Crisc Aio
Crisc Aio
Crisc Aio
CRISC™
Certified in Risk and
Information Systems Control™
EXAM GUIDE
This page intentionally left blank
I ALL • IN • ONE I
CRISC™
Certified in Risk and
Information Systems Control™
EXAM GUIDE
Bobby E. Rogers
Dawn Dunkerley
•
New York Chicago San Francisco
Athens London Madrid Mexico City
Milan New Delhi Singapore Sydney Toronto
McGraw-Hill Education is an independent entity from ISACA• and is not affiliated with ISACA in any manner. This study/
training guide and/or material is not sponsored by, endorsed by, or affiliated with ISACA in any manner. This publication and
digital content may be used in assisting students co prepare for the Certified in Risk and Information Systems Control~ (CRisc~)
exam. Neither ISACA nor McGraw-Hill Education warrants chat use of chis publication and digital content will ensure passing
any exam. Certified in Risk and Information Systems Control and CRISC are trademarks ofISACA in the United Scates and
certain ocher countries. All ocher trademarks are trademarks of their respective owners.
Copyright© 2016 by McGraw-Hill Education. All rights reserved. Except as permitted under the United States Copyright Act of 1976, no part of
this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written
permission of the publisher, with the exception that the program listings may be entered, stored, and executed in a computer system, but they may
not be reproduced for publication.
ISBN: 978-0-07-184714-8
MHID: 0-07-184714-6
The material in this eBook also appears in the print version of this title: ISBN: 978-0-07-184711-7,
MHID: 0-07-184711-1.
All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trademarked name, we
use names in an editorial fashion only, and to the benefit of the trademark owner, with no intention of infringement of the trademark. Where such
designations appear in this book, they have been printed with initial caps.
McGraw-Hill Education eBooks are available at special quantity discounts to use as premiums and sales promotions or for use in corporate training
programs. To contact a representative, please visit the Contact Us page at www.mhprofessional.com.
Information has been obtained by McGraw-Hill Education from sources believed to be reliable. However, because of the possibility of human
or mechanical error by our sources, McGraw-Hill Education, or others, McGraw-Hill Education does not guarantee the accuracy, adequacy, or
completeness of any information and is not responsible for any errors or omissions or the results obtained from the use of such information.
TERMS OF USE
This is a copyrighted work and McGraw-Hill Education and its licensors reserve all rights in and to the work. Use of this work is subject to these
terms. Except as permitted under the Copyright Act of 1976 and the right to store and retrieve one copy of the work, you may not decompile,
disassemble, reverse engineer, reproduce, modify, create derivative works based upon, transmit, distribute, disseminate, sell, publish or sublicense
the work or any part of it without McGraw-Hill Education's prior consent. You may use the work for your own noncommercial and personal use;
any other use of the work is strictly prohibited. Your right to use the work may be terminated if you fail to comply with these terms.
THE WORK IS PROVIDED "AS IS." McGRAW-HILL EDUCATION AND ITS LICENSORS MAKE NO GUARANTEES OR
WARRANTIES AS TOTHEACCURACY,ADEQUACYORCOMPLETENESS OFORRESULTS TO BEOBTAINEDFROMUSING THE WORK,
INCLUDING ANY INFORMATION THAT CAN BE ACCESSED THROUGH THE WORK VIA HYPERLINK OR OTHERWISE, AND
EXPRESSLY DISCLAIM ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. McGraw-Hill Education and its licensors do not warrant or guarantee
that the functions contained in the work will meet your requirements or that its operation will be uninterrupted or error free. Neither McGraw-Hill
Education nor its licensors shall be liable to you or anyone else for any inaccuracy, error or omission, regardless of cause, in the work or for any
damages resulting therefrom. McGraw-Hill Education has no responsibility for the content of any information accessed through the work. Under
no circumstances shall McGraw-Hill Education and/or its licensors be liable for any indirect, incidental, special, punitive, consequential or similar
damages that result from the use of or inability to use the work, even if any of them has been advised of the possibility of such damages. This
limitation ofliability shall apply to any claim or cause whatsoever whether such claim or cause arises in contract, tort or otherwise.
I'd like to dedicate this book to my family, who was very
understanding and patient with me while I wrote this book.
To my wife Barbara; my children Greg, Sarah, and AJ; and my
grandchildren, Sam and Ben: you guys are the world to me.
-Bobby E. Rogers
Index...................................................................... 295
ix
This page intentionally left blank
CONTENTS
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
xi
CRISC Certified in Risk and Information Systems Control All-In-One Exam Guide
xii
Chapter 3 Identifying and Managing Risk Scenarios 69
Developing and Managing Risk Scenarios 69
Risk Identification and Classification 70
Risk Scenarios . . . . . . . . . . . . . . . . ... . . . ... . . . ... . . . .. 71
Developing Risk Scenarios . . . . . . . ... . . . ... . . . ... . . . .. 75
Analyzing Risk Scenarios . . . . . . . . ... . . . ... . . . ... . . . .. 80
Risk Register . . . . . . . . . . . . . . . . . ... . . . ... . . . ... . . . .. 82
Chapter Review . . . . . . . . . . . . . . . . . . . . ... . . . ... . . . ... . . . .. 84
Review Questions ............. ... . . . ... . . . ... . . . .. 84
Answers 88
Glossary 287
From Bobby:
First, we'd like to thank all the good folks at McGraw-Hill Education and their
associates for guiding us throughout this book, helping us to ensure a quality product.
Meghan Manfre, Amy Stonebraker, and Tim Green were awesome to work with, making
sure we stayed on track and doing everything they could to make this a wonderful
experience. We're very grateful to them for giving us the chance to write this book and
believing in us every step of the way.
Dawn Dunkerley has been one of my best friends for several years now, and I also
consider her one of the smartest folks in our profession, so I was doubly happy to have
her accept my invitation to coauthor this book. She's added some fantastic insight and
knowledge to this book; I couldn't have done it without her. Thanks much, Dawn!
Kelly Sparks deserves some special thanks because, as the technical editor, he had a
difficult job, which was to make sure that we stayed reasonable and technically accurate
throughout the book. It's hard to be critical of someone else's work when you're also good
friends with the writers, so I know it must have been a challenge for Kelly to be critical,
truthful, and diplomatic at the same time, but he pulled it off just perfectly anyway. Kelly
knows this field extremely well. He didn't pull any punches and was hard on us when
he needed to be, and that's why I'm happy to have him on board as the technical editor.
Kelly definitely contributed to the clarity, understanding, and technical accuracy of the
text. Thanks for all your help, Kelly; this book is a direct testament to your extraordinary
competence and professionalism.
Finally, and most importantly, I'd like to thank my family, who endured a lot of time
without me at the dinner table, on family outings, and on a daily basis to give me the
time to write this book. For my wife Barbara, who went to bed without me many nights
while I stayed up writing to meet a deadline, as well as doing my share of the housework
so I could write, I give my deepest thanks and love. For my children, Greg, Sarah, and AJ,
thanks for being great kids. I'm very proud of the adults you three have become. I'd also
like to thank my two grandsons, Sam and Ben, who had to learn to play quietly in the
house while I wrote.
From Dawn:
I absolutely must start by acknowledging the best author and friend I could have asked
to work with, Bobby Rogers. Bobby not only has a work ethic that scares me (when does
he sleep?) but has always been ready with a kind word, a joke, or a willing hand. Thank
you for your exceptional service to our field. I would also like to thank Barbara Rogers
for putting up with Bobby and his aforementioned work ethic. I am so glad to call you
both friends.
xv
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
xvi
Meghan Manfre, Amy Stonebraker, and Tim Green continue to be both excellent
editors and excellent people; we could not have pulled off this project without you and
your consistent support.
A big thank you to our technical editor, Kelly Sparks. You did a great job keeping
us on our toes. You were great to work with, and I have a renewed appreciation for
your skills.
Finally, I heartily acknowledge the contribution of my family and friends who have
supported me throughout my various crazy endeavors. I could not ask for more than the
love and encouragement I receive every day toward pursuing my goals. Thank you all.
