-
[Music]
-
what is information security risk
-
information security risk is simply a
-
combination of the impact that could
-
result from a threat compromising one of
-
your important information assets and
-
the likelihood of this happening
-
risk management in iso 27001
-
iso 27001 requires that you implement a
-
management system to help you manage the
-
security of your important information
-
assets
-
the backbone of this is formed from the
-
need to develop and implement an
-
appropriate and effective information
-
security risk management methodology
-
iso 27001 risk management
-
you should develop and implement a risk
-
management methodology which allows you
-
to identify your important information
-
assets and to determine why they need
-
protecting
-
it is important to note here that when
-
information security is mentioned people
-
immediately start thinking about
-
confidentiality aspects but the
-
availability and integrity aspects also
-
need to be taken into consideration
-
as these are important components of
-
information security
-
once this has been achieved your
-
methodology needs to be able to identify
-
the likelihood of something going wrong
-
and what can be done to mitigate this
-
risk
-
in a nutshell it enables you to quantify
-
the impact and the likelihood elements
-
of information security risk and then go
-
on to do something about it
-
iso 27001 risk management framework
-
there are several discrete stages of an
-
iso 27001 risk management methodology
-
first of all it is important to
-
understand the information security
-
context of your organization
-
once this has been achieved you can
-
perform a risk assessment which includes
-
the need to identify your risks
-
analyze them and evaluate them
-
you then need to determine a suitable
-
treatment for the risks you have
-
assessed and then implement that
-
treatment
-
it is vitally important that you do not
-
see this as a one-off exercise
-
your risk management methodology should
-
be designed to be iterative
-
this enables you to not only review the
-
status of risks you have previously
-
identified taking into consideration any
-
potential changes in context but it also
-
enables you to identify new risks
-
the high level stages of a risk
-
management methodology as described
-
above should be thought of as a
-
framework that enables risk management
-
to be embedded within key processes
-
throughout your organization
-
so that any identified risks are
-
comparable
-
iso 27001 risk management context
-
the first stage of your risk management
-
methodology needs to identify what is
-
important to you or your organization
-
from an information security point of
-
view
-
iso 27001 requires you to determine the
-
context of your organization
-
part of which means that you need to be
-
able to identify the information
-
security related issues that you face
-
along with who the internal and external
-
interested parties are and what their
-
needs and expectations are
-
it is important to also understand what
-
your risk appetite is at this stage as
-
we will need this information later
-
once you have done this you are able to
-
determine what is important about the
-
different information assets under your
-
control
-
iso 27001 risk management what is risk
-
appetite
-
risk appetite is simply the amount and
-
type of risk you are willing to accept
-
or retain
-
in order to allow business operations to
-
proceed
-
this is important because too much
-
security can sometimes compromise your
-
operational viability whereas too little
-
will reduce the confidence of your
-
stakeholders
-
some types of organizations are willing
-
to accept more risk than others
-
for example a hedge fund manager is
-
likely to take more risk in order to
-
make greater profits over a short space
-
of time whereas a pension fund manager
-
generally prefers a less risky steady
-
growth approach
-
iso 27001 risk assessment methodology
-
risk identification
-
once you have determined the context you
-
can go ahead and conduct a risk
-
assessment
-
the first part of a risk assessment is
-
to identify the risks that you face
-
this can be broken down into three
-
elements the first element is to
-
identify your information assets an
-
information asset is any information
-
that has value to you
-
there are several different ways to
-
calculate the value of an asset but it
-
is important that you not only consider
-
the confidentiality needs of the
-
information but also the integrity and
-
availability requirements
-
the second element of risk
-
identification is threat analysis you
-
need to have a process which enables you
-
to identify all of the threats which are
-
applicable to the assets you have
-
identified
-
if a particular threat is applicable
-
then it is also a good idea to think
-
about how probable it is that the threat
-
will materialize
-
for example if you use windows based
-
computer systems which are connected
-
somehow to the internet the probability
-
of them being affected by a virus is
-
probably very high if you do nothing to
-
stop it
-
whereas if you are using an apple mac
-
which is never connected to the internet
-
