Towards a Measurement Framework for Security
Risk Management
Nicolas Mayer1,2 , Eric Dubois1 , Raimundas Matulevičius2 , and Patrick
Heymans2
1
CRP-Henri Tudor - CITI
29 Av. John F. Kennedy, L-1855 Luxembourg, Luxembourg
[email protected],
[email protected]
2
PReCISE, University of Namur,
rue Grandgagnage 21, B-5000 Namur, Belgium
[email protected],
[email protected]
Abstract. Risk management is currently a key tool for managing Information System (IS) security. In the context of the definition of an IS
Security Risk Management (ISSRM) modelling language, we already defined the set of concepts and relationships taking a place in the ISSRM
domain within a UML class diagram. To extend this work and to support
reasoning at the modelling language level, the objective is now to define
the metrics available. A systematic and iterative research method is proposed to determine suited metrics. It consists first of the application of
the Goal-Question-Metric (GQM) approach on the domain model. Second a review of the literature aims at completing and validating this first
step. The outcome of this work is the enrichment of the class diagram
with attributes representing the elicited metrics.
1
Introduction
Security aspects currently play a vital role in Information Systems (IS) and are
thus a central issue in their effective usage. In this context, a lot of work has
already been done in the IS Security Risk Management (ISSRM) domain and
particularly many industrial methods for risk assessment (see e.g., [1–4]) have
been recently proposed. They are generally focused on structuring the different steps and activities to perform ISSRM. However, regarding the documents
produced as output of these different steps, they are generally informal, most
often expressed in a natural language. This lack of formality prevents the automation (reasoning, evolution, monitoring and traceability) of ISSRM-related
information.
For a long time, IS engineers are aware about the problems of informal documents. They use ‘models’ as a way to achieve a better formality and quality
in the representation of the knowledge. In our previous work [5], we argued for
a modelling component which provides better support to formalise different information and knowledge created and exchanged during ISSRM. The results of
ad-hoc extensions of security-modelling languages, presented in [6, 7], has highlighted the need of a structured research method. This research method includes
the set-up of an ontology of ISSRM concepts, called domain model, which can
act as a meta-model for the targeted modelling language. It has been established
during a preceding research work, through a systematic elicitation method presented in [8]. It has then been applied to assess the support of some existing
modelling languages with regards to ISSRM in [9, 10].
In this paper we focus on the metrics identification and their integration in
the domain model. They are necessary for allowing reasoning at the modelling
level. The objective of such a measurement system is to reach the best Return on
Security Investment (ROSI) for the studied IS, and so to optimise the alignment
between the business of the organisation and its IS security. In this paper, we
investigate what the metrics relevant for performing ISSRM and reasoning about
ROSI are. Our research objective is, first, to propose a systematic manner to
define what the metrics to be used in ISSRM are. Second, the application of this
research method shall propose a set of metrics to be integrated in our domain
model and so in our modelling language.
Section 2 introduces our preceding work about the definition of an ISSRM
domain model, together with its set of concepts. Then, Section 3 presents the
research method for the definition of the ISSRM metrics. Section 4 and Section
5 are the application of the two steps of the research method, respectively for
metrics elicitation and metrics validation. Finally, Section 6 is the enrichment of
our domain model with the metrics. The paper ends with conclusion and future
work in Section 7.
2
The ISSRM domain model
The objective of ISSRM is to protect assets of an organisation, from all harm to
IS security which could arise accidentally or deliberately, by using a risk management approach. Its domain model aims at presenting the different concepts
involved and their mutual relationships. In this section we summarise some core
definitions of ISSRM concepts, organised in three categories: asset-related concepts, risk-related concepts and risk-treatment related concepts. The domain
model, represented as a UML class diagram, can be seen at the end of the paper
in Fig. 3. It consists of the set of classes and their relationships, the attributes
of the classes being the subject (and the contribution) of the rest of the paper.
Asset-related concepts describe what assets are important to protect, and
what criteria guarantee asset security. An asset is anything that has value to
the organisation and is necessary for achieving its objectives. A business asset
describes information, processes, capabilities and skills inherent to the business
of the organisation, and that has value for it. An IS asset is a component of
the IS supporting business assets. Security criterion characterises a property
or constraint on business assets. They are most often confidentiality, integrity
and availability, but sometimes, depending on the context, other specific criteria
might be added, like non-repudiation or accountability.