INTRODUCTION
Welcome to the All-in-One exam guide for ISACA's Certified in Risk and Information
Systems Control"' (CruSC"') exam! This book will help you study for, and successfully
pass, one ofISACA's premier certification exams, the cruse exam. This exam is designed
to test your knowledge of a wide variety of topics related to the risk management and
information systems controls. The exam focuses on business and IT risk management in
an enterprise infrastructure, as well as how to design and implement IT security controls
to mitigate risk.
Every day, it seems, data is breached at some of the largest organizations in the world.
Recently we've seen breaches in the U.S. government, in the healthcare industry, and
even at entertainment giants such as Sony. No organization, no matter what size, is
immune to the threat of data breaches or, for that matter, data theft or loss. Effective risk
management, however, can reduce the possibility of data breaches, as well as strengthen
IT infrastructures and even contribute to their efficient use. Information system controls
serve to reduce the likelihood of negative events having a significant impact on the
organization and should be carefully planned for and considered.
This book covers topics that include basic risk concepts, risk assessments, standards
and frameworks, and information security control design and implementation. We
also cover the essential concepts, terminology, and definitions that risk management
practitioners and security professionals need to be effective in this area. In the book's nine
chapters, we cover all four of the top-level domains, as well as the task and knowledge
statements listed in the official ISACA exam objectives.
While you don't have to already be an expert in all of the areas we discuss, of course
having experience in some of these areas, such as risk concepts, helps. A good, broad
background of experience and knowledge in information security will give you an
advantage in your studies for this exam. Of course, you'll get a good background in all of
these subjects throughout the book. Chapters 1 through 6 cover risk management basic
concepts, assessments, and risk response. The remaining chapters (Chapters 7 through
9) discuss how to design and implement information security controls, integrating them
with an effective risk management program.
Passing the cruse exam not only places you in a class of professionals recognized for
their experience and expertise in this field but also serves to quantify and validate your
knowledge of advanced risk management and security topics. After passing this exam,
you'll be able to show that not only are you qualified but you are certified in these areas.
This book is designed to help get you there.
xvii
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
xviii
• The topics covered in each chapter are listed in the first section to help you to
map out your study.
• Tips are included in each chapter that offer great information on how concepts
you'll study apply in a place that we like to call "the real world." Often, they may
give you a bit more information on a topic covered in the text.
• Exam Tips are included to point out an area you need to focus on for the exam.
Note that they won't give you any exam answers, but they do help you by letting
you know about important topics that you may see on the test.
• Notes may be included in a chapter as well. These are bits of information that are
relevant to the discussion and that point out extra information.
• Some chapters have exercises designed to provide hands-on experience and to
reinforce the chapter information. As your organization and circumstances are no
doubt different from ours, these may, from time to time, need a little adjustment
on your end.
The Examination
As we have several years of experience in taking certification examinations, let's say that
both of us would love for this to be your one-stop shopping source for exam material
to help you study for and pass the exam. Unfortunately, as with any sort of certifica-
tion exam, there's probably no single source of information to study for the test. This is
because different materials offer different perspectives, depth of information, and expla-
nations that people process and learn from differently. Having said that, we believe that
there's more than enough information in this book for you to both pass the exam and be
successful in real life as an ISACA-certified cruse professional. The other thing you'll
need, which in our minds is just as important as good study material, is experience.
There's no substitute for practical, hands-on experience, and you should make every
effort to get experience on all aspects of the ISACA cruse exam material that we discuss
in this book.
In terms of prerequisites and experience, ISACA requires that you have three years
of experience, in at least two of the domains, and of those, one of those two must be in
Domain 1 or Domain 2 in order to take this exam and earn the certification. There is no
Introduction
xix
prerequisite certification exam that you must pass, although having other advanced-level
certifications, such as the CISSP or CISM, certainly will also help you gauge the level of
knowledge you need for this exam.
Speaking of the exam, here are the specifics: The exam consists of 150 questions,
covering the four domains of the job practice areas. Each domain covers a specific topic
and is broken down into task and knowledge statements. Because domain objectives can
change at ISACA's discretion, the best source for you to get up-to-date information on
the domains and objectives is ISACA's website (www.isaca.org), where the most current
exam information will be posted. While we've made every effort to ensure that we have
the most current exam information in the book (as of the June 2015 exam session),
remember to check ISACA's site for any exam or objective changes before, and during,
your study effort and definitely before you take the exam.
As you might imagine, the four domains are broken out over the 150 questions, but
there is not an equal percentage of questions. If you take a look at the most current
version of the ISACA objectives on the site, you'll see that some domains may have more
questions than others, based upon how important the topic is to the exam. For example,
Domain 1.0, IT Risk Identification, comprises 27 percent of the questions on the exam,
per the exam information from ISACA. This domain is broken down into topics such
as identifying threats and vulnerabilities, developing risk scenarios, and so on. So, out of
150 questions, you should expect to get about 40 of them from this particular domain.
Of course, this is just an estimate because ISACA can alter the exam and its objectives as
it desires. But you can pretty much bet that this is a fair estimate. Other domains have
differing percentages of questions on the exam as well. One test-taking strategy that has
served countless students is to make sure that you know an area you're comfortable with
very well, especially if it has a higher percentage of exam questions, but you should also
try to focus most of your studying on the areas you are unsure about, of course. You won't
be able to pass the test by just being very good at one particular domain, so you should
make every effort to learn the domains that you may not know as well.
Finally, you should know that you have a maximum of four hours to take the exam.
The exam has a passing score of 450, on a scale of 200 to 800. ISACA, like many
certification bodies, uses a type of scale scoring system, so it may be difficult at first to
determine exactly how well you did based upon the score you get. As it's still a paper-
based exam (as of this writing), scoring the exam and receiving your results can take up
to eight weeks. When you pass the exam, you'll get a breakdown of your scores on each
of the domains, as well as an overall passing score.
Chapter Page
Official Job Practice Areas All-In-One Coverage No. No.
This chapter will review a large portion of Certified in Risk and Information Systems
Control (CRISC) Domain 1: Risk Identification with coverage offundamental informa-
tion security and risk management concepts. We'll cover a good deal of the terminology
associated with risk management and many of the core concepts you'll need to be famil-
iar with for the exam, but we will go into more depth on many of these concepts in later
chapters.
The CRISC exam topics that we cover in this chapter are as follows and include the
following domain objectives and knowledge statements:
• 1.6 Identify risk appetite and tolerance defined by senior leadership and key
stakeholders to ensure alignment with business objectives
• 1.7 Collaborate in the development of a risk awareness program, and conduct
training to ensure that stakeholders understand risk and to promote a risk-aware
culture
NOTE Throughout the book, the task and knowledge statements are listed
in the order they are described in the CRISC Job Practice areas, not necessarily
how they are presented in the chapter.
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
2
Confidentiality
The goal of confidentiality is to keep information systems and data from being accessed by
people who do not have the authorization, need-to-know, or security clearance to access
that information. In other words, confidentiality means that only authorized individu-
als and entities should be able to access information and systems. Confidentiality can be
achieved through a number of security protection mechanisms, such as rights, privileges,
permissions, encryption, authentication, and other access controls. If the confidentiality
of data or information systems is breached, you get the opposite of confidentiality, which
is unauthorized disclosure. Unauthorized disclosure is a risk to data and information sys-
tems and one that we as security professionals struggle hard to protect against.
Integrity
Integrity is the characteristic of data that means the data has not been subject to unau-
thorized modification or alteration. In other words, it means data is left in the same state
as it was when it was stored or transmitted. So, when it is accessed again or received,
it should be identical to the data that was originally stored or transmitted. Integrity is
Chapter 1: Risk Concepts
3
achieved in several ways, by using checksums, message digests, and other verification
methods. Data alteration is the opposite of integrity, particularly when the modification
has not been authorized by the data owner. Data modification or alteration can happen
accidentally, such as when it may be inadvertently changed because of human error or
faulty transmission media. It can also happen intentionally (which is usually malicious
in nature when this modification is unauthorized) by direct interaction with data during
storage or transmission, such as during an attack, for example. This risk to data affects
whether the data can be trusted as authentic or true, whether it can be read as intended,
and whether it is corrupt.
