CRISC Domain2 Part1
CRISC Domain2 Part1
April 2025
Quiz
The MAIN objective of IT risk management is to:
A. Bringing all locations into conformity with the aggregate requirements of all governmental
jurisdictions
B. Bringing all locations into conformity with a generally accepted set of industry good practices
C. Establishing a baseline standard incorporating the requirements all jurisdictions have in
common
D. Establishing baseline standards for all locations and add supplemental standards as required
Quiz
Which of the following would be the BEST approach for a global enterprise that is subject to
regulation by multiple governmental jurisdictions with differing requirements?
A. Bringing all locations into conformity with the aggregate requirements of all governmental
jurisdictions
B. Bringing all locations into conformity with a generally accepted set of industry good practices
C. Establishing a baseline standard incorporating the requirements all jurisdictions have in
common
D. Establishing baseline standards for all locations and add supplemental standards as required
Quiz
Who MUST give final sign-off on the IT risk management plan?
A. Mid-level managers
B. Senior managers
C. Frontline employees
D. The incident response team
Quiz
Which of the following groups would be the MOST effective in managing and executing an
enterprise’s risk program?
A. Mid-level managers
B. Senior managers
C. Frontline employees
D. The incident response team
Quiz
The board of directors of a one-year-old start-up company has asked the chief information
officer to create the enterprise’s IT policies and procedures, which will be managed and
approved by the IT steering committee.
The committee will make the IT decisions for the enterprise, including those related to the
technology budget.
The IT steering committee will be BEST represented by:
Risk Events
Risk Events
Contextual factors:
• Can be internal or external.
• Differ by the degree of control that an enterprise has over the respective factors.
Internal contexts are under the control of the enterprise, although they may not always be easy to
change. Examples:
• Enterprise goals and objectives. Strategic importance of IT for the business
• Complexity of IT. Complexity of the entity and degree of change
• Change management capability. Operating model. Strategic priorities. Culture of the enterprise
• Financial capacity
Risk Factors - 2
External contexts are factors outside of the enterprise’s control.
Examples include:
• Market and economic factors
• Rate of change in the market/product life cycle
• Industry and competition
• Geopolitical situation
• Regulatory environment
• Technology status and evolution
• The threat landscape
Risk Factors - 3
Capability factors
Ability to perform IT related activities.
Are critical to successful outcomes in managing risk.
Are embedded in tools, techniques, methods, and frameworks to define and improve IT-related
activities.
• How robustly do IT-related capabilities support enterprise objectives while managing the risk that
can jeopardize objectives? Examples:
• Evaluate, direct and monitor (EDM)
• Align, plan and organize (APO)
• Build, acquire and implement (BAI)
• Deliver, service and support (DSS)
• Monitor, evaluate and assess (MEA)
Threat Actors
A threat actor performs specific activities that result in an event (or action) occurring.
Threat actors may use one or many threat events to carry out their attacks against assets that fall within
their objectives, with each channel used to create the event known as a threat vector.
Cybercriminal (Threat Actor) ➔ Phishing Attack (Threat Event) ➔ Email Link (Threat Vector) ➔ Unpatched
Antivirus (Vulnerability) ➔ Data Breach (Risk) ➔ Customer Data (Asset)
Quiz
Earlier, a discussion was held about an incident in which an IT business function was impacted by
a cyber-attack that brought down a server whose functionality was not recoverable under the
business continuity plan.
What risk-associated role did the business continuity plan play in this incident?
A. Threat Vector
B. Vulnerability
C. Asset
D. Threat Actor
Quiz
Earlier, a discussion was held about an incident in which an IT business function was impacted by
a cyber-attack that brought down a server whose functionality was not recoverable under the
business continuity plan.
What risk-associated role did the business continuity plan play in this incident?
A. Threat Vector
B. Vulnerability
C. Asset
D. Threat Actor
Risk Identification, Analysis and Evaluation
Risk Identification
The first step in countering a threat is identifying it, so that the threat may be managed before
any threat events occur.
A. Historical methods
B. Penetration testing
C. Existing taxonomy
D. Systematic methods
Quiz
Earlier, a discussion took place about an incident in which an IT business function was
impacted by a cyber-attack that brought down a server whose functionality was not
recoverable under the business continuity plan.
What approach to risk identification would have best revealed this problem before the
incident occurred?
