Crisc Exam Guide Book
Crisc Exam Guide Book
Crisc Exam Guide Book
Blind Folio i
ALL IN ONE
CRISC
™
ALL IN ONE
CRISC
™
Bobby E. Rogers
Dawn Dunkerley
McGraw-Hill Education is an independent entity from ISACA® and is not affiliated with ISACA in any manner. This study/
training guide and/or material is not sponsored by, endorsed by, or affiliated with ISACA in any manner. This publication and
CD-ROM may be used in assisting students to prepare for the Certified in Risk and Information Systems Control™ (CRISC™)
exam. Neither ISACA nor McGraw-Hill Education warrants that use of this publication and CD-ROM will ensure passing
any exam. Certified in Risk and Information Systems Control and CRISC are trademarks of ISACA in the United States and
certain other countries. All other trademarks are trademarks of their respective owners.
McGraw-Hill Education books are available at special quantity discounts to use as premiums and sales
promotions, or for use in corporate training programs. To contact a representative, please visit the Contact Us
pages at www.mhprofessional.com.
CRISC™ Certified in Risk and Information Systems Control™ All-in-One Exam Guide
Copyright © 2016 by McGraw-Hill Education. All rights reserved. Printed in the United States of America.
Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or
distributed in any form or by any means, or stored in a database or retrieval system, without the prior written
permission of publisher, with the exception that the program listings may be entered, stored, and executed in a
computer system, but they may not be reproduced for publication.
All trademarks or copyrights mentioned herein are the possession of their respective owners and McGraw-Hill
Education makes no claim of ownership by the mention of products that contain these marks.
1234567890 DOC DOC 1098765
ISBN: Book p/n 978-0-07-184712-4 and CD p/n 978-0-07-184713-1
of set 978-0-07-184711-7
MHID: Book p/n 0-07-184712-X and CD p/n 0-07-184713-8
of set 0-07-184711-1
Sponsoring Editors Technical Editor Production Supervisor
Meghan Manfre, Tim Green B. Kelly Sparks James Kussow
Editorial Supervisor Copy Editor Composition
Jody McKenzie Kim Wimpsett Cenveo Publisher Services
Project Manager Proofreader Illustration
Namita Gahtori, Julie Searls Cenveo Publisher Services
Cenveo® Publisher Services Indexer Art Director, Cover
Acquisitions Coordinator Rebecca Plunkett Jeff Weeks
Amy Stonebraker
Information has been obtained by McGraw-Hill Education from sources believed to be reliable. However, because of the possibility
of human or mechanical error by our sources, McGraw-Hill Education, or others, McGraw-Hill Education does not guarantee the
accuracy, adequacy, or completeness of any information and is not responsible for any errors or omissions or the results obtained from
the use of such information.
CONTENTS AT A GLANCE
Index.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
ix
CONTENTS
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
Chapter 1 Risk Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Basic Security Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Goals of Information Security . . . . . . . . . . . . . . . . . . . . . . . . 2
Supporting Security Goals . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Risk Management Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Risk Terms and Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Standards, Frameworks, and Best Practices . . . . . . . . . . . . . . 12
Business Perspective of IT Risk Management . . . . . . . . . . . . . . . . . 19
Business Goals and Objectives . . . . . . . . . . . . . . . . . . . . . . . . 19
Business Information Criteria . . . . . . . . . . . . . . . . . . . . . . . . 20
Organizational Structures . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Information Systems Architecture . . . . . . . . . . . . . . . . . . . . . 22
Managing Risk Ownership . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Risk Ownership . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Risk Awareness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Legal and Governance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Chapter Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Chapter 2 Threats and Vulnerabilities in the Enterprise . . . . . . . . . . . . . . . . . . . 37
Threats and Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Identifying Threats and Vulnerabilities in the Enterprise . . . . 38
Business Processes and Initiatives . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Environmental Risk Factors . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Project and Program Management . . . . . . . . . . . . . . . . . . . . . 44
Third-Party Management . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Systems Development Life Cycle . . . . . . . . . . . . . . . . . . . . . . 49
Emerging Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Management of IT Operations . . . . . . . . . . . . . . . . . . . . . . . 54
Data Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Business Continuity and Disaster Recovery Management . . . 58
Chapter Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
xi
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
xii
Chapter 3 Identifying and Managing Risk Scenarios . . . . . . . . . . . . . . . . . . . . . . 69
Developing and Managing Risk Scenarios . . . . . . . . . . . . . . . . . . . . 69
Risk Identification and Classification . . . . . . . . . . . . . . . . . . 70
Risk Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Developing Risk Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Analyzing Risk Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Risk Register . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Chapter Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Chapter 4 Risk Assessment and Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Risk Assessment Processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
NIST RMF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
OCTAVE Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
ISO/IEC Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
ISACA’s Risk IT Framework . . . . . . . . . . . . . . . . . . . . . . . . . 96
Performing a Risk Assessment . . . . . . . . . . . . . . . . . . . . . . . . 98
Quantitative and Qualitative Techniques . . . . . . . . . . . . . . . . . . . . . 103
Quantitative . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Qualitative . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Combining Quantitative and Qualitative Techniques . . . . . . 107
Other Analysis Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Risk Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Control Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Reporting Risk Assessment Results . . . . . . . . . . . . . . . . . . . . 116
Chapter Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Chapter 5 Risk Response and Mitigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Risk Response . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Risk Response Standards and Frameworks . . . . . . . . . . . . . . . 127
Understanding Risk Response Options . . . . . . . . . . . . . . . . . . . . . . 131
Evaluating Risk Response Options . . . . . . . . . . . . . . . . . . . . 131
Selecting Risk Response . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Prioritizing Risk Responses . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Risk Mitigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Risk Response Action Plans . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Control Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
System Development Life Cycle . . . . . . . . . . . . . . . . . . . . . . 146
Project Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Project Management Frameworks . . . . . . . . . . . . . . . . . . . . . 148
Contents
xiii
Chapter Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Chapter 6 Control and Risk Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Control Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Control Testing and Assessment . . . . . . . . . . . . . . . . . . . . . . 160
Indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
Chapter Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
Chapter 7 Information Systems Control Concepts . . . . . . . . . . . . . . . . . . . . . . . . 181
Information Security Control Concepts . . . . . . . . . . . . . . . . . . . . . 182
Control Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
Control Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Control Frameworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
NIST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
COBIT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
Val IT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
PCI-DSS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Other Control Frameworks . . . . . . . . . . . . . . . . . . . . . . . . . . 195
Chapter Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
Chapter 8 Designing and Implementing Controls . . . . . . . . . . . . . . . . . . . . . . . . 209
Business Perspectives of Controls . . . . . . . . . . . . . . . . . . . . . . . . . . 210
Business Cases for Controls . . . . . . . . . . . . . . . . . . . . . . . . . . 210
Regulatory Guidance and Controls . . . . . . . . . . . . . . . . . . . . 213
Business Functions and Controls . . . . . . . . . . . . . . . . . . . . . . 216
Information System Security Engineering . . . . . . . . . . . . . . . 218
Design Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
Control Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
Implementing Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
Chapter Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
Chapter 9 Measuring Risk and Control Effectiveness . . . . . . . . . . . . . . . . . . . . . . 239
Applying Key Performance Indicators . . . . . . . . . . . . . . . . . . . . . . . 239
Key Performance Indicator Review . . . . . . . . . . . . . . . . . . . . 240
Key Performance Indicator Development . . . . . . . . . . . . . . . 240
Chapter Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
xiv
Appendix A The NIST Risk Management Framework . . . . . . . . . . . . . . . . . . . . . . . . 267
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
Tiered Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
Applicability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
Publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
RMF Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270
Step 1: Categorize Information Systems . . . . . . . . . . . . . . . . . 270
Step 2: Select Security Controls . . . . . . . . . . . . . . . . . . . . . . . 270
Step 3: Implement Security Controls . . . . . . . . . . . . . . . . . . . 272
Step 4: Assess Security Controls . . . . . . . . . . . . . . . . . . . . . . . 273
Step 5: Authorize Information Systems . . . . . . . . . . . . . . . . . 273
Step 6: Monitor Security Controls . . . . . . . . . . . . . . . . . . . . . 274
Appendix B ISACA’s Risk IT Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
Applicability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
Publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
Framework Focus Areas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
Risk Governance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
RG1: Establish and Maintain a Common Risk View . . . . . . . 280
RG2: Integrate with ERM . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
RG3: Make Risk-Aware Business Decisions . . . . . . . . . . . . . . 280
Risk Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
RE1: Collect Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
RE2: Analyze Risk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
RE3: Maintain Risk Profile . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Risk Response . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
RR1: Articulate Risk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
RR2: Manage Risk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
RR3: React to Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
Appendix C About the CD-ROM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
Total Tester Premium Practice Exam Software . . . . . . . . . . . . . . . . . 285
Installing and Running Total Tester Premium
Practice Exam Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
PDF Copy of the Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286
Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286
Total Seminars Technical Support . . . . . . . . . . . . . . . . . . . . . 286
McGraw-Hill Education Content Support . . . . . . . . . . . . . . 286
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
ACKNOWLEDGMENTS
From Bobby:
First, we’d like to thank all the good folks at McGraw-Hill Education and their
associates for guiding us throughout this book, helping us to ensure a quality product.
Meghan Manfre, Amy Stonebraker, and Tim Green were awesome to work with, making
sure we stayed on track and doing everything they could to make this a wonderful
experience. We’re very grateful to them for giving us the chance to write this book and
believing in us every step of the way.
Dawn Dunkerley has been one of my best friends for several years now, and I also
consider her one of the smartest folks in our profession, so I was doubly happy to have
her accept my invitation to coauthor this book. She’s added some fantastic insight and
knowledge to this book; I couldn’t have done it without her. Thanks much, Dawn!
Kelly Sparks deserves some special thanks because, as the technical editor, he had a
difficult job, which was to make sure that we stayed reasonable and technically accurate
throughout the book. It’s hard to be critical of someone else’s work when you’re also good
friends with the writers, so I know it must have been a challenge for Kelly to be critical,
truthful, and diplomatic at the same time, but he pulled it off just perfectly anyway. Kelly
knows this field extremely well. He didn’t pull any punches and was hard on us when
he needed to be, and that’s why I’m happy to have him on board as the technical editor.
Kelly definitely contributed to the clarity, understanding, and technical accuracy of the
text. Thanks for all your help, Kelly; this book is a direct testament to your extraordinary
competence and professionalism.
Finally, and most importantly, I’d like to thank my family, who endured a lot of time
without me at the dinner table, on family outings, and on a daily basis to give me the
time to write this book. For my wife Barbara, who went to bed without me many nights
while I stayed up writing to meet a deadline, as well as doing my share of the housework
so I could write, I give my deepest thanks and love. For my children, Greg, Sarah, and AJ,
thanks for being great kids. I’m very proud of the adults you three have become. I’d also
like to thank my two grandsons, Sam and Ben, who had to learn to play quietly in the
house while I wrote.
From Dawn:
I absolutely must start by acknowledging the best author and friend I could have asked
to work with, Bobby Rogers. Bobby not only has a work ethic that scares me (when does
he sleep?) but has always been ready with a kind word, a joke, or a willing hand. Thank
you for your exceptional service to our field. I would also like to thank Barbara Rogers
for putting up with Bobby and his aforementioned work ethic. I am so glad to call you
both friends.
xv
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
xvi
Meghan Manfre, Amy Stonebraker, and Tim Green continue to be both excellent
editors and excellent people; we could not have pulled off this project without you and
your consistent support.
A big thank you to our technical editor, Kelly Sparks. You did a great job keeping
us on our toes. You were great to work with, and I have a renewed appreciation for
your skills.
Finally, I heartily acknowledge the contribution of my family and friends who have
supported me throughout my various crazy endeavors. I could not ask for more than the
love and encouragement I receive every day toward pursuing my goals. Thank you all.
INTRODUCTION
Welcome to the All-in-One exam guide for ISACA’s Certified in Risk and Information
Systems Control™ (CRISC™) exam! This book will help you study for, and successfully
pass, one of ISACA’s premier certification exams, the CRISC exam. This exam is designed
to test your knowledge of a wide variety of topics related to the risk management and
information systems controls. The exam focuses on business and IT risk management in
an enterprise infrastructure, as well as how to design and implement IT security controls
to mitigate risk.
Every day, it seems, data is breached at some of the largest organizations in the world.
Recently we’ve seen breaches in the U.S. government, in the healthcare industry, and
even at entertainment giants such as Sony. No organization, no matter what size, is
immune to the threat of data breaches or, for that matter, data theft or loss. Effective risk
management, however, can reduce the possibility of data breaches, as well as strengthen
IT infrastructures and even contribute to their efficient use. Information system controls
serve to reduce the likelihood of negative events having a significant impact on the
organization and should be carefully planned for and considered.
This book covers topics that include basic risk concepts, risk assessments, standards
and frameworks, and information security control design and implementation. We
also cover the essential concepts, terminology, and definitions that risk management
practitioners and security professionals need to be effective in this area. In the book’s nine
chapters, we cover all four of the top-level domains, as well as the task and knowledge
statements listed in the official ISACA exam objectives.
While you don’t have to already be an expert in all of the areas we discuss, of course
having experience in some of these areas, such as risk concepts, helps. A good, broad
background of experience and knowledge in information security will give you an
advantage in your studies for this exam. Of course, you’ll get a good background in all of
these subjects throughout the book. Chapters 1 through 6 cover risk management basic
concepts, assessments, and risk response. The remaining chapters (Chapters 7 through
9) discuss how to design and implement information security controls, integrating them
with an effective risk management program.
Passing the CRISC exam not only places you in a class of professionals recognized for
their experience and expertise in this field but also serves to quantify and validate your
knowledge of advanced risk management and security topics. After passing this exam,
you’ll be able to show that not only are you qualified but you are certified in these areas.
This book is designed to help get you there.
xvii
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
xviii
How to Use This Book
This book covers everything you’ll need to know for ISACA’s CRISC certification exami-
nation. Each chapter covers specific objectives and details for the exam, as defined by
ISACA in its job practice areas. We’ve arranged these objectives in a manner that makes
fairly logical sense from a learning perspective, and we think you’ll find that arrangement
will help you in learning the material.
Each chapter has several components designed to effectively communicate the
information you’ll need for the exam.
•• The topics covered in each chapter are listed in the first section to help you to
map out your study.
•• Tips are included in each chapter that offer great information on how concepts
you’ll study apply in a place that we like to call “the real world.” Often, they may
give you a bit more information on a topic covered in the text.
•• Exam Tips are included to point out an area you need to focus on for the exam.
Note that they won’t give you any exam answers, but they do help you by letting
you know about important topics that you may see on the test.
•• Notes may be included in a chapter as well. These are bits of information that are
relevant to the discussion and that point out extra information.
•• Some chapters have exercises designed to provide hands-on experience and to
reinforce the chapter information. As your organization and circumstances are no
doubt different from ours, these may, from time to time, need a little adjustment
on your end.
The Examination
As we have several years of experience in taking certification examinations, let’s say that
both of us would love for this to be your one-stop shopping source for exam material
to help you study for and pass the exam. Unfortunately, as with any sort of certifica-
tion exam, there’s probably no single source of information to study for the test. This is
because different materials offer different perspectives, depth of information, and expla-
nations that people process and learn from differently. Having said that, we believe that
there’s more than enough information in this book for you to both pass the exam and be
successful in real life as an ISACA-certified CRISC professional. The other thing you’ll
need, which in our minds is just as important as good study material, is experience.
There’s no substitute for practical, hands-on experience, and you should make every
effort to get experience on all aspects of the ISACA CRISC exam material that we discuss
in this book.
In terms of prerequisites and experience, ISACA requires that you have three years
of experience, in at least two of the domains, and of those, one of those two must be in
Domain 1 or Domain 2 in order to take this exam and earn the certification. There is no
Introduction
xix
prerequisite certification exam that you must pass, although having other advanced-level
certifications, such as the CISSP or CISM, certainly will also help you gauge the level of
knowledge you need for this exam.
Speaking of the exam, here are the specifics: The exam consists of 150 questions,
covering the four domains of the job practice areas. Each domain covers a specific topic
and is broken down into task and knowledge statements. Because domain objectives can
change at ISACA’s discretion, the best source for you to get up-to-date information on
the domains and objectives is ISACA’s website (www.isaca.org), where the most current
exam information will be posted. While we’ve made every effort to ensure that we have
the most current exam information in the book (as of the June 2015 exam session),
remember to check ISACA’s site for any exam or objective changes before, and during,
your study effort and definitely before you take the exam.
As you might imagine, the four domains are broken out over the 150 questions, but
there is not an equal percentage of questions. If you take a look at the most current
version of the ISACA objectives on the site, you’ll see that some domains may have more
questions than others, based upon how important the topic is to the exam. For example,
Domain 1.0, IT Risk Identification, comprises 27 percent of the questions on the exam,
per the exam information from ISACA. This domain is broken down into topics such
as identifying threats and vulnerabilities, developing risk scenarios, and so on. So, out of
150 questions, you should expect to get about 40 of them from this particular domain.
Of course, this is just an estimate because ISACA can alter the exam and its objectives as
it desires. But you can pretty much bet that this is a fair estimate. Other domains have
differing percentages of questions on the exam as well. One test-taking strategy that has
served countless students is to make sure that you know an area you’re comfortable with
very well, especially if it has a higher percentage of exam questions, but you should also
try to focus most of your studying on the areas you are unsure about, of course. You won’t
be able to pass the test by just being very good at one particular domain, so you should
make every effort to learn the domains that you may not know as well.
Finally, you should know that you have a maximum of four hours to take the exam.
The exam has a passing score of 450, on a scale of 200 to 800. ISACA, like many
certification bodies, uses a type of scale scoring system, so it may be difficult at first to
determine exactly how well you did based upon the score you get. As it’s still a paper-
based exam (as of this writing), scoring the exam and receiving your results can take up
to eight weeks. When you pass the exam, you’ll get a breakdown of your scores on each
of the domains, as well as an overall passing score.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
xx
CRISC Exam Effective 2015
Chapter Page
Official Job Practice Areas All-in-One Coverage No. No.
Domain 1: Risk Identification
1.1 Collect and review information, Business Processes and 2 42
including existing documentation, regarding Initiatives
the organization’s internal and external
business and IT environments to identify
potential or realized impacts of IT risk to
the organization’s business objectives and
operations
1.2 Identify potential threats and Threats and 2 38
vulnerabilities to the organization’s people, Vulnerabilities
processes and technology to enable IT risk
analysis
1.3 Develop a comprehensive set of IT risk Developing and 3 69
scenarios based on available information to Managing Risk
determine the potential impact to business Scenarios
objectives and operations
1.4 Identify key stakeholders for IT risk Risk Scenario 3 79
scenarios to help establish accountability Stakeholders
1.5 Establish an IT risk register to help Risk Register 3 82
ensure that identified IT risk scenarios are
accounted for and incorporated into the
enterprise-wide risk profile
1.6 Identify risk appetite and tolerance Risk Culture, Appetite, 1 12
defined by senior leadership and key and Tolerance
stakeholders to ensure alignment with
business objectives
1.7 Collaborate in the development of a risk Risk Awareness 1 26
awareness program, and conduct training to
ensure that stakeholders understand risk and
to promote a risk-aware culture.
Domain 2: IT Risk Assessment
2.1 Analyze risk scenarios based on Analyzing Risk 3 80
organizational criteria (e.g., organizational Scenarios
structure, policies, standards, technology,
architecture, controls) to determine the
likelihood and impact of an identified risk
2.2 Identify the current state of existing Control Analysis 4 102
controls and evaluate their effectiveness for IT Evaluating Existing 8 229
risk mitigation Control Effectiveness
2.3 Review the results of risk and control Control Gaps 4 113
analysis to assess any gaps between current Adjusting Controls 8 230
and desired states of the IT risk environment Based on Mitigation
Requirements and
Control Gaps
Introduction
xxi
Chapter Page
Official Job Practice Areas All-in-One Coverage No. No.
2.4 Ensure that risk ownership is assigned at Considering Risk and 4 116
the appropriate level to establish clear lines of Control Ownership
accountability
2.5 Communicate the results of risk Reporting Risk 4 116
assessments to senior management and Assessment Results
appropriate stakeholders to enable risk-based
decision making
2.6 Update the risk register with the results Updating the Risk 4 118
of the risk assessment. Register
Domain 3: Risk Response and Mitigation
3.1 Consult with risk owners to select and Risk Response 5 126
align recommended risk responses with
business objectives and enable informed risk
decisions
3.2 Consult with, or assist, risk owners Risk Response 5 126
on the development of risk action plans to
ensure that plans include key elements (e.g.,
response, cost, target date)
3.3 Consult on the design and Designing Effective 5 140
implementation or adjustment of mitigating Controls
controls to ensure that the risk is managed to Information Security 7 182
an acceptable level Control Concepts
Designing 8 224
Considerations
Control Selection 8 227
3.4 Ensure that control ownership Risk Mitigation 5 131
is assigned to establish clear lines of Managing Control 8 232
accountability Ownership and Risk
3.5 Assist control owners in developing Risk Mitigation 5 131
control procedures and documentation Documenting 8 232
to enable efficient and effective control Controls
execution
3.6 Update the risk register to reflect Documentation 5 143
changes in risk and management’s risk
response
3.7 Validate that risk responses have been Risk Response 5 126
executed according to the risk action plans
Domain 4: Risk and Control Monitoring
and Reporting
4.1 Define and establish key risk indicators Defining Key Risk 6 171
(KRIs) and thresholds based on available data, Indicators
to enable monitoring of changes in risk
4.2 Monitor and analyze key risk indicators Collecting and 6 172
(KRIs) to identify changes or trends in the IT Analyzing Data
risk profile Key Performance 9 240
Indicator Review
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
xxii
Chapter Page
Official Job Practice Areas All-in-One Coverage No. No.
4.3 Report on changes or trends related to Collecting and 6 172
the IT risk profile to assist management and Analyzing Data
relevant stakeholders in decision making Key Performance 9 240
Indicator Review
4.4 Facilitate the identification of metrics Defining Key 6 166
and key performance indicators (KPIs) Performance
to enable the measurement of control Indicators
performance Key Performance 9 240
Indicator
Development
4.5 Monitor and analyze key performance Defining Key 6 166
indicators (KPIs) to identify changes or trends Performance
related to the control environment and Indicators
determine the efficiency and effectiveness of Key Performance 9 240
controls Indicator Review
4.6 Review the results of control Control Testing and 6 160
assessments to determine the effectiveness of Assessment
the control environment Key Performance 9 240
Indicator
Development
4.7 Report on the performance of, changes Collecting and 6 172
to, or trends in the overall risk profile and Analyzing Data
control environment to relevant stakeholders Key Performance 9 240
to enable decision making Indicator Review
Risk Concepts
CHAPTER
1
In this chapter, you will:
• Review basic security concepts
• Learn about standards, frameworks, and best practices related to risk
identification, assessment, and evaluation
• Learn to describe how business goals, information criteria, and organizational
structures affect risk
• Determine how information systems architecture presents risk to the
organization
• Learn about risk ownership and awareness
• Recognize legal, regulatory, and contractual requirements for risk management
within the organization
This chapter will review a large portion of Certified in Risk and Information Systems
Control (CRISC) Domain 1: Risk Identification with coverage of fundamental informa-
tion security and risk management concepts. We’ll cover a good deal of the terminology
associated with risk management and many of the core concepts you’ll need to be famil-
iar with for the exam, but we will go into more depth on many of these concepts in later
chapters.
The CRISC exam topics that we cover in this chapter are as follows and include the
following domain objectives and knowledge statements:
• 1.6 Identify risk appetite and tolerance defined by senior leadership and key
stakeholders to ensure alignment with business objectives
• 1.7 Collaborate in the development of a risk awareness program, and conduct
training to ensure that stakeholders understand risk and to promote a risk-aware
culture
NOTE Throughout the book, the task and knowledge statements are listed
in the order they are described in the CRISC Job Practice areas, not necessarily
how they are presented in the chapter.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
2
Basic Security Concepts
To successfully sit for the CRISC exam, you should be familiar with some basic security
concepts. You can’t be expected to know how to manage risk in a security environment if
you don’t understand the basics of security. We’ll assume you have some level of experience
already as a security professional since risk management is a significant portion of (and a
logical career progression from) the information security profession. You may also have
had some level of experience in specific risk management processes during your career.
As such, we won’t go into detail on the basic security concepts in the upcoming sections;
this chapter will just serve as a quick refresher to remind you of certain security concepts.
The CRISC exam is not a technical exam; it is more of a process- and management-
oriented exam, so we won’t delve into firewall configuration rules, protocol filtering,
encryption, or any of the other fun stuff that security professionals do. We will, however,
discuss a couple of other security concepts that are important to know for the exam since
risk affects all of these concepts in different ways.
Confidentiality
The goal of confidentiality is to keep information systems and data from being accessed by
people who do not have the authorization, need-to-know, or security clearance to access
that information. In other words, confidentiality means that only authorized individu-
als and entities should be able to access information and systems. Confidentiality can be
achieved through a number of security protection mechanisms, such as rights, privileges,
permissions, encryption, authentication, and other access controls. If the confidentiality
of data or information systems is breached, you get the opposite of confidentiality, which
is unauthorized disclosure. Unauthorized disclosure is a risk to data and information sys-
tems and one that we as security professionals struggle hard to protect against.
Integrity
Integrity is the characteristic of data that means the data has not been subject to unau-
thorized modification or alteration. In other words, it means data is left in the same state
as it was when it was stored or transmitted. So, when it is accessed again or received,
it should be identical to the data that was originally stored or transmitted. Integrity is
Availability
Availability is when data and systems are accessible to authorized users at any time or under
any circumstances. Even if data is kept confidential and its integrity remains intact, that
does you no good if you can’t access it when you need it to perform critical business func-
tions. Availability ensures you have this data (and the information systems that process it)
at your fingertips. Just as confidentiality and integrity have their opposites, data destruction
or denial of service is the opposite of availability. This risk to your information systems
could prevent authorized consumers of that data or users of that information system from
performing their jobs, thus severely impacting your business operations. Figure 1-1 shows
the relationships of the three information security goals to one another.
EXAM TIP You will need to understand the definitions of the goals of
information security well for the exam. Almost everything in information risk
management supports these three goals, either directly or indirectly.
Figure 1-1
The three goals
of information
security
Availability Confidentiality
Integrity
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
4
confidentiality, integrity, and availability, as well as protect your systems from unauthor-
ized use or misuse. We’ll discuss these different security elements and other concepts, as
well as how they support the three primary goals of security, in the next few sections.
Access Control
As a security professional, you probably already know that a security control is a security
measure or protection applied to data, systems, people, facilities, and other resources to
protect them from adverse events. Security controls can be broken down and categorized
in several ways. Access controls directly support the confidentiality and integrity goals
of security and indirectly support the goal of availability. An access control essentially
means that you will proactively ensure that only authorized personnel are able to access
data or the information systems that process that data. Access controls ensure that only
authorized personnel can read, write to, modify, add to, or delete data. They also ensure
that only the same authorized personnel can access the different information systems and
equipment used to store, process, transmit, and receive sensitive data.
There are several different types of access controls, including identification and authen-
tication methods, encryption, object permissions, and so on. Remember that access con-
trols can be administrative, technical, or physical in nature. Administrative controls are
those that are implemented as policies, procedures, rules and regulations, and other types
of directives or governance. For example, personnel policies are usually administrative
access controls. Technical controls are those that are most often associated with security
professionals, such as firewalls, proxy servers, virtual private network (VPN) concentra-
tors, encryption techniques, file and folder permissions, and so on. Physical controls are
those used to protect people, equipment, and facilities. Examples of physical controls
include fences, closed-circuit television cameras, guards, gates, and restricted areas.
In addition to classifying controls in terms of administrative, technical, and physical,
you can also classify access controls in terms of their functions. These functions include
preventative controls, detective controls, corrective or remedial controls, deterrent con-
trols, and compensating controls. All of the different controls can be classified as one or
more of these different types of functions, depending upon the context and the circum-
stances in which they are being used.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
6
Authorization
Authentication to a resource doesn’t automatically guarantee you have full, unrestricted
access to a resource. Once you are authenticated, the system or resource defines what
actions you are authorized to take on a resource and how you are allowed to interact with
that resource. Authorization is what happens once you’ve successfully identified yourself
and been authenticated to the network. Authorization dictates what you can or can’t
do on the network, in a system, or with a resource. This is usually where permissions,
rights, and privileges come in. In keeping with the concept of least privilege, users should
be authorized to perform only the minimum actions they need in order to fulfill their
position responsibilities. Authorization has a few different components. First, there is
need to know. This means there must be a valid reason or need for an individual to access
a resource, and only to a certain degree. Second, an individual may have to be trusted,
or cleared, to access a resource. This may be accomplished through a security clearance
process or nondisclosure agreement, for example.
Accountability
Accountability means that a person is going to be held responsible for their actions on
a system or with regard to their interaction with data. Accountability is essentially the
traceability of a particular action to a particular user. Users must be held responsible for
their actions, and there are different ways to do this; it is usually assured through audit-
ing. First, there must be a unique identifier that is tied only to a particular user. This way,
the identity of the user who performs an action or accesses a resource can be positively
established. Second, auditing must be properly configured and implemented on the sys-
tem or resource. What you are auditing is a user’s actions on a system or interactions
with a resource. For example, if a user named Sam deletes a file on a network share, you
want to be able to positively identify which user performed that action, as well as the
circumstances surrounding the action (such as the time, date, from which workstation,
and so on). This can be accomplished only if you have auditing configured correctly and
you take the time to review the audit logs to establish accountability.
Nonrepudiation
Nonrepudiation is closely related to accountability. Nonrepudiation ensures that the user
cannot deny that they took an action simply because the system is set up such that no
Availability Confidentiality
Integrity
Administrative
Nonrepudiation Controls Authorization
one else could have performed the action. The classic example of nonrepudiation is given
as the proper use of public key cryptography. If a user sends an e-mail that is digitally
signed using their private key, then they cannot later deny that they sent the e-mail, since
only they are supposed to have access to the private key. In this case, the user can be held
accountable for sending the e-mail, and nonrepudiation is assured.
Figure 1-2 summarizes the relationships between access controls, the supporting ele-
ments of information security, and the three information security goals. Note that there
is no hard-and-fast rule about mapping security elements and access controls to security
goals; all of these elements and controls can support any one or even more than one goal
at a time. For example, encryption, a technical access control, can support both confi-
dentiality and data integrity at the same time.
NOTE Although other books may describe the supporting elements of the
security goals differently, the basic ones we’ve described here are common
and directly support the three goals of confidentiality, integrity, and
availability.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
8
associated with risk, we’ll cover the different terms you need to know for risk manage-
ment. Risk management is the overall process of developing a strategy for addressing risk
throughout its life cycle and includes several components. These include risk identifica-
tion, assessment, analysis, evaluation, and response. We’ll talk about each of these differ-
ent processes later in the chapter, as well as throughout this book. For the exam, you’ll
need to know how these basic processes work, and as you proceed through this book, you
will learn how to perform each of these risk management steps.
Vulnerabilities
Vulnerabilities are weaknesses in a system, operation, or facility that would make these
resources susceptible to being exploited by a threat. Vulnerabilities can exist in the way a
system processes, transmits, or stores data; they can also exist in the technologies that make
up a system or even in its design. Even people can have vulnerabilities; one such weakness
that affects the people in an organization is complacency. This weakness might prevent
them from always following security practices, for example, and allow a security threat to
take advantage of that weakness. Facility vulnerabilities could include a lack of physical
security controls, a “blind spot” near a doorway to a secure area where an intruder may
hide, and so on. One of the first steps in managing risk is to identify all of the vulnerabili-
ties that exist within a system or facility so they can be adequately addressed. This is usu-
ally accomplished by conducting a vulnerability assessment, which attempts to thoroughly
identify any and all vulnerabilities inherent to a system and its people, operations, policies,
procedures, and facilities. We’ll discuss vulnerability assessments more in Chapter 2, but
for now keep in mind that while a vulnerability assessment can be conducted as a stand-
alone type of assessment, it really doesn’t have as much value unless it is part of a larger risk
assessment, where it can be brought into context with other important elements of risk.
threat would not be a danger or risk to the system for that specific instance. A threat
agent is something that causes or initiates a threat against a vulnerability. In the example
given previously, a hacker or malicious actor would be the threat agent that exercises the
cryptographic attack (threat) against the weak algorithm (vulnerability). Table 1-1 gives
some other examples of threats, vulnerabilities, and threat agents to further emphasize
these concepts.
As you can see from Table 1-1, a threat is only the presence of something that can
exploit a vulnerability; the vulnerability can be a concrete weakness or even the absence
of a security control within the system (such as a lack of backup power or data destruc-
tion policy, for example) that creates a weakness or vulnerability. The presence of both of
these conditions at the same time creates the potential for danger or harm to a system,
its data, the people, or the facilities. This potential danger is defined as risk, but we will
present a more comprehensive definition of that term in the next few sections. From
the table you can also see that both vulnerabilities and threats directly affect the three
primary goals of security (confidentiality, integrity, and availability). Both threats and
vulnerabilities can also be different combinations of administrative, technical, physical,
and operational in nature.
Threat assessments are often conducted to identify matching threat and vulnerability
pairings, as well as the threat agents that could exercise a threat. Like a vulnerability
assessment, the assessment does not have to necessarily be part of but can definitely sup-
port risk management. Threat assessments are conducted using a wide variety of data,
including historical trends, statistical analysis, industry data, and other information from
sources including the government, vendors, and even the organization.
Impact
Impact is what happens to the organization or to the business when a weakness or vulner-
ability is exploited by a threat. Impact can be expressed as a level of damage to an asset or
the organization itself. It can be seen as how the business or operations of an organization
are affected by a threat that exercises a vulnerability. Impact can also be cumulative; several
smaller impacts that affect different systems within an organization can be additive and
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
10
create a much larger impact on an organization than any one of them would. Impact can
be expressed in terms of revenue lost based upon a complete or partial loss of an asset or
process. It can also be expressed in terms of other concrete numbers or, even in subjective
terms, based upon how serious the organization determines the effect of the event to be.
Likelihood
Likelihood is the probability of a threat exploiting a particular vulnerability. During
threat and vulnerability assessment processes, the organization will normally determine
the seriousness of a threat in terms of its impact if it occurs, based upon a certain level
of weakness in the system. The organization also routinely determines the likelihood of
these threats, given existing security controls and protections for an asset in the organiza-
tion. For example, the likelihood of an intruder that breaks into an extremely secure facil-
ity that has gates, guards, and guns surrounding it, as well as high security fences, might
be extremely low. A different facility without all of these security protections might incur
a much higher likelihood of the same threat. In addition to security controls protecting
an asset, other environmental factors might come into play, such as the facility residing
in a “bad” neighborhood, distance from police and other emergency services, motivation
of the threat agent, and so on. All of these different factors, which are really unique to the
operational environment and asset in question, should be considered when determining
the likelihood that a threat could occur. As with impact, likelihood could be measured in
statistical percentages or subjective terms.
Risk
The four elements just described—vulnerabilities, threats and threat agents, impact, and
likelihood—combine to make up the fundamental parts of risk. Risk is sometimes a dif-
ficult concept to get your arms around because it can be explained with different defini-
tions, especially within the security community. On one hand, risk is a relative level of
danger or harm to an asset. It’s also sometimes defined as the likelihood of a negative
event happening to an organization and impacting its business operations. Another way
of saying it might be the likelihood of a threat exploiting a vulnerability, causing an
impact to an asset.
In any event, risk is a combination of these four factors, and it is a value that can be
relatively measured using these factors. For example, impact can be expressed in lost
revenue (dollars), lost productivity (labor hours), or even loss of market share (a drop in
sales). Likelihood can be measured as a statistical probability (a percentage, for example)
or even a subjective measurement, such as high, medium, or low. Threats and vulner-
abilities can be a little bit more difficult to assign concrete values to; usually these values
are also subjective, such as high, medium, or low designations. Later in this chapter, we’ll
discuss how these values can be measured and risk can be expressed, using either quanti-
tative (expressed as numbers) or qualitative (expressed using subjective values) methods.
Figure 1-3 attempts to bring together all of these factors to illustrate their relationships,
helping you to better grasp the concept of risk.
Causes
Produces
Risk Impact
Two terms associated with risk that we will briefly describe here include inherent risk
and residual risk. Inherent risk is associated with any endeavor, including risk associ-
ated with technologies, business processes, markets, and so on. All endeavors that busi-
nesses embark on contain some inherent risk that may be both unique to the particular
endeavor and common to a technology or process. Residual risk, which we’ll discuss in
depth later in the book, is the risk that remains after we have taken steps to respond to
risk, either by reducing it or by mitigating it. It is a commonly accepted fact within the
risk management community that risk can never be entirely eliminated; it can only be
reduced to a manageable or acceptable level. Residual risk is normally the amount of risk
left over after you’ve taken these steps, which must then be accepted. We’ll discuss more
about risk response in Chapter 5.
It’s worth mentioning here that organizations typically maintain data associated with
risk, including identified threats and vulnerabilities, as well as their likelihood and impact
determinations, in what is known as an enterprise risk management (ERM) program. In
addition to being a system that records and assists in analyzing risk management data,
ERM is also the formal management program, including processes and methodologies,
that the organization uses to manage risk throughout its entire life cycle.
EXAM TIP Understand the differences and relationships between the four
risk elements of threats, vulnerabilities, likelihood, and impact. Threats
exploit vulnerabilities, and the level of risk is based upon the likelihood of
the threat exploiting a given vulnerability and the impact to the system if
it occurs.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
12
Risk Culture, Appetite, and Tolerance
An organization normally has a risk culture, which is essentially how the organization as
an entity feels about and deals with risk. This culture is developed from several sources.
First, it can come from the organization’s leadership, based upon their business and man-
agement philosophies, attitudes, education, and experience. It can also come from the
organization’s governance. Remember that governance is essentially the rules and regula-
tions imposed either by external entities (in the form of laws, for example) or internally
by organization.
In any case, the culture of the organization really defines how the organization feels
about risk and how it treats risk over time. As part of the organization’s risk culture, there
are its risk appetite and risk tolerance. These are different terms you also need to know to
understand risk. Risk appetite is, in effect, how much risk an organization is willing to
deal with in any given endeavor. This is the general level of risk that an organization is
willing to accept in the course of its business. An organization’s risk appetite is driven by
the corporate risk culture, in other words, by the environment the organization exists in
(market, regulation, and other external factors).
Risk tolerance, on the other hand, is the acceptable level of deviation in risk for a
particular endeavor or business pursuit. Risk tolerance is how much variation from the
expected level of risk the organization is willing to put up with. There’s a certain amount
of risk in every business enterprise or pursuit; however, the organization may not be able
or willing to tolerate large deviations from what it considers is its acceptable level of risk
on an endeavor.
EXAM TIP Know the differences between risk appetite and risk tolerance; risk
appetite involves how much risk the organization is willing to endure, and
risk tolerance is how much variation from that amount is acceptable to the
business for a particular venture. Risk culture drives both of these factors.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
14
Step 1: Categorize Information Systems This step involves inventorying the
types of information on target systems and assigning categorization levels to that infor-
mation based upon the level of impact based upon if the security goals of confidentiality,
integrity, and availability were affected or compromised for that particular information
on the system. This step uses subjective values of high, medium, and low to assign values
to each of the three goals for a particular type of information. Types of information pro-
cessed on the system could include business-sensitive information, financial information,
protected health information, and so on. FIPS 199, as well as NIST Special Publication
800-60, provides detailed guidance on categorizing information systems.
Step 2: Select Security Controls Based upon these individual values, as well as
an aggregate of them, step 2 involves choosing the applicable security controls you would
assign to each information system. This step provides baselines of security controls based
upon the high, medium, and low values assigned during step 1. If the aggregate value of
information or a system has been rated as high, for example, then the high baseline of
security controls is employed for that system. Once the security control baseline has been
established, the organization has the latitude and flexibility to add or subtract security
controls from the baseline as it sees fit based upon different factors including the applica-
bility of some controls, the environment the system operates within, and so on. You can
find the selected controls in the supporting NIST Special Publication 800-53, revision 4,
which contains a catalog of all of the NIST controls.
Step 3: Implement Security Controls In this step, the selected controls are
applied to the information systems, and data is processed on those systems. This in itself
is a large process that can cover a good deal of the life cycle of the system in question,
and it may take significant time and resources. In this step, the organization is essentially
securing the information system against any validated threats and protecting identified
vulnerabilities.
Step 4: Assess Security Controls This step is where a lot of security profes-
sionals who manage certification and accreditation activities or perform risk assessments
come into the picture. During this step, the controls that the organization selects for the
information system are formally assessed, verifying that they implement them correctly
and validating that they perform as they were designed. They are assessed based upon
their effectiveness in protecting against the threats they were implemented to protect
against. During this step, the system is assessed in its current state, with all existing
controls and mitigations in place. Based upon the assessment, there may be recommen-
dations for further controls and mitigations, as well as alterations to existing security
posture for the system. In this step, the level of risk to the system and its data is normally
analyzed and determined.
Step 5: Authorize Information Systems Step 5 involves the decision from the
entity with the power to authorize a system to be implemented and put into operation.
This decision is based upon various factors, including the level of risk assessed during
step 4, the risk appetite the organization has settled on, and the tolerance for risk that
Repeat as necessary
Step 1
CATEGORIZE
Information Systems
FIPS 199/SP 800-60
Step 6 Step 2
MONITOR SELECT
Security Controls Security Controls
RISK FIPS 200/SP 800-53
SP 800-137
MANAGEMENT
FRAMEWORK
Figure 1-4 The NIST Risk Management Framework (courtesy of NIST, from Special Publication
800-53, revision 4)
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
16
As you can see from Figure 1-4, each step of the RMF has associated NIST publica-
tions that provide guidance on performing that particular step. Additionally, however,
there are also NIST publications that help you manage the overall risk process within the
organization. These publications support the RMF by providing more detail on processes
and activities, such as managing risk in the organization, implementing the RMF, and
even performing risk analysis. The three primary standards that support the RMF are:
COBIT 5 (ISACA)
Control Objectives for Information and Related Technology (COBIT) is a framework
developed by ISACA; it covers several key areas in business governance and IT enter-
prise management. COBIT covers key areas in auditing, compliance, information assur-
ance, IT operations, and security risk management. This framework has been around
for several years and through several iterations; COBIT 5 integrates several other frame-
works developed by ISACA into a single unified framework, including the Risk IT, Value
(Val) IT, and the IT Assurance Framework (ITAF). It also provides for easy integration
of other popular frameworks and standards, including The Open Group Architecture
Forum (TOGAF), the Project Management Body of Knowledge (PMBOK), the Infor-
mation Technology Infrastructure Library (ITIL), Projects In Controlled Environments
2 (PRINCE2), the Committee of Sponsoring Organizations of the Treadway Commis-
sion (COSO), and the many International Organization for Standardization (ISO) stan-
dards. This interoperability enables new users of COBIT to leverage any of these other
standards they have already been using in their adoption of COBIT.