Availability
Availability is when data and systems are accessible to authorized users at any time or under
any circumstances. Even if data is kept confidential and its integrity remains intact, that
does you no good if you can't access it when you need it to perform critical business func-
tions. Availability ensures you have this data (and the information systems that process it)
at your fingertips. Juse as confidentiality and integrity have their opposites, data destruction
or denial of service is the opposite of availability. This risk to your information systems
could prevent authorized consumers of that data or users of that information system from
performing their jobs, thus severely impacting your business operations. Figure 1-1 shows
the relationships of the three information security goals to one another.
EXAM TIP You will need to understand the definitions of the goals of
information security well for the exam. Almost everything in information risk
management supports these three goals, either directly or indirectly.
Figure 1-1
The three goals
of information
security
Availability Confidentiality
Integrity
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
4
confidentiality, integrity, and availability, as well as protect your systems from unauthor-
ized use or misuse. We'll discuss these different security elements and other concepts, as
well as how they support the three primary goals of security, in the next few sections.
Access Control
As a security professional, you probably already know that a security control is a security
measure or protection applied to data, systems, people, facilities, and other resources to
protect them from adverse events. Security controls can be broken down and categorized
in several ways. Access controls directly support the confidentiality and integrity goals
of security and indirectly support the goal of availability. An access control essentially
means that you will proactively ensure that only authorized personnel are able to access
data or the information systems that process that data. Access controls ensure that only
authorized personnel can read, write to, modify, add to, or delete data. They also ensure
that only the same authorized personnel can access the different information systems and
equipment used to store, process, transmit, and receive sensitive data.
There are several different types of access controls, including identification and authen-
tication methods, encryption, object permissions, and so on. Remember that access con-
trols can be administrative, technical, or physical in nature. Administrative controls are
those that are implemented as policies, procedures, rules and regulations, and other types
of directives or governance. For example, personnel policies are usually administrative
access controls. Technical controls are those that are most often associated with security
professionals, such as firewalls, proxy servers, virtual private network (VPN) concentra-
tors, encryption techniques, file and folder permissions, and so on. Physical controls are
those used to protect people, equipment, and facilities. Examples of physical controls
include fences, dosed-circuit television cameras, guards, gates, and restricted areas.
In addition to classifying controls in terms of administrative, technical, and physical,
you can also classify access controls in terms of their functions. These functions include
preventative controls, detective controls, corrective or remedial controls, deterrent con-
trols, and compensating controls. All of the different controls can be classified as one or
more of these different types of functions, depending upon the context and the circum-
stances in which they are being used.
Accountability
Accountability means that a person is going to be held responsible for their actions on
a system or with regard to their interaction with data. Accountability is essentially the
traceability of a particular action to a particular user. Users must be held responsible for
their actions, and there are different ways to do this; it is usually assured through audit-
ing. First, there must be a unique identifier that is tied only to a particular user. This way,
the identity of the user who performs an action or accesses a resource can be positively
established. Second, auditing must be properly configured and implemented on the sys-
tem or resource. What you are auditing is a user's actions on a system or interactions
with a resource. For example, if a user named Sam deletes a file on a network share, you
want to be able to positively identify which user performed that action, as well as the
circumstances surrounding the action (such as the time, date, from which workstation,
and so on). This can be accomplished only if you have auditing configured correctly and
you take the time to review the audit logs to establish accountability.
Non repudiation
Nonrepudiation is closely related to accountability. Nonrepudiation ensures that the user
cannot deny that they took an action simply because the system is set up such that no
Chapter 1: Risk Concepts
7
Figure 1-2
How access Identification
controls support
security elements
and information
security goals Physical Technical
Controls Controls
Availability Confidentiality
Integrity
Administrative
Nonrepudiation Control s Authorization
one else could have performed the action. The classic example of nonrepudiation is given
as the proper use of public key cryptography. If a user sends an e-mail that is digitally
signed using their private key, then they cannot later deny that they sent the e-mail, since
only they are supposed to have access to the private key. In this case, the user can be held
accountable for sending the e-mail, and nonrepudiation is assured.
Figure 1-2 summarizes the relationships between access controls, the supporting ele-
ments of information security, and the three information security goals. Note that there
is no hard-and-fast rule about mapping security elements and access controls to security
goals; all of these elements and controls can support any one or even more than one goal
at a time. For example, encryption, a technical access control, can support both confi-
dentiality and data integrity at the same time.
NOTE Although other books may describe the supporting elements of the
security goals differently, the basic ones we've described here are common
and directly support the three goals of confidentiality, integrity, and
availability.
Vulnerabilities
Vulnerabilities are weaknesses in a system, operation, or facility that would make these
resources susceptible to being exploited by a threat. Vulnerabilities can exist in the way a
system processes, transmits, or stores data; they can also exist in the technologies that make
up a system or even in its design. Even people can have vulnerabilities; one such weakness
that affects the people in an organization is complacency. This weakness might prevent
them from always following security practices, for example, and allow a security threat to
take advantage of that weakness. Facility vulnerabilities could include a lack of physical
security controls, a "blind spot" near a doorway to a secure area where an intruder may
hide, and so on. One of the first steps in managing risk is to identify all of the vulnerabili-
ties that exist within a system or facility so they can be adequately addressed. This is usu-
ally accomplished by conducting a vulnerability assessment, which attempts to thoroughly
identify any and all vulnerabilities inherent to a system and its people, operations, policies,
procedures, and facilities. We'll discuss vulnerability assessments more in Chapter 2, but
for now keep in mind that while a vulnerability assessment can be conducted as a stand-
alone type of assessment, it really doesn't have as much value unless it is part of a larger risk
assessment, where it can be brought into context with other important elements of risk.
threat would not be a danger or risk to the system for that specific instance. A threat
agent is something that causes or initiates a threat against a vulnerability. In the example
given previously, a hacker or malicious actor would be the threat agent that exercises the
cryptographic attack (threat) against the weak algorithm (vulnerability). Table 1-1 gives
some other examples of threats, vulnerabilities, and threat agents to further emphasize
these concepts.
As you can see from Table 1-1, a threat is only the presence of something that can
exploit a vulnerability; the vulnerability can be a concrete weakness or even the absence
of a security control within the system (such as a lack of backup power or data destruc-
tion policy, for example) that creates a weakness or vulnerability. The presence of both of
these conditions at the same time creates the potential for danger or harm to a system,
its data, the people, or the facilities. This potential danger is defined as risk, but we will
present a more comprehensive definition of that term in the next few sections. From
the table you can also see that both vulnerabilities and threats directly affect the three
primary goals of security (confidentiality, integrity, and availability). Both threats and
vulnerabilities can also be different combinations of administrative, technical, physical,
and operational in nature.
Threat assessments are often conducted to identify matching threat and vulnerability
pairings, as well as the threat agents that could exercise a threat. Like a vulnerability
assessment, the assessment does not have to necessarily be part of but can definitely sup-
port risk management. Threat assessments are conducted using a wide variety of data,
including historical trends, statistical analysis, industry data, and other information from
sources including the government, vendors, and even the organization.
Impact
Impact is what happens to the organization or to the business when a weakness or vulner-
ability is exploited by a threat. Impact can be expressed as a level of damage to an asset or
the organization itself. It can be seen as how the business or operations of an organization
are affected by a threat that exercises a vulnerability. Impact can also be cumulative; several
smaller impacts that affect different systems within an organization can be additive and
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
10
create a much larger impact on an organization than any one of them would. Impact can
be expressed in terms of revenue lost based upon a complete or partial loss of an asset or
process. It can also be expressed in terms of other concrete numbers or, even in subjective
terms, based upon how serious the organization determines the effect of the event to be.