A. Historical methods
B. Penetration testing
C. Existing taxonomy
D. Systematic methods
Domain 2 - Agenda
Loss of essential services and disturbance due to radiation (electromagnetic radiation, thermal radiation,
electromagnetic pulses)
Unauthorized actions
Compromise of functions
Threat Landscape - 2
The risk practitioner should document all the threats by:
The organization should have controls in place effective from hiring selection through
termination:
➢ During Hiring
➢ During Employment
➢ During Termination
Internal Threats - 2
During Hiring
During Employment
The access to the systems, network, and facility has been revoked before the employee’s
departure.
External Threats
Threats to information systems from outside the enterprise can originate from anywhere and
may take several forms.
Finding the interconnected traces requires advanced analytical and AI/ML systems for many
enterprises. Requires awareness of a variety of degradations in much smaller fractions of
seconds.
Repeated alarms
Threat modeling helps to build systems with attention to defensive controls, built-in security
features, and proper placement within a strategy of overlapping defenses.
Threat modeling is done by mapping the potential methods, approaches, steps, and techniques
used by an adversary to perpetrate an attack.
The risk practitioner must think of as many of these methods and approaches as possible so
that adequate controls can be designed to meet the possible threats.
Impacts of Threat Modeling
To prevent threats from taking advantage, various threat-modeling methods can steer appropriate
responses.
▪ General Impact
▪ High-level Answers
General Impact
In general, threat modeling will:
• Create an abstraction of the system.
• Profile attackers, including goals, methods, and attacker skills.
• Create a catalog of potential threats.
Impacts of Threat Modeling - 2
High-level Answers
Threat modeling will provide high-level answers to basic questions:
• How often will a threat actor encounter assets at the vendor location?
• What is the danger of discovery posed to that threat actor while it is attempting to compromise those
assets?
• What perceived value may enterprise data at the third party hold for an adversary?
• What skills does an adversary need to succeed in compromising vendor systems and accessing
enterprise data?
• How much time does an adversary need to compromise systems and access data?
• What resources and materials does the adversary need?
• What level of effort is required overall from the threat actor to compromise the vendor?
Threat Modeling Methods
Several threat-modeling methods can be combined to create a more robust and well-rounded view of
potential threats.
Methods:
• STRIDE
• PASTA
• LINDDUN
• Attack Trees
• PnG
• Trike
• VAST
Threat Modeling Methods - 2
STRIDE (Spoofing identity, Tampering with data, Repudiation, Information Disclosure, Denial of Service,
Elevation of Privilege)
➢ Evaluates the system detail design
➢ Models the in-place system
➢ Identifies system entities, events, and the boundaries of the system by building data-flow diagrams
(DFDs)
Attack Trees
➢ Depicts attacks on a system in tree form
➢ Has the goal for the attack in the tree root and the methods to achieve that goal in the leaves
➢ Represents each goal as a separate tree
Threat Modeling Methods - 4
PnG (Persona non Grata)
➢ Focuses on the motivations and skills of human attackers. Characterizes users as archetypes that can
misuse the system.
➢ Forces analysts to view the system from an unintended-use point of view.
➢ Works well with the Agile approach, which uses personas.
➢ Note: These personas have the advantage of being believable adversaries who can be considered
across multiple scenarios. They can be paired to help evaluate more complex attacks.
Trike
➢ Is a security audit framework
➢ Uses threat modeling as a technique from a risk management and defensive perspective
➢ Starts with defining a system and building a model using the system’s actors, assets, intended actions,
and rules
➢ Creates an actor-asset-action matrix by representing the assets as columns and the actors as rows
Threat Modeling Methods - 5
VAST (Visual, Agile, and Simple Threat)
➢ Is based on ThreatModeler, an automated threat-modeling platform
➢ Requires the creation of:
➢Application threat models representing the architectural point of view
➢Operational threat models representing the attacker’s point of view
➢ Allows for the integration of VAST into the organization’s development and DevOps life cycles
Domain 2 - Agenda
➢ NIST SP800-30 R1> Guide to Conducting Risk Assessments provides a list of vulnerabilities to
consider along with “predisposing conditions” that may lead to the rapid or unpredictable emergence
of new vulnerabilities.
Sources of Vulnerabilities
Vulnerabilities can be found in most places within and external to the enterprise.
• Network Vulnerabilities
• Physical Access
• Applications and Web-facing Services
• Utilities
• Supply Chain
• Equipment
• Cloud Computing
• Big Data
Sources of Vulnerabilities - 2
Network Vulnerabilities
These are often related to misconfiguration of equipment, poor architecture, or traffic interception.
Misconfiguration is a common problem with network equipment that is not properly installed, operated,
or maintained.