COBIT combines the best of tried-and-true standards into its fold; it is compat-
ible with the principles of ISO/IEC 38500:2008, Corporate Governance of Information
Technology, for example, and provides strategy and activities supporting those principles.
COBIT also is interoperable, to various degrees, with standards such as the ISO/IEC
27000 series of standards and covers similar security and risk management areas under
its domains.
COBIT consists of two layers in its model, governance and management, and sepa-
rates those two layers into five governance processes and four management domains,
respectively. These layers further break down into a total of 37 separate processes.
Table 1-2 quickly summarizes these layers and domains and the process they decom-
pose into.
Note that while COBIT covers a variety of business and IT processes and areas, those
specific to risk management happen at both layers—governance and management—and
are tightly integrated with other processes. COBIT in this regard is not a risk manage-
ment framework per se, as is NIST’s RMF, but offers a broader view of management and
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
18
governance across all major areas of a business. The next topic we cover, ISACA’s Risk
IT Framework, supports COBIT and provides a more granular view of risk management
practices and activities.
Risk Governance (RG) RG1: Establish and RG2: Integrate with RG3: Make risk-aware
maintain a common ERM business decisions
risk view
Risk Evaluation (RE) RE1: Collect data RE2: Analyze risk RE3: Maintain risk
profile
Risk Response (RR) RR1: Articulate risk RR2: Manage risk RR3: React to events
Table 1-3 The Domains and Processes of ISACA’s Risk IT Framework
EXAM TIP While you may not be expected to know the intricate details of
each framework described here, it will be helpful to know at least the basic
characteristics and descriptions of each. You may be asked to identify a
particular characteristic of a framework on the exam.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
20
a service. Organizational senior management defines the business’s mission, goals, and
objectives, typically on a strategic or long-term level. Senior management also defines the
levels of risk tolerance and appetite, based upon factors that include the market space,
operational environment, economy, governmental regulation, and so on. These risk levels
directly articulate and support the business mission, balancing business opportunity that
can generate revenue and move the business forward with potential negative events that
may cause the business to fail, or at least have a detrimental impact to the organization.
TIP Remember that risk appetite and tolerance are directly related to the
business mission, although different business pursuits may have varying
levels of each. Senior management sets those levels based upon the
potential rewards from risky opportunities and the amount of loss the
organization could endure if those rewards don’t materialize.
EXAM TIP Many elements of risk management can be traced back to the
three information security goals or the security tenets discussed earlier in
the chapter. You should be able to examine risk and determine how it can be
traced back to (and how it affects) those goals and tenets.
Organizational Structures
How the business is organized can help drive how it deals with risk, in several ways.
Most businesses are organized from a functional perspective; in other words, there are
departments and other hierarchical structures established to take care of specific func-
tions that contribute to the business goals and objectives. For example, in a production-
driven business, there may be a manufacturing or production department, an engineer-
ing department, a research and development department, or an assembly line. There
will likely be additional departments that cover support functions, such as marketing,
accounting and finance, public relations, and so on. A hospital, on the other hand, will
be organized according to its specific functions, such as the emergency department, sur-
gery, neurology, radiology, and so on. Businesses in other markets or areas will be orga-
nized differently as well. In any case, the organization of the business is structured as its
mission and business purposes dictate. There are certain functions that may be found in
any business and may deal with information technology, information security, or even
legal compliance. These functional areas may have the primary function of dealing with
risk, but an important thing to consider is that all different organizational structures,
from lower-level work sections to higher-level departments and divisions, have responsi-
bilities regarding risk.
The organization must look at its structure and decide how each individual unit will
manage risk at its own level, understanding that risk management must be uniform
throughout the entire organization. Another consideration is that risks tend to “roll up,”
or be combined at the higher levels of organization. For example, risks that the account-
ing department incurs are only part of the higher organizational levels’ risks and included
in the risk management processes. Each lower-level unit in an organizational hierarchy
has risks that are part of the next higher levels’ risk considerations. While individual units
may be responsible for only a small piece of the overall organizational risk, their parent
units also bear responsibility for managing that risk, as well as the risk of other subordi-
nate units. Another concept relating to organizational structures is that the risk incurred
by one part of the organization is borne by all parts of the organization; there is almost
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
22
no such thing as risk that affects only one small part of the business. Risk ripples across
the entire organization in some way.
Each individual unit, whether it is a unit in the lower levels of the business hierarchy
or at the highest levels, must take steps to identify, evaluate, and assess risks at their level.
Risks may be thought of as tactical, operational, and strategic. Tactical risks are those that
are encountered by smaller-level production sections, in other words, those that carry out
the day-to-day work of the organization. Operational risks can span several work units
and relate to how the business conducts its functions, as well as how the different work
units interact with each other. Strategic risk is borne at the higher levels of the organiza-
tion, including senior management, and involves risks incurred by leading the business
toward opportunities and away from decisions that exceed the organization’s capacity
for risk appetite and tolerance. Respectively, these three types of risks also correspond to
short-term, mid-term, and long-term risks.
Regardless of the level of risk incurred within the organization, there must be an enter-
prise risk management strategy and program in place to deal with the lower-tier, middle-
tier, and higher-tier risks, as well as ensure that all of the risks are managed consistently
and uniformly. Governance from the higher levels of the organization affects risk appetite
and tolerance and shapes the organization’s risk management strategy throughout all the
different hierarchical levels. Organizational structure must support that governance, as
well as clearly define lines of authority and responsibility in terms of risk leadership and
management.
Platforms
Platforms are the operating systems and distinct architectures the business information
systems run on. Businesses could use the Windows and Unix platforms or the Intel
and SPARC platforms. Platforms are an element of the IT infrastructure that contrib-
utes to the information security and business risk for several reasons. First, it costs to
Networks
A network is another aspect of the IT infrastructure that inserts risk into the business
environment. While networks are necessary to carry data both within and outside of the
organization, these benefits do not come without some degree of risk. Risk can be intro-
duced from a variety of issues, such as unsecured protocols, lack of encryption for data in
transit, improper data or system access through weak authentication mechanisms, inter-
ception and modification of data, and so on. Networks should be designed to carefully
control traffic during all aspects of data transmission, routing, and reception in order for
a network to be considered secure.
Applications
Applications introduce risk simply because in this day and age they’re so critical to the
operations of businesses. Businesses need not only basic word-processing and spreadsheet
software but also complex databases, line-of-business applications, specialized software,
security software, and other types of applications. Applications have to be managed to
their own life cycles as well; they’re constantly being patched, upgraded, superseded, and
replaced by better, faster software with more features that usually cost more. Risks that
are inherent to managing applications within an organization include supportability,
backward compatibility, data format compatibility, licensing, and proper use.
Adding to this complexity are the decisions an organization makes in terms of select-
ing proprietary software, open source software, general-purpose commercial software, or
highly specialized software. All of these different categories incur different levels of cost,
supportability, licensing, and feature sets. Interoperability also plays a part in application
risk, like it does with other infrastructure components. Applications that do not use com-
mon data formats or produce usable output for the organization create risk of expense
or additional work that goes into transforming data between incompatible applications.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
24
Applications also introduce risk into the business environment with the level of security
mechanisms built into them and how effective those security mechanisms are in protect-
ing data residing in the application.
It’s worth mentioning here that web-based applications, in addition to presenting the
same risks as normal client-server apps, also have their own unique risks. Security is a defi-
nite risk imposed by web-based applications since they often directly connect to unpro-
tected networks, such as the Internet. Other risks include those that come from the wide
variety of web programming languages and standards available for developers to use.
Databases
Databases, as a subset of applications, impose some of the same risks that applications
and other software do. Additionally, databases incur risks associated with data aggrega-
tion, compatibility, privacy, and security. Aggregation and inference are risks associated
with database systems. Unauthorized access and data loss are also huge risks that data-
bases introduce into the enterprise environment.
Operating Systems
Although we discussed platforms in a previous section, it’s worth mentioning operating
systems as their own separate risk element in the IT infrastructure. Platforms and oper-
ating systems are sometimes used interchangeably, but truthfully, a platform is more a
hardware architecture than an operating system categorization. A platform could be an
Intel PC or a tablet chipset, for example, which is designed and architected differently
and run on totally different operating systems. Different operating systems, on the other
hand, could run on the same platform but still introduce risk into the organization, for
the same reasons discussed previously with applications. First, there are interoperability
and supportability risks and all of the other issues that go hand-in-hand with the nor-
mal operating system life cycle, such as patch and vulnerability management. Licensing,
standardization, level of user control, and configuration are also issues that introduce risk
into the organizational computing environment.
Risk Ownership
Risk ownership is a concept that provides a focal point for responsibility and account-
ability for managing risk throughout its life cycle, including identifying it, assessing and
evaluating it, responding to it, and monitoring it. Risk owners take responsibility for risk
in their own functional domains within an organization, although you should under-
stand that the risk from several areas is usually “rolled up” into overall organizational risk
and is owned by the senior executives or board members who are legally responsible for
the organization. There are several components to risk ownership.
The first component is governance. Governance, remember, can be external laws
and regulations that the organization is required to comply with. It can also be internal
regulations and requirements set by senior leadership within the organization. As part
of governance, the organization should set a formal risk strategy and risk management
plan, which should detail how risk ownership is defined within the organization. Risk
ownership may be defined by functional area, hierarchy within the organization, or any
number of other factors.
Other components of risk ownership include responsibility, accountability, and the
ability to control the resources that can effectively manage risk (people, funding, equip-
ment, supplies, facilities, and so on). Responsibility means someone has been given the
formal authority to manage risk, either by position or by specific appointment from the
organization’s leaders. A risk owner may have responsibility for a specific area of risk.
Responsibility also means that the risk owner bears the burden of being held accountable
for their actions in risk management. Accountability means that risk owners must be
prepared to take the consequences for success or failure of the risk management efforts.
Finally, risk owners must be given the resources and the authority to control those resourc-
es in order to effectively manage risk within their area of responsibility. If they have the
responsibility and accountability but don’t have any control over resources to help manage
risk, they will be quite ineffective and won’t be able to meet their responsibilities.
EXAM TIP Remember that regardless of what area within the organization is
considered a risk owner, ultimately the responsibility for owning and
managing risk belongs to the highest level within the organization. This
would likely be either the person or the group that has legal liability and
responsibility for the organization, such as the chief executive officer (CEO)
or the board of directors, as appropriate.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
26
Risk ownership is directly affected by appetite and tolerance. Since these two factors
are derived from the organization, they are defined by senior leaders and management,
boards of directors, shareholders, and other key entities within the organization. Gover-
nance can also help drive risk appetite and tolerance; the organization may establish rules
and regulations that strictly limit or are less restrictive toward taking and managing risk.
The organization’s take on appetite and tolerance directly affects risk ownership because
risk owners must manage the risk within their areas based upon these two factors in order
to be in line with the organization. Senior leaders, shareholders, and boards of directors
must establish the organizational risk culture in order to give boundaries to risk owners
within the organization. They may also require that risk owners consult and validate risk
decisions with senior management, based upon different threshold or tolerance levels.
EXAM TIP Remember that risk acceptance and tolerance come from the
senior management levels of the organization and drive the organization’s
risk culture. They also drive how risk ownership is defined and structured
within the organization.
Risk Awareness
Risk awareness is a necessary part of risk management. It can’t be viewed as simply just
another two-hour training session to check a box for management or compliance. Risk
awareness is essential because it helps form and maintain the organization’s risk culture.
It also educates personnel at all levels of the organization, including employees, manag-
ers, and senior leadership, on the organization’s risk strategy, its appetite and tolerance
levels for risk, its risk management plan, and other relevant topics necessary to manage
risk in the organization. Beyond the education on organizational governance and risk
management processes, awareness training can give all members of the organization the
knowledge they need to better identify, assess and evaluate, and respond to risk. Risk
awareness training may be required for compliance with governance in some cases, but
even if it’s not, it should be considered critical to the overall risk management strategy in
the organization and given its due consideration in the organizational priority list. The
next two sections will discuss the different tools and techniques used in risk awareness
training and how to develop a risk awareness program within an organization.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
28
population, but specific instances of threats and vulnerabilities, risk factors, and so on,
should be provided to risk managers in key areas so they can keep updated on the most
current risk posture for the organization.
TIP While training programs are sometimes the first things that are cut
from the budget or the last things to be developed in a program, don’t
underestimate the importance of risk awareness training within the overall
risk management strategy. Not only can training make the risk management
process within the organization more effective, but it can also help reduce or
mitigate risks by itself since it also has the effect of educating people on risk
and this alone may even help minimize it.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
30
type of consumer credit cards or maintain financial information on individuals, they
likely fall under at least the PCI-DSS, if not others. However, even if your organiza-
tion does not fall under one of the previous categories, you may have legal or regulatory
requirements to maintain a risk management program. Often, businesses are members of
the industry associations or professional organizations that require risk management as a
condition of membership. Additionally, contractual agreements with other organizations
often have stipulations built in that require risk management.
Some of these nonregulatory requirements may include requirements for the organi-
zation to have a risk management program, for the organization to perform risk assess-
ments and analysis, and for the organization to demonstrate due care and diligence in
reducing or mitigating risk. While some of these requirements might not be specifi-
cally stated as “risk management” activities, they may come in the form of requirements
to maintain security policies, require separation of duties or data, implement standard
safeguards (such as strong authentication and encryption methods, for example), and
periodically test systems for vulnerabilities. Regardless of how they are stated in policies
or contracts, these requirements can be legally used to determine liability for an organiza-
tion in the event its risk management activities are ever questioned.
When determining legal or regulatory requirements for risk management activities,
you should consult with both your organization’s legal representatives, as well as its
executive management. You should also research any requirements levied by external
organizations or contractual obligations. You must take these requirements into account
when developing a risk management program, as well as when developing an informa-
tion security program. These requirements will likely impact the organization’s stance on
risk, as well as its levels of risk appetite and tolerance.
Chapter Review
In this first chapter, we discussed fundamental concepts of both security and risk man-
agement. The three goals of security, known as the CIA triad, are confidentiality, integ-
rity, and availability. Supporting these three goals are other elements of security, such as
access control, data sensitivity and classification, identification, authentication, authori-
zation, accountability, and, finally, nonrepudiation.
Review Questions
1. Which of the following security goals is concerned with ensuring that data has
not been modified or altered during transmission?
A. Confidentiality
B. Availability
C. Integrity
D. Nonrepudiation
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
32
2. Which the following is most concerned with ensuring that users cannot deny that
they took an action?
A. Accountability
B. Nonrepudiation
C. Auditing
D. Authorization
3. Which of the following terms describes a weakness in a system?
A. Threat
B. Vulnerability
C. Risk
D. Threat agent
4. Which of the following are both necessary for risk to exist and are often paired
together? (Choose two.)
A. Impact
B. Threat
C. Vulnerability
D. Likelihood
5. The likelihood of a threat exploiting a vulnerability, causing an impact on an
asset, describes which of the following terms?
A. Attack
B. Threat agent
C. Exploit
D. Risk
6. Which of the following terms describes the acceptable variation in risk that an
organization is willing to deal with for a particular effort?
A. Risk acceptance
B. Risk appetite
C. Risk culture
D. Risk tolerance
7. Which of the following describes a set of mandatory procedures or processes used
by an organization?
A. Standard
B. Framework
C. Practice
D. Policy
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
34
13. Which of the following terms describes risk that occurs at the lowest levels of the
organization, usually corresponding to short-term risk?
A. Operational risk
B. Strategic risk
C. Tactical risk
D. Enterprise risk
14. All of the following are risks to the enterprise incurred by the organization’s
information systems architecture, except which one?
A. Economical
B. Interoperability
C. Security
D. Supportability
15. Who is ultimately responsible for risk ownership within an organization?
A. Risk assessor
B. Mid-level manager
C. Designated risk owner
D. Senior executives and board of directors
16. What responsibilities do risk owners have toward managing risk?
A. Managing risk for a given area of responsibility throughout its life cycle
B. Eliminating risk from their area of responsibility
C. Informing senior executives and the board of directors about risk levels within
their area of responsibility
D. Delegating risk management responsibilities to a lower-level manager
17. What are the two goals of a risk awareness program within an organization?
(Choose two.)
A. Eliminating risk
B. Informing organizational personnel about the risk environment
C. Training organizational personnel on risk concepts and responsibilities
D. Training risk managers on risk reduction and mitigation techniques
18. In addition to the legal and regulatory requirements for risk management, what
are two other sources of requirements for risk management programs within an
organization?
A. Contractual requirements
B. Risk assessor requirements
C. Industry association requirements
D. Activist group requirements
Answers
1. C. Integrity is concerned with ensuring that data has not been modified or altered
during transmission or storage.
2. B. Nonrepudiation is concerned with ensuring that users cannot deny that they
took a particular action.
3. B. A vulnerability is a weakness in a system.
4. B, C. Threats and vulnerabilities are both necessary for risk to exist and are often
paired together in assessments since you cannot have risk if you have one without
the other.
5. D. The likelihood of a threat exploiting a vulnerability, causing an impact to an
asset, describes risk.
6. D. Risk tolerance is the acceptable variation in risk that an organization is willing
to deal with for a particular effort.
7. A. A standard is a set of mandatory procedures or processes used by an organization.
8. B. COBIT is used in business governance and IT enterprise management.
9. D. Step 2 of the RMF is to select security controls and is accomplished after
information systems have been categorized.
10. C. Maintain risk profile is not a process of the Risk Response domain of ISACA’s
Risk IT Framework; it falls under the Risk Evaluation domain.
11. A. Senior management in the organization defines the organization’s mission,
goals, and objectives.
12. B, D. Information technology is used to generate the business’s information, as
well as protect it.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
36
13. C. Tactical risk occurs at the lowest levels of the organization, usually
corresponding to short-term risk.
14. A. While there is a financial risk involved in capital expenditures for IT,
economical risk is not one specifically introduced into the enterprise as a direct
consequence of the IT architecture.
15. D. Senior-level executives, as well as the board of directors, are ultimately
responsible for risk ownership within an organization, even when a lower-level
person has been designated as a risk owner.
16. A. Risk owners have responsibility for managing risk in their areas of
responsibility throughout its life cycle.
17. B, C. A risk awareness training program is designed to both train organizational
personnel on risk concepts and their various roles and responsibilities related to
risk management and train all personnel on the risk environment in which the
organization resides.
18. A, C. Both contractual requirements, as well as industry associations, may
mandate that an organization have a formalized risk management program.
19. C. HIPAA regulations require a formalized risk management program in order to
protect electronic patient health information.
20. A. PCI-DSS is an industry standard, established by an association of vendors, that
requires stringent information security safeguards as part of a risk management
program.
2
In this chapter, you will:
• Learn how to identify potential threats and vulnerabilities
• Understand the different business initiatives and processes that create risk
• Analyze how threats and vulnerabilities factor into different aspects of enterprise
risk, including areas such as data management, third-party relationships, the
systems development life cycle, project management, business continuity and
disaster recovery, IT operations management, and implementation of new
technologies
This chapter covers the second part of the first Certified in Risk and Information Sys-
tems Control (CRISC) domain and focuses on threats and vulnerabilities associated with
different aspects of the enterprise. Aspects of business we’ll discuss include managing
technology changes, working with external parties, planning for disasters and other nega-
tive events, and managing the information infrastructure that the business depends on
daily. These aspects create risk and are a necessary part of a business.
The CRISC exam objectives covered during this chapter include the following task
statements:
NOTE Throughout the book, the knowledge and task statements are
listed in the order they are described in the CRISC Job Practice areas, not
necessarily the order they are presented in the chapter.
37
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
38
Threats and Vulnerabilities
In Chapter 1 we defined threats and vulnerabilities: A threat is a negative action or event,
which is exercised against a vulnerability (a weakness or lack of security control within a
system or asset). Threats can be categorized in many ways; they can be human-made or
natural, accidental or intentional, internal or external, and so on. By itself, an event or
action is not necessarily a threat against a particular organization or system; there must
be a vulnerability present on that particular system or in that organization that could be
negatively affected (exploited) by the event or action for it to be actually considered a
threat to that system or organization.
A vulnerability could be within an asset, a system, a process, an organizational entity,
or even a person. It could be a weak algorithm, a faulty procedure, a lack of a physical
barrier, an uneducated or careless user, or any of a number of other examples. Weak-
nesses in these elements, or a lack of security protections for them, are vulnerabilities, and
they enable threats to materialize in negative ways when those weaknesses are exposed.
A threat agent (sometimes called a threat actor) is the entity causing or enacting a threat
against a vulnerability.
Threats and vulnerabilities create risk. These two elements alone don’t, however, tell
you the magnitude or level of risk; that’s where the elements of impact and likelihood
come in. One simple method of defining risk in terms of threats and vulnerabilities (not
the only method, by the way) is by using the formula threats × vulnerabilities = risk. You
might not want to think of this formula in strict mathematical terms; it’s more helpful
to look at it as a relationship formula more than a mathematical one. It helps illustrate
the point that threats and vulnerabilities go hand-in-hand in producing risk; if you are
lacking for either a particular asset or a scenario, then you have no risk.
Over the next several sections, we will discuss threats and vulnerabilities from several
different perspectives. Some of these directly relate to business processes, objectives, and
initiatives. All of these perspectives discuss the various threats and vulnerabilities that
affect these different aspects of the business and organization. First, though, we’ll discuss
general concepts in discovering threats and vulnerabilities.
EXAM TIP Keep in mind the definitions of and relationships between threat
agents, threats, and vulnerabilities. Threat agents initiate or cause threats,
which exploit vulnerabilities in a system.
EXAM TIP Threats and vulnerabilities are always expressed together as a pair.
For a given set of circumstances, if you have no threat that could exercise
a particular vulnerability or no vulnerability that could be exploited by a
particular threat, then you have no definable risk for those particular sets of
circumstances.
Threat Assessments
A term that you may occasionally hear is threat modeling. Threat modeling involves look-
ing at every possible threat agent, action or event, attack vector, and vulnerability for
a given system, asset, or process, and then modeling or simulating how it could prog-
ress and the damage that could occur. It has its origins in the U.S. and U.K. defense
industries. A threat assessment examines how these threats could affect the particular
asset, organization, or system you are looking at, in context. With that, a threat assess-
ment could be done on one of several levels, either simultaneously or separately. For
example, you could perform a threat assessment on a new system that is being developed
or installed. You would examine the different threat agents and threats that could affect
that particular system. You could also look at an organizational process, or even the entire
organization itself, and perform a comprehensive threat assessment. In addition to scal-
ing a threat assessment, as we just described, you could look at threats from a particular
perspective, performing a threat assessment specifically for technical threats, physical
ones, or even external operating environment threats. This relates to scope of the assess-
ment. For example, you could look at the technical aspects of a given system or examine
threats inherent to the processes and procedures associated with a particular business
unit. Figure 2-1 shows this scoping and scaling process.
As this figure illustrates, you could scale an assessment to include only certain systems
within certain functional areas. You could scope it by examining not only all of the threats
that apply to the technical aspects of systems in those particular functional areas but also
threats that affect associated business or management processes. You could have any com-
bination of scope and scale that the organization needs to fulfill its assessment goals.
Table 2-1 illustrates how threat agents and threats could be categorized, given factors
such as intent, relationships, skills, and so on. Note that these could affect any number
or combination of elements (processes, systems, and so on) within an organization. You
could categorize threats and threat agents using these characteristics, as well as develop
others that frame and define them for your organization.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
40
Figure 2-1
Scoping and Organization
scaling a threat
assessment
Technical, Physical,
Operational,
Scale
Mission or Business Processes
Managerial
Perspectives
Organizational
System System
Element
Scope
Note that this information is only a sampling of what you may come up with in a
threat assessment. You may also break down some of these elements into far more specific
ones, based upon your needs and the organization and systems you are focused on. For
example, a defense contractor or military organization would likely have a more specific
set of threats and agents in its assessment than would a nonprofit, charitable organization.
Vulnerability Category
Lack of access control policy Administrative
Inadequate encryption mechanisms Technical
Faulty media storage or transport procedures Operational
Use of single-factor authentication Technical
Lack of closed-circuit television (CCTV) cameras near sensitive areas Physical
Table 2-2 Vulnerabilities Developed During a Vulnerability Assessment
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
42
Threat Threat Agent Vulnerability Impact Likelihood Result
Exploit code Malicious Software flaw High Medium Buffer overflow,
outsider unauthorized
access
Data pilfering Malicious Inadequate High Medium Unauthorized
insider permissions on access to data
sensitive files
Fire Careless Lack of fire High Low Loss of systems
employee suppression
systems
Natural Tornado No off-site Medium Low Destruction
disaster storage of of systems
backups and media
containing data
Table 2-3 Combining All Four Risk Elements
are factored in with impact and likelihood to generate a risk assessment. Table 2-3 shows
how a simplistic example might look after factoring in all of these different elements.
Threats
Because business processes and initiatives are so widely different between organizations,
it’s probably difficult to nail down specific threats that could affect these elements, other
than simple generalization. Threats that affect business processes and initiatives include
things that are caused by both external and internal risk factors, such as IT platforms,
new and emerging technologies, software and system supportability, and so on. These
particular factors, focused on the information infrastructure, can affect business process-
es simply because technology is a direct enabler of business. So, business processes could
be greatly enhanced by using new technologies, or even be hindered by them because of
the lack of training or supporting infrastructure the organization may have when imple-
menting new technologies. Since it is a possibility, this is a potential threat if not handled
correctly by the organization. Most organizations find that there is a fine line between
threat and opportunity in the business world.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
44
Vulnerabilities
There are, of course, vulnerabilities inherent to a business’s processes and initiatives that
threats can take advantage of. Again, it’s difficult to state vulnerabilities beyond basic
generalization simply because they are so specific to a particular business, with its mis-
sion and processes, that is operating in a particular business environment. However, there
are several general vulnerabilities that can apply here. Some of the vulnerabilities that
may influence the business processes include dependency on older technologies, lack of
trained personnel, inflexible business processes or methods, an unwillingness to change
or adapt to new technologies and processes, lack of interoperability, lack of security, and
so on. All of these vulnerabilities could negatively affect the business if corresponding
threats were to exploit them.
For instance, if a business has a dependency on older technologies, it may not be
easily able to interact with new markets or business partners that use newer technolo-
gies, systems, data formats, and information-processing methods. It also may not be
prepared to interact with other businesses that use social media or the Web for product
marketing and delivery. So, this would be a serious vulnerability inherent to its business
processes. Another example may come from an organization’s culture. Suppose the key
staff members have been in their positions for years and have adopted a “that’s the way
it’s always been done” attitude toward processes and technologies and are reluctant to
change based upon new market situations, accelerated development and product delivery
requirements, and new enabling technologies. These attitudes are cultural in nature but
are vulnerabilities because they may directly affect an organization’s ability to change to
be more flexible or even secure processes or technologies.
Threats
The threats to a project or program are similar; the major difference is the duration of
the time that the threat represents potential harm to a project or program. Keep in mind
that threats for a project or program aren’t those you might traditionally think of as
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
46
threat sources; they are rarely malicious in nature and come from the business environ-
ment itself. For example, threats to cost are usually those that involve money or resource
issues, such as price increases, currency value fluctuation, stock market variations, and
so on. These are usually external threats; internal threats to costs might include a sudden
budget restructuring, cutting funds for a project, bankruptcy, and so on. Threats to the
schedule might include worker shortage, strikes, inadequate training, delays in contract
negotiations, delays from suppliers, and so on. Scope threats usually involve additional
work because of faulty requirements gathering and decisions about what actually falls
into the project’s scope and scale.
Vulnerabilities
Since vulnerabilities are weaknesses, or a lack of protective controls, the vulnerabilities
found in project and program management are inherent to weaknesses in their critical
elements and processes. For example, a weakness often found in the cost element of a
project or program is a failure of the organization to adequately budget for all of the
resources required for the project. The organization may not list every piece of equip-
ment or every major supply it needs or take into account labor costs such as overtime
in the event of a schedule slippage. It may not adequately negotiate firm prices with a
supplier, who then may raise prices on critical parts or equipment. These are all vulner-
abilities inherent to the budgeting and cost element of a project.
Scheduling also has some common vulnerabilities associated with it. If an organiza-
tion fails to build in potential scheduling delays such as work stoppages, dependencies
on other organizations to fulfill parts of the schedule, or even holidays, this can lead to
problems with completing the project on time. Another scheduling vulnerability is to
incorrectly estimate the amount of time it takes to perform a task or get a piece of work
accomplished.
Vulnerabilities inherent to the scope element of a project affect how much work has to
be done, in what order, and by whom. A work breakdown structure (WBS) is a document
that the project manager develops that covers exactly all of this information, and more.
The WBS describes, in excruciating detail, the work, its subcomponent parts and tasks,
what skill sets are needed, and what resources are required to do the job. Other documents
may break down individual tasks into much more detail, even describing step-by-step how
a task is accomplished. If the project manager and team do not create these documents,
this is a weakness in that the work may not be performed exactly as needed. Resources
may not be adequately allocated for the work, or the work may be performed by unskilled
people. Additionally, the amount and quality of work may not be performed to require-
ments. Failure to set requirements initially in the project and to periodically check and
track the work against those requirements are also vulnerabilities associated with scope
because this can affect whether the work meets the established requirements.
An additional vulnerability that simultaneously affects all three project elements is the
failure to monitor or control all of these elements on an ongoing basis throughout the life
of the project or program. Scope, schedule, and cost must be monitored on a continuing
basis to ensure that they meet the original requirements set forth in the project’s charter.
The project or program manager must monitor and control these things to prevent cost
overruns, schedule slippage, and scope creep. Failure to monitor or control these ele-
ments is a serious vulnerability and could jeopardize the success of the entire project or
program. Table 2-4 gives examples of some of the risk factors, threats, and vulnerabilities
related to project and program management.
Third-Party Management
In today’s business world, an organization rarely functions independently from any other
entities. Most businesses are not entirely independent and self-sustaining; they depend
on other entities, such as suppliers, service providers, and so on, to help them bring their
products and services to market. These third parties often perform services that are out-
sourced from the organization because of a lack of infrastructure or simply a desire to not
perform these functions or services internally. A great example of a third-party service
provider is one that provides cloud services to businesses, such as data storage, applica-
tions, and even entire infrastructures to organizations that don’t have the means or the
desire to create the internal structures needed to manage them internally. Sometimes it is
more cost effective for an organization to simply hire a third party to perform a function
or provide a service than it is to expend the resources to create and maintain all of the
equipment and processes itself.
Sometimes a portion of the risk an organization incurs during a particular business
or IT effort can also be offset by a third party. Transferring risk includes the use of third
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
48
parties to bear some of the risk in performing certain business functions. Insurance is the
classic example of transferring risk used in most risk management training texts, but this
instance usually only provides monetary funds in case of a disaster or liability scenario.
Transferring risk to third parties also includes outsourcing certain functions and services
to third parties, so this, too, is a standard risk treatment method. The organization, for
example, can reduce its risk of accounting and budget errors with a small, untrained staff
by outsourcing its accounting functions to a third-party accounting firm. It’s important to
note that while this strategy of dealing with risk is effective and common, the organization
is transferring only risk, not responsibility. The organization almost always retains final
accountability and responsibility for functions and services outsourced to a third party.
For example, transferring a business’s accounting functions to an outside firm mitigates
risk by transferring some of it to the third party, but the organization is still ultimately
responsible to its stockholders, government regulators, banks, and financial obligations,
even if the accounting firm makes an error. As another example, an organization that
makes use of cloud data storage services still maintains accountability and responsibility
for any data stored with a provider if the provider suffers a breach that results in the release
of sensitive information. While third-party providers may still incur some level of liability
in these cases, the final liability rests with the organization that contracted with them.
Liability, accountability, and responsibility are also some of the key risk factors with third
parties that we’ll discuss next.
Risk Factors
As indicated earlier, several risk factors relate to the legal aspects of dealing with third-
party providers. Most of these risk factors deal with trust in the third-party provider or
in dependencies the organization may have on the provider services. For example, the
organization must be able to trust that the third-party provider will provide adequate
security for any data that is maintained in its infrastructure. In addition to trust as a risk
factor, risk factors include interoperability with existing systems in the organization, data
protection and security, and legal liability. Remember we said earlier that an organiza-
tion can outsource risk to third-party providers, but the organization typically retains
accountability, responsibility, and legal liability. Some legal liability, however, is levied on
the third-party provider since it has a duty to provide services, as well as assurances that
those services will meet certain legal standards, as written in the contract between the
provider and the organization.
The risk factors relating to third-party providers depend upon the types of services
provided, as well as how the contract agreements are set up between the organization and
the provider. A document known as a service level agreement (SLA) is the key to reducing
risk factors when dealing with a third-party provider. The service level agreement stipu-
lates what the third party must provide in terms of level of service, performance, and so
on. It could also specify what security measures a third-party provider must take in order
to protect any organizational data in its custody.
Threats
Like the risk factors mentioned earlier, threats associated with dealing with third-party
providers primarily relate to trust and the contractual and legal aspects of those arrange-
ments. Threats include failure to provide services as specified in contracts, failure to meet
Vulnerabilities
Vulnerabilities that result from associations or dealings with third-party providers include
failure to adequately cover contingencies in contractual agreements, such as system or
data availability or loss, security protections, and service levels. Furthermore, any vulner-
abilities that the third-party provider has inherent to its own organization are, unfor-
tunately, indirectly incurred by any organization that deals with the third party since
those vulnerabilities could affect data in its custody or services it must provide to others.
Examples of internal vulnerabilities that could affect organizations for whom the third
party provides services include infrastructure vulnerabilities (such as loss of equipment or
hacking), organizational vulnerabilities (such as loss of revenue or bankruptcy), or even
technological vulnerabilities (such as lack of sufficient encryption strengths or strong
authentication methods). All these vulnerabilities could indirectly affect any organization
that has a contractual agreement with a third-party provider.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
50
in general, the concepts are the same. Also note that some models are linear, in that they
progress in a sequential manner only, and some are cyclic in some way (repetitive, recur-
sive, or iterative), where a system can be re-introduced into an earlier phase for updates,
for upgrades, or to fix problems or issues.
The first phase of the SDLC normally involves some type of conceptual planning
process, where the need for the system is determined and a general idea is developed of
what the system needs to do and what purpose it will serve. Some models refer to this
as the initiation phase. During this phase, the feasibility of developing or acquiring a
system is studied and includes considerations such as when the system is needed; how
much it might cost; what type of staffing it might need to develop, implement, main-
tain, and support it; what other systems it might need to connect to or interface with;
and so on.
The next phase of the SDLC is generally the requirements phase, which is typically
named as such in most models. During this phase, different sets of requirements are
developed. These requirements might include functional requirements, performance
requirements, security requirements, and business requirements. Requirements dictate
concrete terms, such as what a system is exactly supposed to do, how it will do it, to
what degree, and what standards it must meet. Without a clear set of requirements, there
can’t be any good traceability back to what the system was supposed to do in the first
place. That’s why it’s important to try to accurately cover all the possible requirements
and needs the system may have to meet. This is also where the scope of the development
process is established.
The next few phases can be a bit different based upon the model under discussion
and whether the product being developed is a system or software. System developers
move from the requirements phase into designing the architecture, in terms of devel-
oping a general high-level design of how the system is supposed to work, what major
components it might have, and what other systems it might interface with. Software
developers similarly might design software architecture at a higher level during this
phase. As the SDLC development processes move forward, this overall architecture is
decomposed into smaller pieces, until finally individual components or pieces of code
are developed. Again, how this design process progresses depends upon which model is
being used.
After the design phase, there must be decisions made as to whether to build a system or
software or simply acquire it from a third party. Some systems or software can be bought
from other developers, but some must be developed specifically for the end application
or use. If the system is to be acquired from an outside source, the design specifications
are provided to that developer, and they should, in turn, provide a system or software
that meets the requirements and design. If the system is to be developed, then the next
phase of the SDLC comes into play. During this phase, software is written, and systems
are assembled from individual components.
Following the development phase, many SDLC models include a test phase. In the
test phase, different aspects of the software and systems are tested. There are many dif-
ferent tests that can take place during this phase. Some of these tests might involve
unit testing, which simply means to test an individual component or unit of software
EXAM TIP While you will likely not be expected to know the details of
any specific SDLC model, be familiar with the generic phases of the SDLC:
Initiation, Requirements, Design, Development, Testing, Implementation,
and Disposal. Also keep in mind that different models may refer to these
phases by different names or even combine or separate phases to some
degree.
Development/ Disposal/
Initiation Requirements Design Implementation
Acquisition Retirement
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
52
Risk Factors
Most of the risk factors inherent to the SDLC affect both the entire model and each of
the phases separately. Since the SDLC could be considered to have several different facets,
including a management process, an engineering framework, and even a methodology,
you could say that risk factors that affect the SDLC are also common to other types of
processes. For instance, earlier we discussed risk factors that affect project and program
management. These risk factors affect scope, schedule, and cost. The SDLC suffers from
similar risk factors because each of the phases, as well as the SDLC as a whole, has different
scope, schedule, and cost elements. Each of these phases can also be affected by risk factors
that impact the availability of resources (including manpower, funding, equipment, facili-
ties, and so on), such as management commitment and organizational structure.
Unique risk factors that affect the SDLC include those that affect system changes,
those that affect system configuration throughout the life cycle, and those that affect
releasing different versions of the system as updates take place. Most of these elements
occur during implementation, maintenance, and sustainment of a system but also can
occur in other phases of the SDLC where multiple versions of a system are fielded simul-
taneously, as well as in models where there is a continual iterative process of updating and
upgrading a system or software. Risk factors that affect system changes include how well
the change and configuration management processes work and how changes are imple-
mented into the system. Change and configuration management processes that are not
well managed are risk factors because this could cause changes that are not documented
or not tested for security, functionality, or performance. Additionally, factors such as
the complexity of the system, how the organization is structured to manage the systems
development process, and how rapid system changes occur are potential risk factors.
Threats
Threats to the SDLC manifest themselves when systems are produced that are not interop-
erable or compatible with other systems and their environment or systems that are not
secure. Other threats might include systems that do not meet the requirements they were
originally intended to meet. These threats would definitely affect both the functionality
and the performance of the system. Threats to the design process include faulty design
specifications, as well as faulty requirements input from the previous requirements phase.
Most of the threats to the SDLC come in the form of mismanagement, miscommunica-
tion, incorrect expectations, and lack of a commitment of resources or expertise.
Vulnerabilities
Many different vulnerabilities can affect the SDLC; again, a great many of them were
previously discussed as also affecting the project or program management process. These
vulnerabilities affect scope, schedule, and cost, of course, but can also affect the quality
of the system or product. In addition, the system’s security, functionality, and perfor-
mance are also affected by these different vulnerabilities. While there are probably too
many to list here, examples of vulnerabilities that affect the SDLC start with a lack of
firm requirements and mixed expectations from the different system stakeholders. A lack
of documentation in all phases is also a significant vulnerability to the entire SDLC but
Emerging Technologies
New or emerging technologies can present risks to organizations simply because there are
several different important considerations when integrating the latest technologies into
the existing infrastructure. Many organizations have an unfortunate tendency to rush
out, buy, and attempt to implement the latest and greatest technologies on the market,
without careful planning or consideration of the existing infrastructure and how it will
react to the new technologies. One of the primary considerations organizations must
look at is making a business case for the new technology, which may be to fill a gap that
the older technology does not provide or to provide a capability that the organization
must now have to compete in the market space. In other words, the company really must
justify new technologies to make them worth the risk they could incur.
Risk Factors
Emerging technologies have several risk factors inherent to their integration into the
existing infrastructure. If the organization has been able to justify the implementation
based on a true business need for the emerging technology, it must consider several risk
factors. One of the major risk factors is interoperability with existing infrastructure. Fre-
quently, newer technologies don’t always work properly with older systems right out of
the box; there may be adjustments that need to be made to the existing infrastructure
to integrate the new technology, or bridging technologies may be needed to connect
the two. Interoperability doesn’t just involve the right connections; it can involve data
formats and flows, security methods, and interfaces into other systems. These consider-
ations, and many others, are risk factors that must be taken into account before acquiring
and integrating new technologies.
Another risk factor is security. New technologies may have security mechanisms that
are not necessarily backward compatible with existing ones. Examples include encryption
algorithms and strengths, identification and authentication technologies, integrity mech-
anisms, and even redundant or backup systems. Additionally, the systems may involve a
learning curve that may intimidate users who must now learn new security methods for
the system. The human factor can be a weak link in the security chain, so either a lack
of training or a lack of adaptability to the new security mechanisms can introduce risk.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
54
Earlier, when we discussed the SDLC model, we pointed out that system updates
and changes can be risky if not managed properly. Integrating new technologies into the
environment with older ones can introduce both intentional and unintended changes
into the environment, affecting the stability of the organization’s SDLC with a particu-
lar system, so change is also a risk factor. Even in the disposal or replacement phase of
the SDLC, introducing new technologies to replace older ones can be problematic if
not planned and executed properly. New technologies that are not adequately tested for
functionality, performance, integration, interoperability, and security may not be able to
adequately replace older systems, resulting in extended costs and possibly even requiring
the extension of the older systems’ life cycle.
Threats
Threats resulting from the introduction of new and emerging technologies into the exist-
ing infrastructure are numerous. If the organization has failed to adequately plan for
the new technology, then these threats can become significant. Some of these threats
include untested or unproven technologies, noninteroperability, incompatible security
mechanisms, and suitability of the technology for use in the organization. The organi-
zation could also incur additional cost and require more resources because of a faulty
implementation. These threats can be minimized by careful planning and integrating
new technologies using a stable SDLC model.
Vulnerabilities
As with threats, vulnerabilities that go along with working with emerging technologies
are numerous as well. Vulnerabilities could include a lack of trained staff committed to
managing and implementing the new technology. Lack of adequate project planning
is also a serious vulnerability that could affect the organization’s ability to effectively
integrate new technologies. Another vulnerability could be a weak support contract or
other type of warranty, guarantee, or support for a new technology or system. Most of
these vulnerabilities appear when the new technologies are first implemented and tend
to become mitigated or lessened as the technology is integrated into the existing infra-
structure but still exists.
EXAM TIP The key areas of concern with emerging technologies are
interoperability and compatibility. These two concerns affect the security,
functionality, and performance of the new technologies when they are
installed into an existing infrastructure.
Management of IT Operations
Managing the IT infrastructure is one of the most work-intensive efforts in an organiza-
tion, especially in a larger business. The IT infrastructure in an organization covers a
broad scope of areas. Infrastructure, of course, covers employee workstations, printers, and
other end-user devices. It also covers the major pieces needed to conduct business, such
as servers, cabling, switches, routers, and a variety of other network and security devices.
Risk Factors
The management of IT operations incurs risk factors previously discussed in other sec-
tions of this chapter. These include the size and complexity of the organization and its
IT infrastructure, the criticality and priority of the different systems that make up the
infrastructure, and the internal management processes of the organization. Resourcing
issues also affect the management piece of IT operations, such as staffing the right people
who are trained on the various technologies the organization needs and creating and
maintaining a budget that supports maintaining the current level of support, as well as
future growth for IT. Additionally, compliance with legal and governance requirements
in the face of increased regulation is a risk factor the IT managers must deal with.