the probability is very low
-
the third element of risk identification
-
is the need to determine if there are
-
any vulnerabilities that would allow a
-
threat that you have identified to cause
-
an impact on your asset
-
to carry on with the example we have
-
just used if you have an antivirus
-
system installed and running on your
-
internet connected windows computers you
-
are less vulnerable to this particular
-
threat than if you didn't
-
iso 27001 risk assessment methodology
-
risk analysis
-
one of the useful aspects of the output
-
from an effective risk assessment is the
-
ability to prioritize your risks this is
-
important as you may not have sufficient
-
resources to fully mitigate every risk
-
that you identify
-
this means that it is important to
-
somehow quantify your risks
-
to do this we need to know two things
-
first how much of an impact would be
-
felt if a compromise occurred and second
-
what is the likelihood of that threat
-
occurring
-
one good idea is to use a set of scales
-
to record values in these areas
-
for example using a scale of one to five
-
we could say how impactful it would be
-
if the confidentiality of an asset were
-
breached
-
clearly breaches of confidentiality
-
would cause a greater impact for some
-
assets for example hr records than
-
others like the staff canteen menu
-
a second one to five scale could be used
-
to determine the likelihood of a breach
-
occurring and we would take into
-
consideration the threat and
-
vulnerability information we spoke about
-
earlier in order to do this
-
iso 27001 risk assessment methodology
-
risk evaluation
-
risk evaluation is a relatively simple
-
process as it requires you to identify
-
whether or not the risk that you have
-
identified is above or below appetite
-
to do this the first thing we need to do
-
is calculate the value of the risk which
-
simply means multiplying the impact and
-
likelihood values together
-
we have a range of possible values which
-
result from multiplying the two one to
-
five scales together
-
the appetite is stated within the
-
methodology as a particular value on the
-
five by five matrix
-
if a particular risk is above this value
-
then it is above appetite which means
-
that it can then be flanked for
-
treatment
-
anything below appetite can be accepted
-
and monitored for change
-
iso 27001 risk treatment methodology
-
your risk management methodology needs
-
to include a methodology for determining
-
the most appropriate treatment for the
-
risks that you have identified
-
there are four possible treatments to
-
choose from these are accept reduce
-
transfer
-
and avoid
-
you may come across different terms used
-
for these such as tolerate treat
-
transfer and terminate this example is
-
known as the forties however they take
-
the same approach
-
iso 27001 risk treatment methodology
-
accept or tolerate
-
one of the four treatments provides you
-
with the ability to accept risk
-
we have already seen that this is
-
possible as it is likely that you will
-
simply accept risks that are below
-
appetite
-
however you can also make an informed
-
decision to accept risks in certain
-
circumstances such as where there is a
-
legal requirement preventing you from
-
taking the desired action or you have
-
insufficient resources to do so
-
these cases should be few and far
-
between though and should always be
-
approved by appropriate management and
-
regularly reviewed
-
iso 27001 risk treatment methodology
-
reduce or treat
-
the second treatment option is to reduce
-
or treat the risk
-
this is done through the implementation
-
of controls
-
iso 27001 provides you with a list of
-
114 best practice controls that can be
-
used to mitigate the risks that you have
-
identified
-
these can be used in combination in
-
order to increase their effectiveness
-
and of course you can also add controls
-
of your own that do not appear in iso
-
27001
-
iso 27001 risk treatment methodology
-
transfer
-
the third risk treatment option is to
-
transfer the risk
-
the transfer option involves the use of
-
third parties to help you mitigate your
-
risks
-
you could do this for example by
-
offloading some of the financial impact
-
of something going wrong by taking out
-
an insurance policy
-
another way of doing this is to
-
outsource the responsibility for
-
implementing and operating technical
-
controls to a third party such as an i.t
-
managed service provider
-
it is important to note here that
-
although responsibility for financial
-
impact or the management of operational
-
controls can be transferred to a third
-
party the accountability associated with
-
the risk cannot
-
in other words you will still be held
-
accountable by your stakeholders if
-
something goes wrong
-
iso 27001 risk treatment methodology
-
avoid or terminate
-
the fourth risk treatment option is to
-
simply avoid the risk
-
as we have discussed before there are
-
three component parts to risk the impact
-
felt by the organization following a
-
breach of confidentiality integrity or
-
availability for an information asset
-
a threat that could cause this impact
-
and a vulnerability that would allow it
-
to do so
-