Risk-related concepts present how the risk itself is defined. A risk is the
combination of a threat with one or more vulnerabilities leading to a negative
impact harming one or more of the assets. An impact describes the potential negative consequence of a risk that may harm assets of a system or an organisation,
when a threat (or the cause of a risk) is accomplished. The event, in the frame
of IS security, is the combination of a threat and one or more vulnerabilities. A
vulnerability describes a characteristic of an IS asset or group of IS assets, that
constitutes a weakness or a flaw in terms of IS security. A threat characterises a
potential attack or incident, which targets one or more IS assets that may lead
to a harm for the assets. A threat agent is an agent that can potentially cause
harm to IS assets. An attack method is a standard means by which a threat
agent carries out a threat.
Risk treatment-related concepts describe what decisions, requirements
and controls should be defined and implemented in order to mitigate possible
risks. A risk treatment is the decision of how to treat an identified risk. A security
requirement is the refinement of a risk treatment decision to mitigate the risk.
Controls (or countermeasures) are means designed to improve security, specified
by a security requirement, and implemented to comply with it.
Regarding our coming modelling language, the current state of the domain
model brings out the concepts to be considered. However, it does not provide
any information about how to reason with these concepts, and if it is necessary
to estimate them. Therefore, the next step is to complete the domain model
by introducing the metrics of ISSRM. They shall be added as attributes of the
ISSRM class diagram (Fig. 3).
3
Research method for metrics definition
To achieve the objective of defining relevant ISSRM metrics, we propose a research method based on a combination of approaches (Figure 1). The outcome
of this research method is the introduction of ISSRM metrics as attributes to
the ISSRM domain model.
The first approach, used during Step 1 of the research method, is the GoalQuestion-Metric (GQM) paradigm [11]. This approach is used for eliciting metrics in a top-down manner, from general objectives to achieve, to suited metrics
to be used for achieving the objectives. Thus, the benefit of using GQM is that
we focus on the main objectives of ISSRM to define the metrics. GQM is applied on the ISSRM domain. Therefore, the ISSRM domain model is an input
for this step. The application results in GQM models, leading to the set of ISSRM metrics. However, this elicitation work remains subjective and potentially
incomplete.
The second approach, used as a validation/improvement of the first step, and
appearing in Step 2 of the research method, is based on a survey of ISSRM standards and methods [1–4, 12–15]. This approach is bottom-up, being an analysis
of the literature to identify the metrics currently used. For each ISSRM source
of the literature studied, a comparison is done between its metrics and those
Fig. 1. Research method for the ISSRM metrics elicitation
defined through GQM. This comparison is summarised in an analysis table. If a
metric not identified with GQM is found, it is necessary to evaluate its relevance.
Even it can highlight a lack in the GQM study, and thus the GQM models are
reviewed and improved considering this new issue, or a justification for the exclusion of the metric shall be provided. This task is iteratively done for every
approach identified in the literature [1–4, 12–15].
Once the literature is completely surveyed, leading to the GQM models in
their last version, the final set of metrics is introduced in the ISSRM domain
model as attributes of the classes.
4
4.1
The GQM approach for metrics elicitation
The GQM approach overview
In the GQM approach, measurement is defined in a top-down fashion [11]. GQM
is based upon the assumption that, for an organisation to measure in an efficient
way, it must specify the goals for itself and its projects first, then it must trace
those goals to the data intended to operationalise them. Finally, it must provide
a framework for interpreting the data with respect to the stated goals [11].
The result of the application of the GQM approach is the definition of the
measurement system targeting a particular set of issues. The outcome is a GQM
model that has three levels: the goal level, the question level and the metric level.
Therefore, a GQM model is a hierarchical structure starting with a goal (the goal
to be reached). The goal is refined into several questions. Each question is then
refined into metrics.