Likelihood
Likelihood is the probability of a threat exploiting a particular vulnerability. During
threat and vulnerability assessment processes, the organization will normally determine
the seriousness of a threat in terms of its impact if it occurs, based upon a certain level
of weakness in the system. The organization also routinely determines the likelihood of
these threats, given existing security controls and protections for an asset in the organiza-
tion. For example, the likelihood of an intruder that breaks into an extremely secure facil-
ity that has gates, guards, and guns surrounding it, as well as high security fences, might
be extremely low. A different facility without all of these security protections might incur
a much higher likelihood of the same threat. In addition to security controls protecting
an asset, other environmental factors might come into play, such as the facility residing
in a "bad" neighborhood, distance from police and other emergency services, motivation
of the threat agent, and so on. All of these different factors, which are really unique to the
operational environment and asset in question, should be considered when determining
the likelihood that a threat could occur. As with impact, likelihood could be measured in
statistical percentages or subjective terms.
Risk
The four elements just described-vulnerabilities, threats and threat agents, impact, and
likelihood-combine to make up the fundamental parts of risk. Risk is sometimes a dif-
ficult concept to get your arms around because it can be explained with different defini-
tions, especially within the security community. On one hand, risk is a relative level of
danger or harm to an asset. It's also sometimes defined as the likelihood of a negative
event happening to an organization and impacting its business operations. Another way
of saying it might be the likelihood of a threat exploiting a vulnerability, causing an
impact to an asset.
In any event, risk is a combination of these four factors, and it is a value that can be
relatively measured using these factors. For example, impact can be expressed in lost
revenue (dollars), lost productivity (labor hours), or even loss of market share (a drop in
sales). Likelihood can be measured as a statistical probability (a percentage, for example)
or even a subjective measurement, such as high, medium, or low. Threats and vulner-
abilities can be a little bit more difficult to assign concrete values to; usually these values
are also subjective, such as high, medium, or low designations. Later in this chapter, we'll
discuss how these values can be measured and risk can be expressed, using either quanti-
tative (expressed as numbers) or qualitative (expressed using subjective values) methods.
Figure 1-3 attempts to bring together all of these factors to illustrate their relationships,
helping you to better grasp the concept of risk.
Chapter 1: Risk Concepts
11
Figure 1-3 Likelihood of Likelihood of Successfully
Threat Occurring Causing Impact
Threats, r____A _ _ _ _,
vulnerabilities, r----A----,
likelihood, and
impact
Threat Agent
Initiates
B Exploits
Vulnerability
Produces
Risk
Two terms associated with risk that we will briefly describe here include inherent risk
and residual risk. Inherent risk is associated with any endeavor, including risk associ-
ated with technologies, business processes, markets, and so on. All endeavors that busi-
nesses embark on contain some inherent risk that may be both unique to the particular
endeavor and common to a technology or process. Residual risk, which we'll discuss in
depth later in the book, is the risk that remains after we have taken steps to respond to
risk, either by reducing it or by mitigating it. It is a commonly accepted fact within the
risk management community that risk can never be entirely eliminated; it can only be
reduced to a manageable or acceptable level. Residual risk is normally the amount of risk
left over after you've taken these steps, which must then be accepted. We'll discuss more
about risk response in Chapter 5.
It's worth mentioning here that organizations typically maintain data associated with
risk, including identified threats and vulnerabilities, as well as their likelihood and impact
determinations, in what is known as an enterprise risk management (ERM) program. In
addition to being a system that records and assists in analyzing risk management data,
ERM is also the formal management program, including processes and methodologies,
that the organization uses to manage risk throughout its entire life cycle.
EXAM TIP Understand the differences and relationships between the four
risk elements of threats, vulnerabilities, likelihood, and impact. Threats
exploit vulnerabilities, and the level of risk is based upon the likelihood of
the threat exploiting a given vulnerability and the impact to the system if
it occurs.
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
12
Risk Culture, Appetite, and Tolerance
An organization normally has a risk culture, which is essentially how the organization as
an entity feels about and deals with risk. This culture is developed from several sources.
First, it can come from the organization's leadership, based upon their business and man-
agement philosophies, attitudes, education, and experience. It can also come from the
organization's governance. Remember that governance is essentially the rules and regula-
tions imposed either by external entities (in the form of laws, for example) or internally
by organization.
In any case, the culture of the organization really defines how the organization feels
about risk and how it treats risk over time. As part of the organization's risk culture, there
are its risk appetite and risk tolerance. These are different terms you also need to know to
understand risk. Risk appetite is, in effect, how much risk an organization is willing to
deal with in any given endeavor. This is the general level of risk that an organization is
willing to accept in the course of its business. An organization's risk appetite is driven by
the corporate risk culture, in other words, by the environment the organization exists in
(market, regulation, and other external factors).
Risk tolerance, on the other hand, is the acceptable level of deviation in risk for a
particular endeavor or business pursuit. Risk tolerance is how much variation from the
expected level of risk the organization is willing to put up with. There's a certain amount
of risk in every business enterprise or pursuit; however, the organization may not be able
or willing to tolerate large deviations from what it considers is its acceptable level of risk
on an endeavor.
EXAM TIP Know the differences between risk appetite and risk tolerance; risk
appetite involves how much risk the organization is willing to endure, and
risk tolerance is how much variation from that amount is acceptable to the
business for a particular venture. Risk culture drives both of these factors.
Repeat as necessary
Step 1
CATEGORIZE
Inform ation Systems
FIPS 199/SP 800-60
Step 6 Step 2
MONITOR SELECT
Security Controls Secu rity Controls
RISK
l
SP 800-137 FIP S 200/SP 800-53
MAN AGEMENT
FRAMEWORK
r Step 5
AUTHORIZE
Security Life Cycle Step 3
IMPLEMENT
Inform ation System s Security Cont rols
SP 800-37 SP 800-1 60
Step4
ASSESS
Security Control s
SP 800-53 A
Figure 1-4 The NIST Risk Management Framework (courtesy of NIST, from Special Publication
800-53, revision 4)
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
16
As you can see from Figure 1-4, each step of the RMF has associated NIST publica-
tions that provide guidance on performing that particular step. Additionally, however,
there are also NIST publications that help you manage the overall risk process within the
organization. These publications support the RMF by providing more detail on processes
and activities, such as managing risk in the organization, implementing the RMF, and
even performing risk analysis. The three primary standards that support the RMF are:
Keep in mind that there are other standards, however, that support the individual
steps of the RMF. These three provide the overall guidance and detail concerning how to
implement the RMF's processes. Appendix A goes into detail on decomposing the differ-
ent steps and associated publications with the NIST RMF, so see that part of the book
for a complete breakdown of the framework.
COBIT S (ISACA)
Control Objectives for Information and Related Technology (COBIT) is a framework
developed by ISACA; it covers several key areas in business governance and IT enter-
prise management. CO BIT covers key areas in auditing, compliance, information assur-
ance, IT operations, and security risk management. This framework has been around
for several years and through several iterations; CO BIT 5 integrates several other frame-
works developed by ISACA into a single unified framework, including the Risk IT, Value
(Val) IT, and the IT Assurance Framework (ITAF). It also provides for easy integration
of other popular frameworks and standards, including The Open Group Architecture
Forum (TOGAF), the Project Management Body of Knowledge (PMBOK), the Infor-
mation Technology Infrastructure Library (ITIL), Projects In Controlled Environments
2 (PRINCE2), the Committee of Sponsoring Organizations of the Treadway Commis-
sion (COSO), and the many International Organization for Standardization (ISO) stan-
dards. This interoperability enables new users of CO BIT to leverage any of these other
standards they have already been using in their adoption of CO BIT.
COBIT combines the best of tried-and-true standards into its fold; it is compat-
ible with the principles of ISO/IEC 38500:2008, Corporate Governance of Information
Technology, for example, and provides strategy and activities supporting those principles.
COBIT also is interoperable, to various degrees, with standards such as the ISO/IEC
27000 series of standards and covers similar security and risk management areas under
its domains.
CO BIT consists of two layers in its model, governance and management, and sepa-
rates those two layers into five governance processes and four management domains,
respectively. These layers further break down into a total of 37 separate processes.
Table 1-2 quickly summarizes these layers and domains and the process they decom-
pose into.