Organizational structure also affects IT operations because the IT infrastructure may
be managed on either a centralized or decentralized basis, sometimes by one centralized
IT shop or, in the case of larger organizations, by multiple areas within other divisions
that are delegated the task of managing their own piece of the infrastructure. IT might
also be managed on a functional basis; the accounting and human resources divisions
may have responsibility for managing the systems that support their mission. Addition-
ally, the IT infrastructure may be managed on a geographical basis, in the case of physi-
cally separated locations in large organizations. All of these structural considerations are
factors that contribute to risk in managing IT operations.
Also directly affecting IT operations risk are two key processes: the change and config-
uration management processes. We’ve already discussed risk factors that affect the SDLC
model in an organization, as well as how new and emerging technologies can affect the
existing infrastructure. These same risk factors also directly affect the daily management
of IT operations simply because they introduce change into the network. Some of this
change can be planned and carefully introduced, but often there is change, from the
large-scale network side all the way down to individual configuration items on hosts,
that may cause unforeseen changes and affect the network in different ways. How the
organization deals with change and configuration management is a risk factor that affects
not only the SDLC but also the day-to-day operations management.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
56
Threats
Threats that affect the IT operations are similar to those that affect other areas of the
business and can be external or internal threats from a variety of sources. Some of these
threats have a ripple effect in that they may first affect other areas of business and in
turn affect IT. For example, the threat of a poor economy may affect the profitability
and sustainment of the business, resulting in making cuts, which often include IT
personnel or equipment. Obviously, there are also direct threats to the daily manage-
ment of the IT infrastructure. These include external threats such as hackers, of course,
but also more common ones such as increases in cost to maintain operations, issues
with external service providers, and disaster-related events (weather, fire, and so on).
Internal threats can include those carried out by malicious insiders or even careless
employees, such as theft, sabotage, accidental equipment breakage, and so on. Internal
threats can also come from management processes and include budget cuts, loss of
trained personnel, shifts in organizational priorities, and transitioning from one mar-
ket segment to another.
Vulnerabilities
Technical vulnerabilities are beyond the scope and purpose of this book; our focus here is
on those associated with the IT management aspect of the organization. Vulnerabilities
affecting IT management include faulty processes and procedures, lack of resources, and
lack of trained technical personnel. An end-user population that has not been trained or
held accountable for proper care and treatment of the infrastructure can also be a vulner-
ability. Other vulnerabilities might include a lack of infrastructure monitoring, lack of
control of sensitive information in IT systems, and failure to maintain a stable SDLC
throughout the entire infrastructure.
Data Management
Data management is a holistic way of controlling all the various information and data
that the organization uses and processes and includes considering its various formats,
how it is used, how it must be stored and transformed, and, of course, the confidentiality,
integrity, and availability of the data. While we won’t be discussing the technical aspects
of a database management system (DBMS), we will discuss some of the various aspects
of managing data processed in those systems, as well as what risk factors they face, threats
to data, and vulnerabilities that plague data and database management systems.
Information technology and security personnel are responsible for the systems that
process data, as well as keeping data secure from a technical perspective. However,
typically there are personnel in the organization who are formally assigned as the
responsible party for the overall management of a particular class or set of data. That
position is called a data owner. The data owner has overall responsibility for determin-
ing who should access data, determining how it should be used, and making decisions
regarding its security and processing. In coordination with both technical and risk
management personnel, the data owner should be cognizant of risk potential with
data in database systems.
Threats
Most of the threats that are common to data and database systems directly affect confi-
dentiality, integrity, and availability. Confidentiality threats come in the form of unau-
thorized access to data that ranges from unintentional access by unauthorized employees
to malicious insiders who purposefully attempt to access data to outside hackers who are
actively trying to infiltrate the organization’s network and steal or modify data. Integrity
threats are a large concern with data simply because unauthorized modification can result
in many different types of processes in the organization being conducted with errors.
These can include financial transactions, healthcare transactions, or even erroneous
transactions with personal data. Finally, threats that affect availability include accidental
or intentional deletion of data, database system downtime, or any other instance where
users can’t access the data they need in order to do their job.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
58
Vulnerabilities
Likewise, vulnerabilities that data and database management systems incur also directly
affect the three goals of security: confidentiality, integrity, and availability. From a con-
fidentiality perspective, vulnerabilities might include the lack of adequate permissions
on database objects, such as tables or queries; lack of encryption for sensitive data; and
failure on the part of the data owner to adequately classify data based on sensitivity level.
Integrity vulnerabilities might include lack of permissions for personnel authorized to
change data, inability of the database system to control changes to the data, lack of a
transaction checking or rollback process in DBMSs, and, of course, old, unreliable stor-
age media that might affect data stored on it. Vulnerabilities that might affect availability
could include inadequate or faulty backup processes, lack of trained personnel, outdated
equipment, equipment that doesn’t have the capacity to handle the organization’s data
backup requirements, lack of redundant systems or capabilities, and so on.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
60
NOTE Much more information on business continuity and disaster recovery
planning can be found in the NIST Special Publication 800-34, “Contingency
Planning Guide for Federal Information Systems,” which was written for use
by government agencies but can be used by anyone or any business to help
understand and plan for business continuity.
Risk Factors
Resilience is a term that refers to the ability of the business to survive negative events and
continue with its mission and function. In other words, it could be said that resilience
is the ability of an organization to resist the effects of negative events and its ability to
bounce back after one of these events. Resilience can affect to what degree different risk
factors, as well as threats and vulnerabilities, impact the normal business operations of the
organization. A more resilient organization can better tolerate risk factors and the effects
they have on the organization’s ability to prepare for and respond to negative events.
There are various risk factors that can affect the organization’s ability to respond to
disasters, as well as continue the business and mission functions after it has recovered
from the disaster. Some of these risk factors are inherent to the organization itself; these
include size of the organization, its facilities, its people, and how well it has performed
business continuity and disaster recovery planning. A higher level of management com-
mitment to business continuity planning reduces the effect of risk factors on the busi-
ness; less commitment may render the organization more susceptible to these risk factors.
A larger organization may have more complexity in terms of numbers of people to take
care of during a disaster, as well as numbers of critical assets or processes that must be
planned for. Small organizations don’t necessarily have an advantage, however; a small
organization may have fewer resources to adequately plan for and address business con-
tinuity and disaster recovery.
Another risk factor that an organization could face is physical location and geography.
For example, a business situated on the U.S. Gulf Coast is probably more susceptible
to adverse weather, such as hurricanes and tornadoes, than a business located inland.
Businesses that are located in areas that are prone to heavy flooding or have forest fires
or extreme snow storms at various times of the year should plan for these weather con-
ditions appropriately. Distance could also be a risk factor; if the organization is located
farther away from population centers or infrastructure services (such as fire departments,
police, hospitals, telecommunications providers, and so on), there is a greater risk that
the organization could not adequately respond to a disaster.
Earlier in the chapter we discussed risks associated with third-party providers, and
these providers can affect business continuity and disaster recovery as well. Yet another
risk factor could be the degree of outsourcing the organization is involved with. A busi-
ness that outsources some of its processes or key functions may have less control over
those functions or processes during an incident or disaster. They may be at the mercy of
the third party with whom they are contracted and subject to the third party’s disaster
recovery strategies (or lack thereof ). Business continuity and disaster recovery are two
areas that should be carefully considered when engaging in business with any external
provider, usually through a service level agreement or other method.
Threats
Most people associate the threats involved with business continuity and disaster recovery
with natural disasters. Obviously, there are the natural threats that exist, such as severe
weather, earthquakes, fires, and so on. These are threats that can’t be typically prevented
or neutralized, but they can be planned for. Hardened facilities, adequate ventilation,
fire suppression systems, and other physical or environmental controls can mitigate the
damage from these threats. There are also human-made threats that can affect the abil-
ity of an organization to recover from an incident or continue to function. These can
be broken down into unintentional and intentional threats. Intentional threats include
those associated with hackers, terrorists, theft, and other malicious actors and activities.
Unintentional threats may be attributed to accidents that are caused by carelessness, lack
of training, and so on. All of these threats, both natural and human-made, are usually
the type that cause incidents or disasters. However, there are also threats to the continuity
management process.
Threats to the business’s ability to manage its continuity and disaster recovery include
incomplete or inadequate planning, as well as limited resources to carry out any business
continuity planning (BCP)/disaster recovery planning (DRP) activities. Because of regula-
tory considerations in many cases, a business usually must have some degree of business
continuity planning accomplished; the real threat centers on whether it is enough and
adequately covers the different facets of recovery and continuity that the business must
consider. Usually, inadequate planning or insufficient resources committed to this area are
a result of shortsightedness on the part of the organization’s leadership and management.
Vulnerabilities
A wide variety of vulnerabilities can affect the ability of an organization to respond to
and recover from an incident or disaster. The same vulnerabilities can also in turn affect
the organization’s ability to continue to function at some level or degree after the disas-
ter. Some of these vulnerabilities involve the lack of resources, such as a lack of person-
nel, lack of equipment or facilities, or dedicated recovery resources. For instance, if the
organization has not acquired an alternate processing site, there may be no way it can
quickly recover its operations back to a functional state. Other vulnerabilities include
the lack of training for personnel tasked with disaster recovery or business continuity
responsibilities. Additionally, there are also process vulnerabilities. Process vulnerabilities
are those that result from a failure of the organization’s management to adequately plan
for, staff, and equip continuity management efforts. For example, a lack of management
commitment is a vulnerability that will certainly lead to a lack of training, resources, and
personnel dedicated to continuity management. An inadequate or nonexistent business
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
62
impact assessment is a vulnerability because an organization won’t be able to adequately
identify its critical processes or assets and determine how the loss of those critical items
impacts the organization. Another critical vulnerability could be faced if the organization
has failed to adequately test the response plan.
EXAM TIP Be familiar with the different business process areas and their
respective risk factors, threats, and vulnerabilities. Remember that risk
factors, while not a threat or a vulnerability, contribute to the overall risk
of the organization by increasing or decreasing the likelihood or impact
of threats exploiting vulnerabilities or the organization’s resilience to
negative events.
Chapter Review
In this second part of our discussion on Domain 1 topics, we covered additional infor-
mation on threats, threat agents, vulnerabilities, and risk factors. We examined these
different elements from a business perspective, rather than from purely a technological
perspective. This is important because most of the risk a business incurs comes from
engaging in the normal business operations, both day-to-day and strategically. We looked
at risk from the different processes that go on in a business, such as the internal business
processes, dealings with third parties, the systems development life cycle process, and
business continuity and disaster management. We discussed the different risk factors,
threats, and vulnerabilities that are inherent to each of these processes and how they
introduce risk into the organization and affect its mission and goals.
Review Questions
1. For a negative event or action to materialize and cause risk to an organization or
system, what other factor must be present?
A. Risk factor
B. Vulnerability
C. Threat agent
D. Threat
2. Which the following collects information about different actors and negative
events that could exploit the vulnerabilities in a system?
A. Threat assessment
B. Vulnerability assessment
C. Compliance assessment
D. Penetration test
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
64
8. Failure to determine exactly what standards or needs a system must meet in terms
of functionality, performance, and security is a vulnerability of which of the
following phases of the systems development life cycle?
A. Implementation
B. Development
C. Design
D. Requirements
9. As a risk practitioner in a larger organization, you have been asked to review
the company’s SDLC model for potential risk areas. The model includes the
Requirements, Design, Development, Implementation, and Disposal phases.
Software and systems are moved from the development environment immediately
into the production environment and implemented. Which SDLC phase
would you recommend that the business add to reduce risk of integration or
functionality issues as the system is implemented?
A. Initiation
B. Test
C. Sustainment
D. Maintenance
10. Lack of a well-written work breakdown structure document can contribute to a
vulnerability that affects which aspect of project management?
A. Cost
B. Schedule
C. Scope
D. Quality
11. Which of the following are two elements that are critical in planning a threat or
vulnerability assessment?
A. Scope and scale
B. Threat agents and threats
C. Impact and likelihood
D. Vulnerabilities and risk
12. Which of the following is the major risk factor associated with integrating new or
emerging technologies into an existing IT infrastructure?
A. Security mechanisms
B. Data format
C. Vendor supportability
D. Interoperability
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
66
18. Which of the following is a short-term process primarily concerned with
protecting personnel, facilities, and equipment immediately following a disaster
or major incident?
A. Disaster recovery
B. Business continuity
C. Business impact analysis
D. Recovery point objective
19. Which of the following would be a vulnerability that stems from the business
not identifying its critical assets and processes during the continuity management
process?
A. Failure to adequately consider system requirements during the SDLC
B. Failure to perform a business impact analysis
C. Failure to consider interoperability with integrating new technologies
D. Failure to maintain redundant systems or data backups
20. Your business just went through a major storm that flooded your data center.
Members of your recovery team are attempting to salvage equipment, as well
as locate critical data backups. No one seems to know exactly what they’re
supposed to do, and they don’t have the right equipment available to them.
Additionally, there is no coordinated effort within the team to perform specific
tasks. Which of the following vulnerabilities most likely led up to this scenario?
A. Failure to back up sensitive data
B. Failure to acquire an alternate processing site
C. Lack of a business impact analysis
D. Failure to test the disaster recovery plan
Answers
1. B. For a negative event or action (threat) to materialize and cause risk to an
organization or system, a vulnerability must also be present.
2. A. A threat assessment collects information about different actors and negative
events that could exploit the vulnerabilities in a system.
3. A. A threat agent is an entity that initiates a threat.
4. D. Risk factors are elements that could influence the likelihood or impact of a
threat exploiting a vulnerability or even influence the ability of the organization
to withstand the effects of risk.
5. C. The organization’s structure would be considered an internal risk factor affecting
its business processes.
6. C. Cost is the element of project management most affected by the threat of not
enough funding.
3
In this chapter, you will:
• Understand how to identify and categorize risk factors
• Learn to develop and analyze risk scenarios
• Develop and manage a risk register
This chapter covers different aspects of managing risk scenarios within an organization
as well as documenting and updating risks on a risk register. Now that we’ve discussed the
fundamentals of risk and its concepts, as well as identified threats and vulnerabilities as-
sociated with business processes, we’ll cover the other aspects of managing risk that occur
before you even get the point of assessing or responding to risk.
The CRISC exam objectives we will discuss in this chapter include the remaining task
statements that apply to Domain 1, as well as the first task statement of Domain 2:
We will also cover the supporting knowledge statements that support these objectives.
69
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
70
activities are presented in accordance with ISACA’s objectives and knowledge statements
for the exam. These processes are generic but should be consistent with most popular
risk management frameworks and processes. The end goal of the identification part of
the process, the subject of this chapter, is to identify and document the risk scenarios
associated with the organization, based on different risk factors. These identified factors
and collected information are used to develop risk scenarios. While you may be able to
evaluate and analyze aspects of risk after this process, this is a separate part of the process
and is discussed in Chapter 4. You can also provide recommendations for risk response
as part of this process, but understand that risk response is the primary discussion of
Domain 3 and will be discussed in-depth starting in Chapter 5. For this chapter, we’ll be
looking at risk identification, classification, and risk factors, as well as how they help us
develop risk scenarios.
Identifying Risk
To begin the process of developing risk scenarios, one of the first things you must do is
try to identify what risks the organization is subject to. To identify risk, you must first
identify all the components of risk that exist in the organization. This includes threats,
vulnerabilities, and the assets the organization places value on. To acquire knowledge of
all of these different elements, you may have to perform in-depth assessments to give you
this information. For example, you’ll have to inventory all of your assets and determine
their value and priority to the organization. Value indicates how much they’re worth
to the organization; this could be in terms of dollars to replace an asset or how much
revenue the organization will lose if that asset is lost. Priority could mean the relative
criticality of the asset to the organization; this could indicate how much protection the
organization believes an asset warrants and the urgency of protecting or restoring the
asset (or the capability it provides) if it is lost. Although the terms value, priority, critical-
ity, and urgency may seem to be ambiguous, they are all interrelated terms that the orga-
nization must define for each of its assets. For instance, assets that are deemed critical will
likely have a higher value to the organization, as well as a higher priority for restoration
if the asset is lost or damaged. There is a related term called exposure factor that describes
the level of loss an asset could suffer; we’ll discuss this term in Chapter 4 when we talk
about quantitative and qualitative risk analysis techniques.
TIP Identifying and classifying risk are generic steps and really are intended
for you to get situational awareness of what risks your organization may
be exposed to. They should be considered precursor steps to developing
risk scenarios.
Risk Scenarios
Risk scenarios are created by developing an idea of potential events that can affect an
organization or its assets. The scenarios are based upon different risk factors that an
organization experiences. These can be factors that are internal to the organization, such
as personnel, training, technology, and so on; there could also be external factors such as
market space, regulation, and the economy, for example. There are several different ele-
ments that make up a risk scenario, which we will discuss in this section.
Threat Agent
Threat agents, as you recall from Chapter 1, are the actors and initiate a threat event.
Threat agents could be internal or external, their motivation could be intentional or
accidental, and their focus or goals could be wide and varied. Threat agents are a neces-
sary part of risk scenario development simply because there has to be some entity that
initiates a threat. Remember that threats are merely negative events; there must be a
catalyst for them to occur. Developing risk scenarios requires that the organization be
aware that many different types of threat agents may potentially initiate negative events
against them. The threat agents should be matched to potential threat events, as well as
vulnerabilities that a threat might exploit.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
72
Threat
Threats are negative events; they are initiated by threat agents and exploit vulnerabilities
inherent to an asset, a process, people, technology, or an organization. Understanding
all of the potential realistic and relevant threat events that could affect an organization is
necessary to developing risk scenarios. The possible gamut of threat events that concern
the organization is developed through threat assessment and modeling methods.
Asset
Risk scenarios target and directly affect assets. Remember that assets are not only tangible
equipment or systems; they can also be a process, a proprietary manufacturing method,
people, facilities, equipment, or anything else the organization places a value on. Assets
can also be intangible items such as consumer confidence, customer loyalty, reputation,
and so on. These intangible assets are more difficult to develop risk scenarios around, but
they’re no less important than the tangible ones. When developing risk scenarios, assets
should be identified as concretely as possible; even intangible assets, such as reputation,
might be defined in terms of dollar values derived from customer satisfaction surveys or
statistical analysis of return customer business. Identifying assets and prioritizing them
based on their importance to the organization is sometimes referred to as a criticality
analysis. In any event, identifying assets, as well as prioritizing them in order of impor-
tance to the organization, is an essential step in the process of developing risk scenarios.
Asset value is a critical concern in developing risk scenarios because it directly affects the
impact the organization bears when the risk scenario successfully affects an asset.
Vulnerability
Vulnerabilities are weaknesses inherent to assets. Threats directly affect vulnerabilities,
turning any “potential” for damage into real damage and impact if they are able to suc-
cessfully exploit those vulnerabilities. Risk scenario development directly depends upon
the organization thoroughly identifying all the potential vulnerabilities an asset may
have. If all the different vulnerabilities are not identified, then the organization could
have risk scenarios it is not even aware of. Recall that for risk to exist, there must be both
a threat and a matching vulnerability for it to exploit. Without adequate knowledge of
either, the risk scenario can’t be developed.
EXAM TIP Keeping in mind the basic definitions of the four elements of
threat agent, threat, asset, and vulnerability will help you understand how
they contribute to risk scenarios in particular and risk in general. Threat
agents initiate threats, which exploit vulnerabilities, which are inherent
to assets. The two other factors that are considered with these four are
likelihood and impact. Together, all of these elements make up risk.
Figure 3-1
Elements of a risk Threat Agents
scenario (Internal/External)
Time/Location (When,
Duration, How Long to Threats
Detect and Respond, (Internal/External)
and Where?)
Risk Scenario
Assets
Vulnerabilities
(People, Processes,
(Weaknesses, Lack of
Facilities, Equipment,
Controls)
Technologies)
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
74
NOTE The time and location elements of a risk scenario are really
characteristics of the event itself; they actually describe details about the
occurrence of risk scenarios. They should be used to help develop the
scenarios to the extent that time and location factors could also affect the
likelihood and impact of the scenario.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
76
and then look at the system itself (the asset) for vulnerabilities that match up to these
threats. Considering potential event characteristics, such as times that the risk scenario
might occur (peak ordering times, for example, or even during off-hours when there may
not be an administrator available to address the problem), location (considering both
internal database servers and external Internet-facing web application servers, as well as
geographic locations where infrastructure assets may be dispersed), and potential risk fac-
tors that could both increase or decrease the risk, is also part of this approach. The result
would be a more detailed list of specific risk scenarios that affect the different business
objectives under scrutiny. The top-down approach is considered objective-centered and
requires more participation from upper-level managers who may have more strategic
information regarding business objectives and goals than lower-level employees. It is also
more directive and structured in nature.
Asset Vulnerabilities
Time and
Risk Scenarios
Location
Top-Down Approach Bottom-Up Approach
EXAM TIP The top-down approach develops risk scenarios from a business
objective perspective, whereas the bottom-up approach is more general
and is designed to look at all possible scenarios, regardless of business
objective.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
78
TIP The same internal and external factors are the ones that affect risk from
several different viewpoints. Not only do they affect risk scenarios, but they
also affect different business processes and activities within an organization,
as discussed in Chapter 2.
IT Infrastructure Factors
We’ve already discussed internal and external factors, as well as risk management pro-
cesses, and the effect these factors have on developing and dealing with risk scenarios. IT
infrastructure is both an internal and external risk factor since there are internal pieces
of the IT infrastructure that support the processes of the organization, as well as external
pieces that support its interaction with the outside world. Often the lines between inter-
nal and external IT infrastructure are blurred since there may be a seamless connection
between internal and external networks and the technologies that support all the differ-
ent business processes. Additionally, outsourcing to third parties makes the infrastructure
straddle both internal and external environments since some of the infrastructure may
be off-site and located in a different geographical location behind some other businesses
firewall yet process sensitive internal data.
IT infrastructure affects the development of risk scenarios the same way other factors
do; the way the infrastructure is designed and implemented can increase or decrease
the likelihood or impact of the risk scenario and make the scenario more likely or not.
Outdated or overtaxed infrastructure introduces risk into the organization and exposes
the organization to many more risk scenarios than a more modern, robust infrastructure.
Because infrastructure can exist in both the internal and external environments simul-
taneously, this increases the risk and the number of possible scenarios it may encounter.
The IT infrastructure must be carefully considered when developing risk scenarios.
EXAM TIP Risk scenario stakeholders include anyone who is affected by the
scenario itself. These could be asset owners or managers, risk managers, or
anyone responsible for responding to risk in any way. Stakeholders could
also include people who manage processes that affect risk. Additionally, all
the stakeholders should be included in the scenario development process.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
80
Analyzing Risk Scenarios
Now that we’ve discussed the different factors and processes involved with developing risk
scenarios, we’re going to take a look at analyzing these risk scenarios. Analyzing them will
help you frame them better for when you’re looking at their impact and likelihood, which
is the subject of Chapter 4. For this portion of the chapter, we are not going to calculate
the likelihood and impact, but we will discuss some of the factors that may affect the cal-
culation. Some of these factors include organizational factors, such as structure, policies,
and standards but may also include infrastructure factors, such as technology, architecture,
and security controls. These different factors weigh in on how likely a risk scenario is to
take place, as well as what its potential impact will be to the asset or organization.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
82
CAUTION Both organizational and technological factors can influence risk
scenarios, as well as their likelihood and impact, in different ways. These
ways are not only always positive or always negative; most of the time
these factors could influence risk scenarios both negatively and positively,
resulting in increases or decreases in likelihood and impact.
Risk Register
A risk register is a product or document that reflects the different risk scenarios and fac-
tors for a given context. It could be for a single system, for a component of the system, or
even for a higher-level organizational element. It also may address only a small portion of
the specific piece of risk. Normally the risk register has several components, which we’ll
discuss in the next few paragraphs. The risk register is used to record and manage risk and
serves as a reference point for tracking risk through its life cycle.
If you’ve ever been exposed to Plan of Actions and Milestones documents found in
the Department of Defense and in NIST’s Risk Management Framework, then you’ve
looked at one type of risk register. While there are different components that a risk
register should have, different organizations may have different entries or elements on
their own risk registers. We’ll take a look at some of the more common elements of a risk
register in this section.
• Risk factors
• Threat agents, threats, and vulnerabilities
• Risk scenarios
• Criticality, severity, or priority of risk
• Asset information
• Impact of the risk on an asset
• Likelihood of the threat exploiting the vulnerability
• Current status of risk response actions
• Resources that may be committed to respond to risk
• Risk ownership information
• Planned milestones toward risk response
Data theft from Medium High Engineering $10K for new Jan 2016 Assessing Purchase and
malicious user Department DLP system different implementation
(via risk DLP by Dec 2015
assessment on vendors
04/2015)
Loss of primary High High Accounting 15K for Oct 2015 Sep 2015 Vendor Final purchase
accounting department backup selected and installation
server data system in August 2015
Any or all of these data elements could be included on the risk register. Addition-
ally, the risk register could span more than one document as part of a multidocument
package describing the overall risk toward the organizational asset. Essentially, the data
points that are included on the register need to be those that support the organization’s
risk management strategy and plan and help it to adequately identify, manage, monitor,
and mitigate risk throughout its life cycle. Figure 3-3 illustrates how a basic risk register
might look.
NOTE These are only notional entries for a risk register but are the most
commonly used. Organizations should include the data most relevant to
their management needs.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
84
Chapter Review
In this chapter, we discussed several aspects of managing risks, particularly those that
take place before risk evaluation, assessment, and response. We looked at developing risk
scenarios in-depth and the different factors and components that make up risk scenarios.
A risk scenario is a potential event that could affect the organization. It consists of a
threat agent, a threat, an asset, and a vulnerability. Risk scenarios are part of the overall
risk consideration, less the likelihood and impact calculations.
Finally, we discussed the purpose and elements of the risk register and how different
information and data points are recorded on the register. Some of these different data
points include risk scenario information, such as threat agents, threats, assets, and vulner-
abilities, as well as criticality, likelihood, and impact information. The risk register may
also include information on risk owners and other responsible parties that must manage
risk. Finally, it also may include resources that are dedicated to risk management and
mitigation. The risk register is a living document that allows the organization to manage
risk throughout its life cycle for given scenarios and assets.
Review Questions
1. Which term describes a potential risk event that can affect an organization?
A. Risk factor
B. Risk scenario
C. Risk consideration
D. Risk agent
2. Which of the following could initiate a risk scenario?
A. Threat agent
B. Threat
C. Asset
D. Vulnerability
3. Risk scenarios are all the elements of risk, except for __________ and __________.
(Choose two.)
A. Threat
B. Likelihood
C. Impact
D. Vulnerability
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
86
9. All of the following are organizational factors influencing risk scenarios, except
which one?
A. Policies
B. Structure
C. Resource allocation
D. Market trends
10. Which of the following are concerns with the IT infrastructure in terms of how it
affects risk scenarios? (Choose all that apply.)
A. Level of modernization
B. Level of performance
C. Internal and external interfaces and connections
D. Cost
11. Which of the following are two elements that are critical in risk scenario
development? (Choose two.)
A. Asset identification and valuation
B. Likelihood calculation
C. Impact calculation
D. Threat assessment
12. Which of the following would be considered primary stakeholders with regard to
risk scenario development?
A. Production control managers
B. Accounting executives
C. Vendors
D. Asset managers
13. Which of the following are factors of organizational structures that could have an
effect on likelihood and impact of a risk scenario? (Choose two.)
A. Technology upgrades
B. Budget or resource allocation
C. Strategic product development
D. Organizational chain of command
14. Compliance is a factor that influences risk scenarios as a direct result of
organizational __________.
A. Threats
B. Risk management strategy
C. Governance
D. Vulnerabilities
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
88
Answers
1. B. A risk scenario describes a potential risk event that can affect an organization.
2. A. A threat agent could initiate a risk scenario.
3. B, C. Risk scenarios include all the different elements that make up risk, except
for likelihood and impact.
4. C. Risk factors are elements that influence the development of risk scenarios, as
well as their likelihood and impact.
5. D. The organization’s structure would be considered an internal risk factor affecting
the development of risk scenarios.
6. A. A hacking attack that occurs while most of the company’s IT security personnel
are away would have a serious impact on the entire organization, and could even
be more likely, if the attack were planned during this time.
7. B. A top-down approach starts with business objectives and attempts to identify
risk scenarios that could affect particular business objectives.
8. C. The bottom-up approach involves brainstorming all the different potential risk
scenarios that could affect an organization.
9. D. Market trends are not organizational factors.
10. A, B, C. All of these are concerns with how the IT infrastructure would influence
risk scenarios, except for cost. Cost would be a concern about how the IT
infrastructure is used to respond to risk but not necessarily its influence over the
likelihood or impact of a risk scenario.
11. A, D. To develop risk scenarios, you need to know details about assets, such as
criticality and their value, vulnerabilities, threat agents, and threats. Likelihood
and impact are not necessary to create risk scenarios, but they are necessary to
evaluate and assess risk.
12. D. An asset manager would be considered a primary stakeholder since that person
is directly responsible for the risk an asset incurs.
13. B, D. Both chain of command and resource allocation are factors of organizational
structure that could affect risk scenario likelihood and impact.
14. C. Compliance is a factor that influences risk scenarios as a direct result of
organizational governance.
15. A, C. Organizations that have a higher level of appetite and tolerance for risk
typically incur more risk scenarios, which could have a higher likelihood of
occurring and a greater impact.
16. D. A risk register is a management product that allows the organization to
track risk.
17. B. The organization’s risk management strategy and plan determines how a risk
register is created and maintained.
Risk Assessment
and Analysis
CHAPTER
4
In this chapter, you will:
• Review the processes of risk identification, evaluation, and assessment
• Learn about qualitative and quantitative risk assessment techniques
• Understand how to evaluate existing controls for effectiveness
• Assess gaps between current and target states of risk in the IT environment
• Consider risk ownership and accountability during risk analysis
• Be able to report risk results to appropriate levels of management
This chapter covers Domain 2 of the Certified in Risk and Information Systems Con-
trol (CRISC) exam objectives and knowledge statements and focuses on the risk evalua-
tion, assessment, and analysis processes. We will cover the overall process for evaluating
likelihood and impact for risk, examining both qualitative and quantitative assessment
methods. We will also cover how control effectiveness is examined and how you might
identify gaps between how effective controls are in the existing risk state and the desired
level of effectiveness at which controls need to be functioning. Finally, we’ll discuss how
the results of the risk analysis are communicated to upper management and risk owners
and reported on the risk register.
The CRISC exam objectives covered during this chapter include the following task
statements:
• 2.2 Identify the current state of existing controls and evaluate their effectiveness
for IT risk mitigation
• 2.3 Review the results of risk and control analysis to assess any gaps between
current and desired states of the IT risk environment
• 2.4 Ensure that risk ownership is assigned at the appropriate level to establish
clear lines of accountability
• 2.5 Communicate the results of risk assessments to senior management and
appropriate stakeholders to enable risk-based decision making
• 2.6 Update the risk register with the results of the risk assessment
91
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
92
As indicated in previous chapters, these objectives and knowledge statements are
shown in order of how they are listed in the CRISC Job Practice areas, not necessarily
how they are presented in the chapter.
Some organizations see risk assessment as one large monolithic process, but many
frameworks and standards break it down into different steps. We’ll take another look at
several important frameworks we briefly touched on in Chapter 1, including the Nation-
al Institute of Standards and Technology (NIST) Risk Management Framework (RMF),
the ISACA Risk IT Framework, and others. In this chapter, however, we will go into
more detail and examine them from a risk assessment perspective.
NIST RMF
The NIST RMF, found in Special Publication 800-37, describes an overall risk man-
agement process that covers all aspects of the risk life cycle. For the assessment piece of
the RMF, NIST uses a four-step risk assessment process found in Special Publication
800-30, “Guide for Conducting Risk Assessments.” You’ll see that these four steps are
broken down into nine distinctive processes and are listed here:
While we won’t go through every step of this process like NIST does, the process is
similar to what we’ve been describing all along in this book, and it is similar to the other
frameworks we discuss in the next section. The NIST assessment process is a subset of the
integrated RMF, which includes not only assessments but categorizing assets according to
criticality and protection (a necessary first step in the process), as well as managing and
monitoring risk throughout the entire life cycle of a system or asset. The NIST RMF also
includes a control framework and methods for assessing the various controls, which we
will cover in upcoming chapters. Appendix A of this book covers the overall RMF and its
supporting publications in detail.
OCTAVE Methodology
As part of a U.S. government contract with Carnegie Mellon University, the Operation-
ally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) methodology was
developed to assist organizations in identifying and assessing information security risk.
The methodology was originally developed by the Software Engineering Institute (SEI)
at Carnegie Mellon University in 1999 and has been updated over the years to its current
version, OCTAVE Allegro, in 2007. OCTAVE uses a concept called workshops, made up
of members of an organization, sometimes including outside facilitators with risk man-
agement and assessment expertise. The methodology has prescribed procedures, which
include worksheets and information catalogs to assist organizational members, drawn from
all functional areas of an organization, to frame and assess risk based upon internal organi-
zational context (infrastructure, governance, business environment, and so on). OCTAVE
has three iterations: the original OCTAVE, OCTAVE-S, and OCTAVE Allegro.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
94
protection practices, vulnerabilities, and security requirements. You can see where this
maps to the practices we’ve described throughout this chapter as determining threats,
identifying assets and their vulnerabilities, and evaluating existing controls. In the sec-
ond phase, the members of the workshop perform assessment activities and evaluate the
infrastructure. In the third phase, the workshop members develop response strategies for
the identified risks.
OCTAVE-S is fundamentally the same as the original OCTAVE, with a few minor
differences. First, OCTAVE-S was designed to assess smaller organizations, usually with
fewer than 100 people. Second, this iteration relies more on internal personnel with
extensive knowledge of the organization and its infrastructure and less on outside risk
experts or facilitators. The number of workshop members will also be considerably less;
the team may rely on fewer than ten key experts in the organization. OCTAVE-S pro-
cesses and procedure documents were also written to include more detailed security-
related information since this approach does not rely on outside security experts or risk
facilitators to assist the team.
OCTAVE Allegro
The OCTAVE Allegro methodology, introduced in 2007, expands the previous two
iterations but does not necessarily replace them. It includes a more business-centered
and operational risk approach to the assessment. It is also asset-centered in its approach;
it focuses on assets and their use or misuse, the environment they are used in, and how
threats and vulnerabilities specifically target and affect the assets. Allegro can be used
on a scaled basis; either individuals or workshop teams can use this method without the
need for a high degree of risk management or assessment knowledge and experience.
OCTAVE Allegro is divided into four phases, which include eight steps. These phases
and steps are described next.
Phase 1: Establish Drivers
Step 1: Establish risk measurement criteria. This step serves to develop and establish the
organization’s methodology and measurement criteria used to assess risk. OCTAVE uses
a qualitative assessment methodology and measurements but can use quantitative meth-
ods for certain aspects of the overall process, such as determining likelihood and impact.
Phase 2: Profile Assets
Step 2: Develop an information asset profile. In this step, the organization develops an asset
profile, which is really a collection of information that describes the asset, including its
characteristics, priority, impact to the organization, and value. This profile also contains
security requirements the asset may have.
Step 3: Identify information asset containers. The information asset container describes
how data is stored, where it is processed, and how it is transported. Containers are usually
networks and systems, including those that the organization directly operates, as well as
those that it outsources.
Phase 3: Identify Threats
Step 4: Identify areas of concern. In this step, potential risk factors are identified and are
used to develop threat scenarios.
ISO/IEC Standards
ISO stands for the International Organization for Standardization, and IEC stands for
the International Electrotechnical Commission. Together, these two organizations are
responsible for a plethora of information technology standards that are used worldwide,
including several that apply to information security and risk management. We briefly
mentioned risk-related ISO/IEC standards in Chapter 1; in this chapter, we will go into
a bit more depth on these standards, focusing mainly on those that cover risk manage-
ment and assessment.
ISO/IEC 27005:2011
Standards in the ISO/IEC 27000 series are all about information security, and the
27005:2011 standard supports the common ideas promulgated in both ISO/IEC 27001
and 27002. The standard applies to risk management, providing a unified risk manage-
ment approach to organizational security. The standard doesn’t necessarily offer a specific
risk management or assessment methodology, but it does serve to describe a formalized,
structured process of risk management, such as developing context, scope, methods, and
so on. It also describes the two primary types of assessment methodologies, qualitative
and quantitative. Additionally, it describes processes used to develop risk response strate-
gies, communication with stakeholders, and continuous risk monitoring.
ISO 31000:2009
ISO/IEC 31000:2009, “Risk Management—Principles and Guidelines,” covers a
broader range of risk management and is not specific to IT or IT security. It generally
focuses on business risk and can be used by organizations of any size, regardless of which
business area or sector the organization occupies. It is useful for assisting organizations
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
96
in developing sound risk management frameworks, processes, and strategies. It replaced
a previous comprehensive standard on risk management, the AS/NZS 4360:2004 stan-
dard. ISO/IEC 31000:2009 is the governing document for other risk-related docu-
ments in the 31000 series, such as the assessment document we’ll cover next.
IEC 31010:2009
IEC 31010:2009 is where the meat of information regarding risk assessments is locat-
ed for the ISO/IEC standards. This document, “Risk Management—Risk Assessment
Techniques,” articulates with and extends the risk management principles of ISO/IEC
31000:2009 and provides a concrete overview of the risk assessment process. This stan-
dard describes risk assessment as the combination of risk identification, analysis, and
evaluation, with a precursor step of establishing the risk context within the organization.
The standard also addresses communication and consultation with various stakeholders
and management, risk treatment (response), and monitoring risk.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
98
Methodology Sponsor Notes
NIST SP 800-30, “Guide National Institute of Part of the NIST Risk
for Conducting Risk Standards and Technology Management Framework
Assessments”
OCTAVE (OCTAVE, OCTAVE-S, Software Engineering Uses workgroups; suited
and OCTAVE Allegro) Institute, Carnegie Mellon for any organization; does
University not require extensive risk
management experience
or knowledge
ISO/IEC ISO/IEC Prescribes methods and
processes for developing
assessment programs;
describes more than
30 different means to assess
risk factors and elements
The ISACA Risk IT Framework ISACA Risk assessments covered in
the Risk Evaluation (RE) phase
Table 4-1 Summary of Available Risk Assessment Methods and Frameworks
While key risk indicators are discussed in upcoming chapters, for now you should know
that they allow the organization to monitor changes in risk for given scenarios, enabling
the organization to modify its risk profiles as these indicators change. Table 4-1 summa-
rizes some of the different risk assessment methodologies available to you.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
100
program is in place, who has access to systems and data, what policies exist to define
security requirements, and how the system is securely configured. Documentation can
be either paper-based or electronic; it can come from spreadsheets, databases, network
devices, systems, written procedures, physical access logs, and so on. Examples of docu-
mentation include organizational policies, backup and restore procedures, security offi-
cer appointment letters, and so on. While not strictly documentation (unless printed),
audit logs and configuration files could also be considered in this category since they
provide documentary evidence that supports an assertion of how events were recorded
or how a system was configured. Documentation also serves to verify data collected from
other sources, such as interviews. Remember, in the security assessor world, if you don’t
document it, then you can’t prove that you do it.
System Observation and Verification Sometimes it’s not enough to interview
personnel and review documentation. Unfortunately, people can lie or be mistaken in
interviews, and documentation can be falsified. Observing a system in operation can
verify whether it is secure and whether its security functions and controls are actually
working as intended to protect systems and data. The same is true for physical security
controls. An assessor can easily determine whether a control is functioning by observing
a system operator perform a security function or by visually inspecting a control to make
sure it is in place and implemented properly. Examples requiring the observation method
include gates, guards, and locks; other examples are watching a system through the boot
process, observing a screen lock go into effect, having a system administrator show you
various security features, and so on.
System Testing Obviously, not all data can come from talking to people, reading
system architecture documents, and watching the system administrator assign permis-
sions to shared folders and files. Some data must come from looking at the configuration
of the system itself, as well as getting relevant data that pertains to patching, vulner-
abilities, user accounts, configuration files, registry settings, and other technical data.
This data is used to determine not only if a system is configured properly and securely
but also what potential vulnerabilities might exist on a system. This is where the techni-
cal assessment portion of data collection comes into play. Since technical data can be
overwhelming in size and volume, automated tools are typically used to perform system
security testing. These tools include vulnerability scanners, sniffers, and other hardware
and software tools, some of which are described in Chapter 6.
During system security testing, various types of host-based and network scans may
be performed, along with in-depth examination of patches and updates that have been
applied to the system, configuration settings, user accounts, and other security settings.
Rights, permissions, and privileges on the system and its resources are examined and
compared against security requirements and control functions to ensure they match.
Network protocols and connections are studied, and the network architecture may be
examined to ensure a sound network design has been implemented. Application soft-
ware code reviews and testing, including fuzzing, may be performed. Authentication and
encryption mechanisms are examined in-depth to ensure they are strong and effective
and meet governance and best-practice requirements where applicable. Physical access
controls may be tested to ensure that physical separation away from systems for unau-
thorized users is maintained.
The results of system security assessments (usually in the form of vulnerability assess-
ments or penetration testing, discussed further in Chapter 6) are consolidated with the
results from interviews, documentation reviews, and system observations to form a com-
prehensive data picture of the system or asset; these results further inform the controls
analysis and impact determination aspects of risk. Table 4-2 summarizes the different
data collection methods you can use during an assessment.
NOTE While you may not be directly tested on data collection methods, it
is a good idea to understand these methods, as in actual practice, you will
likely use them extensively.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
102
Threat and Vulnerability Identification
Once you have categorized each of your key assets, you must determine the vulnerabili-
ties inherent to that asset and the threat events that could exploit those vulnerabilities.
A vulnerability assessment can give you information about the weaknesses inherent to
an asset. The vulnerability assessment might include examining all aspects of an asset
or capability to determine any vulnerability it has, including the physical, technical,
and operational vulnerabilities inherent to the asset. For example, there can be technical
vulnerabilities related to configuration issues or lack of hardening on a network device.
Physical vulnerabilities could relate to the lack of physical protection for the network
device. Operational vulnerabilities might include the lack of backup processes or con-
figuration control exercised for the device.
You will need to do a threat assessment to determine what threats and threat agents
exist that could exploit those vulnerabilities. These threats can be internal or external,
can be human-made or natural, and should match up with a discovered vulnerability. To
complete the development of a given risk scenario, you should consider time and loca-
tion characteristics of a potential scenario as well. Remember that you are developing sce-
narios down to the most practical level of detail possible; you will have developed many
different possible scenarios for an asset, each covering a particular threat–vulnerability
pairing by the time you are done. You should then look at the existing controls you have
in place to determine how effective they are in protecting an asset.
TIP Threat and vulnerability assessments are discussed a great deal in this
and other chapters of this book. These two assessment processes are critical
to understanding the elements that formulate the risk for an asset.