4.2
Application of the GQM framework on the ISSRM domain
Fig. 2. GQM models
The main outcome of ISSRM and one of the main motivation is to obtain the
best ROSI [16, 13]. Several definitions of ROSI are available [17–19]. Whichever
definition is chosen, the following proposition remains valid regarding the ISSRM
domain: to maximise the ROSI means to maximise the risk reduction when minimising the risk treatment cost. Thus, this assumption provides two objectives
for the GQM study, which are respectively the two roots of the GQM models
(Fig. 2). Considering the concepts of the ISSRM domain model, to maximise the
risk reduction involves to know first what is the level of risk, depending on its
occurrence frequency and its importance regarding the business. Second, it is nec-
essary to know what is the risk reduction level. To minimise the risk treatment
cost, it is naturally necessary to know what is the risk treatment cost.
From these questions, and based on the set of concepts of the ISSRM domain
model (Fig. 3), the related metrics are defined. All of the elicited metrics are
represented in the GQM models (Fig. 2) with the following notation: “Class of
the ISSRM model.Metric”. For example, regarding the treatment cost of risk, we
know with regards to the domain model that 3 risk treatment-related concepts
are involved. A cost metric is thus proposed for each of them to know their
respective cost (Fig. 2 part B). It is necessary to note that the GQM models
of Figure 2 are the ones obtained after the last iteration of Step 2, as depicted
in the research method. They thus represent the final set of metrics. Further
explanations about each metric are provided after their validation, in Section 6.
5
Survey of ISSRM approaches for metrics validation
For the ISSRM domain model definition, we surveyed the ISSRM literature [8].
Regarding our metrics validation, we select the subset of the identified ISSRM
literature having a methodological part. The approaches focusing on terminology
or conceptual aspects of ISSRM are neglected. We thus select 8 sources in ISSRM
standards [12–14] and methods [1–4, 15] as the pool of sources to be studied for
metrics validation. The complete presentation of Step 2 of the research method
about metrics validation can be found in [20]. In this section, we present and
comment the metrics analysis table (Table 1) for the ISO/IEC 27005 standard
[12], which is the standard for ISSRM. In this table, the concepts are ordered
by type, respectively standing in asset-, risk- and risk treatment-related concept
category (Section 2). The categories are delimited by a double line in the table.
Table 1. Metrics analysis table for ISO/IEC 27005
ISSRM concept
ISO/IEC 27005 [12]
Concept
Metric
ISSRM metric
Asset
Business asset
IS asset
Asset
Value
Primary asset
Value
Supporting asset Value
Value
Value
Risk
Event
Impact
Threat
Vulnerability
Risk
Event
Consequence
Threat
Vulnerability
Risk level
Likelihood
Business impact value
Frequency of occurrence
Easiness of exploitation
Risk level
Potentiality
Impact level
Likelihood
Vulnerability level
Effectiveness
Risk reduction
Security requirement
Control
Control
/
The only asset-related concept measured in ISO/IEC 27005 is the concept of
asset (in general) (Table 1). The related metric is the value of assets. Primary
asset and supporting asset, being specialisations of asset in general, are also
measured with this metric. Then, the business impact value associated to each
asset is estimated, based on the value of the asset. Risk estimation is based
on the successive considerations of threat and vulnerability, leading to event
likelihood. Combining it with the business impact value, it is possible to estimate
the risk level. Finally, controls from ISO/IEC 27005, which can be aligned with
both security requirement and control from our domain model, are estimated
according to their effectiveness, mainly in reducing vulnerabilities.
In ISO/IEC 27005, as said above, the value of asset in general is estimated
for asset-related concepts. In the GQM study (and after the complete review
of the ISSRM sources), the focus is rather put on the value of business assets,
which is more relevant. IS assets being only the support of business assets, it
is worth to consider the value of only business assets. Moreover, in IS security,
the value of IS assets (e.g., the replacement cost of a computer) is generally
considered as negligible compared to the value of the processed information at
the business level (e.g., the client information, the estimates, etc.). Finally, it
is necessary to consider the value of business assets for estimating the security
objectives and assess the significance of risks, as depicted in the ISSRM domain
model (cf. Figure 3). IS assets are not involved in this process. For risk-related
concepts, the metrics are very close to those proposed in Section 4. Risk, event,
consequence, threat and vulnerability of ISO/IEC 27005 have all an associated
metric. Moreover, ISO/IEC 27005 proposes additional characteristics for threat
source (equivalent to threat agent in the ISSRM model). For example, it is possible to define the motivation, the capabilities and the resources available of a
threat source for a deliberate threat, or some factors that could influence the
threat source in the case the threat is accidental. However, such characteristics
are not included in the metric analysis table, because they are indicators helping to define frequency of occurrence and the risk level in general, rather than
metrics themselves. For the risk-treatment related concepts, the effectiveness of
controls is estimated, which has the same objective as risk reduction of security
requirements in the ISSRM domain model. The concept of risk treatment is not
estimated in terms of effectiveness. Finally, the cost dimension is not needed to
be measured in ISO/IEC 27005.