Chapter 1: Risk Concepts
17
Governance Processes: Evaluate, Direct, and Monitor (EDM) (S)
EDM0l : Ensure EDM02 : Ensure EDM03 : Ensure EDM04: Ensure EDM0S : Ensure
Governance Benefits Delivery Risk Optimization Resource Stakeholder
Framework Optimization Transparency
Setting and
Maintenance
Management Domain: Align, Plan, and Organize (APO) (13)
BAI0l: Manage BAI02 : Manage BAI03 : Manage BAI04: Manage BAI0S : Manage
Programs and Requirements Solutions Availability and Organizational
Projects Definition Identification Capacity Change
and Build Enablement
BAI06: Manage BAIO? : Manage BAI08: Manage BAI09 : Manage BAll0: Manage
Changes Change Knowledge Assets Configuration
Acceptance and
Transitioning
Management Domain: Deliver, Service, and Support (DSS) (6)
DSS0l : Manage DSS02: Manage DSS03 : Manage DSS04: Manage DSS0S : Manage
Operations Service Requests Problems Continuity Security Services
and Incidents
DSS06: Manage
Business Process
Controls
Management Domain: Monitor, Evaluate, and Assess (MEA) (3)
N ote that while CO BIT covers a variety of business and IT pro cesses and areas, those
specific to risk m anagement happen at bo th layers-governance and m anagement-and
are tightly integrated with other processes. COBIT in this regard is not a risk m anage-
ment framework per se, as is NIST 's RMF, but offers a broader view of m anagement and
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
18
governance across all major areas of a business. The next topic we cover, ISACA's Risk
IT Framework, supports CO BIT and provides a more granular view of risk management
practices and activities.
Risk Oovernance (RO) RG1: Establish and RG2: Integrate with RG3: Make risk-aware
maintain a common ERM business decisions
risk view
Risk Evaluation (RE) RE 1: Collect data RE2: Analyze risk RE3: Maintain risk
profile
Risk Response (RR) RR1: Articulate risk RR2: Manage risk RR3: React to events
Table 1-3 The Domains and Processes of ISACA's Risk IT Framework
Chapter 1: Risk Concepts
19
to your work since they help you turn risk management from "magic" into an art and
science for your organization. The frameworks and standards we have described so far are
the ones most relevant to your studies for the CRISC exam.
EXAM TIP While you may not be expected to know the intricate details of
each framework described here, it will be helpful to know at least the basic
characteristics and descriptions of each. You may be asked to identify a
particular characteristic of a framework on the exam.
TIP Remember that risk appetite and tolerance are directly related to the
business mission, although different business pursuits may have varying
levels of each. Senior management sets those levels based upon the
potential rewards from risky opportunities and the amount of loss the
organization could endure if those rewards don't materialize.
EXAM TIP Many elements of risk management can be traced back to the
three information security goals or the security tenets discussed earlier in
the chapter. You should be able to examine risk and determine how it can be
traced back to (and how it affects) those goals and tenets.
Organizational Structures
How the business is organized can help drive how it deals with risk, in several ways.
Most businesses are organized from a functional perspective; in other words, there are
departments and other hierarchical structures established to take care of specific func-
tions that contribute to the business goals and objectives. For example, in a production-
driven business, there may be a manufacturing or production department, an engineer-
ing department, a research and development department, or an assembly line. There
will likely be additional departments that cover support functions, such as marketing,
accounting and finance, public relations, and so on. A hospital, on the other hand, will
be organized according to its specific functions, such as the emergency department, sur-
gery, neurology, radiology, and so on. Businesses in other markets or areas will be orga-
nized differently as well. In any case, the organization of the business is structured as its
mission and business purposes dictate. There are certain functions that may be found in
any business and may deal with information technology, information security, or even
legal compliance. These functional areas may have the primary function of dealing with
risk, but an important thing to consider is that all different organizational structures,
from lower-level work sections to higher-level departments and divisions, have responsi-
bilities regarding risk.
The organization must look at its structure and decide how each individual unit will
manage risk at its own level, understanding that risk management must be uniform
throughout the entire organization. Another consideration is that risks tend to "roll up,"
or be combined at the higher levels of organization. For example, risks that the account-
ing department incurs are only part of the higher organizational levels' risks and included
in the risk management processes. Each lower-level unit in an organizational hierarchy
has risks that are part of the next higher levels' risk considerations. While individual units
may be responsible for only a small piece of the overall organizational risk, their parent
units also bear responsibility for managing that risk, as well as the risk of other subordi-
nate units. Another concept relating to organizational structures is that the risk incurred
by one part of the organization is borne by all parts of the organization; there is almost
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
22
no such thing as risk that affects only one small part of the business. Risk ripples across
the entire organization in some way.
Each individual unit, whether it is a unit in the lower levels of the business hierarchy
or at the highest levels, must take steps to identify, evaluate, and assess risks at their level.
Risks may be thought of as tactical, operational, and strategic. Tactical risks are those that
are encountered by smaller-level production sections, in other words, those that carry out
the day-to-day work of the organization. Operational risks can span several work units
and relate to how the business conducts its functions, as well as how the different work
units interact with each other. Strategic risk is borne at the higher levels of the organiza-
tion, including senior management, and involves risks incurred by leading the business
toward opportunities and away from decisions that exceed the organization's capacity
for risk appetite and tolerance. Respectively, these three types of risks also correspond to
short-term, mid-term, and long-term risks.
Regardless of the level of risk incurred within the organization, there must be an enter-
prise risk management strategy and program in place to deal with the lower-tier, middle-
tier, and higher-tier risks, as well as ensure that all of the risks are managed consistently
and uniformly. Governance from the higher levels of the organization affects risk appetite
and tolerance and shapes the organization's risk management strategy throughout all the
different hierarchical levels. Organizational structure must support that governance, as
well as clearly define lines of authority and responsibility in terms of risk leadership and
management.
Platforms
Platforms are the operating systems and distinct architectures the business information
systems run on. Businesses could use the Windows and Unix platforms or the Intel
and SPARC platforms. Platforms are an element of the IT infrastructure that contrib-
utes to the information security and business risk for several reasons. First, it costs to
Chapter 1: Risk Concepts
23
simultaneously maintain different operating systems and environments that come in
different platforms. Platforms also introduce risk into the environment in the form
of interoperability, security, and supportability. A diverse platform environment (with
mixed platforms, such as Windows, Linux, Macs, Unix, and so on) can affect interoper-
ability with other systems because of differing versions of software and different network
protocols, security methods, and so on. A diverse environment can also affect support-
ability because the organization must maintain different skill sets and a wide knowledge
base in order to support the diverse platforms.
On the other hand, maintaining a homogeneous environment can reduce costs, ensure
interoperability, and allow a more common set of security controls and mechanisms,
such as patch management and configuration management. However, there is even risk
involved in a homogeneous platform environment because of the likelihood that a vul-
nerability discovered in one system would also be shared in many others, offering a wider
attack vector for a potential malicious actor. It is really a matter of the systems develop-
ment life cycle (SDLC) as to how and when platforms are developed, introduced into the
infrastructure, implemented, maintained, and, eventually, disposed of, and there is risk
inherent to all of these different phases, which we'll discuss more in Chapter 2.
Networks
A network is another aspect of the IT infrastructure that inserts risk into the business
environment. While networks are necessary to carry data both within and outside of the
organization, these benefits do not come without some degree of risk. Risk can be intro-
duced from a variety of issues, such as unsecured protocols, lack of encryption for data in
transit, improper data or system access through weak authentication mechanisms, inter-
ception and modification of data, and so on. Networks should be designed to carefully
control traffic during all aspects of data transmission, routing, and reception in order for
a network to be considered secure.
Applications
Applications introduce risk simply because in this day and age they're so critical to the
operations of businesses. Businesses need not only basic word-processing and spreadsheet
software but also complex databases, line-of-business applications, specialized software,
security software, and other types of applications. Applications have to be managed to
their own life cycles as well; they're constantly being patched, upgraded, superseded, and
replaced by better, faster software with more features that usually cost more. Risks that
are inherent to managing applications within an organization include supportability,
backward compatibility, data format compatibility, licensing, and proper use.
