable Information)
o These rights are still valid even if the
data is not in the subject’s control
Data Privacy Concepts

o Informed Consent
o Privacy Impact Assessment (PIA)
o Minimization
o Destruction
o Risk is involved in monitoring the
legal and regulatory requirements

You might also like