Physical Access
Threat actors that are able to gain physical access to systems have the potential to bypass nearly every
other type of control.
With access to server rooms, network cabling, information systems equipment, and buildings, an
attacker can:
• Circumvent passwords
• Install skimmers to steal data
• Use network taps to intercept data communications
• Take logical ownership of systems or devices
Sources of Vulnerabilities - 3
Application Vulnerabilities
Applications in general, and web applications in particular, are among the most common entry points
currently used by attackers.
Many applications are written to support business functions without properly considering security or
privacy requirements.
Supply Chain
Many enterprises rely on products, services, raw materials, and supplies that originate from various
suppliers from across the globe, and any interruption in the supply chain may affect their ability to
function.
Equipment
As equipment ages, it becomes less efficient and potentially unable to support business functions.
There are multiple threats that older equipment can pose to enterprises, and each needs to be
investigated and evaluated in the full context of the business value provided and benefits yielded.
Sources of Vulnerabilities - 5
Cloud Computing
Outsourcing of application hosting and data processing has been growing in popularity for decades.
Cloud computing offers many business advantages, but both the organization and the risk practitioner
should recognize that outsourcing data processing does not eliminate the responsibility of the
outsourcing organization to ensure proper data protection.
Big Data
Advances in the capability to perform analysis of data from various sources of structured and
unstructured data allow enterprises to make better business decisions and increase competitive
advantage.
This change in analytics capabilities dealing with big data can introduce risk, and organizations should
understand that risk can arise both from adopting or not adopting these capabilities.
Gap Analysis
By documenting the desired state or condition of risk that management wants to reach, and then
carefully analyzing the current condition, the risk practitioner can identify the existence of a gap
and what actions are needed to close it.
By using gap analysis with milestones, the organization can execute projects in a logical sequence,
accounting for interdependencies.
Quiz
What task should a risk practitioner do in order to identify vulnerabilities within the enterprise?
D. Interview business unit leaders to identify where perceived weaknesses are within their business
units.
Quiz
What task should a risk practitioner do in order to identify vulnerabilities within the enterprise?
D. Interview business unit leaders to identify where perceived weaknesses are within their business
units.
Vulnerability Assessment and Penetration Testing
Vulnerability Assessment
A vulnerability assessment is a careful examination of a target environment to discover any potential
points of compromise or weakness.
Penetration Testing
To validate the results of a vulnerability assessment, the organization may conduct a penetration test
against a potential vulnerability or attack vector.
A penetration test can be focused not only on logical vulnerabilities, such as networks, but also
include: People, Processes, Physical assets, Wireless, and Third Parties,
Most enterprises mistakenly believe that penetration testing to network and applications covers all
risks, while in reality, it often only addresses one-third of vulnerabilities within the enterprise.
Vulnerability Assessment and Penetration Testing - 2
Vulnerability Assessment
Vulnerabilities that may be identified by an assessment include:
Network vulnerabilities, Poor physical access controls (e.g., buildings, offices)
Insecure applications, Poorly designed or implemented web-facing services
Disruption to utilities (e.g., power, telecommunications), Unreliable supply chain, Untrained personnel
Inefficient or ineffective processes (e.g., change control, incident handling), Poorly maintained or old
equipment
➢ There are different types of penetration tests that can be performed, based upon the enterprise’s
appetite and end goals, which should dictate the approach that is employed in carrying out a
penetration test.
➢ Penetration tests may be conducted by either internal or external teams or hybrid, and rules vary
from full knowledge of the environment to zero-knowledge tests in which the testing team has no
knowledge of the environment being attacked.
Root Cause Analysis
Definition:
The process of discovering the source of problems and faults that lead to the incident occurring, in
order to identify appropriate solutions.
This requires identifying the original cause of the issue, where processes or systems failed.
Purpose:
The actions that an enterprise takes in response to risk are often based on the lessons learned from
previous events.
Objectives:
Root cause analysis examines the reasons that lead to the problem or why a breach has occurred and
seeks to identify and resolve these underlying issues.
Root Cause Analysis - 2
A prudent risk practitioner examines the root cause of an incident to discover the conditions and
factors that led to the event, rather than reacting to the symptoms of the problem.
One implementation of root cause analysis is a pre-mortem — a facilitated workshop where the group
is told to pretend that the project has failed and discuss why it has failed.
In many cases, a risk event may be the result of coinciding events — several issues that act in
combination to create what appear to be a single result.
The risk practitioner can use root cause analysis as a means of identifying coinciding events, which
cannot be traced to a single common cause.