Adding to this complexity are the decisions an organization makes in terms of select-
ing proprietary software, open source software, general-purpose commercial software, or
highly specialized software. All of these different categories incur different levels of cost,
supportability, licensing, and feature sets. Interoperability also plays a part in application
risk, like it does with other infrastructure components. Applications that do not use com-
mon data formats or produce usable output for the organization create risk of expense
or additional work that goes into transforming data between incompatible applications.
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
24
Applications also introduce risk into the business environment with the level of security
mechanisms built into them and how effective those security mechanisms are in protect-
ing data residing in the application.
It's worth mentioning here that web-based applications, in addition to presenting the
same risks as normal client-server apps, also have their own unique risks. Security is a defi-
nite risk imposed by web-based applications since they often directly connect to unpro-
tected networks, such as the Internet. Other risks include those that come from the wide
variety of web programming languages and standards available for developers to use.
Databases
Databases, as a subset of applications, impose some of the same risks that applications
and other software do. Additionally, databases incur risks associated with data aggrega-
tion, compatibility, privacy, and security. Aggregation and inference are risks associated
with database systems. Unauthorized access and data loss are also huge risks that data-
bases introduce into the enterprise environment.
Operating Systems
Although we discussed platforms in a previous section, it's worth mentioning operating
systems as their own separate risk element in the IT infrastructure. Platforms and oper-
ating systems are sometimes used interchangeably, but truthfully, a platform is more a
hardware architecture than an operating system categorization. A platform could be an
Intel PC or a tablet chipset, for example, which is designed and architected differently
and run on totally different operating systems. Different operating systems, on the other
hand, could run on the same platform but still introduce risk into the organization, for
the same reasons discussed previously with applications. First, there are interoperability
and supportability risks and all of the other issues that go hand-in-hand with the nor-
mal operating system life cycle, such as patch and vulnerability management. Licensing,
standardization, level of user control, and configuration are also issues that introduce risk
into the organizational computing environment.
Risk Ownership
Risk ownership is a concept that provides a focal point for responsibility and account-
ability for managing risk throughout its life cycle, including identifying it, assessing and
evaluating it, responding to it, and monitoring it. Risk owners take responsibility for risk
in their own functional domains within an organization, although you should under-
stand that the risk from several areas is usually "rolled up" into overall organizational risk
and is owned by the senior executives or board members who are legally responsible for
the organization. There are several components to risk ownership.
The first component is governance. Governance, remember, can be external laws
and regulations that the organization is required to comply with. It can also be internal
regulations and requirements set by senior leadership within the organization. As part
of governance, the organization should set a formal risk strategy and risk management
plan, which should detail how risk ownership is defined within the organization. Risk
ownership may be defined by functional area, hierarchy within the organization, or any
number of other factors.
Other components of risk ownership include responsibility, accountability, and the
ability to control the resources that can effectively manage risk (people, funding, equip-
ment, supplies, facilities, and so on). Responsibility means someone has been given the
formal authority to manage risk, either by position or by specific appointment from the
organization's leaders. A risk owner may have responsibility for a specific area of risk.
Responsibility also means that the risk owner bears the burden of being held accountable
for their actions in risk management. Accountability means that risk owners must be
prepared to take the consequences for success or failure of the risk management efforts.
Finally, risk owners must be given the resources and the authority to control those resourc-
es in order to effectively manage risk within their area of responsibility. If they have the
responsibility and accountability but don't have any control over resources to help manage
risk, they will be quite ineffective and won't be able to meet their responsibilities.
EXAM TIP Remember that regardless of what area within the organization is
considered a risk owner, ultimately the responsibility for owning and
managing risk belongs to the highest level within the organization. This
would likely be either the person or the group that has legal liability and
responsibility for the organization, such as the chief executive officer (CEO)
or the board of directors, as appropriate.
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
26
Risk ownership is directly affected by appetite and tolerance. Since these two factors
are derived from the organization, they are defined by senior leaders and management,
boards of directors, shareholders, and other key entities within the organization. Gover-
nance can also help drive risk appetite and tolerance; the organization may establish rules
and regulations that strictly limit or are less restrictive toward taking and managing risk.
The organization's take on appetite and tolerance directly affects risk ownership because
risk owners must manage the risk within their areas based upon these two factors in order
to be in line with the organization. Senior leaders, shareholders, and boards of directors
must establish the organizational risk culture in order to give boundaries to risk owners
within the organization. They may also require that risk owners consult and validate risk
decisions with senior management, based upon different threshold or tolerance levels.
EXAM TIP Remember that risk acceptance and tolerance come from the
senior management levels of the organization and drive the organization's
risk culture. They also drive how risk ownership is defined and structured
within the organization.
Risk Awareness
Risk awareness is a necessary part of risk management. It can't be viewed as simply just
another two-hour training session to check a box for management or compliance. Risk
awareness is essential because it helps form and maintain the organization's risk culture.
It also educates personnel at all levels of the organization, including employees, manag-
ers, and senior leadership, on the organization's risk strategy, its appetite and tolerance
levels for risk, its risk management plan, and other relevant topics necessary to manage
risk in the organization. Beyond the education on organizational governance and risk
management processes, awareness training can give all members of the organization the
knowledge they need to better identify, assess and evaluate, and respond to risk. Risk
awareness training may be required for compliance with governance in some cases, but
even if it's not, it should be considered critical to the overall risk management strategy in
the organization and given its due consideration in the organizational priority list. The
next two sections will discuss the different tools and techniques used in risk awareness
training and how to develop a risk awareness program within an organization.
TIP While training programs are sometimes the first things that are cut
from the budget or the last things to be developed in a program, don't
underestimate the importance of risk awareness training within the overall
risk management strategy. Not only can training make the risk management
process within the organization more effective, but it can also help reduce or
mitigate risks by itself since it also has the effect of educating people on risk
and this alone may even help minimize it.
Chapter Review
In this first chapter, we discussed fundamental concepts of both security and risk man-
agement. The three goals of security, known as the CIA triad, are confidentiality, integ-
rity, and availability. Supporting these three goals are other elements of security, such as
access control, data sensitivity and classification, identification, authentication, authori-
zation, accountability, and, finally, nonrepudiation.
Chapter 1: Risk Concepts
31
Risk management is the overall process of developing a strategy for addressing risk
throughout its life cycle and includes several components, including risk identification,
evaluation, and assessment. We discussed the different concepts associated with risk
management, including the threat agents, threats, and vulnerabilities that are associated
with assets. We also looked at the variables that affect how these elements create risk:
likelihood and impact. The relationships between these elements are what define risk. We
also looked at the organizational culture and examined the definitions for risk appetite
and risk tolerance.
We then defined standards, frameworks, and practices, and we detailed some of the
ones relevant to risk management. We looked at the NIST Risk Management Frame-
work, CO BIT 5, and the Risk IT Framework.
We then looked at the business perspectives ofIT risk management and discussed how
risk from the IT perspective is only a subset of the overall enterprise risk. We examined
how business views risk from a mission perspective and covered the criteria business
information must meet in order to support that mission. Organizational structures also
affect the overall business risk since how the business is organized affects how it incurs
and manages risk. We also looked at various elements of information systems architec-
ture and some of the inherent risks involved with those elements. Platforms, networks,
applications, databases, and operating systems are all elements of the infrastructure that
contribute not only to the IT risk but also to the overall enterprise risk.
We then examined concepts of risk ownership and risk awareness. Risk ownership,
while ultimately held by the senior levels of the organization, is also shared by people who
have responsibilities and accountability to manage risk within their areas of control. Risk
awareness is an educational program that should be implemented to provide the right level
of risk-related training to both employees and managers. Risk awareness training can actu-
ally help reduce risk throughout the organization. A risk awareness also means keeping the
members of an organization informed on the current risk environment.