Control Analysis
After you’ve accomplished asset categorization and determined threats and vulnerabili-
ties associated with those assets, then you must take stock of what existing controls or
mitigations you’ve implemented to determine the level of protection an asset currently
has. Based upon this existing level of protection, you should be able to determine the
impact to the asset if a particular vulnerability is exercised by a specified threat and how
likely that event is, given the protections you have in place. All of this information helps
to identify the basic risk involved. Chapters 5 and 6 go into much more detail on how
controls are managed, as well as on responding to risk after a risk assessment.
CAUTION Make sure you consider controls and their effectiveness when
analyzing risk since controls can help decrease likelihood or reduce impact,
thereby decreasing the assessed risk for an asset and the organization.
Evaluation involves the measurement of these two primary factors, likelihood and
impact. We’ve already discussed how there can be different ways to measure these factors,
based upon subjectivity or concrete values. This is where the discussion on qualitative
and quantitative techniques comes into play. We’ll go into depth on those assessment
techniques next.
EXAM TIP Remember that risk assessments are comprised of the steps of
risk identification, evaluation, and analysis. Identification produces threat-
vulnerability pairs, asset inventories, and risk scenarios. Evaluation covers
likelihood and impact calculations, resulting in risk values. Analysis looks at
the overall application of these factors, as well as control analysis, to produce
a comprehensive picture of risk.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
104
Quantitative
A quantitative risk analysis uses concrete (nonsubjective) numerical values and statistical
analysis to calculate the likelihood and impact of risk. Quantitative methods use numeri-
cal values such as dollar figures, statistical numbers, and any other hard-core numerical
assignments. Quantitative risk assessments follow the same general pattern described pre-
viously; you must first list your assets (along with their replacement costs and exposure
factors), calculate the impact of a full or partial loss of the asset, determine the likelihood
of the negative event, and come up with the overall risk to the organization. This might
be calculated in terms of dollars, for example. The following is a scenario that will help
you to better understand quantitative risk analysis, as well as some of the factors that can
actually be quantified and how.
The final piece of this puzzle is how much it would cost the organization to reduce this
risk. Let’s examine all of the factors that the organization could influence. First, it could
not influence the weather, so the threat agent and threat can’t be reduced or eliminated.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
106
The organization could, however, address the vulnerability (the server building with its
ineffective protections against bad weather, in this case), reducing it somewhat by relo-
cating the server farm or even moving its applications and data to the cloud, for example.
The organization could also reduce the likelihood for that particular threat-vulnerability
pairing if it removed or changed the nature of the vulnerability itself, as described earlier.
The organization could also reduce the impact of this specific event in several ways.
It could create a real-time failover cluster for the servers in another location that would
instantly be available if said servers got struck by lightning, or it could at least have a hot
spare server and a recent backup, if nothing else. The organization can affect the risk
factors, but there is a cost for doing this. What is important in developing risk responses
is that the organization must balance the cost of mitigations (for example, acquiring
another facility, moving to the cloud, server clusters, or at least hot spares and better
backups) with how much it loses in terms of SLE and ALE and the added impact of lost
revenue per day, as in this example. The bottom line is that you must find a solution that
isn’t more expensive or impacts the organization to a degree worse than the risk event
itself. Risk responses are covered in more detail in Chapter 5.
Qualitative
A qualitative risk analysis, on the other hand, involves using subjective scales. These
scales could be a numerical scale from one to ten or have subjective values of High,
Medium, and Low, for instance. Qualitative risk analysis can come from historical trend
analysis, experience, expert opinion, existing internal and external environmental factors,
governance, and other inputs that are not always necessarily quantifiable but exist and are
important nonetheless. Qualitative risk analysis is appropriate when you must evaluate
risk based upon factors that can be hard to quantify, such as those that are not typically
measured with concrete, repeatable values. For example, what numerical value could you
assign to a potential impact of loss of consumer confidence or damage to reputation?
You may attempt to frame it in terms of lost revenue (an educated guess at best) or loss
of business. You could also survey a sample population to determine how many people
would or would not do business with the organization after a data breach, for example,
but even that would be subjective and would offer only a small statistical insight into a
hard-to-define measurement.
That’s not to say you couldn’t assign numerical values to different risk factors, how-
ever. Instead of values such as Low, Medium, and High, you might assign numerical
values that roughly correspond to those levels. For example, you might use a type of Lik-
ert scale, which may have values such as 1 (Very Low), 2 (Low), 3 (Medium), 4 (High),
and 5 (Very High). This might characterize the subjective level of impact or likelihood
the organization wants to assign to a particular risk event. In assigning these subjective
values, you must also decide how they relate to each other, yielding an overall risk calcu-
lation. In other words, given likelihood values of 1 (Very Low), 2 (Low), 3 (Medium), 4
(High), and 5 (Very High), and identical values for impact, what would the overall risk
level be when these two dimensions of risk are viewed together? How do their values
affect each other? NIST Special Publication 800-30 offers a good example of how risk is
calculated using qualitative analysis.
In Figure 4-1, taken from NIST SP 800-30, you can see how the relationships of
likelihood and impact affect different risk levels. The values of each are correlated, and
a qualitative risk determination results. For example, according to this figure, a moderate
level of likelihood combined with a very high level of impact results in a level of risk deter-
mined as high. The determination of what constitutes a likelihood of moderate and what
is required for an impact level of very high is subjective but should be defined within the
organization for consistency and standardization.
Likelihood
(Threat Event Level of Impact
Occurs
and Results in
Adverse Impact) Very Low Low Moderate High Very High
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
108
impact or loss to the company, for instance. Those would almost have to be qualitative
values, so the assessment couldn’t always be expressed in exact numerical terms that are
easily repeatable or defendable.
In practice, most risk assessments are usually qualitative with some quantitative ele-
ments to them, or vice versa. There are usually few purely quantitative or entirely qualita-
tive assessments performed. You should understand the elements and characteristics of
both, however, for the exam and your profession.
Event
Firewall Configuration
Appliance Error
No Rule Due to in Rule
Error
Unknown Nature
of Traffic
Malformed
Traffic
No Rule Due to
Firewall
Administrator Hardware
Software
Error or Lack Issue
Issue
of Training
Physical Controls
Work Outcome Frequency
Event Loss or Damage
Minimal High
Yes Yes Loss or Frequency
Damage
Maximum
Break-in Low
No Loss or
Frequency
Damage
No Loss
Medium
No or
Frequency
Damage
Bow-Tie Analysis
A bow-tie analysis uses diagrams to analyze and explain relationships between various
elements of risk, from causes (threats) to events and then to impacts (consequences). It
is similar to both the fault-tree analysis and the event-tree analysis since it looks at the
various causes of a risk event (fault tree) and also analyzes the consequences of the event
(event tree). The difference, however, is that the bow-tie analysis looks at the intervening
characteristics of the events and causes, such as the path by which the cause leads to the
event and then the consequences. Figure 4-4 illustrates a bow-tie diagram. In this figure,
the negative event is shown as the center of the bow tie, with potential causes on the left
and possible consequences on the right.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
110
Figure 4-4 Potential Cause 1 Potential Consequence 1
An example of a
bow-tie analysis
diagram Potential Cause 2 Negative Event Potential Consequence 2
Other Methods
As mentioned, there are too numerous other methods that exist to perform the different
types of assessments to mention here. Some of these methods focus on data collection,
while others emphasize different group analysis techniques. All are, again, some varia-
tion of either the qualitative or quantitative method and may require looking at specific
aspects of data to determine various elements of risk. Other examples of these techniques
include the Delphi method, which centers on expert opinion from questionnaires; the
Bayesian analysis method, which uses data distribution and statistical inference to deter-
mine risk probability values, checklists, scenario analysis, and business impact assessment
(briefly described in Chapter 2); root-cause analysis (discussed further in Chapter 6); and
various collaborative techniques, such as brainstorming. You won’t be expected to know
all of these methods for the exam, but you should be familiar at least with the concepts
of qualitative and quantitative analysis and some of the techniques that use each. For
further knowledge on various assessment and analysis techniques, consult with ISO/IEC
31010:2009.
EXAM TIP You will not have to know any particular risk assessment method
in detail for the exam, but you should understand how the qualitative and
quantitative methods work.
Risk Analysis
Now that you’ve assessed impact and likelihood (using any of several qualitative or quan-
titative methods), it’s time to perform the risk analysis. Risk analysis is just an extension
of what you’ve been doing all along so far; a risk analysis looks at impact and likelihood
values and determines what the level of risk is for a particular system, an asset, or even
the entire organization. Part of risk analysis involves discussing findings with risk and
control owners, as well as senior managers in the organization. During this discussion,
you may discover other factors that influence the levels of likelihood and impact or
even affect threats, vulnerabilities, and assets. You’ll also look at the existing controls and
determine how effective they really are in meeting risk, as well as recommend additional
controls. Finally, after this process is complete, you will report risk analysis results to
senior managers and generate a risk report. We’ll discuss all of these topics in more detail
in this section. Figure 4-5 shows a familiar variation of the 5×5 likelihood and impact
Figure 4-5 Likelihood and impact are evaluated together to produce a risk level.
table, demonstrating how different levels of likelihood and impact are evaluated together
to produce a qualitative risk level.
Control Analysis
In this section, we will discuss control analysis in detail. You’ll also receive some more in-
depth information on controls in the next three chapters, focusing on different aspects of
how controls are designed, implemented, and used to respond to risk. It’s important to
understand how controls fit into the overall risk analysis process; you perform a control
analysis before actually determining risk since existing controls that are already in place
may be effective to varying degrees in mitigating risk. Simply examining threats, vulner-
abilities, assets, impact, and likelihood without taking into account existing controls and
protections in place doesn’t do justice to the risk analysis process. Not accounting for
existing controls would dramatically skew risk assessments and render an unrealistic risk
determination. The goal here is to examine existing controls, determine how effective
they are, and use that determination in analyzing the impact to assets if threats exploit
vulnerabilities, as well as the likelihood of that exploitation. Typically, results of your
documentation, observation, interviews, and testing will likely also be part of your con-
trol analysis. We’ll look at different aspects of control analysis in the next few sections.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
112
other critical control functions. When identifying controls that apply to a given resource,
process, asset, or system, you should look at all of these different categories to determine
exactly what controls exist. Administrative controls will be in the form of policies or pro-
cedures and can serve to protect an asset by detailing requirements that users must abide
by. Technical controls can serve to protect assets by providing logical protections, which
might include strong authentication, restrictive permissions, and other access controls.
Physical and operational controls can provide asset protection in the form of operational
procedures and physical barriers, which separate unauthorized persons from the asset and
prevent them from physically accessing the asset. Consider all these different categories
of controls when attempting to identify any controls that may be providing protection
for assets.
Once you have identified all the different controls that are protecting a given asset,
you should determine what functions they are required to serve and how well they’re
performing that function. Controls are designed to perform different security functions
(in some cases only one but often many different functions). Economy of use is one
important aspect of applying controls to assets; organizations that are able to use fewer
controls to cover more security functions are able to reduce costs and more effectively use
the resources they have.
Just as threats and vulnerabilities are often paired together, controls are often identi-
fied that match up with specific threats or vulnerabilities. While we discuss the value of
performing threat and vulnerability assessments, seemingly as separate activities, often
they are conducted simultaneously, along with control analysis, to get a better idea of
how these three elements balance with each other. Threats exploit vulnerabilities; how-
ever, controls can reduce the likelihood of threat exploitation, as well as mitigate the
weaknesses that vulnerabilities provide. So, there is a relationship between these three
elements, making it valuable to sometimes look at all three of them simultaneously in a
concerted effort.
In assessing control effectiveness, you should examine how well a particular con-
trol protects against a given threat or reduces a particular vulnerability. This can be
a subjective process but can be more objective if performed as part of an in-depth
penetration test (discussed in Chapter 6). For example, a threat assessment may give
you only the potential threat events that could affect a given asset, and a vulnerability
assessment may tell you only what potential vulnerabilities exist on the system. Neither
tells you how effective a control may actually be in reducing the effects of the threat or
vulnerability, unless you actually attempt to exploit the vulnerability during penetra-
tion testing. Only then will you truly know how effective the control really is; if a given
vulnerability isn’t easily exploitable, then realistically the control may be more effective
than a cursory review would indicate. Likewise, a penetration test may indicate that a
control is not as effective as you might have originally thought. Remember that vulner-
ability assessments describe theoretical weaknesses, whereas penetration tests actually
attempt to exploit vulnerabilities and can give more realistic estimates of how effective
controls really are.
When evaluating controls, you may report them as part of a risk analysis as ineffective,
partially effective, or effective in reducing impact or likelihood. You also might use a semi-
quantitative scale that indicates control effectiveness from a range of numerical values.
Often, different control frameworks also provide guidance on assessing the effectiveness
of the controls in that particular framework. For example, the catalog of controls found in
NIST’s Special Publication 800-53, “Security and Privacy Controls for Federal Informa-
tion Systems and Organizations,” is supplemented by an assessment methodology found
in its companion volume, Special Publication 800-53A, “Assessing Security and Privacy
Controls in Federal Information Systems and Organizations,” which describes how to
assess and report the effectiveness of each control. Figure 4-6 shows an example of a NIST
control, from SP 800-53, and Figure 4-7 shows the corresponding assessment guidance
for the same control in SP 800-53A.
Control Gaps
A control gap is a situation where existing controls are not sufficient to provide adequate
protection for an asset, reducing either impact or likelihood (and thereby risk) to an
acceptable level. In this situation, after the lack of effectiveness of the control is estab-
lished, the organization has to look at remediating the situation. We won’t go too much
in-depth on remediation here; that’s really the subject of the Risk Response domain that
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
114
AC-5 SEPARATION OF DUTIES
ASSESSMENT OBJECTIVE:
Determine if the organization:
AC-5(a) AC-5(a)[1] defines duties of individuals to be separated;
AC-5(a)[2] separates organization-defined duties of individuals;
AC-5(b) documents separation of duties; and
AC-5(c) defines information system access authorizations to support separation of duties.
POTENTIAL ASSESSMENT METHODS AND OBJECTS:
Examine: [SELECT FROM: Access control policy; procedures addressing divisions of
responsibility and separation of duties; information system configuration
settings and associated documentation; list of divisions of responsibility and
separation of duties; information system access authorizations; information
system audit records; other relevant documents or records].
you’ll read about in the next chapter. However, during your analysis, you must identify
control gaps and may even make recommendations as to possible response options that
would close those gaps. You may identify gaps in physical, technical, or administrative
controls, even when there are other types of controls present that perform some secu-
rity and protection functions. For example, if an organization is implementing account
management processes, such as creating accounts in a standardized fashion, verifying
identities before user accounts are created, and so on, then it has operational and tech-
nical controls in place that help provide secure account management. However, if the
organization has no written policy in place that actually requires this process and dictates
that it be performed in a consistent manner, how can the organization be assured that
these procedures will always be followed uniformly and in a secure manner? If there is
no policy, then the organization leaves it up to individual account operators to perform
this function as they want, regardless of how “most people do it.” In this case, a control
gap would be that although the organization is applying some level of control over this
process, there is no written policy ensuring that it is standardized.
Control Recommendations
Once you’ve identified existing controls, determined how effective they are, and iden-
tified gaps between the current and desired end states of controls, you should be in a
position to make sound, risk-based recommendations to senior managers on how con-
trols should be supplemented, added, or changed. Recommending controls is in itself
• What more could be done to supplement or change existing controls to close the
gap between current and desired end states of risk?
• Should new or different controls be applied to replace existing ones?
• What are the costs involved in applying additional controls, and do they exceed
the value of the asset or the costs to replace it?
• Would additional controls require retooling or significantly changing the
infrastructure, processes, or asset itself?
• Would additional controls require new personnel or training for current
personnel?
• Can additional controls be implemented that also reduce risks in other areas
(economy of use)?
The answers to these questions, at least some of them, will determine how you make
the recommendations to management about closing the “control gap.” Both the cost of
implementation and the return on investment received from implementing new con-
trols or strengthening existing ones are going to affect management’s acceptance of the
recommendations. The asset value, or impact if it were significantly damaged or lost,
will also affect how well the recommendation is received. Implementing a costly control
to protect an asset that is worth less in terms of impact is not usually an economically
sound decision. Organizational levels of risk appetite and tolerance will also affect con-
trol recommendations since any new or additional controls must reduce risk enough to
fall within those levels. In general, when recommending ways to close the control gap,
whether it is by introducing new controls, modifying existing ones, or modifying the
infrastructure to reduce likelihood or impact, you should do the following:
• Try to leverage existing controls that can be used across the board to include
additional assets.
• Look for “quick wins” first—controls that are easily and inexpensively
implemented (such as policies, training, procedure changes, and so on).
• Prioritize control recommendations with risk; the greater the risk, the more
attention that should be paid to those particular control gaps.
• Be realistic in your recommendations: You can’t reduce risk to absolute zero, you
don’t have all of the resources you would like at your disposal, and you don’t have
to offer a 100 percent solution. Sometimes a 70 percent solution is better than a
0 percent solution.
• Provide alternatives to your primary recommendation for each control gap. Give
management alternatives based on cost, level of risk reduction, and effectiveness.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
116
Considering Risk and Control Ownership
Risk and control ownership are issues that must be taken into account during a risk anal-
ysis. Depending upon how the organization is structured and how the risk management
strategy has been developed, risk ownership may be assigned to one or several different
managers, spanning multiple functional areas. This is because the risk that affects one
area likely affects other areas as well, so many different people may have responsibility
over affected areas and be required to deal with and respond to risk. Control ownership
is also something that should be examined; often controls that provide protections for
a given asset or a number of systems may not fall under the operational purview of the
risk owner. Some controls span the entire organization and protect multiple assets, rather
than only a specific system. These are referred to as common controls, and the responsible
entity for these controls is the common controls provider. For example, consider physical
security controls. There may be a physical security officer for the organization that is
in charge of guards, personnel security, and access to secured areas. They may also be
responsible for locks, closed-circuit televisions (CCTVs), and physical intrusion detec-
tion systems and alarms. All of these controls serve to protect information systems and
data assets that might be in a secure data center. Risks may be presented to the person
who is responsible for information systems in the data center, but the controls that serve
to protect them may belong to the physical security functional area. This will require
some coordination between the different functional areas if controls managed by one
functional area are insufficient to protect assets managed by another area. This may also
affect organizational structures, budget, and allocation of resources.
CAUTION Risk, asset, and control owners are not always the same person,
functional area, or even organization. It’s important that you identify these
particular owners early in the assessment process and maintain careful
coordination and communication between these and other relevant
stakeholders, within the boundaries of your authority and assessment scope.
Different types of owners can result in politically sensitive issues that revolve
around resourcing, responsibility, accountability, and, sometimes, blame.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
118
Results Documentation
Documenting the results of a risk assessment involves carefully and accurately recording
the process of assessing risk for the organization, as well as the results of that process.
Documentation includes presenting an executive summary and briefly describes the risk
of analysis results, as well as the general aspects of the assessment itself, including scope,
limitations, delimitations, assets assessed, information owners, risk owners, and control
owners. The general aspects of the assessment may also discuss timeframes and the meth-
odology involved in the assessment. The key of this part of the assessment is that you
are trying to communicate supporting information to the right people so that they have
the information they need to make risk-based decisions supporting risk response. Docu-
mentation could also produce detailed technical findings, such as those that might result
from threat or vulnerability assessments. Normally these are included as appendixes to
the risk assessment report. In some reports, risks and findings are also mapped to controls
as part of a formal risk management or compliance monitoring effort.
Documentation also involves updating the risk profile for the organization, which
usually details characteristics of risk at the organizational level, as well as at the lower
levels involving processes, systems, and other resources or assets. Normally, all of this
documentation is reviewed by senior management, as well as the appropriate risk or con-
trol owners. Note that documentation should be carefully controlled; only appropriate
people within the organization who have a valid need to know should be able to access
this information, and it should be considered sensitive information for the organization.
Resources
Required
(Hours, Estimated Actual
Risk Risk Dollars, Completion Completion Current
Description Likelihood Impact Owner etc.) Date Date Status Comments
Data theft Medium High Engineering $10,000 for January 2016 Assessing Purchase and
from malicious department new DLP different implementation
user (via risk system DLP by December
assessment in vendors 2015
April 2015)
Loss of High High Accounting $15,000 October 2015 September 2015 Vendor Final purchase
primary department for backup selected and installation
accounting system in August 2015
server data
Table 4-3 Sample Entries in a Risk Register
Chapter Review
Risk assessments include risk identification, evaluation, and assessment. While iden-
tification involves developing risk scenarios by identifying threat agents, threat and
vulnerability pairs, and the affected assets, risk evaluation looks at the likelihood and
impact variables, which indicate how likely a threat and vulnerability pair is to occur,
causing a significant impact to an asset. Analysis also looks at controls and rolls the
assessment up into a comprehensive risk determination for the organization. In this
chapter, we also further reviewed different risk management and assessment frame-
works and standards, including NIST RMF, OCTAVE, the ISACA Risk IT Frame-
work, and the ISO/IEC standards.
We also reviewed the basic generic steps of conducting a risk assessment, including risk
identification, threat and vulnerability assessments, asset identification, categorization and
prioritization, and control analysis. We discussed key aspects of assessment that include
evaluating likelihood and impact and their relationships to the other risk elements.
We discussed the value of both qualitative and quantitative assessment methods.
Quantitative techniques primarily use quantifiable numerical values, such as cost and
statistical analysis, as factors in assessing likelihood and impact. Qualitative values are
subjective and are not easily definable or repeatable. Qualitative values might include a
range of values or designations such as High, Medium, and Low. Most risk assessments
use a combination of these techniques.
Finally, we looked at other aspects of risk analysis, including control evaluation and
gaps, as well as recommending additional controls for risk response. We discussed risk
and control ownership and communicating risk to these stakeholders. Reporting risk and
updating the risk register are also key parts of the assessment process, as are maintaining
risk profiles and monitoring risk on a continual basis.
Review Questions
1. What is the first step in risk management?
A. Risk evaluation
B. Risk classification
C. Risk identification
D. Risk response
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
120
2. Which of the following steps in the four-step NIST risk assessment guidance
should be accomplished after identifying threat sources and events?
A. Determining magnitude of impact
B. Identifying vulnerabilities and predisposing conditions
C. Determining likelihood of occurrence
D. Determining risk
3. Which two of the following factors are the primary focus during risk evaluation?
(Choose two.)
A. Likelihood
B. Impact
C. Threat
D. Vulnerability
4. Which of the following techniques uses subjective terms for its evaluation?
A. Statistical
B. Quantitative
C. Asset valuation
D. Qualitative
5. Which of the following quantitative formulas is used to express the annualized
loss expectancy (ALE)?
A. EF × SLE
B. AV × ARO
C. AV × EF
D. SLE × ARO
6. Given an asset value (AV) of $20,000 and an exposure factor (EF) of 0.5, what is
the annualized loss expectancy (ALE) where a specific negative event is expected
to occur once every two years?
A. $10,000
B. $20,000
C. $5,000
D. $2,500
7. Which of the following assessment methodologies uses a workshop methodology
and is specifically intended for large organizations?
A. OCTAVE Allegro
B. OCTAVE-S
C. OCTAVE
D. The ISACA Risk IT Framework
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
122
14. Which of the following terms describes the difference between how controls are
currently functioning and the level they need to be functioning at?
A. Control enhancements
B. Supplemental controls
C. Control effectiveness
D. Control gap
15. Which of the following terms describes an entity responsible for controls used
across several different assets and systems within the organization?
A. Common controls provider
B. Risk owner
C. Asset owner
D. Control owner
16. Once a risk assessment is completed and recommended controls are put into place,
at what level should residual risk fall?
A. Below the level that it costs to replace an asset
B. Within risk appetite and tolerance levels for the organization
C. Below the level of the priority of the asset
D. Within a range of values predetermined before the risk assessment
17. Which of the following is the most critical point to convey to managers when
communicating the results of a risk assessment?
A. The risk assessment methodology used
B. How impact and likelihood values are calculated
C. How much it will cost to remediate discovered risks
D. How IT risk relates to any impacts on business processes and operations
18. Who should a risk assessor communicate the results of a risk assessment to?
A. All senior executives
B. Senior executives and designated senior managers
C. The board of directors only
D. Only those personnel who have been formally designated and approved to
receive the information by senior management
19. Which of the following should be updated after a risk assessment, especially if
and when risk conditions change? (Choose two.)
A. Risk management strategy
B. Risk register
C. Risk profiles
D. Asset documentation
Answers
1. C. Risk identification is the first step in risk management.
2. B. “Identify vulnerabilities and predisposing conditions” comes immediately after
“Identify threat sources and events” in the NIST assessment guidance.
3. A, B. Likelihood and impact are the primary factors focused on during the risk
evaluation stage of risk management.
4. D. Qualitative techniques use subjective terms, such as High, Medium, and Low,
for their evaluations.
5. D. Annualized loss expectancy (ALE) is a product of the single loss expectancy
(SLE) and the annualized rate of occurrence (ARO).
6. C. $5,000 is correct, given $20,000 (AV) × 0.5 (EF) = $10,000 (SLE) and $10,000
(SLE) × 0.5 (ARO) = $5,000 (ALE). Note that the ARO is expressed as an annual
value, although the scenario in this question states that the negative event occurs
once every two years, instead of per year.
7. C. The original OCTAVE uses teams performing in workshops and was designed
for large organizations with more than 300 employees.
8. B. RE2, “Analyze risk,” is the process step used for risk analysis in the Risk IT
Framework.
9. B. Interviews are by far the most subjective data collection method since people
may offer opinion or mistaken or false information.
10. D. Directly observing the system in operation, including examining the
permissions on sensitive system files, would be one way to confirm the system
administrator’s claim.
11. A. Existing controls must be examined to determine how well they reduce
likelihood or impact to a system in the event a threat actually occurs.
12. C. Fault-tree analysis focuses on an event and all of its potential causes.
13. C. ISO/IEC 31010 primarily focuses on risk assessment processes and
methodologies.
14. D. The difference between the level at which a control is currently functioning
and its desired level is the control gap.
15. A. A common controls provider is responsible for controls that aren’t specific to a
particular asset but are used across the organization for various assets and systems
to provide general protection.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
124
16. B. Residual risk levels should fall within acceptable ranges, given the organization’s
risk appetite and tolerance levels.
17. D. The one important point to convey when communicating the results of a risk
assessment to senior managers and executives is how IT risk impacts business
processes and the business operations of the organization.
18. D. Only approved personnel should receive information regarding the risk
assessment results since it is sensitive information.
19. B, C. Both risk registers and risk profiles should be updated after the assessment
since changing risk affects the current risk posture of the organization.
20. C. During control analysis, the primary concern is how well the control provides
protections for an asset, reducing the likelihood of a threat occurring or reducing
the impact to the asset if a threat does occur.
Risk Response
and Mitigation
CHAPTER
5
In this chapter, you will:
• Learn about the risk response process
• Understand risk response options and how to align choices with business
objectives
• Become familiar with risk response standards and frameworks
• Understand how risk appetite and tolerance affect risk response choices
• Understand risk response action plans and how they are developed
• Understand how controls are designed, implemented, and executed
• Develop better project management skills to more effectively execute risk
response plans
• Learn methods to document and assess risk responses
• Determine how to best train personnel on risk responses
In this chapter, we will review the concepts that comprise Certified in Risk and Infor-
mation Systems Control (CRISC) Domain 3, which is focused on risk response and
mitigation. There is a natural progression from the risk assessment discussions in previ-
ous chapters that covered CRISC Domains 1 and 2, to the discussion on risk response
in this chapter; you will see that many of the outputs from those processes lead directly
to this chapter because an organization generally wants a positive response to any risk
assessment findings. After discussing how risk responses are chosen, we will discuss how
to implement those risk responses, including how to design, develop, and adjust controls.
The CRISC exam objectives covered during this chapter include the following task
statements:
• 3.1 Consult with risk owners to select and align recommended risk responses
with business objectives and enable informed risk decisions
• 3.2 Consult with, or assist, risk owners on the development of risk action plans
to ensure that the plans include key elements (e.g., response, cost, target date)
125
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
126
• 3.3 Consult on the design and implementation or adjustment of mitigating
controls to ensure that the risk is managed to an acceptable level
• 3.4 Ensure that control ownership is assigned to establish clear lines of
accountability
• 3.5 Assist control owners in developing control procedures and documentation to
enable efficient and effective control execution
• 3.6 Update the risk register to reflect changes in risk and management’s risk
response
• 3.7 Validate that risk responses have been executed according to the risk
action plans
Risk Response
Every organization has risk. The leaders of smart organizations, however, have deter-
mined how they will deal with that risk appropriately for their business context. Will
they accept all risks? Will they transfer some risks to a third party, such as an insurance
company? These are some questions that need to be considered within the risk response
process, discussed in this chapter.
We will also discuss the major risk frameworks within the field and how they incorpo-
rate risk response determination and implementation. Please note that risk is different for
every organization; risk within an educational context is different from a financial context,
which is different from a government context. Also keep in mind that IT risks are differ-
ent from business or mission-oriented risks. It’s important to note that the mission of the
organization helps to shape risks and responses as well. This is why it’s so important that
organizations conduct a thorough risk analysis and understand and prioritize the response
options that are right for them. You should also remember that the risks to the business,
the business goals and objectives, and the systems supporting those functions should all
be considered throughout the risk response process. It’s easy as an IT professional to forget
that the business objectives are the top priority, but to maximize efficiency and effective-
ness (and especially to pass the exam), you should keep that in mind.
It’s a good idea to think about this risk response action plan in a Plan-Do-Check-
Adjust (PDCA) life cycle, as shown in Figure 5-1. The PDCA model (often referred
to as the Plan-Do-Check-Act or Deming cycle) promotes continuous improvement.
Adjust Check
NOTE You can find more general information on standards, frameworks, and
best practices (and the differences between the three) in Chapter 1.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
128
Figure 5-2 The NIST Risk Management Framework (courtesy of NIST, from Special Publication
800-53, revision 4)
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
130
Evaluation domain includes an understanding of the impacts to the business and the risk
scenarios, developed through the inclusion of internal and external environmental fac-
tors, risk management capability, IT capability, and IT-related business capability.
Since we’ve already given you a general overview of the other domains of this frame-
work in Chapter 1, we’ll focus on risk response in particular here. The Risk Response
domain covers the risk response definition, risk response prioritization, and key risk indi-
cators (KRIs). KRIs are those that show a potential for risk that is beyond the organiza-
tion’s risk appetite level, and we will cover them in much more depth in Chapter 6. The
framework also describes risk response options such as risk avoidance, risk mitigation,
risk sharing and transfer, and risk acceptance. If these sound familiar to you, they are the
same options described in NIST, as we mentioned earlier. Again, we’ll go into depth on
them later in the chapter.
You’ll see many areas of similarity between the ISACA Risk IT Framework and the
CRISC exam, so it definitely wouldn’t hurt to include it in your study plan.
COBIT
While ISACA’s COBIT doesn’t focus solely on risk, it’s still important for you to have a
cursory understanding of the framework and its supporting processes, inputs and out-
puts, and activities. Again, ISACA authored both the CRISC and COBIT frameworks,
so you will see many of the same concepts interwoven across the two (as well as within
the Risk IT Framework discussed previously, which is quite complementary and often
grouped with the other two).
To refresh your memory, COBIT was designed to help businesses take advantage of
IT assets, increase compliance levels, and manage risk through an integrated framework.
This framework includes processes that have general inputs and outputs, objectives and
activities, and associated measures. The most recent version, COBIT 5, was released in
2012, with two updates published in late 2012 and 2013, respectively covering infor-
mation security and assurance. This should tip you off to the fact that while many IT
professionals are familiar with the COBIT framework, it is not meant to be IT-centric
or IT security–centric and was developed with organizational governance in mind as its
primary goal. Within COBIT, the activities considered key are grouped into domains,
which are broken down into processes, as described in Table 5-2.
The COBIT processes associated with risk response are Monitor and Evaluate and are
used to ensure that risk response options are implemented and are consistent with the
organization’s desired strategy for dealing with risk. Remember that with COBIT, we are
talking governance, so this supports the governance perspective more so than an IT risk
perspective. These processes could be used to fulfill governance and regulatory require-
ments with regard to risk response.
Risk Mitigation
Risk mitigation generally involves the application of controls that lower the overall level
of risk by reducing the vulnerability, likelihood of the threat exploit, or impact to the
asset if the risk were to be realized. Mitigation actions come in a number of forms; a
policy requiring nightly off-site backups of critical data can mitigate the risk of data loss,
for instance. Similarly, applying a newly released web browser patch can mitigate the
risk of exploitation. The goal is to get the risk down to a level considered acceptable by
the organization’s leadership. For the CRISC exam, you need to understand four main
types of controls: managerial, technical, operational, and preparedness. The following are
examples of each.
Managerial
• Requiring an acceptable use policy to dictate IT usage within the organization
• Starting a risk management program to identify, lower, and monitor unacceptable
risk levels within the organization
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
132
Technical
• Implementing additional firewalls to protect internal (non-public-facing) systems
• Adding 802.1X port-based network access control to deter unapproved assets
being added to the network
• Installing an intrusion detection system/intrusion prevention system (IDS/IPS)
to monitor for malicious activities or violations of policy
Operational
• Implementing delegation/separation of duties procedures to assure that one
person does not have the sole control over key duties
• Mandating security training and certification requirements to increase the
baseline knowledge of IT security-related issues and concepts
Preparedness
• Executing a tabletop exercise of the Continuity of Operations Plan to test its
effectiveness and identify gaps that should be addressed
Risk Sharing
Risk sharing (often referred to as risk transference) entails the use of a third party to
offset part of the risk. Risk sharing can involve the outsourcing of some activities to a
third party to reduce the financial impacts of a risk event in many cases. Sharing off-
site (co-location) assets and contractual obligations with other entities is one way that
organizations implement risk sharing; a cloud service provider can be used within this
scenario. The cloud provider might be contractually obligated to assume part of the
financial impact in the event of a breach, but be aware that there is a potential loss
of brand goodwill or other intangible assets that can be difficult to offload. Another
example of risk sharing is the use of an insurance service to cover the financial impacts
(at least partially) of a breach; however, the intangible losses mentioned previously
would still be present.
EXAM TIP Don’t forget that use of a risk-sharing scheme does not totally
absolve an organization of its responsibilities; there may still be legal
liabilities involved.
EXAM TIP It’s important to note that risk acceptance doesn’t insinuate
ignorance; it’s an active acknowledgment and conscious decision to accept
risk as it is.
Risk Avoidance
Risk can be avoided through a number of methods. Can you remove the source of risk by
making a different choice? Perhaps you don’t need to conduct the activity at all. Avoid-
ing risk can mean anything from eliminating risk associated with a particular activity
through the careful analysis of risks and subsequent changes to a plan to the complete
avoidance of a risk by not performing a planned activity. Risk avoidance is the option
taken when, after controls have been considered, the level of risk is still not acceptable.
An organization might choose not to take on a proposed project because of the probabil-
ity of failure and subsequent loss of capital, for example. Another scenario might be the
organization choosing to not adopt a cloud solution because of the level of sensitivity of
information that would be stored within the cloud.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
134
Risk Response Parameters
Cost is obviously a large factor in response determination. When you think about cost,
think about not only the financial impacts of any decision but also the less easily quan-
tified aspects such as loss of goodwill, loss of brand status, and other hard-to-define
attributes. You also need to consider the cost to maintain the responsive mitigation
over its required life span. For example, if you are required to apply a costly IT solu-
tion into your architecture to load balance and you don’t have an IT professional who
is skilled or knowledgeable in that area, you may be required to hire a new professional
or train an existing staff member. That also brings up your ability to plan for contin-
gencies; is one person enough to complete this task? You may need more personnel in
general to maintain your new security posture or to cross-train existing personnel as
an alternative to hiring new people. Maintenance is a huge consideration that should
not be shrugged off.
The ability (also defined as capability) for the organization to implement the response
should also be considered. How mature is your company’s ability to implement the
response? Do you have a small, untrained, ad hoc team (perhaps that sounds cynical,
but it happens)? In that case, a more sophisticated measure might not be appropriate;
perhaps you need a new team! In contrast, a sharp, well-trained, experienced team can
handle more complicated mitigation measures and processes.
How effective will the response be? Effectiveness can be measured as the extent to which
the response reduces the likelihood or the impact of the risk event to the organization. If
the effectiveness of the response activity is in question, that’s a strong reason to consider
that path questionable as well. You should also consider the efficiency of a response. Effi-
ciency can be described as the ability for a risk response to cover one or more objectives
that our organization sets in front of them. Quite simply, solutions are more efficient if
they lower more risks than if they lower only one risk. Consider low-cost, highly effective
solutions your “nirvana” and work from there. You want to obviously avoid high-cost,
ineffective solutions, but it’s shocking how often you will encounter them!
We will talk about prioritizing risk responses in the following section, and these con-
cepts go hand-in-hand.
Deferral
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
136
it would significantly improve the baseline level of risk. When a business case needs to
be made, generally the risk response option is more costly in general, whether it is costly
in terms of financial or personnel resources. It also might be attempting to address a low
or medium risk that doesn’t have the attention of the leadership in the way a high risk
would. Even an efficient and effective response to a low risk must be questioned and
prioritized appropriately.
Finally, you choose to defer when risk response options simply don’t make good busi-
ness sense. A deferral is the polar opposite of the quick win; whereas a quick win is almost
obvious in its ability to address a medium or high risk in an efficient and effective way,
a deferral is the choice when you have a high cost of response associated with a low risk,
one where even a business case can’t be made. In the scheme of prioritization, defer-
rals will be at the bottom of the list. We choose to accept risk, perhaps until the cost is
reduced, or choose risk acceptance as our permanent measure.
At the end of the day, your prioritization should take into account a number of con-
cerns. These include the regulatory mandates that are applicable to your organization,
the impact to the business through implementation of the proposed measure (including
costs both financial and nonfinancial), the market conditions you find yourself in, the
culture and the climate of the organization (including the inherent resistance to change),
and the ability to optimize resources.
Risk Mitigation
Hooray! You’ve selected your risk responses carefully and prioritized them appropriately.
You’re feeling good about how you’re going to positively capitalize on good risk and mini-
mize bad risk, and you’re going to do it efficiently and effectively. You’re a risk response
rock star! Alas, now comes another challenge: implementing those risk response options.
In this section, we will talk a bit about how controls are implemented, as well as the con-
cepts of exception management and residual risk. Even the best-laid risk response plan
will need to account for these concepts.
Have you ever seen a manager act with a knee-jerk reaction to a sudden problem
that ends up costing more time and money implementing a solution than the actual
issue itself would have? Implementing risk responses properly should consider a few
key components, such as the ability to measure its success, proper documentation, and
appropriate training.
Earlier, we discussed a number of different risk response options, such as risk avoid-
ance, risk sharing (or transference), and risk acceptance. In this chapter, we will focus on
risk mitigation. Risk mitigation incorporates controls of varying types across an enterprise
to lower risks to an appropriate level. These controls can be anything from a written
document to a sophisticated, comprehensive technical solution, but they should all be
designed to most effectively and efficiently mitigate the risk they are associated with. At
the end of the day, control should provide the organization with some level of assurance
that they can meet their business objectives and deal with any events that occur in a man-
ner that is acceptable to the leadership of the organization.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
138
Control Development
So, what is a control anyway? Quite simply, a control is some sort of measure, be it a
document, a technical solution, a procedure, or some other remediation that is put into
place to improve the overall security posture of your organization through correcting a
gap or making up for a shortfall in another control. Controls can be technical solutions,
such as firewalls or intrusion detection systems, but they can also be processes, proce-
dures, policies, or physical controls. We talked in Chapter 1 about the types of controls
(administrative/managerial, technical/logical, and physical/operational), but controls
also can be grouped in different families: access control, auditing, configuration manage-
ment, contingency planning, personnel security, and so on. So, how do you determine
new controls to apply to your system or whether your existing controls are good enough?
We will discuss this in more depth in the following sections.
Control Types
As you may have gathered by now, there are many types of controls to choose from. How-
ever, you can generally group these controls into a number of broad categories by their
intended function; the most common are compensating, corrective, detective, deterrent,
directive, and preventative. You may notice some significant overlap between these cat-
egories, and that is why some experts do not distinguish between, for example, deterrent
controls and preventative controls. Table 5-3 lists each control type, its definition, and an
example control.
Figure 5-4 NIST 800-53 security controls identifiers and family names (courtesy of NIST, from
Special Publication 800-53, revision 4)
NIST 800-53
NIST Special Publication 800-53, “Security and Privacy Controls for Federal Informa-
tion Systems and Organizations,” is a key catalog of controls to be aware of if you are
doing business in the U.S. government but is also a great resource even if you’re not.
With its latest revision (revision 4, as of this writing), it includes controls for assuring
privacy as well as security and is meant to be policy and technology neutral, meaning
that the controls are broad enough to be applied to any architecture. If you’re looking for
a document to tell you the steps of how to configure your router securely, this isn’t the
document for you; it’s perfect, though, if you’re looking for a comprehensive view of the
scope and magnitude of a system-level control solution. Figure 5-4 lists the families of
security controls and their unique identifiers from NIST 800-53.
ISO 27002
While NIST 800-53 is used heavily within the U.S. government, International Standards
Organization (ISO) 27002 is used much more widely internationally. Much like 800-53,
27002 groups controls into families, such as the following:
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
140
• Access control
• Cryptography
• Physical and environmental security
• Operation security
• Communication security
• System acquisition, development, and maintenance
• Supplier relationships
• Incident management
• Business continuity management
Since its birth, versions of 27002 specific to different industries, such as healthcare,
have been developed that are tailored to their specific contexts, laws, and regulations.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
142
do an internal audit of your controls, or you may be required to use a third-party agency
or other testing authority. Either way, be mindful that an assessment should be thorough,
technical (as appropriate), and independent. Anyone conducting an assessment should
be impartial, as free of bias as possible, and preferably not in the same part of the organi-
zation as the personnel charged with implementing the controls. You will often see two
types of testing discussed within the community; developmental testing/evaluation is
conducted in parallel with the development of a system (or in this case the controls for
the system), and operational testing/evaluation is conducted before the system is released
into final production (or operation). While both types of testing are required in some
segments (such as major government systems), some organizations that do not require
developmental testing and evaluation fail to get elected, to their own peril. Quite simply,
the time and money spent to assess iteratively along the life cycle of the project will save
you dividends in the end. Just imagine the headache you will have if you find out that a
major control you were betting on to reduce the risk of external breaches does not play
well with your network infrastructure. You would have found that out much earlier if
testing occurred sooner. Either way, you should have an assessor, inspector, agent, or
other authority assigned to assess your system to detail any flaws found and allow you to
better fill the gaps.