6
Enrichment of the ISSRM domain model with metrics
Elicitation (Section 4) and validation (Section 5) of the metrics result in the
improvement of the ISSRM domain model by completing it with the ISSRM
metrics.
The first modification of the ISSRM domain model is the introduction of
a new concept, necessary regarding the metric of security need. This concept
is security objective and it represents the application of a security criterion on
a business asset, like the confidentiality of patient information or the integrity
of a financial process. The security need metric expresses the importance of
the security objective concept. It is also interesting to determine the value of
business assets. Only business assets are estimated in terms of value. The value
Fig. 3. ISSRM meta-model enriched with metrics
of business assets is used as input to estimate the security need of each business
asset, e.g., in terms of confidentiality, integrity and availability.
For risk-related concepts, risk is estimated by its level. The risk level depends
on the event potentiality and the impact level, these two concepts composing the
one of risk. Event is composed of threat and vulnerability. Their respective levels
are estimated through likelihood and vulnerability level. It is necessary to note
that threat agent and attack method do not have their own metric representing
their level. Only their composition is estimated and this assumption has been
confirmed during metrics validation. Some characteristics of threat agents and
attack methods can be identified independently, like the motivation and the
competence of the threat agent or the kind of attack method (natural, human,
etc.), as seen, for example, in ISO/IEC 27005 [12] and EBIOS [1]. However, they
can be used as indicators to well estimate the risk-related concepts and mainly
the likelihood of a threat.
In risk treatment-related concepts, risk treatment and security requirements
are estimated first in terms of risk reduction performed and second in terms of
cost incurred. Controls can be only estimated in terms of cost (cost of buying
a firewall, cost of maintaining it by a security officer, etc.). The risk reduction
of some controls taken alone has no sense. For example, the risk reduction of
the security officer maintaining the firewall can not be estimated alone, without considering the global effectiveness of the firewall (described at the security
requirement level by, e.g., “Perform network filtering”).
It is necessary to note that this set of metrics is proposed at an abstract
level. The metrics can be implemented differently within a method (qualitatively,
quantitatively, etc.) [12] or through several metrics, depending on the aim of the
method. For example, the likelihood metric of threat can be implemented through
several attributes of the threat class, the first one being the statistic probability
of occurrence of natural threats (in %) and the second one being based on a
qualitative level evaluation of human threats. Before implementing these metrics
in a method or a tool, it is necessary to think about the best way of using them,
depending on the objective and the granularity level wanted. Therefore, this set
of metrics has to be considered with an implementation variability.
7
Conclusion and future work
The objective of this paper is to identify and to define a set of metrics for
the ISSRM domain with a systematic and scientific approach. First a research
method has been defined. Then the application of this research method has
been done through the use of the GQM approach on the ISSRM domain and
its iterative review with regards to the literature. The result of this paper is the
enrichment of the ISSRM domain model with suited metrics.
Although the elicited metrics are validated through literature analysis, their
testing in a real case would provide a concrete instantiation and validation of
their relevance. An assessment of the metrics is now finished in the frame of an
ISO/IEC 27001 certification [21], where ISSRM is at the core of the standard.
The metrics proposed were suited in this context and the organisation obtained
the certification. The validation should also be a continuous process, through
the assessment of other measurement frameworks like [22].
As part of the next step of our future work, the metrics will be integrated into
the developed modelling language. Experimentation of the modelling language
will help to check the usability of the metrics. The development of a supporting
software tool for the language is also important.