it is possible to avoid risk completely
-
by eliminating one or more of these
-
three elements
-
however it is unlikely that we would be
-
able to completely remove all threats or
-
all vulnerabilities which leaves us only
-
with one viable option which is to
-
remove the impact
-
this is done by removing the asset or
-
stopping the processes that are
-
associated with the identified risk
-
for example to avoid the risks
-
associated with the taking of credit
-
card payments
-
remove that process and only deal in
-
cash
-
there are obvious issues associated with
-
taking this approach as it is unlikely
-
to be looked upon to favorably by your
-
stakeholders especially if the process
-
is revenue generating
-
this is the reason why this particular
-
risk treatment methodology is really
-
used
-
iso 27001 risk treatment methodology
-
controls the most common option chosen
-
to treat risks other than maybe accept
-
in more mature isms's is to reduce the
-
risk
-
this is done by implementing controls or
-
improving existing ones to address the
-
risk
-
there are three main operational types
-
of control administrative or
-
people-based controls
-
technical or logical controls and
-
physical or environmental controls
-
within these three operational types
-
there are several different tactical
-
uses of controls such as those that are
-
designed to prevent a threat from
-
materializing
-
those that are designed to deter people
-
from carrying out an undesired action
-
those that detect if a threat has
-
materialized or those that enable you to
-
recover from a situation after the
-
threat has been dealt with
-
and there are several others
-
operational types and tactical uses of
-
controls are not mutually exclusive and
-
can and should be used where possible in
-
combination to provide a greater depth
-
of security
-
iso 27001 risk management monitor and
-
review
-
it is important to ensure that any
-
actions you take to address the risks
-
you have identified are monitored and
-
reviewed to ensure that they have the
-
desired effect
-
part of the monitor and review process
-
should also include a review of context
-
before the risk assessment is
-
re-performed
-
this will allow you to identify and take
-
into consideration any changes that may
-
have happened either internally within
-
your organization or externally such as
-
changes in legislation or changes to the
-
threat environment thus you are able to
-
identify if risks that have previously
-
been identified are getting worse or
-
hopefully better and you will also be
-
able to identify any new risks
-
iso 27001 risk assessment frequency
-
risk management and therefore risk
-
assessment is an iterative process
-
and each iteration should take into
-
consideration lessons learned from the
-
previous iteration and should take into
-
consideration any internal or external
-
changes thus enabling continual
-
improvement
-
there is no hard and fast rule on the
-
frequency of risk assessment but urm
-
recommends that the frequency is no less
-
than annual
-
this does not necessarily mean that you
-
should set aside a certain amount of
-
time at a certain point in the year to
-
conduct a risk assessment although of
-
course you can do this if you wish
-
it just means that each time 12 months
-
has elapsed you should aim to have
-
completed the next iteration
-
so you could spread the workload over
-
the 12-month period by performing
-
smaller risk assessments on a subset of
-
areas at more frequent intervals if this
-
is more manageable
-
iso 27001 risk management
-
governance
-
throughout the risk management process
-
you need to ensure that you communicate
-
effectively with any interested parties
-
it may be useful to put together a racy
-
raci to help you with this as all the
-
way through the process different people
-
will need to be held responsible some
-
will need to be held accountable some
-
will need to be consulted in order to
-
identify all of the pertinent
-
information we need to perform an
-
effective risk assessment and some
-
people for example the management team
-
will need to be informed through
-
effective reporting of your risk status
-
iso 27001 risk management policy and
-
process
-
as with all key processes associated
-
with an effective isms it is a good idea
-
to implement a risk management policy
-
this enables you to set the risk
-
management and risk assessment criteria
-
appetite and roles and responsibilities
-
out within a document that everyone is
-
required to implement throughout the
-
business
-
this should of course be underpinned by
-
the risk management methodology and any
-
required documented processes to enable
-
risk management to be embedded
-
throughout the organization
-
so how can urm help
-
urm can offer a range of information
-
risk management consultancy and training
-
services most notably our accredited
-
five-day practitioner certificate in
-
information risk management training
-
course
-
in addition urm has also developed an
-
information risk management module a
-
brisker 27001 especially to meet the
-
risk assessment requirements of iso
-
27001
-
for more information email us or give us
-
a call