So, what exactly occurs during control assessment? If you are using a formal set
of controls, such as the NIST framework discussed throughout this chapter, you can
expect each family of controls to be decomposed into specific requirements that can
be assessed in a variety of ways. For example, if continuity of operations is one of the
controls you have implemented, you could expect a review of your continuity of opera-
tions documentation, a visit to your off-site facility (as appropriate), and perhaps even
a test of your backup solution. Another example is the door and lock combination
that we discussed previously in this chapter; any assessor worth his or her salt will be
checking to make sure you have a lock on all doors but that they are also adequate to
meet the requirements to lower your organization’s risk posture. There will be a mixture
of documentation review, technical assessments, and interviews that are conducted to
determine whether you have adequately covered all the controls required. Table 5-4 lists
some common assessment techniques. If you’ve done your due diligence in preparing
for an assessment (through adequate documentation, thorough implementation, and
appropriate analysis of the actual controls required), this should be no sweat. However,
if formal assessment is required for an authorization or accreditation action and you did
not diligently pursue these activities, you could be in for a major headache when you
receive your results.
Ever thorough, NIST has a guide to security assessment that aligns well with its other
documents covering risk management. NIST Special Publication 800-115, “Technical
Guide to Information Security Testing And Assessment,” was written with four points
of focus: helping organizations establish an information security assessment policy,
implementing a repeatable and documented assessment methodology, determining the
objectives of the security assessment, and analyzing the findings and developing risk
mitigation techniques to address weaknesses.
• Quantifiable
• Consistent and repeatable
• Valid beyond the “now” timeframe
• Thorough
• Compliant to individual and local laws and the human right to privacy
Even if you do not intend to use the OSSTMM framework, it is a useful reference
document that contains handy rules of thumb for gauging testing time and sample rules
of engagement.
Documentation
Risk response options must also be thoroughly documented, with a clear owner defined,
whether it is a new process, control, team, policy, or any other solution. Just imagine a
risk being uncovered that requires a set of procedures for storing, handling, and destroying
sensitive information. The procedures are developed and put on a shelf until an incident
occurs. In the meantime, the procedures go stale (locations change, for example), and no
clear owner was defined to be responsible for maintaining the documentation. The proce-
dures, in this event, are as good as useless. Substitute any situation where documentation
is not only helpful but necessary, and you can quickly see why this is so important.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
144
By this point, you’ve no doubt made a number of changes to your organizational
security posture, and these changes should be documented within your security plan.
You should write security plans assuming that the personnel who are currently active
within your organization could leave at any time (the old story about someone being hit
by a bus and was the only one who knew how to perform a specific function), so it’s best
to always prepare for contingencies such as this by having your security plan as heavily
documented as possible. You need to make sure to include a functional description of all
controls that were applied to the system, any decisions that were made leading to these
controls being implemented, any interdependencies, and any other relevant information.
Finally, you also want to include any documentation from testing that occurred and
remediations that were made based on testing results.
Any risk response planning should outline a rough timeline for implementation, a
rough estimate of costs, who is responsible for the implementation, and any required
tools (such as software, hardware, and so on) required to complete the tasks. More detail
is always better! A lack of clarity is not your ally, especially if the plan is handed over to a
team that wasn’t involved in the initial planning process.
Finally, you’ll want to track the status of your risk response implementation. This is
usually done using a risk register, discussed previously in Chapter 3. To recap, the risk
register is a document that tracks various elements of the identified risks, such as the risk
name, risk impact, risk probability, risk mitigation, action owner, and action suspense
date. This risk register can be used to track the implementation of the mitigations and
assure that timelines are met.
Do you have any metrics in place that can determine the success of the risk response?
Metrics help you quantify the effectiveness of your implemented risk response over its
life. Monitoring comes into play here because it facilitates your ability to understand
your performance against the metric. Monitoring can be done through a tool, through a
team, or through a combination of both.
Exception Management
It’s easy to say that your risk response options should always be implemented. You care-
fully considered the risks to the organization through the risk analysis process, selected
appropriate responses, and monitored your risk levels diligently. How could you pos-
sibly not implement a control? That would be crazy! However, there are exceptions,
and you need to have a process in place to manage those exceptions and keep them
minimized. Consider the situation where an operating system patch cannot be applied
because of a legacy application that’s critical to the organization’s mission. This miti-
gation is important but less important than the legacy application and its associated
mission. What to do? Exception management comes into play here; you need to docu-
ment this as an accepted exception to the policy and track it. Perhaps the patch can
be implemented in the future, or another mitigation could come along and make the
exception moot. This is another aspect of risk acceptance; you are asking management
to accept an ongoing risk, as an exception, because the response cannot be implemented
for whatever reason. Either way, keeping a close eye is key to not letting these exceptions
slip through the cracks.
NOTE Chapter 1 has more information on the concept of risk tolerance and
how it relates to risk acceptance.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
146
Training
After all is said and done and the controls have been implemented and documented, it
is important that you conduct regular and traceable training that covers a number of
aspects. On top of the usual cyber security, privacy, and acceptable user training that
most organizations (should) have in place, it is imperative that the employees responsible
for the care and feeding of your controls are properly trained on both the content of the
controls and the context of the controls. What does this mean? Content means that a
network administrator in charge of your infrastructure, and the subsequent controls,
understands the latest evolutions and revolutions in both current threats and vulnerabili-
ties. Context means that the same network administrator in a highly sensitive govern-
ment environment (think missiles, space, and so on) should know that they should be
extra prudent and consider the limitations inherent to their systems and how they inter-
act with other systems (if not the larger Internet). Without both of these, content and
context, as part of the training portfolio for all personnel charged with implementation
of controls, you may well likely find that one or the other is neglected.
Figure 5-5 NIST 800-64 System Development Life Cycle (courtesy of NIST, from Special Publication
800-64)
Acquisition/Development
Within the acquisition/development phase, the risk assessment is often conducted, along
with any security testing and development of documentation for system certification
and accreditation (as required). Risk assessment is covered in-depth in Chapter 2, but
just note that an effective risk assessment is built on the initiation phase having been
conducted appropriately and thoroughly. This is also the phase where the bulk of your
control development will occur.
Implementation/Assessment
Within the implementation/assessment phase, the system is installed in its new environ-
ment and evaluated for its readiness, both operational and security. Here you do a final
certification and accreditation review, and the authorizing official or other accrediting
authority will take responsibility for the security posture of the system. Any documenta-
tion to connect the system to any external entity should be completed within this phase.
Outputs for the implementation/assessment phase could include the following:
• Accreditation package
• System authorization
• System security plan
Operations/Maintenance
Within the operations/maintenance phase of the SDLC, the system is actively operat-
ing, so you can leave it alone here, right? Not likely. You need to constantly be looking
for ways to improve and enhance the system, and any improvements or enhancements
need to be considered for their security ramifications. Furthermore, the system must be
assessed periodically based on regulatory, legal, or other guidelines to ensure that it con-
tinues to maintain a risk level that aligns with the company’s risk tolerance. Outputs for
the operations/maintenance phase could include the following:
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
148
Sunset (Disposition)
Every good thing must come to an end, and systems are no exception. The final phase
of the SDLC requires a system to be disposed of properly, and in doing this you need to
be aware of the controls required for securely disposing of a system and any correspond-
ing data or other artifacts. As NIST points out, there is usually not a definitive end to
a system; it is often merely rolled into the next generation of systems, and any data and
associated requirements become the province of that group of personnel tasked with
the care and feeding of the new shiny solution. However, you do need to be aware that,
if required, it is important to have an orderly and safe disposal process on hand that
includes migration of data or archival solutions as appropriate. Outputs for the imple-
mentation/assessment phase could include the following:
Project Management
Risk responses should be implemented in a controlled, defined, and monitored manner
as discussed previously. One tried-and-true way to do this is through the tenets of project
management. The Project Management Body of Knowledge (PMBOK), a publication
of the Project Management Institute, defines a project as “a temporary endeavor to cre-
ate a unique product, service, or result.” Project management, then, is “the application
of knowledge, skills, tools, and techniques to project activities to meet project require-
ments.” Note that a project in this context is indeed temporary in nature, with a defined
beginning and end. Risk management is distinct from project management on this point
because project management incorporates concepts to lower project risk but ends with
the project, while risk management activities can continue indefinitely.
Project management is a great concept to know as a professional because it can be
helpful in completing any set of tasks, but for the CRISC exam, you obviously need to
keep your risk hat on. In this section, we will discuss the most common project manage-
ment frameworks and the vital concepts you need to understand for the exam. We’re not
advocating for a particular standard to be adopted; in fact, you’ll notice a great deal of
similarity among all of the major frameworks. Most importantly, you need to understand
that implementing controls is like any other project, in that, as the PMBOK states, it is
“the application of knowledge, skills, tools, and techniques to project activities to meet
project requirements.” The project activities are the activities you are conducting to meet
the project requirement: a set of controls implemented and functioning properly.
PMI-PMBOK
The Project Management Institute (PMI) Project Management Body of Knowledge
is perhaps the most recognized project management framework internationally. The
PMBOK divides project management into process groups, knowledge areas, and associ-
ated processes. The five process groups are as follows:
• Initiating
• Planning
• Executing
• Monitoring and Controlling
• Closing
Within the Initiating phase, you conduct your project kickoff. This is where you get
authorization to move forward with the project, and you create the project charter. Next,
you conduct the Planning phase, where the work plan is developed. The Executing phase
is where all your hard work planning pays off; you implement your plan and watch it
come to life. Monitoring and Controlling covers the critical points of tracking progress
against established milestones, goals, and objectives, and conducting remediation actions
as necessary. Finally, as discussed previously, all projects have a definite life span and must
be closed out in the Closing phase, with appropriate lessons learned documented.
There are also a number of certifications associated with the PMBOK framework,
including the Project Management Professional (PMP), the Certified Associate in Pro-
gram Management (CAPM), and the Program Management Professional (PgMP). While
you don’t need to know about these certifications within the scope of the CRISC exam,
it’s good to be aware of their existence because they are some of the more widely held and
respected credentials within the Project Management field.
CMMI
The Capability Maturity Model Integration (CMMI) framework is an internationally
recognized standard for improving processes within organizations. Developed by Carn-
egie Mellon University, the CMMI is used to gauge the process maturity within the
organization and to place it within a “maturity level.” There are CMMI frameworks
for a number of sectors, including CMMI for Acquisition (CMMI-ACQ), CMMI for
Services (CMMI-SVC), CMMI for Development (CMMI-DEV), Data Management
Maturity (DMM), and the People CMM. You’ll see many large companies boasting
about their CMMI level; it’s considered to be a solid gauge of the process maturity
within an organization. Why does this matter? If you want to, for example, hire an
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
150
external software developer to create and maintain an enterprise-wide budget tool, their
CMMI rating would give you insight of how they deal with processes such as change
management.
The maturity levels range from 1 through 5.
Agile
Agile project management frameworks have been used within the software development
sector for some time. The Agile methodologies look to improve—you’ll never guess—
agility by improving collaboration, reducing bureaucracy and red tape, and facilitating
ad hoc groups creating products in a rapid fashion. The Agile Manifesto, released by the
Agile Alliance, reflects the following principles:
• The highest priority is to satisfy the customer through early and continuous
delivery of valuable software.
• Welcome changing requirements, even late in development. Agile processes
harness change for the customer’s competitive advantage.
• Deliver working software frequently, from a couple of weeks to a couple of
months, with a preference to the shorter timescale.
• Businesspeople and developers must work together daily throughout the project.
• Build projects around motivated individuals. Give them the environment and
support they need and trust them to get the job done.
• The most efficient and effective method of conveying information to and within
a development team is face-to-face conversation.
• Working software is the primary measure of progress.
• Agile processes promote sustainable development. The sponsors, developers, and
users should be able to maintain a constant pace indefinitely.
• Continuous attention to technical excellence and good design enhance agility.
Within this manifesto, you notice the concepts of welcoming change (not common
within many project management frameworks) and a self-organized team (as opposed
to having a project manager formalize team membership). Finally, the concept of
iteration—from the team members reflecting regularly on their own effectiveness and
tuning accordingly to the delivery of regular products—is central to the Agile mind-set.
While its more flexible, ad hoc project management methodology might not be ideal
for every organization, you can definitely see how it would appeal to a certain subset of
company such as a startup.
The Agile framework (as well as the Lean framework, discussed in the next section)
differs from the PMBOK and the CMMI in its approach and rigidity. Both Agile and
Lean value the ability to make quick changes and the ability to be more ad hoc through
the use of self-organizing teams. There is much less emphasis on tracking through the use
of metrics, and a discussion of project risk is almost nonexistent. Still, in an organization
using these project management frameworks, risk should be considered and incorporated
into the project processes from beginning to end.
Lean
The Lean mind-set is derived from the manufacturing sector and is looking to “lean”
organizations through less waste; in this context, it means less waste within projects.
Waste can be found within too much unnecessary time spent on a project or unnecessary
personnel involved who could be utilized elsewhere. Anything that does not bring value
to the project is a target for “leaning” or improving, perhaps even removal. Value should
be defined early in the project by the end customer and often means what they will be
willing to pay in the end for any segment or part. Lean project management differs from
other frameworks by focusing efforts on improving processes to compress the overall
project schedule to reduce the project cost and improve the profitability of the project.
A common tool used within Lean projects is the value stream map (VSM). Within
the process of creating the VSM, the team will detail the steps, information flows, and
any delays currently resident within existing processes. This will allow the team to better
understand the current state of the processes within the company and look for areas to
reduce waste. At this time, another, updated VSM is created to depict the leaner process.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
152
effective risk response management: understanding the project requirements, tracking
project progress, improving processes, and creating value. Look at how these align with
the overall risk-focused mind-set. You understand the requirements for tracking risk so
that you know the organizational contexts and values, overarching laws and regulations,
and existing policies that you must consider when determining how you will approach
risk management. You track the progress in implementing your chosen risk responses
(and track exceptions to the policies using your exception management process). You
improve the fundamental organizational processes by incorporating a calculation of risk
throughout all of your projects. Finally, understanding risk creates real value for the lead-
ership because no project should be considered if the overall risk of failure, for example,
outweighs the reward of success. Risk management helps your leadership succeed by
helping quantify these concepts in a way that honest assessments can be made.
Chapter Review
In this chapter, we covered the risk response process from top to bottom. We discussed
three major risk frameworks, the NIST RMF, the ISACA IT Risk Framework, and the
ISACA COBIT. The NIST process is comprised of six steps: security categorization,
security control selection, security control implementation, security control assessment,
information system authorization, and security control monitoring, and it has an impor-
tant consideration of continuous monitoring. The ISACA IT Risk Framework has three
domains: Risk Governance, Risk Evaluation, and Risk Response. COBIT is not risk-
centric or IT security–centric but is largely focused on governance. These frameworks all
differ in their scope and content but have the same underlying goal of helping identify,
deal with, and monitor risks within an organization. We discussed how risk response is
an essential topic within all three frameworks.
We then covered the risk response process that includes the selection of risk response
options, the prioritization of risk response options, and the implementation of the risk
response plan. Each of these facets contains a number of key steps involving analysis, proper
communication, and consideration of the organizational risk tolerance and risk appetite.
We then developed an understanding of the different risk response options, includ-
ing risk avoidance, risk mitigation, risk sharing or transference, and risk acceptance.
Each one of these options has advantages and disadvantages. We also discussed how risk
responses should be selected and appropriately prioritized. This requires an understand-
ing of whether a response is a quick win (a situation where the response is high benefit
and low cost), requires a business case to be made, or necessitates a deferral (where the
risk does not outweigh the potential cost). Each risk response choice requires careful
consideration of these options to determine the best course of action; also, when it’s time
to implement the risk responses, knowing how to incorporate metrics, document thor-
oughly, and manage exceptions to the plan is key.
We also discussed how to implement the risk mitigations after they’ve been chosen,
through the use of frameworks, both for controls and for the overarching project man-
agement. You learned how risk responses are assessed, through documentation review,
Review Questions
1. Which of the following is not part of the risk response process?
A. Reviewing the results of the risk analysis
B. Implementing change management
C. Prioritizing risk response options
D. Implementing the risk reaction plan
2. Which of the following options can be considered a risk avoidance option?
(Choose two.)
A. Not opening operations within countries that are considered high risk
B. Deploying intrusion detection systems (IDSs) across the enterprise
C. Choosing to turn down an opportunity to partner on a new technology
project based on the poor performance of previous attempts
D. Purchasing insurance to cover financial losses in the event of a breach
3. What is phase 4 of the SDLC?
A. Sunset (disposition)
B. Implementation/assessment
C. Acquisition/development
D. Operations/maintenance
4. Which of the following would you choose if you had an expensive risk response
option to a relatively low risk?
A. Develop a quick win
B. Conduct more research
C. Develop a business case
D. Defer
5. The SC of a system includes which of the following? (Choose all that apply.)
A. Confidentiality
B. Impact
C. Integrity
D. Availability
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
154
6. Which of the following is not a valid risk response option?
A. Risk avoidance
B. Risk acceptance
C. Risk prediction
D. Risk transference
7. Risk mitigations are developed to reduce which of the following? (Choose two.)
A. The acceptance of risk
B. The avoidance of risk
C. The likelihood of risk
D. The impact of risk
8. Which of the following is considered a managerial activity?
A. Development and implementation of an enterprise acceptable use policy
B. Implementation of an antivirus tool across the organization
C. Implementation of mantraps at all major business entrances
D. A tabletop exercise of the business continuity plan
9. _____ testing and evaluation is conducted before the system is released into
final production.
A. Operational
B. Production
C. Essential
D. Final
10. What process would help you deal with risks that require an exemption to policy?
A. Exception management process
B. Risk acceptance process
C. Risk mitigation process
D. Risk management process
11. The __________ framework is not IT security–centric and was developed with
organizational governance in mind.
A. ISACA IT Risk Management
B. COBIT
C. NIST 800-37, revision 1
D. CRISC
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
156
17. What is the open source alternative for thorough and practical security testing?
A. NIST 800-64
B. NIST 800-115
C. ISACA COBIT
D. OSSTMM
18. Which of the following is a technical control?
A. Creation of a demilitarized zone within the enterprise architecture
B. Implementation of a physical security policy
C. Mandating two people to open secure areas together
D. Requiring segregation of duties across sensitive duty areas
19. __________ help(s) you quantify the effectiveness of your implemented risk
response over its life.
A. Leaders
B. Reports
C. Automation
D. Metrics
20. While the NIST 800-53 control catalog is used predominately within the
United States, the __________ is used more widely internationally and has
specific versions tailored for different types of industry.
A. ISACA COBIT
B. Risk Management Framework
C. ISO 27002
D. ISACA Risk IT Framework
Answers
1. B. While change management is important, it is not a formal step of the risk
response process.
2. A, C. Choosing to avoid risk often means not taking advantage of opportunities
that are determined to be riskier than is acceptable.
3. D. Phase 4 of the SDLC is the operations/maintenance phase, where a system
(and associated controls) is put into operation and continuous monitoring
takes place.
4. D. In the event you have an expensive risk response option to a relatively low
risk, you would ideally choose to defer. Always be on the lookout for low-cost
options for high-risk scenarios.
6
In this chapter, you will:
• Learn about types of control testing and assessment
• Discover tools and techniques used to conduct different types of control testing
and assessment
• Understand and define key performance indicators
• Understand and define key risk indicators
In this chapter, we will review the concepts that comprise CRISC Domain 4, which is
focused on risk control monitoring and reporting. In the previous chapters, we discussed
the elements of risk and information system controls, and this chapter shows you how to
most effectively and efficiently monitor those elements for maximum impact.
The CRISC exam objectives covered during this chapter include the following task
statements:
• 4.1 Define and establish key risk indicators (KRIs) and thresholds based on
available data, to enable monitoring of changes in risk
• 4.2 Monitor and analyze key risk indicators (KRIs) to identify changes or trends
in the IT risk profile
• 4.3 Report on changes or trends related to the IT risk profile to assist management
and relevant stakeholders in decision making
• 4.4 Facilitate the identification of metrics and key performance indicators (KPIs)
to enable the measurement of control performance
• 4.5 Monitor and analyze key performance indicators (KPIs) to identify changes
or trends related to the control environment and determine the efficiency and
effectiveness of controls
• 4.6 Review the results of control assessments to determine the effectiveness of the
control environment
• 4.7 Report on the performance of, changes to, or trends in the overall risk profile
and control environment to relevant stakeholders to enable decision making
159
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
160
Control Monitoring
In Chapter 5, we discussed the development and implementation of controls to help
you reduce risks within your organization. In this section, we will discuss how you can
assess and monitor the efficiency and effectiveness of those controls. Understanding how
controls are operating within your organization is an important input to your risk man-
agement strategy.
Threat Assessment
Threat assessments determine how threats, both of the natural and human-made type,
might harm your systems and, subsequently, the data residing on those systems. Remem-
ber from Chapter 1 that a threat is a danger of harm that can be enacted on an asset. The
asset has to be in danger from this threat; theoretically, if there is no danger, then there
is no threat. Threats exploit specific vulnerabilities, as discussed in the following section.
• Natural disasters, such as flood, fire, or earthquake, that cause physical damage
to assets
• Equipment malfunction, from normal wear and tear to catastrophic failure
• Employees, both malicious users and those with poor practices
• Intruders/hackers, unauthorized people attempting to compromise controls to
gain access or even damage assets
It’s important that a threat assessment consider the organization you work for, the
particular industry you reside within, and what the particular targets within your orga-
nization would be. One example is healthcare, where specific threats might target both
personal and protected health data that could be used for a number of malicious ends;
information concerning these threats can be gathered from other healthcare organiza-
tions or government agencies. Another industry that might be targeted is education,
where an educational institution is conducting applied research in conjunction with the
defense industry. This happens quite frequently for cutting-edge technologies, which are
just the type of thing an adversary would be deeply interested in. In this situation, an
intelligence entity might be able to supply information on foreign intelligence services
and their collection priorities, the likelihood of industrial espionage, and other relevant
threats. Your organization must use the expertise it has at its disposal in order to deter-
mine to what level and how these threats would affect its infrastructure and data.
Vulnerability Assessments
In Chapter 1 we discussed vulnerabilities, and you’ll recall that vulnerabilities are weak-
nesses in a system, operation, or facility that would make these resources susceptible to
being exploited by a threat. Vulnerabilities can exist in the way a system processes, trans-
mits, or stores data; they can also exist in the technologies that make up a system or even
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
162
in its design. Vulnerability assessments are designed for a (generally) third party to come
into an organization, take stock of the assets that will be covered within the scope of the
assessment, conduct scans and other tests against those assets, and provide a report of the
vulnerabilities that have been found. Often, a report recommending possible remediation
measures is also included within the deliverables. Vulnerability assessments often occur
from an internal point looking across the organization; the team will host its equipment
within the network to get the best look at the vulnerabilities without the interference of
the perimeter protections, such as firewalls. Many vulnerability assessment teams also
have the benefit of administrator or root credentials, rather than basic user credentials.
This allows an “open kimono” look at the patches that are missing, incorrect configura-
tions, and other flaws in the system that should be corrected to improve the control set.
A vulnerability assessment is commonly included within a risk assessment.
Penetration Testing
Penetration tests, unlike vulnerability assessments, are designed to actually exploit weak-
nesses on a system. Penetration tests take a vulnerability assessment a step (or ten) further
in that they tell you all of the actual vulnerabilities based on their having been exploited,
not just the probability. While vulnerability assessment is largely nonintrusive, becom-
ing intrusive only when a scan brings a system down because of a misconfiguration or
other situation causing a reboot or a crash of the system, a penetration test attempts to
bypass security controls and exploit any vulnerability that is identified. If a vulnerability
is indeed identified, the tester will attempt to “own” the system, often leaving a marker
showing that they were there. The really high-speed, real-world tests will even attempt
to conduct a denial-of-service attack or steal data, just like an attacker would do. The
results from penetration tests can be used to better determine how to protect the system,
by mitigating the vulnerabilities that the tester was actually able to exploit.
There are a couple of different types of penetration test that you should understand.
A black-box test, or blind test, means that a penetration test is performed with no prior
knowledge about the system design and architecture, personnel and organizational struc-
ture, and other attributes that could shed light on inherent weaknesses. In the same
manner as a malicious actor, the tester would have to use reconnaissance activities to
determine weaknesses.
Another type of penetration test is the gray-box test, in which the tester has some
knowledge, albeit limited, of the organization and its infrastructure. This could be lim-
ited to just information that can be found in certification and accreditation or other
sensitive internal documentation. Finally, there’s the white-box test, where the tester has
full knowledge of the network, access to diagrams of the network, information in detail
of hosts and services on the network, and potentially documentation from previous test-
ing events.
Within a black-box (blind) test, as noted, the testers do not have prior access to the
information regarding the organization and its infrastructure. In a double-blind test,
those charged with defending the network are unaware of the testing and are tested on
their ability to react and defend as if a real-world attack were taking place. Figure 6-1
shows the NIST SP 800-115 penetration testing cycle. As NIST points out, this is an
example of how the penetration process can be divided into phases. However, there are
Reporting
many acceptable ways of grouping the actions involved in performing penetration test-
ing, and other models are available for your use.
Within the planning phase, the rules of engagement are set, and management approves
the testing parameters. Without the due diligence in the planning phase, you could have
any number of disastrous situations, from a lack of management support to overstepping
boundaries because of a lack of agreement. The discovery phase includes reconnaissance,
or information gathering, as well as vulnerability analysis. Vulnerability analysis requires
the systems—and their resident operating systems and software—to be scanned, gener-
ally using automated tools, and compared to accepted vulnerability databases.
The attack phase can be delineated into steps: gaining access to the system, elevat-
ing privileges to gain administrator (or root) access, browsing the system, and installing
additional tools. At any point in time, a new system could be discovered, and the cycle
would loop back; this is depicted in Figure 6-2.
Additional Discovery
Attack Phase
Install
Discovery Gaining Escalating System
Additional
Phase Access Privileges Browsing
Tools
Figure 6-2 The NIST SP 800-115 attack phase steps with loopback to discovery phase
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
164
Finally, reporting is occurring continuously throughout the process; the reporting
requirements are often laid out within the rules of engagement or management approval
documentation. Generally there is a big final report at the end that details all the find-
ings, but there could be weekly, or even daily, reports that are required, as well as “spot
reports” in the event of an incident or a major finding. Be sure you detail what is expect-
ed for reporting up front!
Protocol Analyzer
A protocol analyzer is often known as a sniffer and is dedicated hardware or software
that collects network traffic for the purposes of examination, either to determine net-
work issues or to capture plain-text usernames, passwords, or other sensitive information
being sent in the clear. Encryption helps protect against the malicious use of a protocol
analyzer; while the data can still be captured, the encrypted data is gibberish until it’s
unencrypted.
Port Scanner
A port scanner allows the tester to determine which ports on the system are listening for
requests; this is a crucial step in determining what can be exploited. There are a standard
set of ports, including 65,535 TCP ports and User Datagram Protocol (UDP) ports, avail-
able for running services on a system. The first 1,024 are well-known or common ports,
such as FTP (21), SMTP (25), DNS (53), HTTP (80), and HTTPS (443). After the first
1,024 ports are port ranges used by applications, services, and other devices. Table 6-1 lists
the most common services and their corresponding TCP/IP ports.
Vulnerability Scanner
When a tester has determined which systems are available on the network, the next step
is to determine the associated vulnerabilities. A vulnerability scanner is a piece of software
designed to scan a system to determine what services the system is running and whether
any unnecessary open ports, operating systems and applications, or back doors can be
exploited because of a lack of patching or other flaw. Administrators commonly use the
same tools to test and remediate any flaws existing within the system. Vulnerability scan-
ners can include previously mentioned tools within their kit, such as port scanning, net-
work scanning and mapping, and operating system and application server scanning, and
can include a database of known weaknesses vulnerabilities. The scanner will execute one
or more of those tools against the targets to determine whether any of the vulnerabilities
listed in its database exist.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
166
Indicators
Now that you understand the tools that can be used to test control performance, you can
move toward the indicators associated with measuring and reporting that performance
and come up with current risk levels accurately and efficiently. You will often hear indi-
cators referred to as metrics, and in this book, those terms are interchangeable for our
purposes. However, the types of indicators and what they measure differ. Key performance
indicators (KPIs) are used to understand and enable the measurement of control perfor-
mance. Control performance can be anything from how often your firewall blocks mali-
cious incoming traffic to how often your continuity of operations plan is exercised. The
level of “performance” can be different for each organization; it’s important that you not
solely borrow the KPIs from another organization as a whole but really focus on how they
meet your organizational objectives and what your risk appetite is. Risk indicators are
metrics, much like KPIs, that are used to determine whether and when the organization
has a high probability of risk that exceeds the defined risk appetite. Not all risk indicators,
however, are key. Key risk indicators (KRIs) are considered to be highly probable indicators
designed to accurately predict important levels of risk based on defined thresholds.
So, why do you need indicators? How do you know whether you’re doing well or
poorly? Do you trust your risk team, hoping that they have some sort of reporting mech-
anism that will scratch the stakeholder itch? At the end of the day, you want to be able
to monitor and analyze those indicators to track trends and determine the effectiveness
and efficiency of the controls and to make decisions for creating new controls, ditching
others, and sounding the alarm when risk has passed a predefined threshold.
• Specific
• Measurable
• Attainable
• Relevant
• Timely
When a KPI is S.M.A.R.T., it is tailored to the organization and the area being mea-
sured. Are you attempting to measure availability? And you may want to look at a metric
that measures how often your systems go down or, the converse, the percentage of time
that your systems are up. Measurable KPIs can be measured somehow, in a way that can
be assured that it is accurate. In the instance of the availability measurement, how would
you measure this accurately? Perhaps you would determine how often the systems went
down based on the uptime command in the Unix operating system. However, there are
other ways to measure this such as “When a KPI is attainable, it is readily achievable.”
While it is admirable to shoot for the stars, you wouldn’t want to, for instance, shoot for
100 percent uptime in a situation where you have an entirely new staff, new equipment,
new management, and so on. Perhaps 85 percent is more achievable, and then you can
work toward that 100 percent mark. KPIs that are relevant matter to your organization.
If you’re in a situation where time is of the essence, such as stock trading, availability is
essential. Without availability, your systems cannot buy or sell stocks, and your user base
will quickly move on to another organization that values availability as much as they do.
However, other contexts, such as educational institutions, may not care so much about
availability. Usability might be the word of the day, or it might be the ability to access
content via mobile applications or other cutting-edge technologies. Think about what’s
important or relevant to your organization when determining your KPIs. Finally, timely
KPIs allow the data to be collected when needed to quickly determine the performance
of your measured initiative. Data should be able to be obtained relatively easily from
existing sources and repositories.
A number of academic institutions have done some really great work on KPIs and
metrics that is useful for anyone looking to define solid KPIs. For example, Cornell
University has conducted research on the business of KPIs and has determined that KPIs
should include the following attributes:
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
168
• Data source Where the data was obtained (and often by what means), how the
metric is calculated, and quality of the data
• Metric owner Individual responsible for providing the metric
• Reporting period Period for which the metric is applicable or relevant
• Reporting frequency Frequency in which the metric is measured
• Present value Current or present value of the metric as most recently measured
• Previous value Value of the metric from the last measurement period
• Baseline Normally expected value for a metric (an average for example); may
also include lowest and highest possible values for the metric
• Trend Direction the metric is moving; should indicate if increased or decreased
values are better and the progress (improving, getting worse, and so on)
• Thresholds Expected ranges of the metrics; this determines where the metric is
with respect to target values (determines acceptable values for “green” status) and
danger values (determines unacceptable values; generally the delineation between
“yellow” status and “red” status)
The Oak Ridge Institute for Science and Education has also published questions that
can help you determine the quality of your metrics.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
170
• Contingency planning (CP) Organizations must establish, maintain, and
effectively implement plans for emergency response, backup operations, and
post-disaster recovery for organizational information systems to ensure the
availability of critical information resources and continuity of operations in
emergency situations.
• Identification and authentication (IA) Organizations must identify
information system users, processes acting on behalf of users, or devices and
authenticate (or verify) the identities of those users, processes, or devices, as a
prerequisite to allowing access to organizational information systems.
• Incident response (IR) Organizations must: (i) establish an operational
incident handling capability for organizational information systems that includes
adequate preparation, detection, analysis, containment, recovery, and user
response activities; and (ii) track, document, and report incidents to appropriate
organizational officials and/or authorities.
• Maintenance (MA) Organizations must: (i) perform periodic and timely
maintenance on organizational information systems; and (ii) provide effective
controls on the tools, techniques, mechanisms, and personnel used to conduct
information system maintenance.
• Media protection (MP) Organizations must: (i) protect information system
media, both paper and digital; (ii) limit access to information on information
system media to authorized users; and (iii) sanitize or destroy information system
media before disposal or release for reuse.
• Physical and environmental protection (PE) Organizations must: (i) limit
physical access to information systems, equipment, and the respective operating
environments to authorized individuals; (ii) protect the physical plant and
support infrastructure for information systems; (iii) provide supporting utilities
for information systems; (iv) protect information systems against environmental
hazards; and (v) provide appropriate environmental controls in facilities
containing information systems.
• Planning (PL) Organizations must develop, document, periodically update,
and implement system security plans for organizational information systems that
describe the security controls in place or planned for the information systems and
the rules of behavior for individuals accessing the information systems.
• Personnel security (PS) Organizations must: (i) ensure that individuals
occupying positions of responsibility within organizations (including third-party
service providers) are trustworthy and meet established information security
criteria for those positions; (ii) ensure that organizational information and
information systems are protected during personnel actions such as terminations
and transfers; and (iii) employ formal sanctions for personnel failing to comply
with organizational information security policies and procedures.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
172
Similarly to the determination of KPIs discussed earlier, KRIs should be S.M.A.R.T.
and should drill down to the root cause and not just focus on the symptoms that are
immediately evident. KRIs should include lagging indicators, or indicators that deter-
mine current risk after an event has occurred; leading indicators, which indicate the
controls in place to prevent an event from occurring; and trends, as discussed previ-
ously, which consider patterns in the data that indicate risk. Root-cause analysis is also
important here, as discussed within KPIs, to determine the root cause for any risk, not
just the symptoms.
Root-Cause Analysis
Finally, it is important to use indicators that measure the root cause of any issue and
don’t focus on the symptoms themselves. Root-cause analysis (RCA) has its roots in
rocket science, and NASA has used it to determine faults within its programs. Essentially,
RCA looks to establish a causal relationship between the root cause (or causes) and the
problem as it has manifested itself. While we won’t get into the details (or even basics)
of rocket science, it is easier to understand how the culture of space exploration, and
attempting to lower risk in such a complex environment, helps you to understand the
importance of digging deep for the root cause. For example, the tragic Challenger shuttle
disaster manifested itself with an explosion 73 seconds after liftoff. That is the problem,
with a loss of seven crewmember lives, but the root cause is deeper and must be critically
analyzed. In the end, root-cause analysis showed that a rubber O-ring failed, causing the
disintegration of the spacecraft and the loss of all lives. Understanding that root cause has
saved dozens of lives in subsequent space missions because of redesigns and modifications
that were made as a result.
Reporting
At the end of the day, risk professionals need to make sure they have a clear understand-
ing of the exposures their organization faces, the active mitigations for those exposures,
and the indicators that are being used to measure the success or failure of the control
set, as well as the current risk posture as measured against the risk appetite. This all
needs to be communicated to the stakeholders. Articulating risk should not be under-
estimated; this is the place where you win hearts and minds through improving the
bottom line by reducing negative risk and capitalizing on positive risk. Responsible
reporting involves helping leadership understand the risks to the organization and how
critical it is to support their reduction through compliance with appropriate controls, as
well as identifying business opportunities in areas that can withstand risk. This needs to
be done in the most clear and concise manner possible, understanding the concepts of
risk, the indicators that have been chosen, and the current statuses that allow leadership
to make the best-informed decisions possible. Without the best possible information,
you cannot expect leadership to make informed decisions. You also need to interpret
technical findings and perhaps portray information in a manner that is less technical
and more “business speak.” What does this mean? When is the last time that you heard
a senior leader within your organization use purely technical jargon to describe ongo-
ing business performance? Maybe if you are at a tech company, this is normal, but for
the rest of us, we need to still place this information in a format that is understandable
for leadership. By doing this, you will not only make the point that the risk program is
useful and worthwhile and is supporting business goals and objectives but also identify
opportunities for the risk program (and associated reporting) to integrate throughout
the enterprise more cleanly.
NOTE Communicating clearly will help you receive more useful guidance
from your organization’s leadership; while that may sound like a drag, in fact,
it will facilitate all of those previous “good news” opportunities.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
174
This is also the time to include any other information that would be pertinent to sup-
porting the recommendations you’ve made, such as situations where a financial gain
could be made (through exploiting an opportunity) or any outlying legal or regulatory
concerns you might have.
Chapter Review
In this chapter, we discussed how you can assess and monitor the efficiency and effec-
tiveness of controls and risk. We discussed different types of testing and assessment,
including threat assessment, vulnerability assessment, and penetration testing. Threat
assessments determine how threats, both of the natural and human-made type, might
harm your systems and, subsequently, the data residing on those systems. Vulnerability
assessments are designed, often by a third party, for an organizational inventory that
includes scans and other tests against those assets and includes a report of the vulner-
abilities that have been found. Penetration tests, unlike vulnerability assessments, are
designed to actually exploit weaknesses on a system. Penetration tests take a vulnerability
assessment a step further in that they tell you all of the actual vulnerabilities based on
their having been exploited, not just the probability of them. Black-box tests, or blind
tests, mean that penetration testing is performed with no prior knowledge about the sys-
tem design and architecture, personnel and organizational structure, and other attributes
that could shed light on inherent weaknesses. The gray-box test differs in that the tester
has some knowledge, albeit limited, of the organization and its infrastructure. Finally,
there’s the white-box test, where the tester has full knowledge of the network and access
to diagrams of the network, information in detail of hosts and services on the network,
and potentially documentation from previous testing events.
We then covered the tools that are often used to conduct those assessments and tests,
both passive and active. Passive tools are used when you desire no interference with daily
activities and listen for network traffic or monitor the hosts they reside on quietly and
with little to no impact on the ongoing operations. At the opposite end of the spectrum,
active tools interact actively with a system, which has pros and cons as well. These tools
can often give you a more realistic perspective of vulnerabilities and the overall control
effectiveness but can cause performance issues, sometimes even denials of service. We
subsequently detailed a sampling of tools, including protocol analyzers, port scanners,
and vulnerability scanners.
We then covered indicators associated with measuring and reporting performance
and current risk levels accurately and efficiently. Key performance indicators are used
to understand and enable the measurement of control performance. Key risk indicators
are considered to be highly probable indicators designed to accurately predict important
levels of risk based on defined thresholds. Both KPIs and KRIs should be specific, mea-
surable, attainable, relevant, and timely, and the root cause should be taken into account
to ensure that indicators measure the root cause of any issue and don’t focus on the symp-
toms themselves. We then discussed the need to determine what data you can collect to
help measure indicators effectively.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
176
6. Jim wants to conduct a scan using a tool that can be used during business hours
with minimum disturbance to operations. Which is the most likely to support
his needs?
A. Active tools
B. Impact tools
C. Penetration tools
D. Passive tools
7. A __________ is dedicated hardware or software that collects network traffic
for the purposes of examination, either to determine network issues or to
capture plain-text usernames, passwords, or other sensitive information being
sent in the clear.
A. Port scanner
B. Protocol analyzer
C. Vulnerability scanner
D. Penetration tester
8. A __________ allows the tester to determine which ports on the system are
listening for requests.
A. Port scanner
B. Protocol analyzer
C. Vulnerability scanner
D. Penetration tester
9. A __________ is a piece of software designed to scan a system to determine
what services the system is running and whether any unnecessary open ports,
operating systems and applications, or back doors can be exploited because of a
lack of patching or other flaw.
A. Port scanner
B. Protocol analyzer
C. Vulnerability scanner
D. Penetration tester
10. John is reviewing the results of a vulnerability assessment on his Unix-based
network and finds a Windows patch missing. What is the likely finding?
A. False positive
B. False negative
C. False flag
D. False vulnerability
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
178
17. What NIST SP 800-55 security requirement states that organizations must
establish and maintain baseline configurations and inventories of organizational
information systems?
A. Awareness and training
B. Audit and accountability
C. Access control
D. Configuration management
18. ISACA’s Risk IT Framework includes which criteria? (Choose two.)
A. Impact
B. Meaningfulness
C. Reliability
D. Efficiency
19. The process of __________ helps to determine a causal relationship between a
cause and the manifested problem.
A. Causal analysis
B. Root-cause analysis
C. Indicator analysis
D. Exploratory analysis
20. __________ can contain valuable information about past and ongoing activities
and, when handled properly, can be timely.
A. Metrics
B. Accreditations
C. Indicators
D. Logs
Answers
1. B. Threat assessments are often conducted to identify matching threat and
vulnerability pairings, as well as the threat agents that could exercise a threat.
Like a vulnerability assessment, the assessment does not have to necessarily be
part of but can definitely support risk management.
2. C. Vulnerability assessments often occur from an internal point looking across the
organization; the team will host its equipment within the network to get the best
look at the vulnerabilities without the interference of the perimeter protections,
such as firewalls. Many vulnerability assessment teams also have the benefit of
administrator or root credentials, rather than basic user credentials.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
180
17. D. The principles of configuration management state that organizations must
establish and maintain baseline configurations and inventories of organizational
information systems.
18. A, C. ISACA’s Risk IT Framework includes the following criteria to select KRIs:
impact; effort to implement, measure, and report; reliability; and sensitivity.
19. B. Root-cause analysis looks to establish a causal relationship between the root
cause (or causes) and the problem as it manifested itself.
20. D. Logs can contain valuable information about past and ongoing activities and,
when handled properly, can be very timely.
Information Systems
Control Concepts
CHAPTER
7
In this chapter, you will:
• Learn the basic concepts of controls
• Examine different control frameworks
We’ve discussed controls throughout this book so far, but always from a risk identifica-
tion, assessment, analysis, and response perspective. There’s a lot more to be learned
about security controls and how they are designed and implemented. In this chapter, we
will begin to change direction a bit and focus on controls from those perspectives. We
will review some basics regarding controls, and you will learn about how you select them
to perform specific functions in protecting systems and data. We’ll also review a few key
control frameworks in detail, including the National Institute of Standards and Technol-
ogy (NIST) control catalog, COBIT, and Val IT.
The CRISC exam objective covered in this chapter includes coverage of the following
task statement:
181
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
182
Information Security Control Concepts
Before getting too deeply involved in control frameworks, it’s helpful to understand what
a control is. Although we’ve discussed controls throughout the book, we haven’t really
defined some of the finer points of controls. Controls are fundamentally defined as mea-
sures implemented to ensure that processes are performed to a certain standard, degree,
or depth; they offer detailed guidance relevant to a specific requirement. There are differ-
ent contexts for controls; for example, you may have financial controls that regulate how
transactions are securely processed, ensuring correct balances. In terms of information
security (and the corresponding risk context), they are used to specify what measures
should be taken to ensure security and reduce risk. Controls should be directly relevant
to the risk at hand; usually controls are defined and implemented in terms of addressing
a specific vulnerability or deficiency in asset protection. Often, controls directly address a
known risk or vulnerability in a given system, environment, or program, such as health-
care or financial IT systems and environments.
EXAM TIP Controls are measures implemented to reduce the likelihood and
impact elements of risk and may target specific vulnerabilities in an asset or
be used to generally protect several assets.
