Risk Assessment 1683411582
Risk Assessment 1683411582
Risk Assessment 1683411582
CONDUCTING
AN IT SECURITY
RISK
ASSESSMENT
2 CONDUCTING AN IT SECURITY RISK ASSESSMENT
CONTENTS
ABSTRACT
Every enterprise faces risk—both known and unknown. Many organizations routinely
assess risk, not only in the technology space, but also throughout the enterprise. And
every day, enterprises seek to optimize risk, thereby ensuring the most advantageous
return on investment while sustaining business continuity. Risk changes almost daily, and
IT security leaders are effectively forced to identify and address threats and vulnerabilities
continuously to prevent exposure of important data and maintain risk tolerances at
acceptable levels.
Risk assessments allow the enterprise to reevaluate existing and potential risk within
structured, repeatable frameworks that inform the organizational risk response. In
dynamic and evolving risk environments, enterprise information and technology (I&T)
assets depend upon robust risk-assessment methodology and planning, not only to
secure the assets themselves, but also to understand and appreciate their full institutional
value, to identify business processes that rely on them, potential options for mitigation,
and criticality and priority of any associated risk items relative to organizational risk
appetite.
Intended for new IT security and risk assessment practitioners, as well as other
professionals unfamiliar with the process, this white paper documents how to conduct an
IT security risk assessment. The paper poses key questions that all enterprises must
answer in order to identify assets, determine their value and protect them accordingly.
• Identify vulnerabilities
• Identify risk
1
1
ISACA, CMMI® Institute and Infosecurity® Group, State of Enterprise Risk Management 2020, October 2019, https://www.isaca.org/Knowledge-
Center/Documents/State-of-Enterprise-Risk-2020-Report_1019.pdf
Across these steps are the key aspects of a risk • Assessing the impact of incidents
assessment that determine its success and overall • Promoting communication and collaboration among IT security
include:
• Identifying and prioritizing assets based on their value In some instances, other key stakeholders may need to be
• Identifying threats and vulnerabilities consulted. Recording risk events in a risk register is
• Analyzing controls in a structured, repeatable manner recommended for documenting each step of a risk
• Determining the likelihood of incidents event—both for historical purposes and to plan ahead.
• Identify assets identify its risk appetite and potential risk impact(s).
• Value assets
Without this information, it is difficult to prioritize and This ambiguity can arise both across teams and within
allocate resources where they are most needed. After different levels of the same team.
identifying assets, stakeholders can:
Quantitative valuation takes the opposite approach,
• Determine threats that may affect particular assets
assigning values based on objective monetary
• Assess how assets might be vulnerable
calculations such as net present value, replacement cost
• Determine how well protected assets currently are
or book value. This approach allows everyone in the
• Quantify impact
enterprise to understand both the value of an asset and its
• Determine how best to protect assets and mitigate impact
relative importance compared to all other valued assets,
Asset identification needs to be done in a structured way. satisfying an objective standard that qualitative
Each asset should be identified and documented in terms assessments cannot deliver. The scale used for
of its properties and characteristics, which may include quantitative valuation is common to the entire
hardware, software, intellectual property, customer organization and, thus, eliminates the subjective
information and other factors of importance to valuation. localization of values assigned by expert opinion.
Wherever possible, it is beneficial for asset valuation to be
Asset Valuation done on a quantitative basis.
Once assets are identified, the next step is to value them
Semi-quantitative valuation reflects a compromise
in a way that supports effective prioritization. Note that
approach. It fundamentally involves qualitative
data assets should be included in the assessment at this
assessment, often by associating subjective categories
stage—valuation of data is best performed by data
with numeric values.
owners, who generally have better insight into their data
than upper management. To optimize use of available Although ostensibly useful because it renders expert
resources, “IT should understand the relative significance opinion in a mathematically comparable form, semi-
of different sets of systems, applications, data, storage quantitative analysis is perhaps the most deceptive
and communication mechanisms.” Enterprises have 2 2 approach. A qualitative term like “high” might be assigned
areas of greater and lesser priority, and understanding a value of five or 10, and these values will produce
these at a high level can improve alignment between significantly different results when used in any form of
assessment and executive interest. equation. There is likely no clear, objective basis for
deciding whether “high” is five or 10 times as valuable as
There are three general ways to determine an asset’s
“low.” Such numbers will likely not represent a consistent
value:
scale, therefore subjective localization is still operative.
• Qualitative valuation
• Quantitative valuation
Whenever incompatible perspectives of scale are
• Semi-quantitative valuation
combined in mathematical operations, the results can be
profoundly misleading. Methods of valuation of course
Qualitative valuation is based on the expertise of the depend on enterprise needs, available resources and
person making the assessment. Qualitative assessments requirements; however, risk assessors should avoid semi-
are inherently subjective and tend to use ordinal rankings quantitative valuation when possible.
such as high, medium or low. It is difficult to apply
qualitative rankings consistently because their subjectivity Processes
is inherently localized: what may be categorized as high in While the direct monetary value of an asset informs the
one context can be considered low or medium in another. impact of its loss on an organization, its value can be
2
2
Schmittling, R.; A. Munns; “Performing a Security Risk Assessment,” ISACA Journal, vol. 1, 2010, https://www.isaca.org/Journal/archives/2010/Volume-
1/Pages/Performing-a-Security-Risk-Assessment1.aspx
further informed—that is, indirectly—by the processes or the two broad approaches in identifying risk include threat
supporting technologies in which it is implicated. and vulnerability assessment.