References
1. DCSSI: EBIOS - Expression of Needs and Identification of Security Objectives.
http://www.ssi.gouv.fr/en/confidence/ebiospresentation.html, France (2004)
2. CLUSIF: MEHARI 2007 (MEthode Harmonisée d’Analyse du Risque Informatique). https://www.clusif.asso.fr/fr/production/mehari/, France (2007)
3. Alberts, C.J., Dorofee, A.J.: OCTAVE Method Implementation Guide Version 2.0.
Carnegie Mellon University - Software Engineering Institute (2001)
4. Insight Consulting: CRAMM (CCTA Risk Analysis and Management Method)
User Guide version 5.0. SIEMENS (2003)
5. Mayer, N.: Managing security IT risk: a goal-based requirements engineering approach. In: RE’05 Doctoral Consortium, in conjunction with the 13th IEEE International Requirements Engineering Conference (RE’05). (2005)
6. Mayer, N., Rifaut, A., Dubois, E.: Towards a risk-based security requirements
engineering framework. In: Proceedings of the 11th International Workshop on
Requirements Engineering: Foundation for Software Quality (REFSQ’05). (2005)
83–97
7. Dubois, E., Mayer, N., Rifaut, A., Rosener, V.: Contributions méthodologiques
pour l’amélioration de l’analyse des risques. In Ebrahimi, T., Leprévost, F., Warusfel, B., eds.: Enjeux de la sécurité multimédia (Traité IC2, série Informatique et
systèmes d’information). Hermes (2006) 79–131
8. Mayer, N., Heymans, P., Matulevičius, R.: Design of a modelling language for
information system security risk management. In: Proceedings of the 1st International Conference on Research Challenges in Information Science (RCIS ’07),
Ouarzazate, Morocco (2007) 121–132
9. Matulevičius, R., Mayer, N., Heymans, P.: Alignment of Misuse Cases with security risk management. In: Proceedings of the 3rd International Conference on
Availability, Security and Reliability (ARES ’08), Symposium on Requirements
Engineering for Information Security (SREIS ’08). IEEE Computer Society (2008)
1397–1404
10. Matulevičius, R., Mayer, N., Mouratidis, H., Dubois, E., Heymans, P., Genon,
N.: Adapting Secure Tropos for security risk management during early phases of
the information systems development. In: Proceedings of the 20th International
Conference on Advanced Information Systems Engineering (CAiSE ’08). Springer
(2008)
11. Basili, V.R., Caldiera, G., Rombach, H.D.: The goal question metric approach. In:
Encyclopedia of Software Engineering. John Wiley & Sons, Inc. (1994) 532–538
12. ISO/IEC 27005: Information technology – Security techniques – Information security risk management. (2008)
13. Stoneburner, G., Goguen, A., Feringa, A.: NIST Special Publication 800-30: Risk
Management Guide for Information Technology Systems. National Institute of
Standards and Technology, Gaithersburg (2002)
14. Bundesamt für Sicherheit in der Informationstechnik: BSI Standard 100-3 Risk
analysis based on IT-Grundschutz (September 2005)
15. Vraalsen, F., Mahler, T., Lund, M.S., Hogganvik, I., den Braber, F., Stølen, K.:
Assessing enterprise risk level: The CORAS approach. In Khadraoui, D., Herrmann, F., eds.: Advances in Enterprise Information Technology Security. Idea
group (2007) 311–333
16. ISACA: CISA Review Manual 2006. Information Systems Audit and Control
Association (2006)
17. CLUSIF, Groupe de travail ROSI: Retour sur investissement en sécurité des
systèmes d’information : quelques clés pour argumenter (2004)
18. Sonnenreich, W., Albanese, J., Stout, B.: Return on security investment (ROSI):
A practical quantitative model. In Fernández-Medina, E., Castro, J.C.H., Castro,
L.J.G., eds.: WOSIS, INSTICC Press (2005) 239–252
19. Microsoft: The Security Risk Management Guide. (2004)
20. Mayer, N.: Information system security risk management metrics definition,
http://www.nmayer.eu/publis/ISSRMmetrics-TR-11-06.pdf.
Technical report,
CRP Henri Tudor (2008)
21. ISO/IEC 27001: Information technology – Security techniques – Information security management systems – Requirements. (2005)
22. Houmb, S.H., Georg, G., France, R., Bieman, J., Jürjens, J.: Cost-benefit trade-off
analysis using BBN for aspect-oriented risk-driven development. In: Proceedings
of the 10th IEEE International Conference on Engineering of Complex Computer
Systems (ICECCS’05), Shangai, IEEE Computer Society (2005) 195–204