Control libraries or catalogs are defined sets of controls that can be used in a given
set of circumstances, market, or area. Controls are often tied to governance directives
and frameworks, but this isn’t always the case. Sometimes different regulations or even
process frameworks reference controls only to the extent that a control framework is
required, but not to specify which control catalog must be used. The Health Insurance
Portability and Accountability Act (HIPAA) is a good example of this scenario because
HIPAA requires security and risk controls, but it does not specify which control set
must be used (although HIPAA guidance does recommend the NIST control catalog).
As another example, while references to controls are specifically called out in the ISACA
Risk IT Framework (RR 2.1, “Inventory Controls,” and RR 2.4, “Implement Controls”),
the framework itself does not give any clear guidance on how controls are defined, select-
ed, or implemented. The assumption is that implementing the framework will show you
how to use and evaluate whichever control set you choose, especially if it’s the COBIT
5 or Val IT control sets, which are also associated with ISACA. The NIST Risk Man-
agement Framework (RMF), in contrast, does provide guidance on how its controls are
constructed, used, and assessed, devoting two entire publications to this subject.
Specific product or market environments may require the use of specific controls that
are context-related, as indicated in Table 7-1.
Controls in a given framework are often organized according to a particular area or
context, usually by functionality or relevance. For instance, NIST controls are broken
down into families, which are categories that apply to a specific context. As an example,
Physical and Environmental Protection (PE) controls address physical and environmen-
tal concerns such as physical access control and environmental factors (lighting, humid-
ity, and temperature), while the Program Management (PM) control family addresses
management processes that often appear as administrative controls, such as formally
appointing a responsible information security officer, for example. Most other control
frameworks discussed in this chapter similarly categorize controls, usually by process area
or other relevant aspect of context.
TIP You’ll find that most control libraries similarly group controls into
specific categories based upon function or context, and most use specific
identifiers for each control.
Which controls from the various frameworks are used by an organization depends
on several factors, including governance, market segment or area, level of regulation,
and internal factors such as risk tolerance, appetite, and maturity of risk management
processes. We cover more of how controls are selected, designed, implemented, and used
later in this chapter and in the next chapters, but suffice it to say for now that con-
trols are usually developed and applied to specific risk scenarios. These risk scenarios
are developed by the organization or industry as part of their risk identification process.
They describe threats, threat actors, events, time, and other circumstances, but of course,
control assignment and use may be required by legal or regulatory governance, as well as
the needs of the organization that intends to employ them. It’s also fairly common that
an organization will use more than one control set or framework because it may apply
differently to various aspects of the business or mission areas in an organization. For
example, a hospital may use NIST controls for some areas but may also be required to
use PCI-DSS controls because it may process payments from credit cards as patients pay
for medical services.
In examining the various control frameworks, you’ll also find that there are many sim-
ilarities between controls in some instances; often a control in one framework has a close
equivalent in another framework. For example, COBIT control PO7 loosely maps to the
NIST training control, AT-1, but describes a more generic process than the equivalent
NIST control. There will also be controls that have no matching control or even context
in another framework; these are often controls that deal with specific instances of risk or
security requirements unique to a particular environment.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
184
NOTE Most control catalogs have controls that can be easily mapped to
controls in other catalogs, although in some cases, this mapping may be
imprecise, may not be as detailed, or may even map to multiple controls in
another control library.
Control Classification
We discussed in earlier chapters how different controls are classified and categorized, and
those different categorizations are worth repeating here. The first way of categorizing
controls is in terms of their application to different aspects of security. We often catego-
rize controls in terms of administrative, technical, and physical controls. Administrative
controls, if you remember correctly, are those that apply to policies, procedures, person-
nel, training, and so on. For example, a formally documented policy detailing how often
backups should be made, to what type of media, and under what circumstances would be
considered an administrative control. Related to that would be a technical control, which
would be the backups themselves since data is backed up, preventing its loss. Obviously,
the physical control aspect in this particular example would be the physical protection of
the backup media, in terms of physical access, storage, and transport.
Yet another way of categorizing controls that we have discussed is according to func-
tion. Previously we identified several different functions that controls can fulfill and
noted that some controls may serve more than one function at a time. Typically, these
functions are normally considered to be deterrent, preventative, detective, corrective,
compensating, and recovery. Note that different security texts and frameworks may cat-
egorize these functions differently. A deterrent control is one that prevents an action or
issue from occurring, as does a preventative control. The difference here, however, is
that a deterrent control must be known to someone in order to prevent an action. For
example, a firewall rule that prevents someone from sending sensitive data outside the
organization will work regardless of whether someone realizes the rule is in place. This
would be considered a preventative control in this case. A deterrent control, however, is
designed to keep an individual from even attempting to do so. A deterrent control in this
case might be simply a warning message that pops up when someone attempts to send a
specific type of sensitive data outside the network, in an e-mail, for example. A preven-
tative control will work regardless of whether the individual is aware of it. A deterrent
control relies on knowledge of the control in order to perform its deterrent action but
may still prevent the action from taking place.
Detective controls serve to alert the proper individuals and management that a secu-
rity issue has occurred. An example would be an intrusion detection system or a building
alarm. Corrective controls typically are used to remediate an immediate or temporary
Control Selection
Controls are applied to a system, data, process, or even organizational element to address
a weakness or vulnerability or to counter a specific threat. Often, controls are applied to
address a specific risk response strategy, such as risk reduction/mitigation, transference,
avoidance, and acceptance. Controls are applied to reduce the impact and likelihood ele-
ments of risk, as follows:
Note that none of the scenarios listed earlier describes a case where a control prevents
a threat or a threat actor. Threats and threat actors exist, and controls can’t really prevent
their existence. Controls can, however, affect how they interact with vulnerabilities and
assets. Also note that all these strategies may be pursued simultaneously in the case of
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
186
controls that are well designed and effective, using the concept of economy of scale and
multiple use of controls.
EXAM TIP Remember that controls can affect the likelihood or impact risk
elements only by reducing vulnerabilities or protecting assets. They cannot
eliminate or reduce threats or threat actors; they only serve to reduce
likelihood or impact resulting from an attempted or successful exploitation
of a vulnerability by a threat.
Control Frameworks
Now that we’ve covered some generalities about controls, it’s time to look at various
control frameworks that you might use in your professional career. Keep in mind that
some control frameworks go more in-depth than others on their controls; some controls
in a given framework may treat a particular subject area lightly, while others may go into
detail on a particular subject area. Also keep in mind that some control frameworks are
geared toward specific environments or areas, and not all frameworks are necessarily
geared toward security specifically; some frameworks apply to a broad general business or
risk management area but may have security controls built into them for specific needs
or direct security actions from a higher level. Not all control frameworks are technical
in nature either; some frameworks apply to security and risk from a business process
perspective rather than a technical perspective. The control frameworks we’ll describe in
the following sections are just some of the more popular ones that you may encounter in
your professional career. You’ll also see that we spend more time talking about the NIST
control catalog than we do the others; this is because it is simply one of the more popular
frameworks and one of the more comprehensive. It’s also applicable to a wide variety of
risk management programs and efforts. It’s flexible, lending itself to almost any type of
management framework an organization could use. However, we will also describe some
of the other control frameworks you will encounter.
NIST
The U.S. Department of Commerce’s NIST has produced several documents, some
of which we have already discussed, that relate to risk management. The entire Risk
Management Framework, and all of its different components, spans several documents.
We will provide a comprehensive review of the framework and its related documents in
Appendix A, but for now we’ll examine a particular piece of the framework, the controls
catalog. NIST Special Publication 800-53, “Security and Privacy Controls for Federal
Information Systems and Organizations,” is the control catalog supporting the RMF.
The NIST controls are a comprehensive set of security measures and processes intended
to mitigate and reduce risk from an IT security perspective.
The NIST control catalog is divided into 18 control groups, called families, each
related to a particular aspect of IT security. Table 7-2 lists these families.
As you can see, the NIST control families span a great deal of subject areas. Also note
that each family has several controls in it; there are smaller families (such as the Aware-
ness and Training family, for example) that may have as few as five controls, but there are
others that have many different controls that go into great detail on security measures; an
example is the System and Communications Protection (SC) control, with 44 controls.
One thing to keep in mind about the numbers of controls for each family is that often, as
the control catalog goes through editing or revisions, some controls may be merged with
others or withdrawn entirely; this does not change the control numbering in subsequent
revisions for backward compatibility and reference purposes. So, for example, the SC fam-
ily, with 44 controls listed, actually has only 41 controls because three have been “with-
drawn,” but their numerical placeholder remains to avoid confusion with later versions.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
188
NIST controls have different elements or attributes that tell an organization how to
apply then, in regard to data sensitivity and security baselines. Without going into great
depth on all of these different attributes, we’ll explain a few of these entries to help you
understand how and when the control is applied. Figure 7-1 shows an example of a
control, as listed in Special Publication 800-53.
Note that there are several elements to a control listing. The first element is the con-
trol number, in this case, AC-7. This indicates the family control number, along with
the title of the control. There’s also a description of the control, as well as supplemental
Supplemental Guidance: This control applies regardless of whether the logon occurs via a local or
network connection. Due to the potential for denial of service, automatic lockouts initiated by
information systems are usually temporary and automatically release after a predetermined time
period established by organizations. If a delay algorithm is selected, organizations may choose to
employ different algorithms for different information system components based on the capabilities
of those components. Responses to unsuccessful logon attempts may be implemented at both the
operating system and the application levels. Related controls: AC-2, AC-9, AC-14, IA-5.
Control Enhancements:
EXAM TIP You will likely not be tested on any specific NIST controls;
however, it’s a good idea to have this knowledge in order to differentiate
among the different control frameworks you may see on the exam, as well as
for real life.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
190
AC-6 (10) LEAST PRIVILEGE | PROHIBIT NON-PRIVILEGED USERS FROM EXECUTING PRIVILEGED
FUNCTIONS
ASSESSMENT OBJECTIVE:
Determine if the information system prevents non-privileged users from executing privileged
functions to include:
AC-6(10)[1] disabling implemented security safeguards/countermeasures;
AC-6(10)[2] circumventing security safeguards/countermeasures; or
AC-6(10)[3] altering implemented security safeguards/countermeasures.
POTENTIAL ASSESSMENT METHODS AND OBJECTS:
Examine: [SELECT FROM: Access control policy; procedures addressing least privilege; information
system design documentation; information system configuration settings and associated
documentation; list of privileged functions and associated user account assignments;
information system audit records; other relevant documents or records].
Interview: [SELECT FROM: Organizational personnel with responsibilities for defining least privileges
necessary to accomplish specified tasks; organizational personnel with information security
responsibilities; system developers].
Test: [SELECT FROM: Automated mechanisms implementing least privilege functions for
non-privileged users].
Figure 7-2 An example of how to assess a NIST control (AC-6(10)), from NIST Special
Publication 800-53A
COBIT
COBIT (previously known as Control Objectives for Information and Related Tech-
nology but now typically referred to by its acronym) is a management and governance
framework developed and used extensively by ISACA in its various risk management and
business process frameworks. COBIT version 5, the current version, has incorporated
other ISACA-related frameworks, such as the Risk IT Framework and Val IT. COBIT
controls cover various areas, including auditing, compliance, information assurance, IT
operations, and security risk management, but typically from a higher-level perspective
than you might see in the NIST framework. As a governance and management control
framework, COBIT focuses more on the process level, rather than the implementation
details. We presented some basic information about COBIT in Chapter 1, but to refresh
your memory, the following are the COBIT governance and management domains:
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
192
Management Domain: Monitor, Evaluate, and Assess (MEA)
• MEA01: Monitor, Evaluate, and Assess Performance and Conformance
• MEA02: Monitor, Evaluate, and Assess the System of Internal Control
• MEA03: Monitor, Evaluate, and Assess Compliance with External Requirements
You may notice some similarities to the NIST framework described earlier; controls
are broken down into relevant areas, similar to NIST families, and numbered appro-
priately. Like NIST, these controls have subcategories with lower-level breakdowns. For
instance, APO12: Manage Risk breaks down into subprocesses that include the follow-
ing: APO12.01, Collect Data; APO12.02, Analyze Risk; APO12.03, Maintain a Risk
Profile; and so on. While there’s no one-to-one matching of COBIT controls to NIST,
obviously there are some generalities that could be considered equivalent. In the previous
example, COBIT’s APO12: Manage Risk process might map loosely to the NIST Risk
Assessment (RA) family of controls.
EXAM TIP Remember that COBIT 5 has integrated both Val IT (discussed in
the upcoming section) and the Risk IT Framework and serves as the “parent-
level” framework for implementing both of these frameworks.
Val IT
A discussion of Val IT may be a moot point in this chapter regarding control frameworks,
but it’s worth mentioning because it is part of COBIT and works closely with the Risk
IT Framework. Val IT is a governance and management framework developed by the IT
Governance Institute. Previously used in more of a stand-alone context, it has primarily
been absorbed as part of COBIT 5. It consists of three main domains: Value Governance
(VG), Portfolio Management (PM), and Investment Management (IM). While its pur-
pose is to obtain business value from IT investments and infrastructures, it can be used as
the logistical and mechanical business process and governance framework used to justify
control implementation and security programs that affect IT and business risk. It can
also be used as guidance in managing IT portfolios and programs, including the security
aspects of those programs. The three domains in Val IT are broken up as follows:
EXAM TIP While you won’t be expected to know Val IT’s domains and
breakdowns in detail, it’s a good idea to at least have a basic understanding
of the framework and its purpose.
PCI-DSS
The Payment Card Industry Data Security Standard (PCI-DSS) is a set of security
requirements levied on merchants that process credit card transactions. The standard
was developed jointly by the major payment card industry players, including Discover,
Visa, MasterCard, and American Express. The standard was developed in an effort to
impose security requirements and controls on retailers (merchants and service providers)
to reduce credit card fraud and identity theft. Note that PCI-DSS is not a law; rather, it
is an effort by the credit card industry to self-regulate. While not a law, it does have the
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
194
Control Objective Requirement
Build and 1. Install and maintain a firewall configuration to protect cardholder data.
Maintain a Secure
2. Do not use vendor-supplied defaults for system passwords and other
Network and
security parameters.
Systems
Protect 3. Protect stored cardholder data.
Cardholder Data
4. Encrypt transmission of cardholder data across open, public networks.
Maintain a 5. Protect all systems against malware and regularly update anti-virus
Vulnerability software or programs.
Management
6. Develop and maintain secure systems and applications.
Program
Implement Strong 7. Restrict access to cardholder data by business need to know.
Access Control
8. Identify and authenticate access to system components.
Measures
9. Restrict physical access to cardholder data.
Regularly Monitor 10. Track and monitor all access to network resources and cardholder data.
and Test Networks
11. Regularly test security systems and processes.
Maintain an 12. Maintain a policy that addresses information security for all personnel.
Information
Security Policy
Table 7-3 PCI-DSS Control Objectives and Requirements
effect of being mandatory governance requirements; retailers must comply with PCI-
DSS to be allowed to process credit cards from the major industry brands. A few U.S.
states, however, have codified into their laws the use of PCI-DSS standards.
The PCI-DSS (currently in version 3.1 as of this writing) is a set of 6 control objec-
tives, broken down into 12 major requirements, which are further broken down into
subrequirements. Table 7-3 lists the basic PCI-DSS requirements.
On the surface, these objectives and requirements don’t seem to go much in depth.
Understand, however, that PCI-DSS further decomposes the requirements into detailed
processes and procedures. The standard also provides guidance for testing at the control
level. For example, requirement 5, “Protect all systems against malware and regularly
update anti-virus software or programs,” breaks down into four subrequirements, some
of which break down even further. Requirement 5.1.2, continuing the example, specifies
continuous monitoring and evaluation of hosts for malware threats. All in all there are
actually more than 200 subrequirements, the equivalent of controls.
EXAM TIP You likely won’t be asked any control-specific questions on the
exam, but you should keep in mind where it’s applicable: to merchants
and retailers that process credit card transactions. You can find more
detailed information on the PCI-DSS standards at the website of the PCI
Security Standards Council at https://www.pcisecuritystandards.org/
security_standards/.
ISO/IEC Controls
Although we’ve primarily discussed different control sets that originate in the United
States (such as PCI-DSS and NIST), most of the various control frameworks map to,
and in some cases, originate from standards used worldwide and developed by interna-
tionally respected governing bodies. In Chapter 4, we briefly mentioned some of these
standards, including those from ISO and IEC. The ISO and IEC produce informa-
tion technology standards that are used internationally, including several that apply to
information security and risk management. You may see individual standards prepared
by each of these organizations, but you may also see combined standards, usually indi-
cated as ISO/IEC for those standards that are jointly developed. We discussed standards
that applied more specifically to risk assessments in Chapter 4, but there are also ISO/
IEC standards that are essentially control requirements. Two examples are ISO/IEC
27001, “Information Technology–Security Techniques–Information Security Manage-
ment Systems–Requirements,” and ISO/IEC 15408, “Information Technology–Security
Techniques–Evaluation Criteria for IT Security” (more widely known as the Common
Criteria).
In addition to the mapping that the NIST Cybersecurity Framework provides to dif-
ferent control sets and requirements (discussed in an upcoming section), NIST Special
Publication 800-53, the NIST control set, provides a convenient mapping as well to both
ISO/IEC 27001 and 15408 control sets in its appendixes. Figure 7-3 shows a snippet
mapping NIST controls to ISO/IEC 27001, and Figure 7-4 shows the reverse mapping.
Figure 7-5 illustrates the mapping of ISO/IEC 15408 to the NIST 800-53 controls. All
three figures were taken from NIST Special Publication 800-53.
In examining these control mappings, a few points should stand out. First, there’s not
necessarily a straight one-to-one mapping of controls. In some cases, the requirements
for a given control in a control set may map to one, many, or even none of the other
control set’s controls. Second, controls tend to follow similar patterns and requirements,
such as acceptable use, password requirements, media storage, encryption, and so on.
Most controls from the various control sets have these commonalities because all of them
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
196
NIST SP 800-53 CONTROLS ISO/IEC 27001 CONTROLS
AC-1 Access Control Policy and Procedures A.5.1.1, A.5.1.2, A.6.1.1, A.6.1.2, A.6.1.3, A.8.1.1, A.10.1.1,
A10.8.1, A.11.1.1, A.11.3.3, A.11.4.1, A 11.6.1, A.11.7.1,
A.11.7.2, A.12.3.2, A.15.1.1, A.15.2.1
AC-2 Account Management A.8.3.3, A.11.2.1, A.11.2.2, A.11.2.4, A.11.5.2, A.11.5.5,
A.11.5.6
AC-3 Account Enforcement A.7.2.2, A.10.6.1, A.10.7.3, A.10.7.4, A.10.8.1, A.10.9.1,
A.10.9.2, A.10.9.3, A.11.2.2, A.11.5.4, A.11.6.1, A12.4.3,
A.15.1.3
AC-4 Information Flow Enforcement A.7.2.2, A.10.7.3, A.10.8.1, A.11.4.5, A.11.4.7, A.12.5.4
AC-5 Separation of Duties A.10.1.3
AC-6 Least Privilege A.11.2.2, A.11.4.1, A.11.4.4, A.11.5.4, A.11.6.1, A.12.4.3
AC-7 Unsuccessful Logon Attempts A.11.5.1
AC-8 System Use Notification A.6.2.2, A.11.5.1, A.15.1.5
AC-9 Previous Logon (Access) Notification A.11.5.1
AC-10 Concurrent Session Control None
AC-11 Session Lock A.11.3.2, A.11.3.3, A.11.5.5
Figure 7-3 NIST controls mapped to ISO/IEC 27001 (from NIST Special Publication 800-53)
A.12.3 Backup
A.12.3.1 Information backup CP-9
A.12.4 Logging and monitoring
A.12.4.1 Event logging AU-3, AU-6, AU-11, AU-12, AU-14
A.12.4.2 Protection of log information AU-9
A.12.4.3 Administrator and operator logs AU-9, AU-12
A.12.4.4 Clock synchronization AU-8
A.12.5 Control of operational software
A.12.5.1 Installation of software on operational systems CM-5, CM-7(4), CM-7(5), CM-11
A.12.6 Technical vulnerability management
A.12.6.1 Management of technical vulnerabilities RA-3, RA-5, SI-2, SI-5
A.12.6.2 Restrictions on software installation CM-11
A.12.7 Information systems audit considerations
A.12.7.1 Information systems audit controls AU-5*
A.13 Communications security
A.13.1 Network security management
A.13.1.1 Network controls AC-3, AC-17, AC-18, AC-20, SC-7, SC-8, SC-10
A.13.1.2 Security of network services CA-3, SA-9
Figure 7-4 ISO/IEC 27001 control requirements mapped to NIST 800-53 controls (from NIST
Special Publication 800-53)
Figure 7-5 ISO/IEC 15408 controls mapped to NIST controls (from NIST Special
Publication 800-53)
in some way trace back to the three goals of security (confidentiality, integrity, and avail-
ability), as well as the supporting elements that include identification, authentication,
and authorization. This is generally true regardless of which security control framework
you examine.
NOTE You’ll find that many control frameworks are derived from and map to
the ISO/IEC standards. They are international standards and can be applied
across most industries and market spaces.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
198
information systems and data. The Council on CyberSecurity (CCS) currently manages
these controls, listed here:
TIP The SANS CSC Critical Security Controls cover only the top 20 “critical”
controls considered to be the most important in an information security and
risk management program, as recommended by the industry. They do not
go into as much depth as other control catalogs.
ISA
The International Society of Automation (ISA) has developed standards and controls
that apply to automated systems, such as industrial control systems (ICS) and supervisory
control and data acquisition (SCADA). Since so many of these systems are now using
traditional computers and networks to process and carry data, they are also subject to the
same attacks, data modification, loss, and other risks as traditional information systems
and data. Examples of the many uses of industrial control and SCADA systems include
those found in nuclear power plants, electric power facilities, production factories, medi-
cal devices, and other critical infrastructures.
Obviously, then, these types of systems require at least the same level of risk man-
agement and protection through security controls as traditional systems. While some
traditional security controls and frameworks have been applied to these types of sys-
tems (particularly NIST controls), there are also specific control sets developed by that
industry that address vulnerabilities. There are particular standards and controls that
ISA has developed that specifically can be applied to information security requirements.
While ISA, in conjunction with the American National Standards Institute (ANSI),
develops a wide variety of standards, some dealing with safety, electrical equipment, and
so on, specific security-related ISA standards include the ISA 62443 series (for example,
ISA 62443-2-1:2009 and ISA 62443-3-3:2013).
NOTE While the ISA controls specifically apply to ICS and SCADA systems,
they are meant to be supplemented by other controls, such as those found
in NIST.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
200
Cybersecurity Framework from NIST
Interestingly enough, NIST—through its February 2014 “Framework for Improving
Critical Infrastructure Cybersecurity” publication (also known as the Cybersecurity
Framework)—has done a great job of decomposing five key security-related functions
into categories and subcategories. These five functions are Identify (ID), Protect (PR),
Detect (DE), Respond (RS), and Recover (RC). The framework also provides formally
defined designators that can be used by an organization to ensure standardization. In
Figure 7-6, there’s an example directly taken from the cybersecurity framework that
shows how this decomposition of security functions occurs. Notice the similarities in
functions and categories to the material we have been discussing throughout the book.
Function Category
Unique Function Unique Category
Identifier Identifier
ID.AM Asset Management
ID.BE Business Environment
ID Identify ID.GV Governance
ID.RA Risk Assessment
ID.RM Risk Management Strategy
PR.AC Access Control
RS.CO Communications
RS Respond RS.AN Analysis
RS.MI Mitigation
RS.IM Improvements
RC.CO Communications
Figure 7-6 NIST’s cybersecurity functions and categories (from the “Framework for Improving
Critical Infrastructure Cybersecurity” publication, February 2014)
Figure 7-7 Mapping functions to subcategories and controls in the NIST Cybersecurity Framework
(from the “Framework for Improving Critical Infrastructure Cybersecurity” publication, February 2014)
The framework, taking into account that different organizations use different control
frameworks and control sets, also provides for a convenient mapping to various con-
trol libraries, some of which we have discussed. Figure 7-7 shows how the cybersecurity
framework maps its critical security functions to a variety of control sets and frameworks,
including NIST, COBIT 5, ISO/IEC, ISA, and others. The purpose of this mapping is
to help provide standardization to organizations that use different control sets to map to
defined security functions. This can help organizations convert to equivalent control sets
when dealing with auditors or partners and provide a path forward when determining
risk strategy and management. It also helps users who may be under different governance
requirements to use multiple control sets to leverage their efforts to meet the require-
ments of more than one control set simultaneously.
Chapter Review
In this chapter, we went over the basic concepts of controls and examined different con-
trol frameworks. Controls are security measures implemented to ensure that processes are
performed to a certain standard, degree, or depth; they offer detailed guidance relevant to
a specific requirement. Controls directly address a known risk or vulnerability in a given
system, environment, or program. Controls can be classified as administrative, technical,
and physical controls. They can also be classified in terms of function, such as deterrent,
preventative, or corrective controls. Controls are used to reduce likelihood and impact
factors in risk and protect assets by reducing vulnerabilities.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
202
We examined the NIST control framework from Special Publication 800-53, which is
a comprehensive catalog of controls covering all aspects of information system and data
security. We defined the different attributes of a NIST control, such as the baseline and
priority aspects. We also looked at its counterpart, Special Publication 800-53A, which
provides guidance on assessing those same controls.
We then looked at COBIT, a management and governance framework, developed
and used extensively by ISACA in its various risk management and business process
frameworks. COBIT controls cover various areas, including auditing, compliance, infor-
mation assurance, IT operations, and security risk management, but at a higher-level
perspective. COBIT version 5 also incorporates the Val IT governance and management
framework. Val IT consists of three main domains: Value Governance (VG), Portfolio
Management (PM), and Investment Management (IM); it is used to help obtain business
value from IT infrastructure.
PCI-DSS is a set of security requirements levied on merchants that process credit card
transactions, developed by major card providers. Although not a law in itself, it is con-
sidered mandatory for retailers and service providers that process credit card transactions
and has actually been incorporated into several U.S. state laws. PCI-DSS controls are
broken down into 6 control objectives and 12 requirements, which are further broken
down into specific controls.
We also looked at a variety of other control frameworks, such as international standards
promoted by ISO and IEC. These included ISO/IEC 27001 and ISO/IEC 15408; we
demonstrated how these standards and other control sets have much in common and can
often be mapped to each other, allowing for standardization and cross-utilization. The
SANS Institute’s Top 20 Critical Security Controls were developed based upon recom-
mendations from government and industry as high-priority measures that organizations
should take to protect information systems and data. They include controls that address
areas such as device inventory, secure configuration, and application software security, to
name just a few. In another example of a non-U.S. control standard, we briefly looked
at the Australian Signals Directorate’s Strategies to Mitigate Targeted Cyber Intrusions,
a list of 35 mitigation strategies (security controls). This standard covers critical control
areas such as application whitelisting, patching, and restriction of administrative privi-
leges, among others. Then we took a brief look at standards and controls that apply to
automated systems, such as industrial control systems and supervisory control and data
acquisition. Specifically, examples of these specialized types of controls are those devel-
oped by the International Society of Automation.
Finally, we looked at NIST’s Cybersecurity Framework, which defines five key
security-related functions, divides them into categories and subcategories, and also maps
them to various control libraries. These five functions are as follows: Identify (ID), Pro-
tect (PR), Detect (DE), Respond (RS), and Recover (RC). The functions can be mapped
to almost any of the various control sets discussed throughout the book, grouping similar
functions together and identifying the controls associated with those functions.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
204
6. Which of the following is the catalog of controls published by the National
Institute of Standards and Technology?
A. ISO/IEC 27001
B. ISO/IEC 15408
C. Special Publication 800-53
D. Special Publication 800-53A
7. Which control family is not included in NIST’s 18 families of controls?
A. Privacy
B. Personnel Security
C. Media Protection
D. Incident Response
8. Which of the following management and governance frameworks incorporates
both the Risk IT Framework and the Val IT framework?
A. ISO/IEC 27001
B. SANS Top 20 CSC
C. NIST SP 800-53
D. COBIT 5
9. All the following are domains of the Val IT framework except which one?
A. Value Governance
B. Security Management
C. Portfolio Management
D. Investment Management
10. Which control framework is not normally legally required but is mandated by the
members of its industry and is imposed on merchants and retailers?
A. ISO/IEC 15408
B. NIST SP 800-53
C. PCI-DSS
D. Val IT
11. Which of the following control objectives is specific to PCI-DSS?
A. System and Services Acquisition
B. Build and Maintain a Secure Network and Systems
C. Manage Business Process Controls
D. Monitor, Evaluate, and Assess Performance and Conformance
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
206
17. Which the following is not one of the five key security-related functions defined
in NIST’s Cybersecurity Framework?
A. Identify
B. Protect
C. Detect
D. Manage
18. Which of the following control libraries contains BAI04: Manage Availability and
Capacity?
A. COBIT 5
B. NIST SP 800-53
C. ISO/IEC 27001
D. ISA 62443-3-3:2013
19. Which of the following can be used to assess controls under NIST SP 800-53?
A. NIST SP 800-37
B. NIST SP 800-30
C. NIST SP 800-53A
D. FIPS 199
20. Which of the following control sets would AC-7 belong to?
A. NIST SP 800-53
B. COBIT
C. PCI-DSS
D. ISA 62443-2-1:2009
Answers
1. D. Controls are security measures implemented to ensure that processes are
performed to a certain standard, degree, or depth.
2. C. Controls are designed to be effective, but they can never completely eliminate
a particular risk; they can only reduce or mitigate it.
3. A. A documented policy on firewall rules and exceptions would be considered an
administrative control.
4. B. A security fence would be considered a preventative control since it actually
prevents unauthorized persons from entering an area. A sign, by itself, might
deter a person but could not prevent that person from entering an area. Audit
logs are detective controls. Backups used after a failure would be a recovery
control.
Designing and
Implementing Controls
CHAPTER
8
In this chapter, you will:
• Learn business perspectives of information controls
• Examine the information system security engineering process and its relationship
to control design and implementation
• Review effective control design principles
• Learn about information categorization and how it affects control selection
• Learn about implementing information controls
In Chapter 7 we covered the basics of controls, and in previous chapters we’ve discussed
how to assess controls as part of the overall risk assessment process, but we haven’t yet
covered the finer points of how controls are designed and implemented. In this chapter,
we’ll discuss controls from the design and implementation perspectives. We will look
at business perspectives on information controls, as well as the value of business cases
in justifying control implementation or modification. We’ll also cover these controls
and frameworks from the governance view, including the governmental, financial, and
healthcare views. You’ll learn about the information system security engineering (ISSE)
process and how it affects the control life cycle, as well as how controls are selected to per-
form specific functions in protecting systems and data. We’ll cover some of the principles
of effective control design, as well as how to implement controls.
The CRISC exam objectives that we will continue to cover during this chapter include
the following task statements:
• 2.2 Identify the current state of existing controls and evaluate their effectiveness
for IT risk mitigation
• 2.3 Review the results of risk and control analysis to assess any gaps between
current and desired states of the IT risk environment
• 3.3 Consult on the design and implementation or adjustment of mitigating
controls to ensure that the risk is managed to an acceptable level
209
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
210
• 3.4 Ensure that control ownership is assigned to establish clear lines of
accountability
• 3.5 Assist control owners in developing control procedures and documentation to
enable efficient and effective control execution
Notice that we’ve also partially covered these objectives in previous chapters, but more
in the context of discussing risk assessment than control design and implementation.
We’ll touch on some previously discussed topics, as well as introduce some new con-
cepts to round out the discussion of these objectives. Like in the previous chapter, you’ll
find that this chapter covers more material than you might find on the exam; again, it’s
important that you understand foundational and conceptual knowledge about control
design and implementation both for the exam and in the real world when dealing with
information systems and their controls. And, to reiterate, this book is intended to be not
only a study guide for the exam but also a comprehensive reference you will use even after
you have passed the CRISC exam.
IT
IT risk
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
212
required to encrypt data at rest, in the event of a serious data breach, the organization
may face legal ramifications by not following this industry-accepted practice.
TIP Don’t neglect discussing liability issues in a business case. Often this
could be the make-or-break decision for implementing a control since
liabilities could subject the business to legal fees and fines that cost far more
than the control itself.
Governance
Obviously, governance can be used to drive a business case as well. Since governance
can’t easily be ignored, even in the face of limited resources, it’s worthwhile to include
governance requirements for controls in any business case that supports implementing
particular information system controls. Governance requirements can be used to justify
the cost, as well as the need to implement security controls. The particular types of gover-
nance your organization is subject to will need to be carefully examined before inclusion
in any business case to ensure that they are properly interpreted. We’ll discuss particular
types of governance later in this chapter.
NOTE Like the liability issues mentioned earlier, governance can also be a
make-or-break decision for implementing a control since the organization
may be legally required to implement certain data protection controls and
failure to do so may be breaking the law. You definitely want to include any
potential governance or legal compliance issues in business cases because
senior management needs to be aware of any potential compliance issues
involved with the decision.
EXAM TIP Keep in mind the different considerations you should include in
a business case: support for security goals, governance, due care, diligence,
liability; as well as control effectiveness, efficiency, and economy of use.
The business case should also discuss the pros and cons of implementing a
control versus not implementing the control, as well as the risk involved.
Control
Economy of use
effectiveness/efficiency
Due care,
Security goals diligence, and Governance
liability
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
214
PCI-DSS controls are often used alongside other controls mandated by other governance
since many merchants are governed by other requirements and take credit card payments
incidental to their primary business (think of a doctor’s office, covered by HIPAA gover-
nance, which processes credit card payments for medical services rendered, for instance).
EXAM TIP PCI-DSS standards are typically not legally mandatory, except in a
few states. The standards are industry imposed; they are not actually laws or
regulations unless they have been mandated for use by a particular law.
EXAM TIP HIPAA does not mandate any particular control framework but
recommends NIST controls.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
216
NOTE SOX compliance primarily involves auditing, particularly processes
associated with financial accounting. However, information systems and data
are also subject to auditing to ensure data integrity. SOX also primarily covers
management and governance processes, instead of technical controls.
NOTE All U.S. government federal agencies are subject to FISMA, which in
turn requires adherence to NIST standards and use of the RMF.
Internal Functions
Internal functions are those that are specific to the internal workings of a business orga-
nization. This could include functions such as human resources, accounting, security,
External Functions
Most organizations put a higher priority on protecting external functions, such as exter-
nal websites, and other potentially publicly accessible data. The typical example of a
control that protects external functions is a firewall, of course, but that’s not the only
control available and certainly shouldn’t be the only control an organization uses. Strong
authentication, encryption, third-party agreements, and other access controls should be
used to protect external functions and data since these functions are often on stand-alone
servers in a DMZ configuration or on third-party servers and networks, which may not
be as protected as internal assets, and could potentially be accessible from the public,
including resourceful malicious hackers.
Cross-boundary Functions
Closely related to external functions are those functions that tend to cross the physical
and logical boundaries of the organization between the internal and external networks.
These can be the functions that are most difficult to secure simply because data must
pass between the internal and external boundaries of the infrastructure to enable the
business to carry out its day-to-day mission, so they can’t be completely closed off from
the outside world. This can widen the attack surface of the organization’s protected
network. Again, firewalls are the ubiquitous security control used to protect and sepa-
rate internal and external boundaries; this definitely shouldn’t be the only type of con-
trol used. For example, strong authentication should be used for any entity that needs
to come from the external network into the internal network for any reason. Usually
multifactor authentication is preferred in those cases. Also, data encryption is a must,
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
218
Internal functions
• HR Controls: policies,
procedures,
• Accounting
authentication,
• Production encryption, auditing
Cross-boundary functions
External functions
Controls: security devices,
• Public website (with no connections to internal resources) ACLs, authentication,
• Data export to offsite storage or processing physical security
Figure 8-3 Examples of internal, external, and cross-boundary functions and controls
since data traversing in either direction should be protected from unauthorized access
and interception. Even the architectural design of the boundaries between the internal
network and the external world serves as a security control. For example, a DMZ con-
figuration serves as a boundary layer between the Internet and the internal network,
consisting of multiple firewalls, routers, and segmented networks. Examples of cross-
boundary traffic might include VPN traffic, business extranets, and public access to
an e-commerce website. Controls must be selected and implemented that protect and
restrict any and all access that is actually allowed from the external to the internal net-
work, and vice versa. Figure 8-3 illustrates the concepts of internal, external, and cross-
boundary functions, with appropriate functions and control examples.
CAUTION Ensure that you consider data sensitivity and segmentation when
designing controls for internal, external, and cross-boundary interfaces.
This might mean implementing controls such as network segmentation
and VLANs, different authentication credentials for systems with data of
different sensitivity levels, and restrictive access rights and permissions.
It also includes implementing perimeter security controls, such as a DMZ,
internal and external firewalls, and separated extranets, as well as strong
authentication and encryption mechanisms.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
220
The design phase involves actually taking the requirements and turning them into a
workable architecture and design. For systems, this might involve designing interfaces
for different components, as well as higher-level assemblies decomposed into lower-level
components. For systems that will be acquired, rather than developed by the organiza-
tion, system specifications are generated during this phase. In the development or acqui-
sition phase, the organization would then go out and find a source for the system it
desires or, at the least, the components that will be used to build the system. If the
system is to be developed internally by the organization, this process involves actually
assembling the components or developing software. The test phase involves performing
several different types of tests to ensure that the end product meets the performance and
functionality specifications set forth in the requirements phase. Testing could include
individual unit testing, systemwide testing, integration testing, and regression testing,
to name a few types. Once a system is acquired or developed, it goes through a formal
acceptance process. If accepted by the organization, it is usually implemented. Imple-
mentation involves actually putting the system into production for its intended use.
Some models also distinguish a sustainment or maintenance phase separate from the
implementation phase, where the system is maintained, updated, and upgraded occa-
sionally and kept functional. Finally, after the system has reached the end of its useful
life cycle, it is disposed of, replaced, or retired. These basic steps of the SDLC are fairly
common, and most models, once again, follow them with some variation.
Unfortunately, most of these models, such as the waterfall, iterative, and agile mod-
els, were developed before security became a concern. As security became more and
more important, it was included later in the life cycle, typically during the implementa-
tion or sustainment phase, and applied to a system that was already built. This didn’t
always work because adding security mechanisms to a system or software after it is
already in production may have required refitting a system or integrating security tech-
nologies into a system that wasn’t designed to accept them. This practice was known as
“bolting on” security as an afterthought. For example, if the system was designed with
no encryption mechanisms, applying encryption controls to it would be difficult at best
and impossible at worst. That would mean that you would have a functional system that
was not as secure as it needed to be and didn’t protect data during storage, processing, or
transmission. Because of issues such as these, it became apparent that a way was needed
to “bake in” security from the beginning, from the requirements phase all the way to
system disposal. That’s where the information system security engineering discipline
came into play.
ISSE approaches the SDLC from the perspective that security should be included
throughout the entire system’s life cycle. One approach is to include security elements
in existing SDLC models, but this isn’t always easy to do since many of these models
are rigid and don’t necessarily allow for considering security as a requirement when
developing a system. Another approach is to construct development models that are
specific to information security engineering and match them up with available SDLC
models. Three (of the many) such examples of these models that we’ll discuss are the
Information Assurance Technical Framework, NIST’s SP 800-160, and the ISO/IEC
21827:2008.
1. Discover Needs
2. Define System Requirements
3. Design System Architecture
4. Develop Detailed Design
5. Implement System
6. Assess Effectiveness
Each of these phases is broken down into specific activities particular to that phase.
Although the model is sequential in nature, phase 6, Assess Effectiveness, is intended to
be conducted simultaneously with all the other phases, allowing practitioners to check
to ensure that the goal of the phase has been accomplished before moving on to the
next phase. The IATF has not been updated since 2002, with the community generally
waiting for and moving toward a new ISSE-related publication anticipated from NIST,
discussed next.
NIST SP 800-160
NIST has also produced an informative guide on ISSE, in the form of its Special Pub-
lication 800-160, “Systems Security Engineering: An Integrated Approach to Building
Trustworthy Resilient Systems.” Previously, NIST had published its SP 800-64, “Secu-
rity Considerations in the System Development Life Cycle,” in 2008. This older guid-
ance simply looked at security engineering processes in the greater context of the SDLC,
rather than as a separate, broader discipline. It made recommendations on security pro-
cesses and activities that should be considered during the initiation, development/acqui-
sition, implementation/assessment, operations/maintenance, and disposal (the particular
version of the SDLC phases defined in this publication). The newer SP 800-160 looks
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
222
at systems security engineering as a discipline in its own right and defines technical and
nontechnical processes for integrating security activities into the system life cycle. This
guidance has a system security model highly reminiscent of the IATF model and includes
the following phases from the technical processes:
SP 800-160 also maps its phases to processes found in a number of specific sys-
tems engineering processes defined in various ISO/IEC and IEEE standards, including
15288:2008, “Systems and software engineering – System life cycle processes.” Note
that as of this writing, NIST SP 800-160 is still in its draft form, which was published
in May 2014.
ISO/IEC 21827:2008
This standard offers a view of a system’s security engineering process model, known as
the Systems Security Engineering Capability Maturity Model. It does not detail exact
processes; rather, it covers industry best practices related to system security engineering.
The model describes the security engineering life cycle and phases, as well as their sup-
porting activities. It takes a holistic view of the organization’s management and engineer-
ing processes and their interactions, as well as the interactions between systems, software,
compliance, development, and acquisition activities.
TIP Understand that the ISSE process is intended to ensure the security is
included in all phases of the SDLC model so that security is “baked in” to a
system and not “bolted on” after the fact. In this way, it helps reduce risk by
considering security early on in the system life cycle.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
224
Design Considerations
Now that we’ve discussed business requirements, governance, and information security
engineering as contributing to the design and implementation process involved with
selecting and using controls to protect systems and data, we’ll cover some basic design
principles to keep in mind when considering controls. Note that these principles aren’t
specific to a particular type or function of a control; they should be considered for all
controls and control functions. These considerations normally are looked at after busi-
ness and governance requirements are considered since those requirements are usually
mandatory or not easily negotiated. These considerations, however, should be considered
throughout the ISSE and SDLC processes.
Effectiveness
The effectiveness of a control is determined by how well it fulfills its intended security
function and protects assets. If a control is ineffective, it is not performing the intended
security function for which it was designed or implemented, or it’s not performing it to
the degree it needs to, leaving an asset vulnerable to threats and allowing an unacceptable
level of risk to the asset or organization. In these cases, control gaps, already discussed
previously in the book, exist and must be closed (or reduced) by supplementing the con-
trol, adding additional controls, or replacing the control. Control effectiveness may not
necessarily be the fault of the system administrators or security professionals on the job;
in fact, it may not even be a faulty control. Sometimes ineffective controls can be traced
back to poorly defined requirements from the SDLC or ISSE process (if any were even
considered at all). Measuring control effectiveness is closely related to the concepts of key
risk indicators (KRIs) and key performance indicators (KPIs), as well as security metrics,
discussed earlier in Chapter 6 and again later in Chapter 9.