Finally, we concluded this chapter with a discussion of legal, regulatory, and contrac-
tual requirements levied on organizations that make risk management programs and
activities mandatory. We discussed a few examples of common laws, such as HIPAA,
GLBA, and FISMA, as well as the PCI-DSS; they require organizations to implement
and maintain formalized risk management activities.
Review Questions
1. Which of the following security goals is concerned with ensuring that data has
not been modified or altered during transmission?
A. Confidentiality
B. Availability
C. Integrity
D. Nonrepudiation
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
32
2. Which the following is most concerned with ensuring that users cannot deny that
they took an action?
A. Accountability
B. Nonrepudiation
C. Auditing
D. Authorization
3. Which of the following terms describes a weakness in a system?
A. Threat
B. Vulnerability
C. Risk
D. Threat agent
4. Which of the following are both necessary for risk to exist and are often paired
together? (Choose two.)
A. Impact
B. Threat
C. Vulnerability
D. Likelihood
5. The likelihood of a threat exploiting a vulnerability, causing an impact on an
asset, describes which of the following terms?
A. Attack
B. Threat agent
C. Exploit
D. Risk
6. Which of the following terms describes the acceptable variation in risk that an
organization is willing to deal with for a particular effort?
A. Risk acceptance
B. Risk appetite
C. Risk culture
D. Risk tolerance
7. Which of the following describes a set of mandatory procedures or processes used
by an organization?
A. Standard
B. Framework
C. Practice
D. Policy
Chapter 1: Risk Concepts
33
8. Which of the following frameworks might be used in business governance and IT
enterprise management?
A. NIST RMF
B. COBIT
C. The Risk IT Framework
D. ISO 27001
9. You are implementing an organizational-wide risk management strategy, and
you are using the NIST Risk Management Framework (RMF). You have just
completed step 1 of the RMF, categorize information systems. Which of the
following steps should you complete next in the RMF sequence?
A. Authorize system
B. Assess security controls
C. Continuous monitoring
D. Select security controls
10. All of the following are major processes of the Risk Response domain of ISACA's
Risk IT Framework, except which one?
A. Articulate risk
B. Manage risk
C. Maintain risk profile
D. React to events
11. Who defines the organization's mission, goals, and objectives?
A. Senior management
B. Government regulators
C. Risk managers
D. External corporate auditors
12. Which of the following statements most accurately reflects the effect of
information technology (IT) on risk to the business enterprise? (Choose two.)
A. Information technology is a serious risk to the mission of the organization.
B. Information technology is used to protect the organization's information.
C. Information technology is used to eliminate risk to the mission of the
organization.
D. Information technology is used to generate the organization's information.
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
34
13. Which of the following terms describes risk that occurs at the lowest levels of the
organization, usually corresponding to short-term risk?
A. Operational risk
B. Strategic risk
C. Tactical risk
D. Enterprise risk
14. All of the following are risks to the enterprise incurred by the organization's
information systems architecture, except which one?
A. Economical
B. Interoperability
C. Security
D. Supportability
15. Who is ultimately responsible for risk ownership within an organization?
A. Risk assessor
B. Mid-level manager
C. Designated risk owner
D. Senior executives and board of directors
16. What responsibilities do risk owners have toward managing risk?
A. Managing risk for a given area of responsibility throughout its life cycle
B. Eliminating risk from their area of responsibility
C. Informing senior executives and the board of directors about risk levels within
their area of responsibility
D. Delegating risk management responsibilities to a lower-level manager
17. What are the two goals of a risk awareness program within an organization?
(Choose two.)
A. Eliminating risk
B. Informing organizational personnel about the risk environment
C. Training organizational personnel on risk concepts and responsibilities
D. Training risk managers on risk reduction and mitigation techniques
18. In addition to the legal and regulatory requirements for risk management, what
are two other sources of requirements for risk management programs within an
organization?
A. Contractual requirements
B. Risk assessor requirements
C. Industry association requirements
D. Activist group requirements
Chapter 1: Risk Concepts
35
19. Which of the following regulations requires a formalized risk management
program in order to protect electronic patient health information?
A.GLBA
B. PCI-DSS
C. HIPAA
D. FISMA
20. Which of the following is an industry standard, established by an association of
vendors, that requires stringent information security safeguards as part of a risk
management program?
A. PCI-DSS
B. HIPAA
C.GLBA
D. FISMA
Answers
1. C. Integrity is concerned with ensuring that data has not been modified or altered
during transmission or storage.
2. B. Nonrepudiation is concerned with ensuring that users cannot deny that they
took a particular action.
3. B. A vulnerability is a weakness in a system.
4. B, C. Threats and vulnerabilities are both necessary for risk to exist and are often
paired together in assessments since you cannot have risk if you have one without
the other.
5. D. The likelihood of a threat exploiting a vulnerability, causing an impact to an
asset, describes risk.
6. D. Risk tolerance is the acceptable variation in risk that an organization is willing
to deal with for a particular effort.
7. A. A standard is a set of mandatory procedures or processes used by an organization.
8. B. COBIT is used in business governance and IT enterprise management.
9. D. Step 2 of the RMF is to select security controls and is accomplished after
information systems have been categorized.
10. C. Maintain risk profile is not a process of the Risk Response domain ofISACA's
Risk IT Framework; it falls under the Risk Evaluation domain.
11. A. Senior management in the organization defines the organization's mission,
goals, and objectives.
12. B, D. Information technology is used to generate the business's information, as
well as protect it.
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
36
13. C. Tactical risk occurs at the lowest levels of the organization, usually
corresponding to short-term risk.
14. A. While there is a financial risk involved in capital expenditures for IT,
economical risk is not one specifically introduced into the enterprise as a direct
consequence of the IT architecture.
15. D. Senior-level executives, as well as the board of directors, are ultimately
responsible for risk ownership within an organization, even when a lower-level
person has been designated as a risk owner.
16. A. Risk owners have responsibility for managing risk in their areas of
responsibility throughout its life cycle.
17. B, C. A risk awareness training program is designed to both train organizational
personnel on risk concepts and their various roles and responsibilities related to
risk management and train all personnel on the risk environment in which the
organization resides.
18. A, C. Both contractual requirements, as well as industry associations, may
mandate that an organization have a formalized risk management program.
19. C. HIPAA regulations require a formalized risk management program in order to
protect electronic patient health information.
20. A. PCI-DSS is an industry standard, established by an association of vendors, that
requires stringent information security safeguards as part of a risk management
program.
•·~ - - - - - - - - - - - - - - - - - - - - - - - - - - - - • - -•M=~t.JM:.jMj•jllllij-
~ 1
This chapter covers the second part of the first Certified in Risk and Information Sys-
tems Control (CRISC) domain and focuses on threats and vulnerabilities associated with
different aspects of the enterprise. Aspects of business we'll discuss include managing
technology changes, working with external parties, planning for disasters and other nega-
tive events, and managing the information infrastructure that the business depends on
daily. These aspects create risk and are a necessary part of a business.
The CRISC exam objectives covered during this chapter include the following task
statements:
NOTE Throughout the book, the knowledge and task statements are
listed in the order they are described in the CRISC Job Practice areas, not
necessarily the order they are presented in the chapter.
37
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
38
EXAM TIP Keep in mind the definitions of and relationships between threat
agents, threats, and vulnerabilities. Threat agents initiate or cause threats,
which exploit vulnerabilities in a system.
EXAM TIP Threats and vulnerabilities are always expressed together as a pair.
For a given set of circumstances, if you have no threat that could exercise
a particular vulnerability or no vulnerability that could be exploited by a
particular threat, then you have no definable risk for those particular sets of
circumstances.