Quiz
An enterprise’s monthly automated vulnerability assessment was run and yielded several
hundred findings associated with a number of internally developed, critical business web-based
applications. Historically, these applications have had very few findings from assessments.
What will be the MOST likely reason for this occurrence?
A. All of the platforms scanned went end-of-life, end-of-support since the last assessment was
conducted.
B. An uncredentialed account was used, resulting in a high number of false positives be reported.
D. A new zero-day exploit with the OS was discovered since the last assessment.
Quiz
An enterprise’s monthly automated vulnerability assessment was run and yielded several
hundred findings associated with a number of internally developed, critical business web-based
applications. Historically, these applications have had very few findings from assessments.
What will be the MOST likely reason for this occurrence?
A. All of the platforms scanned went end-of-life, end-of-support since the last assessment was
conducted.
B. An uncredentialed account was used, resulting in a high number of false positives be reported.
D. A new zero-day exploit with the OS was discovered since the last assessment.
Domain 2 - Agenda
➢ Differentiate between the bottom-up and top-down approaches to develop risk scenarios.
Key Benefits:
Developing risk scenarios provides a means of gathering and framing information used in
subsequent steps of the risk management process:
1.Risk scenarios facilitate communication associated with risk management.
2.The use of risk scenarios can help the risk team to understand and explain risk.
3.A well-developed scenario provides a realistic and practical view of risk.
Risk Scenarios Components
A risk scenario is a description of an IT-related risk event that can lead to a business impact.
Actor/Threat Community
The internal or external party or entity that generates the threat.
Intent/Motivation
The nature of the threat event:
Malicious or accidental, A natural event or An equipment or process failure
Threat Event
Attempts by a threat actor that may, if successful, result in security events such as:
Disclosure of information, Interruption of a system or project, Theft, Improper modification of
data or a process and Inappropriate use of resources.
Risk Scenarios Components - 2
Asset and Resource
Effect
How much loss would the enterprise feel as a result of a risk scenario being realized?
What primary (direct) and secondary (indirect) losses could be experienced if a risk scenario were
realized?
Risk Scenarios Components - 3
Timing
Risk Analysis
The frequency and magnitude of IT risk scenarios are estimated.
Risk Evaluation
The levels of risk are compared according to risk evaluation criteria and risk acceptance criteria.
Analyzing Risk Scenarios - 2
Analyzing Risk Scenarios is Important Because:
➢ The impact of a risk event is hard to calculate with precision due to the many factors that affect
the outcome of the event.
➢ If an event is detected quickly and appropriate measures are taken to contain it, the impact
may be minimized, and recovery can be relatively quick.
➢ However, if the enterprise fails to detect the incident promptly, the same event could cause
significant damage and result in much higher recovery costs.
Both FAIR and HARM leverage Monte Carlo engines that allow for a number of simulations to
be performed and map qualitative statements to quantitative values.
FAIR Model - Factor Analysis of Information Risk
Which decomposes the major
components that comprise risk into
smaller, manageable components
ready to be analyzed.
Assessments of IT risk must consider the dependencies on the affected IT system, such as:
• Other systems
• Departments
• Business partner
• Users
➢ Relationship between the risk and the enterprise risk appetite and tolerance
Risk Assessment and its Techniques - 3
A consistent risk assessment technique should be used whenever the goal is to produce results
that can be compared over time.
Risk Ranking
Risk ranking is derived from a combination of all the components of risk including the:
• Recognition of the threats
• Characteristics and capabilities of a threat source
• Severity of a vulnerability
• Likelihood of attack success when considering effectiveness of controls
• Impact to the organization of a successful attack
Risk Ranking and Risk Maps - 2
Risk Maps
A Risk Map is a (graphic) tool for ranking and displaying risk by defined ranges for frequency and
magnitude.
Example Risk Map with Risk Appetite:
• This is the risk capacity
• Reduction of risk severity
Risk Ownership and Accountability
➢ To ensure accountability, the ownership of risk must be with an individual, not with a
department or the enterprise as a whole.
➢ Individuals own the risk according to their job responsibilities and duties.
➢ The risk owner is responsible for making the decision of what the best response is to the
identified risk and must be at a level in the enterprise where they are authorized to make
decisions on behalf of the enterprise and can be held accountable for those decisions.
Quiz
Ali has prepared a preliminary risk map and is preparing for a discussion with
management. In the moderate impact / moderate frequency box, he notices that the
risks primarily relate to HR, while Engineering is a risk owner for the majority of items in
the high- and medium-impact boxes with very low frequency. In medium- and high-
frequency boxes with high impact, he sees entries owned by the Research teams. The
Legal department has a cluster of entries in low frequency / low impact and another in
high likelihood / high impact.