Efficiency
Efficiency isn’t the same thing as effectiveness; effectiveness relates to if the control fulfills
its intended function and how well it does so. Efficiency, on the other hand, relates more
to how well the control does in relation to other factors, such as cost, maintainability,
interoperability, and so on. Even if a control is effective at what it’s supposed to be doing,
is it costing too much to maintain it? Does it use up too many resources (manpower,
electricity, spare parts); or, in the case of a nontechnical control, does it require overly
complicated processes? Is it interoperable with other systems or processes?
In looking at efficiency, the organization must consider controls that are not only
effective but reasonable to operate and maintain in terms of the value they add and the
level of protection they afford consistent with the asset’s value. An older firewall already
in place that does the job but is no longer supported by its manufacturer and is therefore
hard to get maintenance work or spare parts for, is not necessarily an efficient control. If
it requires specialized training that is hard to find or costly, it may be less efficient to use
that particular firewall. Process efficiency should also be a consideration in control selec-
tion and use. A particular backup system, while effective, may require additional work
processes or equipment to ensure its effectiveness or may add components and complex-
ity to the infrastructure. These are definitely aspects to think about while selecting and
implementing controls.
Economy of Use
The term economy of use, in this context, refers to the smart design and employment of
controls such that they can be used to protect multiple assets at once or provide mul-
tiple security functions. Controls that are used to protect only one single asset, or are
single-function, tend to be not as useful because additional controls that provide other
functions and protect other assets are required. Likewise, controls that are highly spe-
cialized in terms of function or level of protection tend to be more expensive, require
more training, and may require more personnel or hours to manage and maintain. An
example might be a traffic-filtering firewall that performs only that single function versus
a multifunctional security appliance that can provide firewall, IDS, and proxy services.
Another example might be the use of several security appliances deployed at different
points in the network, which could be consolidated and deployed at a more central point
in the physical and logical architecture, covering more than one subnet or segment. Yet
another instance could be the use of VLANs implemented on a single powerful layer 3
switch, instead of having multiple subnets from many different physical switches. Sup-
pose a system requires specialized hardware encryption devices, which can be expensive.
If you have other systems that also require encryption, you could possibly expand the use
of these devices to include those other systems, thus providing protection for multiple
systems and getting more for the investment than you would if you protected only one
system. This is yet another example of the principle of economy of use.
To achieve economy of use, you should examine different aspects of the architecture,
data sensitivity and protection requirements, and common protection requirements of
assets. Additionally, you can look at the different levels of functionality and features of
security technologies and controls to see whether there are better solutions available than
single-purpose controls. Of course, cost should be considered and balanced with looking
at where a better investment can be made; if a control technology is better suited for econ-
omy of use but seems to cost more, in the long run it may represent a cost savings to the
organization, as well as help to simplify the sustainment and maintenance of the control.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
226
protection, the control is not effective. This could mean that the control itself is faulty
or it has not been implemented and configured correctly. It also could mean, however,
that the original requirements were flawed; that is, they either didn’t completely cover
what the organization actually needed to protect an asset or were out of scope with what
protection levels the control provides.
In any event, if the control is not meeting the asset’s protection requirements, either
the control (or its implementation) or the requirements are at fault. This is why it’s so
vitally important for the organization to implement a solid SDLC and ISSE process, as
well as to put careful consideration into the selection of controls, including their design
and implementation.
Control Redundancy
On the surface, it may seem to be a violation of the design principles of economy of
use, efficiency, and common sense, not to mention a waste of resources, to have redun-
dant controls. But think of it like this: What if a control fails or is circumvented by a
threat, enabling a vulnerability to be exploited and an asset damaged? If you’ve heard the
term defense in depth, then you know that this principle actually encourages multiple,
redundant controls, implemented at different levels of the infrastructure or at various
points in the system or data-processing cycle to provide sustained protection in the
event a single control fails. For example, if a centrally managed anti-malware solution
is implemented on your company’s e-mail and other infrastructure servers but not on
client machines, there’s still a possibility a virus could infect the network through other
means. That’s why you also have the redundant control of having anti-malware soft-
ware installed on workstations and other client devices, just in case. That redundancy
provides defense in depth, maintaining protection against threats. The same could be
said for redundant physical controls (multiple security fences, secure doors, and so on).
These are all in place in case one fails, still preventing an unauthorized person from
entering a secure area.
Control redundancy should be looked at to provide effective protection for an asset
but still should be balanced with good design principles. Redundant controls that cover
many systems at once and several different types of data, or even serve different security
functions simultaneously, should be looked at and implemented. A good example is a
unified threat management (UTM) appliance, which provides several services at once,
including firewall, intrusion detection and prevention, anti-malware, and content filter-
ing functions. This would be more effective and efficient than having separate security
appliances that perform an individual function and having to install multiple instances of
each all over the network. Having multiple UTM appliances, placed at various strategic
and critical points in the infrastructure, would ensure control redundancy and defense
Control Selection
We touched on control selection in Chapter 5, from a risk response perspective, but
in this section we’ll look once again at this process, more from an implementation and
design perspective. Selecting the controls that will be used to protect a particular asset
involves categorizing the information in terms of sensitivity across the areas of confi-
dentiality, integrity, and availability, as well as selecting an appropriate baseline set of
controls for the asset in question. It also involves the concepts of business function and
needs, governance, and the SDLC and ISSE processes discussed earlier, which may influ-
ence data sensitivity and required protection levels. Additionally, control selection should
involve an understanding of the existing threat landscape the organization resides in since
controls must be able to protect against specified threats.
Information Categorization
Control selection has a great deal to do with information classification and data sensitiv-
ity. Controls are selected and put into place to protect data, so the right controls have to
be implemented to provide the right amount of protection. So, it naturally follows that
you must determine the data sensitivity and protection needs first (coincidentally, the
first step in the IATF ISSE model discussed earlier). This is where a well-thought-out and
well-written data sensitivity and classification policy comes into play. Then, you must
look at each data type and determine its impact on the organization if it were to be lost,
destroyed, or otherwise unavailable or compromised.
If you follow the NIST RMF process model, the first step in the model is security
categorization. This means that data is identified and categorized with sensitivity levels
that relate to impact in three areas: confidentiality, integrity, and availability. The level of
impact to the organization is determined for each of these areas individually, in terms of
high, moderate, and low (per FIPS 199). Then, the overall security categorization (SC)
is formulated as follows:
SC information system = {(confidentiality, impact), (integrity, impact), (availabil-
ity, impact)}
When the values of high, moderate, or low are assigned for each security goal, the
highest-valued impact generally becomes the overall security categorization. For exam-
ple, suppose you had the following levels of impact determined:
SC information system = {(confidentiality, MODERATE), (integrity, HIGH),
(availability, MODERATE)}
In this case, the highest impact value is for integrity and has been determined to be
high, so the overall security categorization would be assigned as high. This uses the high
water mark concept to determine the overall SC of the asset. In short, a system considered
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
228
to have an SC of low impact is an information system in which all three of the security
objectives are determined to be low. An information system determined to have an SC
of moderate is one in which at least one of the security objectives is moderate and no
other security objective is rated at a level higher than moderate. Of course, a high-impact
system is an information system in which at least one security objective is rated as high.
EXAM TIP You will not be required to know the specifics of security
categorization for the exam, but you may encounter questions that assume
you have already performed the security categorization of an asset, or at
least know how to do so.
Implementing Controls
Now that you’ve seen how to categorize information and select the various controls you
need for your control baseline, we’ll discuss the actual implementation of controls. By
and large, this simply means that once the controls have been approved and resourced
by management (to include hardware/software purchases, creation of policies and pro-
cedures, and staffed with trained personnel), they are put in place. Often this means
PRIORITY
CNTL INITIAL CONTROL BASELINES
CONTROL NAME
NO.
LOW MOD HIGH
Access Control
AC-1 Access Control Policy and Procedures P1 AC-1 AC-1 AC-1
AC-2 Account Management P1 AC-2 AC-2 (1) (2) (3) AC-2 (1) (2) (3)
(4) (4) (5) (11) (12)
(13)
AC-3 Access Enforcement P1 AC-3 AC-3 AC-3
AC-4 Information Flow Enforcement P1 Not Selected AC-4 AC-4
AC-5 Separation of Duties P1 Not Selected AC-5 AC-5
AC-6 Least Privilege P1 Not Selected AC-6 (1) (2) (5) AC-6 (1) (2) (3)
(9) (10) (5) (9) (10)
AC-7 Unsuccessful Logon Attempts P2 AC-7 AC-7 AC-7
AC-8 System Use Notification P1 AC-8 AC-8 AC-8
AC-9 Previous Logon (Access) Notification P0 Not Selected Not Selected Not Selected
AC-10 Concurrent Session Control P3 Not Selected Not Selected AC-10
AC-11 Session Lock P3 Not Selected AC-11 (1) AC-11 (1)
AC-12 Session Termination P2 Not Selected AC-12 AC-12
AC-13 Withdrawn — — — —
AC-14 Permitted Actions without P3 AC-14 AC-14 AC-14
Identification or Authentication
AC-15 Withdrawn — — — —
AC-16 Security Attributes P0 Not Selected Not Selected Not Selected
AC-17 Remote Access P1 AC-17 AC-17 (1) (2) AC-17 (1) (2)
(3) (4) (3) (4)
AC-18 Wireless Access P1 AC-18 AC-18 (1) AC-18 (1) (4)
(5)
Figure 8-5 Controls and their corresponding security control baselines (from NIST SP 800-53)
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
230
or data produced while the control is performing its normal function. For instance, a
security administrator could view IDS or firewall logs and examine the traffic flows for
metrics on how much traffic was blocked by the firewall rules, including what type, its
protocol, its origin and destination Internet Protocol (IP) addresses, and so on. From this
information, you could gather how effectively the firewall ruleset is blocking or allowing
certain types of traffic.
Similarly, for administrative controls, you could measure the effectiveness of policies
and procedures by looking at the number of security events for a given time period, not-
ing what the most common incidents were and if the policies and procedures adequately
covered those types of incidents. This might also be an indicator of security training
effectiveness, as people may inadvertently violate policies because of a lack of training,
complacency, or outright maliciousness.
Testing is definitely a way to measure the effectiveness of security controls. In Chapter 6
we discussed different assessments, such as vulnerability assessments and penetration test-
ing. Remember that vulnerability testing is a critical part of risk assessment since you must
identify vulnerabilities to identify risk. Vulnerability testing can tell you whether system
and data assets have weaknesses, particularly technical ones. Keep in mind that a vulner-
ability assessment simply tells you the potential for exploitation; only an in-depth penetra-
tion test can tell you whether a vulnerability is actually exploitable. The difference between
a vulnerability showing up as potentially exploitable and actually being able to exploit it is
often the effectiveness of the control in place to mitigate the risk of exploitation. Therefore,
a penetration test can give you a much better idea as to how effective your controls really
are. Otherwise, you have only a list of vulnerabilities that could be exploited, without
knowing how strong the controls protecting them really are.
Once you’ve performed performance monitoring and in-depth testing, you’ll get a
better feel for how effective your controls really are and be able to identify shortfalls
between the job the control is performing and the real protection requirements it needs
to fulfill. This shortfall is a control gap that must be considered for risk response.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
232
require modifications to facilities to implement new controls. All of these things have to
be considered when adding new controls. And, as with any new control or even an older
control that has been supplemented or altered, you should test the control to ensure that
it gives you the protection you require.
CAUTION Always test controls after they have been modified, supplemented,
replaced, or added to. You want to test for both security and interoperability.
Vulnerability testing, penetration testing, and integration testing are key test
types that you will want to consider when modifying or changing controls.
Documenting Controls
Once controls have been implemented and determined to be efficient, be effective, and
meet the original (or new) security requirements, you must also make sure that they are
well-documented, for several reasons. First, documentation helps to maintain the control
history, that is, the records of installing, updating, supplementing, adding, or changing
controls necessary for change and configuration management processes. Second, docu-
mentation serves as objective evidence of compliance when being audited. Documenta-
tion also serves to help support the risk assessment process (remember in Chapter 4,
when we discussed reviewing documentation as part of the assessment methodology?).
Finally, documentation can help when you are troubleshooting issues with the controls
or measuring control effectiveness.
Control owners are generally responsible for maintaining control documentation, but
often they are assisted in preparing and maintaining this documentation by technical
personnel and risk management practitioners. Control documentation includes configu-
ration settings, architectural diagrams, control procedures, and, of course, policies relat-
ing to particular controls. This documentation not only provides compliance validation
for controls but also assists in effective control execution. Documentation should be
consistent, be standardized, and clearly state how the control protects an asset. It should
also be mapped to a formally defined security requirement, for traceability purposes.
Chapter Review
In this chapter, you took a deeper look at controls, focusing on design and implementa-
tion concepts. First, you looked at the business perspectives of controls and learned how
important the business case may be when justifying supplementing or adding to controls.
Business cases are useful for justifying controls when there are cost versus effectiveness
issues, and the requirement for a control must be matched to a business need. Some of
the supporting reasons for a good business case include support for security goals, gover-
nance, due diligence, liability, efficiency, and cost effectiveness. You also looked at regula-
tory guidance and how the selection of controls is influenced by laws, regulations, and
other external requirements imposed on businesses. Some examples we covered included
the PCI-DSS standards, HIPAA, GLBA, SOC, and FISMA. We also discussed business
functions and their relationships to controls, since controls are implemented to reduce
IT risk and in turn reduce business risk. We explained internal, external, and cross-
boundary functions that influence the design and implementation of security controls.
We then explained the role that the information system security engineering process
plays in control development and implementation. We discussed how ISSE ensures that
security is built into systems throughout the life cycle, all the way from concept through
design and development, through acquisition and implementation, and finally to dis-
posal or retirement. We discussed several different ISSE models, including those from
the IATF, NIST, and ISO/IEC.
There are several design considerations that we covered as well, to ensure that the
design process is well considered and takes into account control effectiveness, efficiency,
economy of use, and redundancy. We also stressed that controls must meet the original
security requirements they were designed to fulfill in asset protection.
Control selection is based upon several factors, including information categorization,
which attempts to assign a level of impact to the organization if the asset is lost. After
information is categorized, a baseline set of controls is assigned to it, based upon those
factors. We then looked at actual control implementation and included several processes
that occur when controls are implemented, as well as maintained. These processes include
evaluating the effectiveness of existing controls, through performance monitoring and
testing, as well as adjusting existing controls to reduce any identified control gaps. We
also covered the value of supplementing existing controls versus adding or replacing
controls. Finally, we looked at managing control and risk ownership to ensure that indi-
viduals are held accountable for sound decisions and allocating resources involved with
designing, implementing, maintaining, operating, and documenting controls, as well as
the risk they are intended to mitigate.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
234
Review Questions
1. Which of the following is the ultimate goal of IT controls?
A. Reduce IT risk
B. Reduce business risk
C. Eliminate risk
D. Eliminate threats
2. Which of the following best describes the reason to create a business case for IT
control implementation?
A. To determine the cost to the organization if a control is implemented
B. To help create the organization’s risk profile
C. To justify the resources expended in implementing the IT control
D. To inform control owners about the potential risk of a control
3. All of the following are valid supporting factors in building a business case to
justify implementing an IT control, except which one?
A. Profitability
B. Security goals
C. Liability
D. Governance
4. Which of the following two factors relating to how well a control can be used for
multiple purposes, and how it compares to other controls in terms of cost and
interoperability, are used in business cases? (Choose two.)
A. Economy of use
B. Support for security goals
C. Efficiency
D. Threat reduction
5. Which of the following governance sources explicitly requires the use of NIST
controls as the preferred control framework to support it?
A. SOX
B. GLBA
C. HIPAA
D. FISMA
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
236
12. Which design principle relates to how well a control performs its intended
function in protecting an asset?
A. Efficiency
B. Effectiveness
C. Economy of use
D. Control redundancy
13. Which of the following design principles is concerned with how well a control
operates within its environment, in terms of cost, interoperability, ease of use,
and so on?
A. Effectiveness
B. Economy of use
C. Efficiency
D. Meeting requirements
14. Which of the following concepts supports the principle of control redundancy?
A. Defense in depth
B. Effectiveness
C. ISSE
D. Economy of use
15. Per FIPS 199, when formulating a security categorization, all of the following are
considered in the levels of impact to an organization if an asset is lost or damaged,
or in terms of criticality to the organization, except which one?
A. Confidentiality
B. Integrity
C. Availability
D. Accountability
16. Which of the following best describes how security categorization for data is
calculated?
A. SC information system = {(vulnerability, impact), (threat, impact),
(asset, impact)}
B. SC information system = {(confidentiality, impact), (integrity, impact),
(authorization, impact)}
C. SC information system = {(confidentiality, impact), (integrity, impact),
(availability, impact)}
D. SC information system = {(confidentiality, risk), (integrity, risk),
(availability, risk)}
Answers
1. B. While IT security controls do reduce IT risk, the ultimate goal is to reduce the
overall risk to the business.
2. C. A business case is used to justify the resources expended to implement a
control, balancing cost with the risk incurred if the control is not implemented.
3. A. Profitability is not a valid supporting factor in building a business case to
support implementing an IT control.
4. A, C. Economy of use (relating to multipurpose controls) and efficiency (relating
to cost and interoperability) are two design principles often used in business cases
to justify the implementation of controls.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
238
5. D. FISMA explicitly requires the use of NIST controls as the preferred control
framework to support it.
6. B. PCI-DSS standards are not necessarily a mandatory legal governance but are
imposed by the card payment industry.
7. A. HIPAA governance recommends, but does not require, the use of the NIST
control framework.
8. C. GLBA was enacted into law to ensure, among other things, the safeguarding
of certain client financial and personal information by banks and other financial
institutions.
9. C. SOX uses COBIT and COSO, along with other control frameworks, to
enforce auditing and information governance requirements.
10. A. Cross-boundary functions are those concerned with data flows and system
interfaces between internal and external networks and organizations.
11. A. ISSE contributes to the control design and implementation process by
ensuring that security is considered throughout the entire SDLC process.
12. B. Control effectiveness refers to how well a control performs its intended function
in protecting an asset.
13. C. The design principle of efficiency is concerned with how well a control operates
within its environment, in terms of cost, interoperability, and complexity, among
other factors.
14. A. The concept of defense in depth supports the principle of control redundancy
because it allows for multiple controls to be in place in case a single control fails.
15. D. Accountability is not considered in the levels of impact to an organization
if an asset is lost or damaged or in terms of criticality during a security
categorization.
16. C. Security categorization for an information system is calculated as follows:
SC information system = {(confidentiality, impact), (integrity, impact),
(availability, impact)}
17. A, D. Monitoring control performance and testing are two ways to evaluate
control effectiveness.
18. A. Permissions on a sensitive network share that allow all users to read the
contents would be considered ineffective in protecting sensitive information,
thus showing a control gap; all the other examples are of effective controls or,
even in some cases, controls that may be configured too securely.
19. B, C. Both supplementing existing controls and adding new controls should be
considered to close control gaps.
20. B. Accountability is the main concern when considering control and risk
ownership.
9
In this chapter, you will:
• Learn about how to measure various aspects of risk and control related to
business processes and effectiveness within different organizational contexts.
This chapter reviews real-world examples of metrics designed to measure the risk and
control effectiveness. The following are the CRISC exam objectives from Domain 4 that
we’ll review and apply within this chapter:
• 4.2 Monitor and analyze key risk indicators (KRIs) to identify changes or trends
in the IT risk profile.
• 4.3 Report on changes or trends related to the IT risk profile to assist
management and relevant stakeholders in decision making.
• 4.4 Facilitate the identification of metrics and key performance indicators (KPIs)
to enable the measurement of control performance.
• 4.5 Monitor and analyze key performance indicators (KPIs) to identify changes
or trends related to the control environment and determine the efficiency and
effectiveness of controls.
• 4.7 Report on the performance of, changes to, or trends in the overall risk profile
and control environment to relevant stakeholders to enable decision making.
NOTE More information on the controls measured within KRIs and KPIs is
available in Chapters 7 and 8. It is critical that you understand what should
be measured, and how it relates to improving the risk posture, before you
develop either KPIs or KRIs.
239
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
240
Key Performance Indicator Review
As discussed, you use key performance indicators (KPIs) to understand and enable the
measurement of control performance. Control performance can be anything from how
often your firewall blocks malicious incoming traffic to how often you exercise your
continuity of operations plan. The level of “performance” can be different for each orga-
nization; it’s important that you not borrow the KPIs from another organization as a
whole but really focus on how your KPIs meet your organizational objectives and what
your risk appetite is.
NOTE A hospital might have a KPI or KRI related to systems having proper
redundancy to support medical operations during a crisis situation. That
level of performance would not be appropriate to a university’s local area
network. Understand the context in which you’re working to build the best
measures of success.
KPIs should be S.M.A.R.T. to be most effective. This stands for the following:
• Specific
• Measurable
• Attainable
• Relevant
• Timely
When a KPI is S.M.A.R.T., it is tailored to the organization and the area being mea-
sured. As discussed earlier, the metric will differ greatly depending on whether you are
wanting to measure availability in a stock trading environment versus, say, a college net-
work. It’s incredibly important to think about what’s relevant to your organization when
determining your KPIs.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
242
attributes that make it an appealing choice. For instance, it’s free for use, it’s quite com-
prehensive, and it already has some great security metrics that are associated with it.
Remember that NIST has a number of risk-related documents and frameworks (we’ve
discussed some of them previously), and the organization has done a good job building
this template to take those ideas in and create a usable metric. We’ll build on NIST’s
work and use this template later in the chapter to incorporate other measurable risk con-
cepts, such as usability and budget concerns. Also, for our purposes, when you see the
term metric used by NIST, it is interchangeable with KPI, as discussed within Chapter 6.
Also, don’t forget the questions discussed in Chapter 6 that were developed by Oak
Ridge Institute for Science and Education to determine the quality of metrics; you should
consider these within each KPI you develop.
Field Data
Measure ID Availability measure.
Goal Strategic goal: To provide consistent service to both external and internal users
through website availability.
Measure The measure is the percentage (%) of time that the website is available for use.
Type Effectiveness/Efficiency.
Formula The formula is the agreed-upon service time (downtime/agreed-upon service
time).
Target This should be a high percentage defined by the organization (as stated
previously, this could be 99.9 percent, 99.99 percent, or 99.999 percent,
depending on the desired level of availability).
Implementation 1 Does the organization use an automated “uptime” measure, such as the
Evidence uptime command in UNIX? Yes No
2. What is the agreed-upon service time? _____
3. What is the actual service time (measured through the uptime command or
another agreed-upon tool)? _____
Frequency Collection frequency: This is defined by the organization (for example, minutes).
Reporting frequency: This is defined by the organization (for example, minutes).
Responsible • Information owner: This is defined by the organization (for example, the chief
Parties information officer [CIO]).
• Information collector: This is defined by the organization (for example,
system administrators).
• Information customer: This could be the chief information officer (CIO) or
chief executive officer (CEO).
Data Source This is an uptime tool that conducts “pings” of the website at regular intervals.
Reporting This is a pie chart comparing the percentage of time the system or site is
Format available versus the percentage it is unavailable.
Table 9-2 Availability Measure
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
244
Configuration Management Applications and systems should have a defined,
documented configuration baseline that consists of the basic functional operational set-
tings needed for proper system and application use. This baseline should include all the
hardware, software, firmware, and associated documentation across the life cycle of the
application or system. The baseline may change with updates and patches and should
be tested to ensure that the changes are not problematic before full adoption. Changes
are presented and enforced through the use of boards that allow or deny the requested
changes and automated tools designed to alert on unauthorized changes. Table 9-3 details
a measure that could be used to track the use of an automated configuration tool being
implemented within an organization.
System and Services Acquisition In Chapter 5, we discussed the concept of a
system development life cycle (SDLC), particularly NIST Special Publication 800-64,
“Security Considerations in the System Development Life Cycle.” To recap, the NIST
SDLC life cycle has five phases: initiation, acquisition/development, implementation/
assessment, operations/maintenance, and sunset (otherwise known as disposition). It’s
critical that controls are developed and implemented within each phase of this life cycle;
NIST states that “an integrated security component (composed of milestones, deliv-
erables, control gates, and interdependencies) that specifically addresses risk manage-
ment…enables security to be planned, acquired, built-in, and employed as an integral
part of a project or system.” To effectively achieve these goals, organizations must allo-
cate sufficient resources, follow appropriate processes, and assure that these activities are
undertaken also by any third parties that have access to information, applications, or
services. Table 9-4 provides a KPI that can be used to track the percentage of system and
service acquisition contracts that include those third-party security requirements.
Contingency Planning To maintain business continuity, proper planning must be
conducted to ensure your organization not only survives but can function after a disas-
ter or incident. This planning should include identifying critical processes, prioritizing
systems and equipment, and determining the impact to the business if any of these pro-
cesses, systems, or equipment are unavailable to the organization for extended periods of
time. Additionally, appropriate planning includes determining strategies to bring those
identified assets back online so the business can assume some level of operations. These
plans should be tested regularly to be sure that they are effective and efficient and that
all required personnel are ready to execute them in the heat of the moment. Table 9-5
presents a KPI for understanding the percentage of systems that have conducted their
required contingency plan testing.
Access Control Proper access control requires an organization to restrict access to
systems and data only to authorized users; often there are different data sensitivity levels
and different access requirements for each. Any policy should address and support the
principle of least privilege and mandate that only the minimum rights, permissions,
and privileges necessary to accomplish a job or task be given to individuals. For exam-
ple, it may state that for proprietary financial data, an individual needs to work within
the finance department of the company. It also may detail requirements for any secu-
rity clearance (in the case of government contractors, for example) and need-to-know
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
246
Field Data
Measure ID Service Acquisition Contract measure.
Goal • Strategic goal: To accelerate the development and use of an electronic
information infrastructure.
• Information Security goal: To ensure third-party providers employ
adequate security measures to protect information, applications, or
services outsourced from the organization.
Measure The measure is the percentage (%) of system and service acquisition
contracts that include security requirements or specifications.
Type Implementation.
Formula The formula is as follows: (Number of system and service acquisition
contracts that include security requirements and specifications/total
number of system and service acquisition contracts)*100.
Target This should be a high percentage defined by the organization.
Implementation 1. How many active service acquisition contracts does the organization
Evidence have? _____
2. How many active service acquisition contracts include security
requirements and specifications? _____
Frequency • Collection frequency: This is defined by the organization (for example,
quarterly).
• Reporting frequency: This is defined by the organization (for example,
annually).
Responsible Parties • Information owner: This is defined by the organization (for example, the
contracting officer).
• Information collector: This is defined by the organization (for example,
the contracting officer’s technical representative or the system owner).
• Information customer: This could be the contracting officer’s technical
representative, system owner, procurement officer, chief information
officer (CIO), information system security officer (ISSO), or senior
agency information security officer (SAISO) (for example, chief
information security officer [CISO]).
Data Source This includes service acquisition contracts.
Reporting Format This is a pie chart comparing the percentage of system and service
acquisition contracts that include security requirements or specifications
versus the percentage of system and service acquisition contracts that do
not include security requirements or specifications.
Table 9-4 Service Acquisition Contract Measure (Adapted from NIST Special Publication 800-55)
between departments. One common access control consideration is remote access, often
used to allow users to telecommute or work from home. Table 9-6 provides a sample
KPI that shows the percentage of legitimate remote access points used to gain authorized
access to an organization.
Awareness and Training It’s important that organizations have proper training
and awareness programs that teach employees about current threats, laws, regulations,
policies, and the implications of poor behaviors. These programs help improve user
behavior through awareness of the risks associated with negative activities and ensur-
ing that they are trained appropriately to carry out their duties safely. This is even more
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
248
Field Data
Measure ID Remote Access Control measure.
Goal • Strategic goal: To ensure an environment of comprehensive security
and accountability for personnel, facilities, and products.
• Information Security goal: To restrict information, system, and
component access to individuals or machines that are identifiable,
known, credible, and authorized.
Measure The measure is the percentage (%) of remote access points used to gain
unauthorized access.
Type Effectiveness/Efficiency.
Formula The formula is as follows: (Number of remote access points used to gain
unauthorized access/total number of remote access points)*100.
Target This should be a low percentage defined by the organization.
Implementation 1. Does the organization use automated tools to maintain an up-to-date
Evidence network diagram that identifies all remote access points?
Yes No
2. How many remote access points exist in the organization’s
network? _____
3. Does the organization employ an intrusion detection system (IDS) to
monitor traffic traversing remote access points?
Yes No
4. Does the organization collect and review audit logs associated with all
remote access points?
Yes No
5. Does the organization maintain a security incident database that
identifies standardized incident categories for each incident?
Yes No
6. Based on reviews of the incident database, IDS logs and alerts, and
appropriate remote access point log files, how many access points
have been used to gain unauthorized access within the reporting
period? ______
Frequency • Collection frequency: This is defined by the organization (for example,
monthly).
• Reporting frequency: This is defined by the organization (for example,
quarterly).
Responsible Parties • Information owner: This could be the computer security incident
response team (CSIRT).
• Information collector: This could be the system administrator or
information system security officer (ISSO).
• Information customer: This could be the chief information officer (CIO),
senior agency information security officer (SAISO) (for example, chief
information security officer [CISO]).
Data Source This includes the following: incident database, audit logs, network
diagrams, and IDS logs and alerts.
Reporting Format This is a stacked bar chart, by month, that illustrates the percentage
of remote access points used for unauthorized access versus the total
number of remote access points.
Table 9-6 Remote Access Control Measure (Adapted from NIST Special Publication 800-55)
Field Data
Measure ID Security Training measure.
Goal • Strategic goal: To ensure a high-quality workforce supported by modern and
secure infrastructure and operational capabilities.
• Information Security goal: To ensure that organization personnel are
adequately trained to carry out their assigned information security-related
duties and responsibilities.
Measure The measure is the percentage (%) of information system security personnel
that have received security training.
Type Implementation.
Formula The formula is as follows: (Number of information system security personnel
that have completed security training within the past year/total number of
information system security personnel)*100.
Target This should be a high percentage defined by the organization.
Implementation 1. Are significant security responsibilities defined with qualifications criteria
Evidence and documented in policy?
Yes No
2. Are records kept of which employees have significant security
responsibilities?
Yes No
3. How many employees in your agency (or agency component, as applicable)
have significant security responsibilities? _____
4. Are training records maintained? (Training records indicate the training that
specific employees have received.)
Yes No
5. How many of those with significant security responsibilities have received
the required training? _____
6. If all personnel have not received training, state all the reasons that apply:
Insufficient funding Insufficient time Courses unavailable
Employee has not registered Other (specify) ______________
Frequency • Collection frequency: This is defined by the organization (for example, quarterly).
• Reporting frequency: This is defined by the organization (for example, annually).
Responsible • Information owner: This is defined by the organization (for example, the
Parties training manager).
• Information collector: This is defined by the organization (for example, the
information system security officer [ISSO] or training manager).
• Information customer: This could be the chief information officer (CIO),
information system security officer (ISSO), senior agency information security
officer (SAISO) (for example, chief information security officer [CISO]).
Data Source This includes training and awareness tracking records.
Reporting This is a pie chart illustrating the percentage of security personnel who have
Format received training versus those who have not received training. If performance
is below the target, a pie chart illustrates the causes of performance falling
short of the targets.
Table 9-7 Security Training Measure (Adapted from NIST Special Publication 800-55)
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
250
Audit and Accountability Auditing is implemented by recording the actions of
users or other systems or processes when interacting with your organizational systems
or data. Auditing is a way of preventing data loss or modification, as well as detecting
when it has occurred. Accountability, on the other hand, is the process of holding users
accountable for their actions. Accountability serves two important functions. First, it can
deter otherwise honest users from committing security policy violations, if they know
that their actions are being audited and monitored. It is also used to punish or sanction
users who do attempt to or successfully violate security policies. Auditing and account-
ability often go hand-in-hand because it is difficult to maintain accountability for actions
in the system without auditing mechanisms in place. Table 9-8 provides a KPI that mea-
sures the average frequency that audit logs and other records are reviewed; you want this
to be a high frequency.
Field Data
Measure ID Audit Record Review measure.
Goal • Strategic goal: To ensure an environment of comprehensive security and
accountability for personnel, facilities, and products.
• Information Security goal: To create, protect, and retain information system audit
records to the extent needed to enable the monitoring, analysis, investigation,
and reporting of unlawful, unauthorized, or inappropriate activity.
Measure The measure is the average frequency of audit records review and analysis for
inappropriate activity.
Type Effectiveness/Efficiency.
Formula This is the average frequency during the reporting period.
Target This should be a high frequency defined by the organization.
Implementation For each system:
Evidence 1. Is logging activated on the system?
Yes No
2. Does the organization have clearly defined criteria for what constitutes
evidence of “inappropriate” activity within system audit logs?
Yes No
3. For the reporting period, how many system audit logs have been reviewed
within the following time frames for inappropriate activity (choose the
nearest time period for each system)?
Within the past day _____
Within the past week _____
2 weeks to 1 month _____
1 month to 6 months _____
More than 6 months _____
Frequency • Collection frequency: This is defined by the organization (for example, daily).
• Reporting frequency: This is defined by the organization (for example,
quarterly).
Table 9-8 Audit Record Review Measure (Adapted from NIST Special Publication 800-55) (continued)
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
252
Field Data
Measure ID C&A Completion measure.
Goal • Strategic goal: To ensure an environment of comprehensive security and
accountability for personnel, facilities, and products.
• Information Security goal: To ensure all information systems have been
certified and accredited as required.
Measure The measure is the percentage (%) of new systems that have completed
certification and accreditation (C&A) prior to their implementation.
Type Effectiveness/Efficiency.
Formula The formula is as follows: (Number of new systems with complete C&A
packages with authorizing official [AO] approval prior to implementation)/
(total number of new systems) *100.
Target This should be a high percentage defined by the organization.
Implementation 1. Does your agency (or agency component, if applicable) maintain a complete
Evidence and up-to-date system inventory?
Yes No
2. Is there a formal C&A process within your agency?
Yes No
3. If the answer to the previous question is yes, are system development
projects required to complete C&A prior to implementation?
Yes No
4. How many new systems have been implemented during the reporting
period? _____
5. How many systems indicated in the previous question have received an
authority to operate prior to implementation? _____
Frequency • Collection frequency: This is defined by the organization (for example,
quarterly).
• Reporting frequency: This is defined by the organization (for example,
annually).
Responsible • Information owner: This is defined by the organization (for example,
Parties authorizing official [AO]).
• Information collector: This is defined by the organization (for example,
system owners).
• Information customer: This could be the chief information officer (CIO),
information system security officer (ISSO), or senior agency information
security officer (SAISO) (for example, chief information security officer [CISO]).
Data Source This includes the system inventory and system C&A documentation.
Reporting This is a pie chart comparing the percentage of new systems with
Format AO-approved C&A packages versus new systems without AO-approved
C&A packages.
Table 9-9 C&A Completion Measure (Adapted from NIST Special Publication 800-55)
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
254
Field Data
Measure ID Incident Response measure.
Goal • Strategic goal: To make accurate, timely information on the organization’s
programs and services readily available.
• Information Security goal: To track, document, and report incidents to
appropriate organizational officials or authorities.
Measure The measure is the percentage (%) of incidents reported within required time
frame per applicable incident category (the measure will be computed for
each incident category described in Implementation Evidence).
Type Effectiveness/Efficiency.
Formula For each incident category, the formula is as follows: (Number of incidents
reported on time/total number of reported incidents)*100.
Target This should be a high percentage defined by the organization.
Implementation 1. How many incidents were reported during the period?
Evidence Category 1: Unauthorized Access _____
Category 2: Denial of Service _____
Category 3: Malicious Code _____
Category 4: Improper Usage _____
Category 5: Scans/Probes/Attempted Access _____
Category 6: Investigation _____
2. How many incidents involving personally identifiable information (PII) were
reported during the period? _____
3. Of the incidents reported, how many were reported within the prescribed time
frame for their category, according to the time frames established by US-CERT?
Category 1: Unauthorized Access _____
Category 2: Denial of Service _____
Category 3: Malicious Code _____
Category 4: Improper Usage _____
Category 5: Scans/Probes/Attempted Access _____
Category 6: Investigation _____
4. Of the PII incidents reported, how many were reported within the
prescribed time frame for their category, according to the time frames
established by US-CERT or OMB memorandum(s)? _____
Frequency • Collection frequency: This is defined by the organization (for example, monthly).
• Reporting frequency: This is defined by the organization (for example, annually).
Responsible • Information owner: This is defined by the organization (for example, the
Parties computer security incident response team [CSIRT]).
• Information collector: This is defined by the organization (for example, the
system owner, information system security officer [ISSO], CSIRT).
• Information customer: This could include the chief information officer (CIO)
or senior agency information security officer (SAISO) (for example, chief
information security officer [CISO]).
Data Source This includes the following: incident logs and incident tracking database
(if available).
Reporting For a one-time snapshot, the format is a stacked bar chart illustrating the
Format proportion of reported incidents per category that were reported on time.
For trends, the format is a line chart where each line represents an individual
category plus a line representing 100 percent.
Table 9-11 Incident Response Measure (Adapted from NIST Special Publication 800-55)
Field Data
Measure ID Maintenance measure.
Goal • Strategic goal: To accelerate the development and use of an electronic
information infrastructure.
• Information Security goal: To perform periodic and timely maintenance on
organizational information systems and provide effective controls on the
tools, techniques, mechanisms, and personnel used to conduct information
system maintenance.
Measure The measure is the percentage (%) of system components that have
undergone maintenance in accordance with set maintenance schedules.
Type Effectiveness/Efficiency.
Formula The formula is as follows: (Number of system components that undergo
maintenance according to formal maintenance schedules/total number of
system components)*100.
Target This should be a high percentage defined by the organization.
Implementation 1. Does the system have a formal maintenance schedule?
Evidence Yes No
2. How many components are contained within the system? _____
3. How many components underwent maintenance in accordance with the
formal maintenance schedule? _____
Frequency • Collection frequency: This is defined by the organization (for example,
quarterly).
• Reporting frequency: This is defined by the organization (for example,
annually).
Responsible • Information owner: This is defined by the organization (for example, the
Parties system owner).
• Information collector: This is defined by the organization (for example, the
system administrator).
• Information customer: This could be the chief information officer (CIO),
information system security officer (ISSO), or senior agency information
security officer (SAISO) (for example, chief information security officer [CISO]).
Data Source This includes the maintenance schedule and maintenance logs.
Reporting This is a pie chart comparing the percentage of system components receiving
Format maintenance in accordance with the formal maintenance schedule versus the
percentage of system components not receiving maintenance in accordance
with the formal maintenance schedule over the specified period.
Table 9-12 Maintenance Measure (Adapted from NIST Special Publication 800-55)
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
256
Media Protection Organizations should protect both paper and digital media,
limit access to authorized users (as discussed in the “Access Control” section of this chap-
ter), and sanitize or destroy that media before they are disposed or released for reuse. This
is especially important for high-security environments where classified or other sensitive
material is processed or printed. Table 9-13 depicts a KPI that measures the percentage
of media passing the sanitization procedures testing, compared to all the media that have
been tested.
Field Data
Measure ID Media Sanitization measure.
Goal • Strategic goal: To ensure an environment of comprehensive security and
accountability for personnel, facilities, and products.
• Information Security goal: To sanitize or destroy information system media
before disposal or release for reuse.
Measure The measure is the percentage (%) of media that passes sanitization
procedures testing.
Type Effectiveness/Efficiency.
Formula The formula is as follows: (Number of media that passes sanitization
procedures testing/total number of media tested)*100.
Target This should be a high percentage defined by the organization.
Implementation 1. Is there a policy for sanitizing media before it is discarded or reused?
Evidence Yes No
2. Does the organization test media sanitization procedures for high-impact
systems?
Yes No
3. Number of media that successfully passed sanitization testing for high-
impact systems? _____
4. Total number of media tested for FIPS high-impact systems? _____
Frequency • Collection frequency: This is defined by the organization (for example,
quarterly).
• Reporting frequency: This is defined by the organization (for example,
annually).
Responsible • Information owner: This is defined by the organization (for example, the
Parties facility security officer).
• Information collector: This is defined by the organization (for example,
system owner, information system security officer [ISSO]).
• Information customer: This could be the chief information officer (CIO)
or senior agency information security officer (SAISO) (for example, chief
information security officer [CISO]).
Data Source This includes the sanitization testing results.
Reporting This is a pie chart comparing the percentage of media passing sanitization
Format procedures testing versus the percentage of media not passing sanitization
procedures testing over the specified period.
Table 9-13 Media Sanitization Measure (Adapted from NIST Special Publication 800-55)
Field Data
Measure ID Physical Security Incidents measure.
Goal • Strategic goal: To ensure an environment of comprehensive security and
accountability for personnel, facilities, and products.
• Information Security goal: To integrate physical and information security
protection mechanisms to ensure appropriate protection of the
organization’s information resources.
Measure The measure is the percentage (%) of physical security incidents allowing
unauthorized entry into facilities containing information systems
Type Effectiveness/Efficiency.
Formula The formula is as follows: (Number of physical security incidents allowing
unauthorized entry into facilities containing information systems/total
number of physical security incidents)*100.
Target This should be a low percentage defined by the organization.
Implementation 1. How many physical security incidents occurred during the specified
Evidence period? _____
2. How many of the physical security incidents allowed unauthorized entry
into facilities containing information systems? _____
Frequency • Collection frequency: This is defined by the organization (for example, quarterly).
• Reporting frequency: This is defined by the organization (for example, quarterly).
Responsible • Information owner: This is defined by the organization (for example, the
Parties physical security officer).
• Information collector: This is defined by the organization (for example, the
computer security incident response team [CSIRT]).
• Information customer: This could be the chief information officer (CIO),
information system security officer (ISSO), or senior agency information
security officer (SAISO) (for example, chief information security officer [CISO]).
Data Source This includes the physical security incident reports and physical access control
logs.
Reporting This is a pie chart comparing the physical security incidents allowing
Format unauthorized entry into facilities containing information systems versus the
total number of physical security incidents.
Table 9-14 Physical Security Incidents Measure (Adapted from NIST Special Publication 800-55)
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
258
Planning NIST Special Publication 800-55 states that “[organizations] must develop,
document, periodically update, and implement system security plans for organizational
information systems that describe the security controls in place or planned for the infor-
mation systems and the rules of behavior for individuals accessing the information sys-
tems.” An example of this type of policy, the acceptable use policy (AUP), is designed
to list the things that are not allowed on company devices or traffic that is not allowed
to traverse the company infrastructure. This generally includes things such as pornog-
raphy, gaming, and stock trading. Table 9-15 presents a KPI measuring the percentage
of employees who are authorized access to information systems only after they sign an
acknowledgment that they have read and understood rules of behavior, such as an AUP.
Field Data
Measure ID Planning measure.
Goal • Strategic goal: To ensure an environment of comprehensive security and
accountability for personnel, facilities, and products.
• Information Security goal: To develop, document, periodically update, and
implement security plans for organizational information systems that
describe the security controls in place or planned for information systems
and the rules of behavior for individuals accessing these systems.