Understanding the processes and technologies that an Before considering threats and vulnerability in more detail,
asset utilizes—along with their associated vulnerabilities— it is worth observing that risk can be identified using a
facilitates both risk assessment and consideration of risk scenario approach, which may be top-down or bottom-up.
treatment options. It also clarifies how processes work In a bottom-up approach, assessors generally begin with
together with assets in the value chain. It is essential to an asset and consider what sorts of negative outcomes
remember that risk may not remain isolated; an impact on might befall it, and from there, extrapolate conditions that
one process may have a cascading effect throughout the could create those outcomes. In a top-down approach,
system. Identifying which assets are involved in which assessors begin with a potential threat event (such as a
processes (and vice versa) is essential for an assessor to cyberattack or flood) and consider each asset in turn to
grasp the entire value chain and gauge the impact if an determine how the asset—and by extension, the
asset or process is compromised. organization as a whole—might be affected.
impersonate an employee
Identifying Risk Factors • Accidentally, when systems fail through nonmalicious human
After creating a comprehensive inventory of assets, their error that results from improper training, poor judgment or
begin to identify areas of risk. Risk reflects the • Naturally or by force majeure, when lightning strikes, hurricanes
combination of the probability of an event and its impact— make landfall or floods inundate critical facilities
vulnerabilities. Organizations can then apply that vulnerabilities. Identifying unknown vulnerabilities is
knowledge in risk treatment decisions. possible using code analysis, but this approach is
typically available only to vendors assessing their own
Understanding Vulnerabilities software.
Vulnerabilities are areas of weakness. Not every
vulnerability is exposed (and/or accessible) to a threat Because of the extent to which different applications
actor. For instance, an air-gapped computer that lacks interact, it is commonly accepted that attaining a level of
network connectivity may not incur the threat of zero vulnerability is impossible in a complex information
cyberattack. Nonetheless, any system that could be system. This means that even the most rigorously
compromised when a threat actor makes an adequate assessed environments may be compromised by zero-
attempt is reasonably considered vulnerable. day exploits that target vulnerabilities whose existence up
to that point had been unknown, both to vendors and
Organizations typically develop and implement structured
cybersecurity professionals.
programs for vulnerability assessment, using both manual
and automated processes to identify weaknesses. With
few exceptions, these programs are limited to
Understanding Controls
weaknesses that are already known, including those
Assessed vulnerability typically considers only the
identified in audit reports, published in the US National
inherent state of an information system. In most
Institute for Standards and Technology (NIST)
environments, this inherent state is heavily modified by
vulnerability database, detected when applying third-party
the influence of controls, which may include general or
vulnerability intelligence, or discovered by an enterprise’s
targeted countermeasures. Controls generally do not
own incident response teams or software security
eliminate threats, but they can make it more difficult for
analysts.3 3
Automated tools are effective for rapid vulnerability Controls may be technical or nontechnical. Technical
identification, but should not be the sole method used to controls are found in hardware and software and include
detect and assess vulnerabilities. Often, manual reviews firewalls, intrusion detection systems, automatic updates
are necessary when special-use systems or uncommon and continuous data-leak detection.
Vulnerability assessment reports can be misleading in two actions and physical mechanisms, such as locks and
ways. The first reflects the error of aggregation: An keycards. Hiring a security guard is also a form of
3
3
Upguard, “How to Perform an IT Cyber Security Risk Assessment: Step-by-Step Guide,” 30 October 2019, https://www.upguard.com/blog/cyber-security-
risk-assessment
Calculating Risk valuation and the determination of how they fit into the
enterprise value chain, all make it possible to anticipate
Once threats and vulnerabilities have been analyzed, it
how operations may be affected in the aggregate by
becomes possible to determine likelihood, which is an
specific asset-level fail states, such as a server outage or
assessment of the probability that a vulnerability will be
loss of data integrity.
exploited. As with valuation, likelihood is best assessed on
a quantitative basis, pairing specific threats with
compatible vulnerabilities. However, obtaining solid data Risk combines the estimated frequency of an exploited
for threat activity in particular is difficult, and the existence vulnerability annually, the cost of each occurrence and the
of unknown vulnerabilities compounds the problem. In weight factor of each instance. Thus, for data whose
many organizations, a qualitative or semi-quantitative compromise would incur a US$50,000 loss, estimating the
approach is the best that can be done. To assess risk, the occurrence once every 50 years implies an annualized
determined likelihood is combined with the potential cost of $1,000 per year. This calculation is the end state of
impact of compromise. Identification of assets, their risk assessment.