Which groups are most likely to be outside of management’s risk appetite, and why?
A. HR and Legal, because they trend from low to high impact and low to high frequency
B. Engineering and Legal, because they have clusters trending upward in the low frequency
category
C. Research and Engineering, because they have entries across high impact
D. Legal and Research, because they each have a cluster of entries that are high impact, high
frequency
Quiz
Ali has prepared a preliminary risk map and is preparing for a discussion with
management. In the moderate impact / moderate frequency box, he notices that the
risks primarily relate to HR, while Engineering is a risk owner for the majority of items in
the high- and medium-impact boxes with very low frequency. In medium- and high-
frequency boxes with high impact, he sees entries owned by the Research teams. The
Legal department has a cluster of entries in low frequency / low impact and another in
high likelihood / high impact.
Which groups are most likely to be outside of management’s risk appetite, and why?
A. HR and Legal, because they trend from low to high impact and low to high frequency
B. Engineering and Legal, because they have clusters trending upward in the low frequency
category
C. Research and Engineering, because they have entries across high impact
D. Legal and Research, because they each have a cluster of entries that are high impact,
high frequency
Documenting Risk Assessments
At the conclusion of the IT risk assessment phase, the risk practitioner compiles the results of the
risk assessment into a comprehensive report for senior management.
Purpose
The risk assessment report:
• Indicates any gaps between the current risk environment and the desired state of IT risk
• Advises whether these gaps are within acceptable levels
• Provides some basis on which to judge the severity of the identified issue
Documenting Risk Assessments - 2
Process
The risk assessment when performed in a consistent manner:
• Supports future risk assessment efforts
• Provides predictable results
• Documents all risk in the report including issues that may already have been addressed
Risk Assessment Report Components
Key sections in a risk assessment report:
• Objectives of the risk assessment process
• Scope and description of the area subject to assessment
• External context and factors affecting risk
• Internal factors or limitations affecting risk assessment
• Risk assessment methodology used
• Identification of risk, threats and vulnerabilities
• Results of risk assessment
• Recommendations and conclusions
Documenting Risk Assessments - 3
Best Practices
The risk practitioner should ensure that the report is:
• Clear, concise, and accurate
• Free from terminology that could be misunderstood or is subject to misinterpretation
Addressing Risk Exclusions
The risk practitioner should ensure that all IT risk is:
• Either evaluated
• Intentionally excluded
• Some IT risk events apply only to enterprises that meet particular criteria.For instance, not all
regions are subject to the same natural disasters.
• Intentionally excluded risk must be documented with proper justification behind the exclusion.
• The risk practitioner should re-evaluate each documented risk to ensure that it was identified
and assessed accurately based on the current risk landscape.
Quiz
Sara is preparing a report on her assessment of the company’s energy sector risks.
What is the most important reason to conduct risk assessments in a consistent, structured
manner?
C. To identify instances in which the risk appetite may have been exceeded.
C. To identify instances in which the risk appetite may have been exceeded.
➢ Conduct a risk assessment by analyzing IT risk scenarios based on their likelihood and impact.
Risk Register
A risk register:
• Consolidates risk data into one place.
• Enables the tracking of risk.
Where quantitative risk assessment is desirable, the risk practitioner may seek to approximate
probability using calibrated estimates in addition to quality empirical or historical data to model,
simulate and calculate a likelihood over an entire population.
Quantitative risk assessment becomes progressively more useful as risk can be communicated
using business-aligned methods.
The value of risk used in quantitative risk assessment is often calculated on an annual basis in
order to align the process with the natural cycle for calculating budgets.
Quiz
The board of directors wants to know the financial impact of specific, individual risk
scenarios.
What type of approach/analysis is BEST suited to fulfill this requirement?
A. Delphi method
B. Quantitative analysis
C. Qualitative analysis
D. Financial risk modeling
Quiz
The board of directors wants to know the financial impact of specific, individual risk
scenarios.
What type of approach/analysis is BEST suited to fulfill this requirement?
A. Delphi method
B. Quantitative analysis
C. Qualitative analysis
D. Financial risk modeling
Qualitative Risk Assessment
Qualitative risk assessments are usually based on scenarios or descriptions of situations that
either have occurred or may occur.
The intention of these scenarios is to elicit feedback from multiple stakeholders such as:
• Departments
• Customers
• Management