Measure This is the percentage (%) of employees who are authorized access to
information systems only after they sign an acknowledgment that they have
read and understood rules of behavior.
Type Implementation.
Formula The formula is as follows: (Number of users who are granted system access
after signing rules of behavior/total number of users with system access)*100.
Target This should be a high percentage defined by the organization.
Implementation 1. How many users access the system? _____
Evidence 2. How many users signed rules of behavior acknowledgments? _____
3. How many users have been granted access to the information system only
after signing rules of behavior acknowledgments? _____
Frequency • Collection frequency: This is defined by the organization (for example, quarterly).
• Reporting frequency: This is defined by the organization (for example, annually).
Responsible • Information Owner: This is defined by the organization (for example, the
Parties system owner and information system security officer [ISSO]).
• Information Collector: This is defined by the organization (for example, the
system administrator and system owner).
• Information Customer: This could be the chief information officer (CIO),
information system security officer (ISSO), or senior agency information
security officer (SAISO) (for example, chief information security officer [CISO]).
Data Source This includes the repositories containing rules of behavior records.
Reporting This is a pie chart comparing the percentage of users who have signed an AUP
Format prior to being granted access to the system, versus users who have accessed
the system without signed AUPs.
Table 9-15 Planning Measure (Adapted from NIST Special Publication 800-55)
Field Data
Measure ID Personnel Security Screening measure.
Goal • Strategic goal: To ensure an environment of comprehensive security and
accountability for personnel, facilities, and products.
• Information Security goal: To ensure that individuals occupying positions of
responsibility within organizations are trustworthy and meet established
security criteria for those positions.
Measure The measure is the percentage (%) of individuals screened before being
granted access to organizational information and information systems.
Type Implementation.
Formula The formula is as follows: (Number of individuals screened/total number of
individuals with access)*100.
Target This should be a high percentage defined by the organization.
Implementation 1. How many individuals have been granted access to organizational
Evidence information and information systems? _____
2. What is the number of individuals who have completed personnel
screening? _____
Frequency • Collection frequency: This is defined by the organization (for example, quarterly).
• Reporting frequency: This is defined by the organization (for example, annually).
Responsible • Information owner: This is defined by the organization (for example, human
Parties resources).
• Information collector: This is defined by the organization (for example,
system administrators, system owners, or information system security
officer [ISSO]).
• Information customer: This could be the chief information officer (CIO),
information system security officer (ISSO), or senior agency information
security officer (SAISO) (for example, chief information security officer [CISO]).
Data Source This includes clearance records and access control lists.
Reporting This is a pie chart comparing the percentage of individuals screened versus
Format the total number of individuals.
Table 9-16 Personnel Security Screening Measure (Adapted from NIST Special Publication 800-55)
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
260
Risk Assessment Remember that risk is a combination of several elements: assets,
vulnerabilities, threats, threat agents, likelihood, and impact, and that a risk assessment
is essentially the activities focusing on collection of information (threats, assets, vulner-
abilities, and impacts) and analyzing that information to determine the degree of damage
and impact to a system or business from threats. Organizations should consider the risk
to their missions, their assets, and their reputation (which is much harder to quantify).
Table 9-17 is a KPI to measure the percentage of high vulnerabilities mitigated within
organizationally defined time periods after their discovery.
Field Data
Measure ID Risk Assessment Vulnerability measure.
Goal • Strategic goal: To ensure an environment of comprehensive security and
accountability for personnel, facilities, and products.
• Information Security goal: To ensure all vulnerabilities are identified and
mitigated.
Measure The measure is the percentage (%) of high vulnerabilities mitigated within
organizationally defined time periods after discovery.
Type Effectiveness/Efficiency.
Formula The formula is as follows: (Number of high vulnerabilities identified and
mitigated within targeted time frame during the time period/number of high
vulnerabilities identified within the time period)*100.
Target This should be a high percentage defined by the organization.
Implementation 1. Number of high vulnerabilities identified across the enterprise during the
Evidence time period? _____
2. Number of high vulnerabilities mitigated across the enterprise during the
time period? _____
Frequency • Collection frequency: This is defined by the organization (for example, quarterly).
• Reporting frequency: This is defined by the organization (for example, quarterly).
Responsible • Information owner: This could be the chief information officer (CIO), senior
Parties agency information security officer (SAISO) (for example, chief information
security officer [CISO]), or system owner.
• Information collector: This could be the system administrator or information
system security officer (ISSO).
• Information customer: This could be the chief information officer (CIO)
or senior agency information security officer (SAISO) (for example, chief
information security officer [CISO]).
Data Source This includes the following: vulnerability scanning software, audit logs,
vulnerability management systems, patch management systems, change
management records.
Reporting This is a stacked bar chart illustrating the percentage of high vulnerabilities
Format closed within targeted time frames after discovery over several reporting periods.
Table 9-17 Risk Assessment Vulnerability Measure (Adapted from NIST Special
Publication 800-55)
Field Data
Measure ID System and Communication Protection measure.
Goal • Strategic goal: To accelerate the development and use of an electronic
information infrastructure.
• Information Security goal: To allocate sufficient resources to adequately
protect electronic information infrastructure.
Measure The measure is the percentage (%) of mobile computers and devices that
perform all cryptographic operations using FIPS 140-2 validated cryptographic
modules operating in approved modes of operation.
Type Implementation.
Formula The formula is as follows: (Number of mobile computers and devices that
perform all cryptographic operations using FIPS 140-2 validated cryptographic
modules operating in approved modes of operation/total number of mobile
computers and devices) *100.
Target This should be a high percentage defined by the organization.
Implementation 1. How many mobile computers and devices are used in the organization? _____
Evidence 2. How many mobile computers and devices employ cryptography? _____
a. How many mobile computers and devices employ FIPS 140-2 validated
encryption modules? _____
b. How many of those mobile computers and devices perform all
cryptographic operations using FIPS 140-2 validated cryptographic
modules operating in approved modes of operation? _____
3. How many mobile computers and devices have cryptography
implementation waivers? _____
Frequency • Collection frequency: This is defined by the organization (for example, quarterly).
• Reporting frequency: This is defined by the organization (for example, annually).
Responsible • Information owner: This is defined by the organization (for example, system
Parties owners or the information system security officer [ISSO]).
• Information collector: This is defined by the organization (for example, system
administrators, system owners, or information system security officer [ISSO]).
• Information customer: This could be the chief information officer (CIO),
information system security officer (ISSO), or senior agency information
security officer (SAISO) (for example, chief information security officer [CISO]).
Data Source This includes the system security plans.
Reporting This is a pie chart illustrating the number of mobile computers and devices
Format that perform all cryptographic operations (including key generation) using
FIPS 1
40-2 validated cryptographic modules operating in approved modes of
operation as a percentage of the total number of mobile computers and devices.
Table 9-18 System and Communication Protection Measure (Adapted from NIST Special
Publication 800-55)
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
262
the percentage of systems that perform all cryptographic operations using FIPS 140-2
validated cryptographic modules operating in approved modes of operation. FIPS 140-2
is a U.S. government standard for accrediting cryptographic modules.
System and Information Integrity Integrity is a goal for ensuring that data
and systems are maintained in a pristine, unaltered state, unless the alteration is intended
because of normal processing. In other words, you want no unauthorized modification,
alteration, creation, or deletion of data, and any changes to data must be only as part of
authorized transformations in normal use and processing. Integrity can be maintained
by the use of a variety of checks and mechanisms, including data checksums, compari-
son with known or computed data values, and cryptographic means. To ensure integ-
rity, organizations should understand their system baseline and track any changes to it.
They also should track vulnerabilities to the systems and apply patches when applicable.
Table 9-19 presents a percentage of operating system vulnerabilities for which patches
have been applied or that have been otherwise mitigated.
Field Data
Measure ID System and Information Integrity measure.
Goal • Strategic goal: To accelerate the development and use of an electronic
information infrastructure.
• Information Security goal: To provide protection from malicious code at
appropriate locations within organizational information systems, monitor
information systems security alerts and advisories, and take appropriate
actions in response.
Measure The measure is the percentage (%) of operating system vulnerabilities for
which patches have been applied or that have been otherwise mitigated.
Type Implementation and Effectiveness/Efficiency.
Formula The formula is as follows: (Number of vulnerabilities addressed in distributed
alerts and advisories for which patches have been implemented, determined
as nonapplicable, or granted a waiver/total number of applicable
vulnerabilities identified through alerts and advisories and through
vulnerability scans)*100.
Target This should be a high percentage defined by the organization.
Implementation 1. Does the organization distribute alerts and advisories?
Evidence Yes No
2. How many vulnerabilities were identified by analyzing distributed alerts and
advisories? _____
3. How many vulnerabilities were identified through vulnerability scans? _____
4. How many patches or workarounds were implemented to address identified
vulnerabilities? _____
5. How many vulnerabilities were determined to be nonapplicable? _____
6. How many waivers have been granted for weaknesses that could not be
remediated by implementing patches or workarounds? _____
Table 9-19 System and Information Integrity Measure (Adapted from NIST Special Publication
800-55) (continued)
Chapter Review
In this chapter, we discussed how you can assess and monitor the efficiency and effec-
tiveness of controls and risk through the use of key performance indicators. KPIs are
used to understand and enable the measurement of control performance. KPIs should
be specific, measurable, attainable, relevant, and timely. We discussed the template for
KPIs adapted from NIST Special Publication 800-55 and presented KPIs associated with
availability; configuration management; system and services acquisition; contingency
planning; access control; awareness and training; audit and accountability; certifica-
tion, accreditation, and security assessments; identification and authentication; incident
response; maintenance; media protection; physical and environmental protection; plan-
ning; personnel security; risk assessment; system and communications protection; and
system and information integrity.
Review Questions
1. When a KPI is S.M.A.R.T., it is which of the following? (Choose all that apply.)
A. Short
B. Measurable
C. Right
D. Timely
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
264
2. It’s critical when developing a KPI that you use which of the following?
(Choose all that apply.)
A. A standard format
B. An industry best practice
C. NIST frameworks
D. Evidence
3. The KPI category of _____ deals with maintaining baselines of systems and
applications.
A. Awareness and training
B. Audit and accountability
C. Access control
D. Configuration management
4. The KPI should include a statement of whether it measures which of the
following? (Choose all that apply.)
A. Effectiveness
B. Accountability
C. Efficiency
D. Impact
5. The KPI measure should be a ____ statement.
A. Strong
B. Numeric
C. Simple
D. Qualitative
6. The CISO wants to understand how the organization’s KPI implementation
metrics are trending weekly because there is a concern that the schedule is
slipping. What is the KPI consideration that will make sure the data is collected
on a timely basis?
A. Frequency
B. Evidence
C. Target
D. Data source
7. Who will receive the data from a KPI?
A. Information owner
B. Information collector
C. Information customer
D. Information analyst
A
We’ve discussed the National Institute of Standards and Technology (NIST) Risk Man-
agement Framework (RMF) throughout this book, albeit in specific pieces relevant to
the context of each chapter. Here, in Appendix A, we’ve gathered this information all in
one place, for easier reference and understanding. The NIST RMF is not testable on the
exam; however, you’ll find that more and more risk management professionals are being
exposed to it and having to learn and apply it to their own organization’s risk management
strategy and programs. If you work in the U.S. government, compliance with the RMF is
becoming mandatory by almost all government agencies and, by extension, to their con-
tractors and anyone else they exchange official information with. If you work in a medical
facility, such as a doctor’s office, clinic, or hospital, you may have to apply the NIST RMF
to your organization’s risk management program because HIPAA recommends the RMF
and NIST controls in its implementation guidance. In the private/commercial world,
the RMF also has value in that it is comprehensive and tailorable and it provides solid,
in-depth guidance for managing information risk throughout its life cycle for organiza-
tions of almost any size. Additionally, it’s free. That can’t be said for some of the other
risk management frameworks discussed throughout the book because their standards can
cost a great deal and because finding people specially trained in those standards to help
administer them in a risk management program can also be difficult and more costly. Yet
another good reason for using the NIST RMF is its generality and interoperability with
almost any other risk management framework you can find. All in all, the NIST RMF
is the risk management framework of choice for many organizations. That’s not to say it
fits every situation or organization; as we’ve stated in the book, other frameworks may be
more appropriate to use, either in place of or in conjunction with NIST, because of unique
industry, market, and operating environment factors or governance standards.
NIST’s Risk Management Framework is the product of many years of research and
refinement by the U.S. government and NIST, based upon research, standardization
throughout the industry, best practices, and recommendations from security professionals
just like you. NIST employs a staff of experienced security professionals who come from all
different aspects of the information security world, whose full-time job it is to develop and
continually improve the standards that make up the Risk Management Framework. In this
appendix, we’ll discuss the RMF, including its applicability, publications, and detailed steps.
267
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
268
Overview
The Federal Information Security Management Act of 2002 (44 U.S.C. § 3541, also
known as FISMA) is Title III of the E-Government Act of 2002. This act requires that
federal agencies develop, document, and implement agencywide programs to ensure
information security for the systems and data under their control. FISMA tasked NIST
to develop the standards that federal organizations must use to secure their information
systems and data. The result was the Risk Management Framework, which was initially
developed in 2005 and has been through several iterations. The framework provides
all supporting publications, controls, and assessment methods for its implementation,
although all agencies typically implement it a bit differently, according to their own needs
and regulations. For example, the Department of Defense implements the RMF differ-
ently than the Department of the Treasury would, because it applies RMF to military
weapons systems versus financial and record-keeping systems.
Tiered Approach
You’ll notice in Figure A-1 that the NIST RMF looks at risk at three separate levels, or
tiers. The first tier, the organizational level, looks at risk from a management and gover-
nance perspective (that is, from the top down) at the strategic level. At this level, risk isn’t
looked at from a technical perspective; it is viewed in terms of risk governance, the orga-
nization’s risk appetite and tolerance levels, its risk management processes, and its overall
risk strategy. Policies, procedures, and standards are also examined at this level (and may
be examined at lower levels as well) to determine how they articulate with higher-level
governance and to ensure they support the overall risk strategy of the organization.
STRATEGIC RISK
TIER 2
MISSION/BUSINESS PROCESSES
TIER 3
INFORMATION SYSTEMS
TACTICAL RISK
Figure A-1 The Risk Management Framework tiered approach (from NIST SP 800-53, revision 4)
Applicability
As mentioned, the RMF is required for use by most U.S. government organizations. Even
the Department of Defense, which previously had its own unique security management
framework, called the Defense Information Assurance Certification and Accreditation
Program (DIACAP), has begun the process of converting to the risk management frame-
work. Even nongovernmental agencies that do business with the federal government,
such as contractors, for example, may be subject to the RMF as part of their contractual
agreements with the government. Also, private organizations, while not required to use
the RMF, may certainly find it useful since it is a matured, developed process that can be
applied and scaled to any information system or organizational infrastructure. An orga-
nization’s governance may recommend or require the RMF as an adopted and enforced
standard.
As far as scaling goes, the RMF can be applied to both small and large organizations.
The RMF is both tailorable and scalable, allowing organizations to follow the steps, use
the controls, and assess risk on one system or a thousand. The RMF can be applied to
a wide variety of industries and market segments, including healthcare organizations,
industrial control systems, administrative and general service systems, and even special-
purpose systems.
Publications
The core document of the RMF is Special Publication 800-37, but the entire NIST
library of special publications could be considered part of the RMF because steps in
the process often require performance to a relevant standard published by NIST. For
example, cryptographic controls in SP 800-53 must meet the requirements set forth
in Federal Information Processing Standards (FIPS) 140-1 and 140-2, although these
publications aren’t necessarily part of the RMF. You can see that you could conceivably
go down a great many “rabbit holes” while navigating the RMF and going through each
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
270
step, as well as implementing the NIST controls. Table A-1 lists the most commonly used
publications related to the RMF, in order by publication number. The table also lists the
applicable RMF steps and describes the publication. Note that although the RMF pre-
scribes particular publications for each step, in practice you’ll find that you may use more
publications than those specifically assigned to a step, and in some cases you may actually
use some of these publications, as well as others, throughout all six steps.
RMF Steps
Although there are six steps listed in the RMF process, each step has many subprocesses
to it. While NIST does not necessarily prescribe a rigid set of processes for each step, each
organization to use the RMF must develop its own internal processes to support RMF
steps. Although these were presented earlier in the book, we’ll discuss the steps again
here to bring all of this into context with other discussions of the RMF. Figure A-2 shows
the high-level view of the RMF life cycle, depicted in six steps.
Although this life cycle seems to be sequential and ending with step 6, keep in mind
that this is a continual process, and often previous steps must be revisited. For example,
assessing security controls must be done on a frequent basis, to make sure those controls
are still effective and mitigate the risk for which they were intended. Keep in mind that
the typical risk management activities involving threat and vulnerability assessment also
occur throughout all six steps, and the security posture of information systems, includ-
ing adjustments to controls, are maintained accordingly based upon those assessments.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
272
CATEGORIZE
Information Systems
Step 6 FIPS 199/SP 800-60 Step 2
MONITOR SELECT
Security Controls Security Controls
SP 800-137 FIPS 200/SP 800-53
RISK
MANAGEMENT
FRAMEWORK
AUTHORIZE IMPLEMENT
Information Systems Security Controls
SP 800-37 Step 4 SP 800-160
ASSESS
Security Controls
SP 800-53A
Note: CNSS Instruction 1253 provides guidance for RMF Steps 1 and 2 for National Security Systems (NSS).
Figure A-2 The NIST Risk Management Framework (From NIST SP 800-53, revision 4)
during step 1. It uses high water marks for information to determine security baselines.
So, if the aggregate value of information or a system has been rated as high, for example,
then the high baseline of security controls is employed for that system. Once the security
control baseline has been established, the organization has the latitude and flexibility
to add or subtract security controls from the baseline as it sees fit based upon different
factors including the applicability of some controls, the environment the system oper-
ates within, specific organizational governance, or even other risk factors. Controls are
typically selected from SP 800-53 and combined with any other control frameworks the
organization is required to use.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
274
Step 6: Monitor Security Controls
Continuous monitoring of security controls defines step 6 in the RMF; just because
an authorization decision is rendered doesn’t mean that the system will now be oper-
ated forever without continually monitoring its security posture for new or increased
risks. Existing controls will be monitored for continued compliance and effectiveness
against identified threats, new risks will be occasionally discovered for the system as new
threats and vulnerabilities are identified, and the system will have to be reauthorized
after a certain period of time. Note that the RMF is a cyclical process; all these steps
will be re-accomplished for each system at various times over the system’s life cycle. As
mentioned, even after an authorization decision has been rendered by an authorizing
official, continuous monitoring indicates that a system will be checked and validated on
a continual basis, not merely in the lead-in to its next authorization decision. NIST SP
800-137 details the continuous monitoring process.
ISACA’s Risk IT
Framework
APPENDIX
B
We’ve discussed the ISACA’s Risk IT Framework, as well as the NIST RMF, through-
out this book, albeit in specific pieces relevant to the context of each chapter. Here, in
Appendix B, we’ve gathered this information all in one place, for easier reference and
understanding. The Risk IT Framework is not testable on the exam; however, you’ll find
that many unique ISACA concepts and terms on the exam come from the framework,
so it’s a good idea to be familiar with it. In this appendix, we’ll discuss some particulars
about the framework, including its relationship to COBIT 5 and the Val IT framework.
We’ll also break down some of the processes the framework describes.
ISACA published the Risk IT Framework in 2009, and it was a joint effort from many
different industry partners and professionals. The framework is not simply a product of the
United States, like the NIST framework is, but was developed and influenced by professionals
and organizations from all over the world. Because ISACA is an independent professional
organization and not tied to any particular governmental organization, the framework is
suitable for deployment and use not only in the United States but everywhere in the world.
This makes it especially attractive to non-U.S. entities that prefer not to use the NIST
framework or to entities for which the NIST framework doesn’t satisfy their needs. ISACA’s
framework is a subset of COBIT 5, which covers management and governance principles,
processes, and requirements. The Risk IT Framework approaches risk from business perspec-
tive, while integrating IT risk into the overall risk management process for the organization.
Overview
The framework is based on COBIT 5 and, as such, articulates well with COBIT, as well
as Val IT, since COBIT version 5 has absorbed that framework as well. The terminol-
ogy, organization, processes, and concepts all articulate with each other, making it much
easier to integrate all three in a comprehensive risk management strategy. The framework
is broken down into several sections, which explain its purpose, its intended audience, and
the benefits and outcomes of using the framework. It also describes basic risk IT principles
before going into the meat of the framework. The three basic concepts of the Risk IT
Framework include Risk Governance, Risk Evaluation, and Risk Response. There are major
sections devoted to each of these three key areas. The framework emphasizes that IT risk is,
275
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
276
in fact, business risk; either it is an entity that benefits and adds value to the organization
by providing opportunities for growth or it can create negative situations by increasing risk,
via not protecting and preserving assets, which could result in business failure or, at mini-
mum, missed opportunities as well as liabilities. The framework embraces enterprise risk
management (ERM) principles, such as those found in the COSO framework and other
frameworks, but does not necessarily require their implementation in order to be used.
However, the use of ERM may be a necessary foundation for the successful implementation
of the Risk IT Framework. The framework also discusses the integration of the COBIT, Val
IT, and Risk IT frameworks. Essentially, COBIT covers IT management and governance
practices from a top-down view. The Risk IT Framework focuses specifically on risk man-
agement, and, of course, Val IT is concerned with gaining value from an organization’s IT
portfolio. Although included in Chapter 7, for reference sake, the COBIT 5 and Val IT
framework controls are included here in Tables B-1 and B-2, respectively.
Figure B-1 illustrates the relationship between these three frameworks.
The relationships between these controls are complementary; that is, they are not sub-
sets of each other, nor are they interchangeable with each other. They can be mapped to
each other, however, and since we are discussing the Risk IT Framework primarily here,
it’s worth noting that the appropriate and applicable COBIT and Val IT controls are
mapped to the various processes that make up the Risk IT Framework. As they all cover
different context areas, they are used in unison to cover management and governance, IT
portfolio value, and risk management areas of an organization.
Finally, the framework’s glossary and its higher-level mapping to other frameworks
and standards round it out as a practical standard to reference in establishing and main-
taining a solid risk management strategy. The framework is freely available from ISACA
as a downloadable document; however, there are other documents that are necessary to
implement the framework that require you become a member of ISACA to access. We’ll
discuss a few of those later in this appendix.
Figure B-1
The relationships COBIT 5
between the
COBIT, Val IT,
and Risk IT
Frameworks
Risk IT
Val IT
Framework
Applicability
The Risk IT Framework can be applied to almost any organization but typically works
better in organizations that have a solid infrastructure and are more mature with regard
to attitudes toward risk and risk appetite and tolerance and have the people and resources
to implement it. As mentioned, since its development was influenced by international
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
278
Domain Control
Value Governance (VG) • VG1: Establish informed and committed leadership
• VG2: Define and implement processes
• VG3: Define portfolio characteristics
• VG4: Align and integrate value management with enterprise financial
planning
• VG5: Establish effective governance monitoring
• VG6: Continuously improve value management practices
Portfolio Management • PM1: Establish strategic direction and target investment mix
(PM) • PM2: Determine the availability and sources of funds
• PM3: Manage the availability of human resources
• PM4: Evaluate and select programs to fund
• PM5: Monitor and report on investment portfolio performance
• PM6: Optimize investment portfolio performance
Investment • IM1: Develop and evaluate the initial program concept business case
Management (IM) • IM2: Understand the candidate program and implementation options
• IM3: Develop the program plan
• IM4: Develop full life-cycle costs and benefits
• IM5: Develop the detailed candidate program business case
• IM6: Launch and manage the program
• IM7: Update operational IT portfolios
• IM8: Update the business case
• IM9: Monitor and report on the program
• IM10: Retire the program
Table B-2 Val IT Domains and Controls
professionals and organizations, it can be implemented all over the world. Since it uses
higher-level processes, it can also be used in conjunction with other frameworks, such
as NIST, PCI-DSS, and ISO/IEC standards, although the standards would typically
be used to support the higher-level risk IT framework processes as lower-level controls.
The Risk IT Framework also may be better suited for medium to large organizations that
have the resources to adequately embrace it.
Publications
In addition to the basic Risk IT Framework document, you will probably need additional
documents to gain a better understanding of the framework, as well as put it into practice.
One particular publication is the Risk IT Practitioner Guide, which is a comprehensive
document detailing practical approaches to the process model the Risk IT Framework
promulgates. This document can be purchased only from ISACA or obtained for free
by joining the organization. Other documents, some freely available and some avail-
able only to ISACA members, include those that focus on both COBIT and Val IT.
An organization serious about implementing the Risk IT framework should not only
We’ll provide a detailed look at each of these domains and processes in the remainder
of this appendix; however, you should also take the time to download the Risk IT Frame-
work for yourself and read through it prior to the CRISC examination. This appendix
merely summarizes the framework.
Risk Governance
Risk Governance covers areas that relate to developing the organization’s risk appetite, its
risk tolerance, and its entire culture and attitude with regard to risk. In this process, roles
and responsibilities are defined, and relevant governance is examined for requirements that
must be fulfilled in managing risk. Additionally, risk programs are established, particular-
ly those that affect risk awareness and training. Communication guidelines between risk
practitioners and managers, between managers and the general organizational populace,
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
280
and between other internal, as well as external communication lines, are defined. The
Risk Governance domain covers three process areas, discussed in the next sections.
Risk Evaluation
The Risk Evaluation processes in the ISACA framework cover risk identification and
assessment. In RE processes, business impact is framed and described, and risk scenarios
are also developed. Risks are assessed and analyzed, as well as presented to the organization’s
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
282
IT assets are also mapped to the business and organizational processes they support
during this step; this helps translate IT risk to corresponding business risk and allows
management to see how the organization would be affected if IT risk were realized on
specific assets. This also allows the organization to develop criticality estimates of IT
resources, from a business perspective. It’s worth noting that this is similar to the same
process followed during a business impact assessment (BIA). The key to understanding
how IT risk affects business operations at this point is in understanding how the capa-
bilities of IT are provided to the business processes in question and how critical IT is to
a particular business process or operation. Maintaining a risk profile also means moni-
toring risk and updating risk scenarios and risk analysis as conditions and risk factors
change. This involves keeping the risk register up to date as well. Finally, the organization
should develop key risk indicators (KRIs) during this step, specifically focusing on IT
resources. They allow the organization to monitor changes in risk for given scenarios,
enabling the organization to modify its risk profiles as these indicators change.
Risk Response
Risk Response options are considered by management to reduce or offset risk, using the
standard risk treatment options of risk avoidance, reduction or mitigation, sharing or
transfer, and risk acceptance. In this process, the organization determines and communi-
cates risks to all stakeholders actively managing the risk and reacting to risk events. We’ll
describe these processes next.
C
The CD-ROM included with this book comes complete with Total Tester customizable
practice exam software and a PDF copy of the book.
System Requirements
The Total Tester software requires Windows XP or higher and 30MB of hard disk space
for full installation, in addition to a current or prior major release of Chrome, Firefox,
Internet Explorer, or Safari. To run, the screen resolution must be set to 1024 × 768 or
higher. The PDF copy of the book requires Adobe Acrobat, Adobe Reader, or Adobe
Digital Editions.
285
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
286
icon on your desktop and in your Start menu. To run Total Tester, navigate to Start | (All)
Programs | Total Seminars, or double-click the icon on your desktop.
To uninstall the Total Tester software, go to Start | Settings | Control Panel | Add/
Remove Programs (XP) or Programs And Features (Vista/7/8/10), and then select the
Total Tester program. Select Remove, and Windows will completely uninstall the software.
NOTE For more information on Adobe Reader and to check for the most
recent version of the software, visit Adobe’s website at www.adobe.com
and search for the free Adobe Reader or look for Adobe Reader on the
product page. Adobe Digital Editions can also be downloaded from the
Adobe website.
To view the PDF copy of the book on a portable device, copy the PDF file to your
computer from the CD-ROM, and then copy the file to your portable device using a
USB or other connection. Adobe offers a mobile version of Adobe Reader, the Adobe
Reader mobile app, which currently supports iOS and Android. For customers using
Adobe Digital Editions and an iPad, you may have to download and install a separate
reader program on your device. The Adobe website has a list of recommended applica-
tions, and McGraw-Hill Education recommends the Bluefire Reader.
Technical Support
Technical Support information is provided in the following sections by feature.
GLOSSARY
acceptable use policy (AUP) Organizational policy that describes both accept-
able and unacceptable actions when using organizational computing resources, as well as
the consequences of violating the policy.
access control The processes and technologies involved in protecting information,
systems, and data against unauthorized disclosure, modification, or loss through the con-
trol of access to those resources physically and/or logically.
accountability The ability to trace an action or event to a definitive user and to
hold that user responsible for their actions.
active tools Tools that interact actively with a system and can often give you a more
realistic perspective of vulnerabilities and the overall control effectiveness; can also cause
performance issues.
assessment The process of determining whether a program or a project is meeting
specified objectives and of determining whether the controls selected to protect the sys-
tem are performing their desired function to the level required.
asset Anything of value to an organization; assets can include tangible items such as
information, data, equipment, supplies, facilities, and systems, or intangible items such
as customer loyalty and reputation.
auditing The process of reviewing different data sources, including log files and
access control records, to determine compliance with security policy or detect deviations
or anomalies.
authentication The process of validating credentials that a user has supplied to
verify that they are the actual authorized user and that the credentials belong to that user.
authorization The process of giving authenticated users the proper accesses to sys-
tems, data, and facilities.
availability The goal of having information and systems available to authorized
users whenever and however they need them.
business case Must be made if the response can’t be quickly or easily implemented
without a significant cost or change to the organization or the system. A business case
for a risk response justifies the expense and work required to make the response func-
tion properly.
287
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
288
business continuity The process, generally detailed in a supporting plan, that
keeps the company operating and functioning in the event of a power outage, IT mal-
function, or major disaster.
business impact assessment The process of analyzing the critical missions and
business processes and the systems used to complete those tasks and of determining the
impact to the mission of a loss or disruption in access to those systems.
capability The ability for the organization to implement a risk response.
COBIT Control Objectives for Information and Related Technology (but now typ-
ically referred to by its acronym). This management and governance framework was
developed and is used extensively by ISACA in its various risk management and business
process frameworks. It is currently in version 5.
common controls Controls spanning the entire organization and protecting mul-
tiple assets rather than only a specific system. Physical controls are good examples of
common controls, and the responsible entity for these controls would be the common
controls provider.
confidentiality The goal of protecting systems and information from unauthorized
disclosure.
control A measure put in place to increase protection for an asset, to make up for a
lack of protection for an asset, or to strengthen a weakness for an asset. Controls can be
administrative, technical, or physical and operational. They can also be further divided
by functionality, including deterrent, preventative, detective, and so on.
control baseline The initial set of controls selected, based on security categoriza-
tion, that are to be applied to systems and data and maintained throughout their life cycle.
control gap analysis The process of determining the difference between the exist-
ing state of a control’s effectiveness and its desired state.
cost The financial impacts of any decision, as well as the less-easily quantified aspects
such as loss of goodwill, loss of brand status, and other hard-to-define attributes. Cost
also includes the maintenance of the responsive mitigation over its required life span.
data sensitivity The level of protection information or data required based upon
its impact to the organization if it were disclosed to unauthorized people, subject to
unauthorized modification, or otherwise lost.
deferral When risk response options simply don’t make good business sense, risk is
assumed temporarily, perhaps until the costs are reduced, alternate measures are adopted,
or risk is ultimately accepted.
disaster recovery (DR) The process of reacting to an incident or disaster and
recovering an organization, its personnel, and systems to a functioning state.
Glossary
289
economy of use The design principle that states that you should attempt to design
and implement controls that can be applied to more than one system or set of data
or that provide more than one function in effectively mitigating risk. The goal is to
minimize single-use controls (controls that apply only to a specific system or set of data)
because they can be more expensive and specialized to implement.
effectiveness The extent to which the response reduces the likelihood or the impact
of the risk event to the organization; also the degree and depth that a control fulfills its
security requirements.
efficiency The interaction of a control with its environment, affecting factors such
as cost, reliability, supportability, and interoperability.
exception management The documentation and tracking of accepted excep-
tions to policy.
false negative When a vulnerability isn’t detected but it does actually exist.
false positive When a vulnerability is reported that isn’t actually legitimate.
Family Educational Rights and Privacy Act (FERPA) U.S. law designed to
protect the privacy of students in educational institutions. FERPA covers access con-
trol over data, as well as the circumstances under which information may be disclosed
about students from educational records. The law, in particular, prescribes access control
requirements for students older than 18 with regard to parents’ rights of access to data,
including grades, financial, and other records.
framework An overall methodology prescribing higher-level processes.
governance The legal or corporate standards that prescribe how an organization
will conduct itself with regard to its behavior in handling information and data.
Gramm-Leach-Bliley Act (GLBA) U.S. law that requires financial institutions
(to include banks, loan companies, insurance, and investment companies) to protect
sensitive financial data and make their information-sharing practices known to their
customers. Of particular interest to security professionals is the Safeguards Rule incorpo-
rated into GLBA, which requires institutions under the jurisdiction of the Federal Trade
Commission to have specific measures in place to protect customer information.
Health Insurance Portability and Accountability Act (HIPAA) Law
passed in 1996 requiring the U.S. government’s Health and Human Services Depart-
ment to establish requirements for protecting the privacy and security of personal health
information (PHI). The two important elements of HIPAA of interest to security pro-
fessionals are the HIPAA Privacy Rule and the HIPAA Security Rule, which set forth
specific standards on how to protect electronic PHI.
identification The process of initially presenting credentials to a system for the
purposes of identifying an authorized user.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
290
impact The level of potential harm or damage to an asset or the organization if a
given threat were to exploit a given vulnerability.
Information System Security Engineering (ISSE) The processes and meth-
ods used to manage the security life cycle of information and systems. ISSE typically
follows and is adapted to the organization’s system development life-cycle model but
embeds security processes into each phase of the life cycle so that security is considered
early on in the development process, rather than as an afterthought when the system is
implemented and data produced.
integrity The goal of preventing unauthorized modification to a system or data.
ISO/IEC standards The International Organization for Standardization (ISO) and
the International Electrotechnical Commission (IEC), which together are responsible
for a majority of information technology standards that are used worldwide, including
several that apply to information security and risk management.
key performance indicators (KPIs) Used to understand and enable the mea-
surement of control performance.
key risk indicators (KRIs) Highly probable indicators designed to accurately pre-
dict important levels of risk based on defined thresholds.
least privilege A security principle that dictates that entities should be given only
the minimum level of rights, permissions, and privileges necessary to perform their des-
ignated functions or jobs, and no more than that.
likelihood The level of certainty that an incident will occur; often expressed statisti-
cally as a probability of occurrence.
need-to-know A security concept that requires an individual have an actual require-
ment to access systems or data, based upon their job requirements.
NIST The U.S. Department of Commerce’s National Institute of Standards and Tech-
nology.
NIST Risk Management Framework (RMF) The overall risk management
methodology published and promulgated by the National Institute of Standards and
Technology (NIST).
nonrepudiation The security concept that requires an individual to be accountable
for their actions, such that they cannot deny that they took an action.
OCTAVE The Operationally Critical Threat, Asset, and Vulnerability Evaluation
(OCTAVE) methodology developed by Carnegie Mellon University and the U.S. gov-
ernment to assist organizations in identifying and assessing information security risk.
passive tools Passive tools listen for network traffic or monitor the hosts they reside
on, quietly and with little to no impact on the ongoing operations; used when there is a
desire for no interference with daily activities.
Glossary
291
PCI-DSS A set of security requirements levied on merchants that process credit card
transactions by the major payment card industry providers, including Discover, Visa,
MasterCard, and American Express. PCI-DSS was developed in an effort to impose secu-
rity requirements and controls on retailers (merchants and service providers) in order to
reduce credit card fraud and identity theft.
penetration testing Designed to exploit weaknesses on a system based on their
having been exploited, not just the probability.
platform A hardware or software infrastructure upon which to base computing oper-
ating systems, applications, and networks. It may involve different operating systems,
network protocols, or particular types of hardware.
port scanner Allows a tester to determine which ports on the system are listening
for requests.
portfolio A grouping of programs, managed as a whole. Portfolio management is
the oversight and management of several different programs by a senior person in the
organization.
practice A proven, standardized methodology or way of performing particular tasks
or processes.
program A grouping of similar projects; programs are usually ongoing and longer-
term in nature and may also encompass several individual projects, as well as other activi-
ties specific to processes that may have an indefinite duration.
project A limited-duration set of activities geared toward a particular goal; projects
have definitive start and stop dates, resource allocations, scope, schedule, and costs.
project management A set of processes covering a defined project from start to
finish, generally looking to cut costs such as time, scope, and overall project cost.
protocol analyzer Often known as a sniffer; dedicated hardware or software that
collects network traffic for the purposes of examination, either for determining network
issues or for capturing plain-text usernames, passwords, or other sensitive information
being sent in the clear.
qualitative assessment An assessment technique that uses subjective values,
such as low, moderate, and high, to describe various components of risk, such as likeli-
hood and impact. Qualitative techniques rely on data that is often not easily described
in numerical terms.
quantitative assessment An assessment technique that uses nonsubjective val-
ues, such as numerical or other quantitative data, to describe various components of risk,
such as likelihood and impact. Quantitative techniques rely on data that is numerically
derived and not easily subject to individual opinion.
quick wins Risk responses that are high reward and low cost, which are both effec-
tive and efficient.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
292
recovery point objective (RPO) The maximum tolerable time period in which
data can be lost by the organization because of an incident or disaster.
recovery time objective (RTO) The maximum amount of time that can be
allowed to pass between an incident and recovering the business to an operational state.
resilience The ability of the business to survive negative events and continue with
its mission and function.
risk The possibility of harm that can come to an asset or an organization.
risk acceptance When an active decision is made to assume risk (either inherent or
residual) and take no further action to reduce it.
risk appetite The organization’s overall acceptable level of risk for a given business
venture.
risk assessment The process of identifying and assessing various factors, including
threats, threat actors, vulnerabilities, assets, and likelihood, to determine their impact on
the organization.
risk avoidance An option taken when, after controls have been considered, the
level of risk is still not acceptable, and the project isn’t started or is canceled.
risk culture The overall attitude toward risk, promulgated and supported by the
organization’s leadership.
risk factor Any factor that may contribute to an increase or decrease in risk; risk
factors could be external or internal, and they could affect either likelihood or impact
should a risk event actually occur.
Risk IT Framework ISACA’s own risk management methodology; it is strongly tied
to and integrated with COBIT 5. The Risk IT Framework merges traditional IT models
with a more risk-focused mind-set.
risk management The overall process of managing risk within an organization at
all levels, according to the organization’s risk appetite, tolerance, and strategy.
risk mitigation Involves the application of controls that lower the overall level of
risk through the reduction of the vulnerability, the likelihood of the threat exploit, or the
reduction of the impact to the asset, if the risk were to be realized.
risk ownership The assignment of a particular aspect of risk to a responsible (and
accountable) individual, usually a risk practitioner or manager who has the ability to affect
risk response through their ownership of assets, controls, or status in the organization.
risk profile A collection of detailed data on identified IT risks; typically applied to a
specific system or groups of systems.
Glossary
293
risk register The master product or document that reflects the different risk sce-
narios and factors for the organization; it could be broken down by asset or system and
reflects the different risk factors including threats, vulnerabilities, assets, likelihood, and
impact to assets.
risk response action plan Lists the risk responses that have been chosen and
charts their progress and associated timeline, with an appropriate action owner.
risk scenario An identified risk event possibility, which consists of a threat actor,
threat, vulnerability, and asset.
risk sharing Often referred to as risk transference, entails the use of a third party to
offset part of the risk. It can involve the outsourcing of some activities to a third party to
reduce the financial impacts of a risk event.
risk tolerance The organization’s level of acceptable variation from the risk appetite.
root-cause analysis (RCA) Looks to establish a causal relationship between the
root cause (or causes) and the problem as it manifested itself.
Sarbanes–Oxley Act of 2002 (SOX) U.S. law passed in 2002 establishing
requirements for public companies in the United States, as well as auditors and account-
ing firms, to improve the accuracy and reliability of corporate disclosures with regard to
securities laws. The law is enforced by the U.S. Securities and Exchange Commission
(SEC) and provides governance for the integrity and accuracy of data produced by an
organization. For security professionals, this has the effect of imposing specific integrity
and protection controls on information systems and processes.
security categorization The process of determining the impact to the organi-
zation, with regard to confidentiality, integrity, and availability, for information and
systems. The security categorization uses qualitative benchmarks of low, moderate, and
high. FIPS 199 and NIST SP 800-60 offer a defined process for the security categoriza-
tion of information.
security information and event management (SIEM) Refers to the tech-
nologies and products used to integrate security information management and security
event management information into a centralized interface, providing real-time event
correlation and analysis.
service-level agreement (SLA) A contractual agreement, signed by an organiza-
tion and a third-party provider, which details the level of security, data availability, and
other protections afforded the organization’s data held by the third party.
Software as a Service (SaaS) A third-party cloud-based service that offers out-
sourced use of software by an organization; this allows an organization to use licensed
software at a lower cost than buying, installing, and maintaining software.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
294
stakeholder Any business-related individual, department, or entity directly affected
by risk to the organization.
standard A prescribed set of detailed processes, which may include specific levels of
performance or function, used to complete and measure a given task or function.
systems development life cycle (SDLC) A framework describing the entire
useful life of a system or software, which usually includes phases relating to require-
ments definition, design, development, acquisition, implementation, sustainability,
and disposal.
threat An event or occurrence that has the potential to cause harm or damage to
people, places, or things, or to adversely affect operations.
threat actor See threat agent.
threat agent An entity that has the intent to initiate a threat event. This doesn’t
have to be a person; it could also be nature, in the case of a natural disaster.
threat assessment An assessment that attempts to determine all potential threat
actors and threats that may affect a given asset or its vulnerabilities.
threat modeling A threat assessment that attempts to determine all possible vec-
tors of attack and includes risk factors that may affect the ability of a threat actor to initi-
ate or complete a threat event.
Val IT A governance and management framework developed by the IT Governance
Institute; it has been absorbed as part of COBIT 5. It consists of three main domains: Value
Governance (VG), Portfolio Management (PM), and Investment Management (IM).
vulnerability A weakness in a system or asset, such as a flaw in software code; it
can also be considered to be a lack of protection for an asset, such as an unlocked server
room door.
vulnerability assessment An assessment that attempts to discover all potential
weaknesses for an asset. Often designed for a third party to come into an organization,
take stock of the assets that will be covered within the scope of the assessment, conduct
scans and other tests against those assets, and provide a report of the vulnerabilities that
have been found.
vulnerability scanner A piece of software designed to scan a system to determine
what services the system is running and whether any unnecessary open ports, operating
systems and applications, or back doors can be exploited because of a lack of patching
or other flaw.
work breakdown structure (WBS) A detailed decomposition of the work to be
performed during the project, including specific step-by-step tasks, as well as required
resources.