Risk Treatment
Risk assessment concludes with the recording of risk in If a risk is within the enterprise’s risk appetite, it is
the register—but organizations do not stop considering acceptable without further action. In this case, the risk
risk once it has been assessed. should be formally accepted through documentation in
the risk register, and no further action should be taken.
There are four possible treatments for assessed risk:
• Accept
If the risk is not acceptable, the enterprise might choose
• Transfer
to either transfer or mitigate the risk. Transferring risk is a
• Mitigate
misleading term, because risk can never be fully
• Avoid
transferred; risk sharing is a more accurate
The goal of risk treatment is to bring risk to an acceptable characterization. The idea is to assign some portion of the
level; deciding which treatment option is appropriate potential impact to another organization, as with the
depends entirely on the organization’s risk appetite. purchase of insurance. Transferring risk does not reduce
the likelihood of impact but, by sharing impact, it can be avoided by eliminating the conditions that bring it
reduce risk to an acceptable level. about.
The other option is mitigation, which is the application of In general, this means ceasing a noncritical business
controls to reduce one of the risk factors—generally operation or exiting a particular market. Threats to life
vulnerability or impact—because the number of threat safety in areas of escalating violence or significant natural
actors, their motivations and goals tend to be unknown. disasters are the most common cases in which risk
avoidance is the best treatment option.
The decision to mitigate or transfer risk should be based
on which of the two can produce an acceptable level of Documenting treatment decisions in the risk register is a
risk at the lowest cost to the organization. An organization vital part of the process. The register should be updated
should never spend more to treat risk than the cost accordingly so it can serve as an ongoing reference to
associated with the risk itself. On rare occasions, it may management, business process owners, risk managers
be impossible to reduce risk to an acceptable level and auditors alike. In addition, every risk should have an
without allocating an untenable level of resources to the assigned owner who is responsible for overseeing
task. In this case—and only in this case—the risk should implementation of the treatment decision.
Conclusion
A structured IT security risk assessment enables an Developing an effective IT risk assessment involves
enterprise to identify, evaluate and align its overall security determining the enterprise’s risk appetite and tolerance,
position with its risk appetite. Assessments provide the identifying and valuing its assets, assessing control
opportunity for staff to work across functional areas and effectiveness, and isolating threats and vulnerabilities to
promote communications among IT teams, security pinpoint risk. Assigning impact and likelihood based on
managers and upper management, contributing to a predetermined criteria is essential to an accurate account
broader understanding of how processes and assets of risk.
interact. All of these insights benefit senior managers who
Risk treatment occurs after an assessment, but relies on
seek to conduct operations while maintaining an
the results of the assessment to be done effectively.
acceptable level of risk.
Quantifying the financial cost of risk events can assist in
determining their criticality and promote resource
Risk assessment should be done on a regular or prioritization, including current and future IT security-
continuous basis in order to keep pace with an ever- related investments. Having accurate, quantifiable data
changing threat environment. Security managers and and an up-to-date plan to identify and address possible
staff should be prepared for controls that delivered threat events can lead to improved productivity of IT
sufficient assurance yesterday to become inadequate operations, security and audit, as well as cost savings in
tomorrow. This eventuality can be true even for controls the long run that help keep an enterprise viable. Risk
addressing natural disasters—and it is especially assessment is most effective when risk is documented in
applicable to controls for intentional cyberattacks by a risk register that is regularly updated and consulted by
threat actors who learn from experience. decision makers at all levels of the enterprise.
Acknowledgments
ISACA would like to acknowledge:
Greg Grocholski
ISACA Board Chair, 2012-2013
CISA
Saudi Basic Industries Corporation, USA
About ISACA
Now in its 50th-anniversary year, ISACA® (isaca.org) is a global association
1700 E. Golf Road, Suite 400
helping individuals and enterprises achieve the positive potential of
Schaumburg, IL 60173, USA
technology. Today’s world is powered by information and technology, and
ISACA equips professionals with the knowledge, credentials, education and
Phone: +1.847.660.5505
community to advance their careers and transform their organizations. ISACA
leverages the expertise of its 460,000 engaged professionals—including its Fax: +1.847.253.1755
140,000 members—in information and cybersecurity, governance, assurance,
Support: support.isaca.org
risk and innovation, as well as its enterprise performance subsidiary, CMMI®
Institute, to help advance innovation through technology. ISACA has a Website: www.isaca.org
presence in more than 188 countries, including more than 220 chapters
worldwide and offices in both the United States and China.
DISCLAIMER
Provide Feedback:
ISACA has designed and created Conducting an IT Security Risk Assessment www.isaca.org/conducting-an-IT-
(the “Work”) primarily as an educational resource for professionals. ISACA security-risk-assessment
makes no claim that use of any of the Work will assure a successful outcome.
The Work should not be considered inclusive of all proper information, Participate in the ISACA Online
procedures and tests or exclusive of other information, procedures and tests Forums:
that are reasonably directed to obtaining the same results. In determining the https://engage.isaca.org/onlineforums