Threat Assessments
A term that you may occasionally hear is threat modeling. Threat modeling involves look-
ing at every possible threat agent, action or event, attack vector, and vulnerability for
a given system, asset, or process, and then modeling or simulating how it could prog-
ress and the damage that could occur. It has its origins in the U.S. and U.K. defense
industries. A threat assessment examines how these threats could affect the particular
asset, organization, or system you are looking at, in context. With that, a threat assess-
ment could be done on one of several levels, either simultaneously or separately. For
example, you could perform a threat assessment on a new system that is being developed
or installed. You would examine the different threat agents and threats that could affect
that particular system. You could also look at an organizational process, or even the entire
organization itself, and perform a comprehensive threat assessment. In addition to scal-
ing a threat assessment, as we just described, you could look at threats from a particular
perspective, performing a threat assessment specifically for technical threats, physical
ones, or even external operating environment threats. This relates to scope of the assess-
ment. For example, you could look at the technical aspects of a given system or examine
threats inherent to the processes and procedures associated with a particular business
unit. Figure 2-1 shows this scoping and scaling process.
As this figure illustrates, you could scale an assessment to include only certain systems
within certain functional areas. You could scope it by examining not only all of the threats
that apply to the technical aspects of systems in those particular functional areas but also
threats that affect associated business or management processes. You could have any com-
bination of scope and scale that the organization needs to fulfill its assessment goals.
Table 2-1 illustrates how threat agents and threats could be categorized, given factors
such as intent, relationships, skills, and so on. Note that these could affect any number
or combination of elements (processes, systems, and so on) within an organization. You
could categorize threats and threat agents using these characteristics, as well as develop
others that frame and define them for your organization.
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
40
l
Figure2-1
Scoping and
scaling a threat
assessment
[ Organization
Technical, Physical,
Operational,
Mission or Business Processes
Managerial
Perspectives
r-:=-l
~ _o_rg-a-ni_za_t-io-n-al__,
_ Element r-::-1
~
Scope
Note that this information is only a sampling of what you may come up with in a
threat assessment. You may also break down some of these elements into far more specific
ones, based upon your needs and the organization and systems you are focused on. For
example, a defense contractor or military organization would likely have a more specific
set of threats and agents in its assessment than would a nonprofit, charitable organization.
Vulnerablllty Category
Lack of access control policy Administrative
Inadequate encryption mechanisms Technical
Faulty media storage or transport procedures Operational
Use of single-factor authentication Technical
Lack of closed-circuit television {CCTV) cameras near sensitive areas Physical
Table 2-2 Vulnerabilities Developed During a Vulnerability Assessment
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
42
Threat Threat Agent Vulnerablllty Impact Likelihood Result
Exploit code Malicious Software flaw High Medium Buffer overflow,
outsider unauthorized
access
Data pilfering Malicious Inadequate High Medium Unauthorized
insider permissions on access to data
sensitive files
Fire Careless Lack of fire High Low Loss of systems
employee suppression
systems
Natural Tornado No off-site Medium Low Destruction
disaster storage of of systems
backups and media
containing data
Table2-3 Combining All Four Risk Elements
are factored in with impact and likelihood to generate a risk assessment. Table 2-3 shows
how a simplistic example might look after factoring in all of these different elements.
Threats
Because business processes and initiatives are so widely different between organizations,
it's probably difficult to nail down specific threats that could affect these elements, other
than simple generalization. Threats that affect business processes and initiatives include
things that are caused by both external and internal risk factors, such as IT platforms,
new and emerging technologies, software and system supportability, and so on. These
particular factors, focused on the information infrastructure, can affect business process-
es simply because technology is a direct enabler of business. So, business processes could
be greatly enhanced by using new technologies, or even be hindered by them because of
the lack of training or supporting infrastructure the organization may have when imple-
menting new technologies. Since it is a possibility, this is a potential threat if not handled
correctly by the organization. Most organizations find that there is a fine line between
threat and opportunity in the business world.
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
44
Vulnerabilities
There are, of course, vulnerabilities inherent to a business's processes and initiatives that
threats can take advantage of. Again, it's difficult to state vulnerabilities beyond basic
generalization simply because they are so specific to a particular business, with its mis-
sion and processes, that is operating in a particular business environment. However, there
are several general vulnerabilities that can apply here. Some of the vulnerabilities that
may influence the business processes include dependency on older technologies, lack of
trained personnel, inflexible business processes or methods, an unwillingness to change
or adapt to new technologies and processes, lack of interoperability, lack of security, and
so on. All of these vulnerabilities could negatively affect the business if corresponding
threats were to exploit them.
For instance, if a business has a dependency on older technologies, it may not be
easily able to interact with new markets or business partners that use newer technolo-
gies, systems, data formats, and information-processing methods. It also may not be
prepared to interact with other businesses that use social media or the Web for product
marketing and delivery. So, this would be a serious vulnerability inherent to its business
processes. Another example may come from an organization's culture. Suppose the key
staff members have been in their positions for years and have adopted a "that's the way
it's always been done" attitude toward processes and technologies and are reluctant to
change based upon new market situations, accelerated development and product delivery
requirements, and new enabling technologies. These attitudes are cultural in nature but
are vulnerabilities because they may directly affect an organization's ability to change to
be more flexible or even secure processes or technologies.
Threats
The threats to a project or program are similar; the major difference is the duration of
the time that the threat represents potential harm to a project or program. Keep in mind
that threats for a project or program aren't those you might traditionally think of as
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
46
threat sources; they are rarely malicious in nature and come from the business environ-
ment itself. For example, threats to cost are usually those that involve money or resource
issues, such as price increases, currency value fluctuation, stock market variations, and
so on. These are usually external threats; internal threats to costs might include a sudden
budget restructuring, cutting funds for a project, bankruptcy, and so on. Threats to the
schedule might include worker shortage, strikes, inadequate training, delays in contract
negotiations, delays from suppliers, and so on. Scope threats usually involve additional
work because of faulty requirements gathering and decisions about what actually falls
into the project's scope and scale.
Vulnerabilities
Since vulnerabilities are weaknesses, or a lack of protective controls, the vulnerabilities
found in project and program management are inherent to weaknesses in their critical
elements and processes. For example, a weakness often found in the cost element of a
project or program is a failure of the organization to adequately budget for all of the
resources required for the project. The organization may not list every piece of equip-
ment or every major supply it needs or take into account labor costs such as overtime
in the event of a schedule slippage. It may not adequately negotiate firm prices with a
supplier, who then may raise prices on critical parts or equipment. These are all vulner-
abilities inherent to the budgeting and cost element of a project.
Scheduling also has some common vulnerabilities associated with it. If an organiza-
tion fails to build in potential scheduling delays such as work stoppages, dependencies
on other organizations to fulfill parts of the schedule, or even holidays, this can lead to
problems with completing the project on time. Another scheduling vulnerability is to
incorrectly estimate the amount of time it takes to perform a task or get a piece of work
accomplished.
Vulnerabilities inherent to the scope element of a project affect how much work has to
be done, in what order, and by whom. A work breakdown structure (WBS) is a document
that the project manager develops that covers exactly all of this information, and more.
The WBS describes, in excruciating detail, the work, its subcomponent parts and tasks,
what skill sets are needed, and what resources are required to do the job. Other documents
may break down individual tasks into much more detail, even describing step-by-step how
a task is accomplished. If the project manager and team do not create these documents,
this is a weakness in that the work may not be performed exactly as needed. Resources
may not be adequately allocated for the work, or the work may be performed by unskilled
people. Additionally, the amount and quality of work may not be performed to require-
ments. Failure to set requirements initially in the project and to periodically check and
track the work against those requirements are also vulnerabilities associated with scope
because this can affect whether the work meets the established requirements.
Chapter 2: Threats and Vulnerabilities in the Enterprise
47
Risk Factor Threat Threat Agent Vulnerablllty Affects
An additional vulnerability that simultaneously affects all three project elements is the
failure to monitor or control all of these elements on an ongoing basis throughout the life
of the project or program. Scope, schedule, and cost must be monitored on a continuing
basis to ensure that they meet the original requirements set forth in the project's charter.
The project or program manager must monitor and control these things to prevent cost
overruns, schedule slippage, and scope creep. Failure to monitor or control these ele-
ments is a serious vulnerability and could jeopardize the success of the entire project or
program. Table 2-4 gives examples of some of the risk factors, threats, and vulnerabilities
related to project and program management.
Third-Party Management
In today's business world, an organization rarely functions independently from any other
entities. Most businesses are not entirely independent and self-sustaining; they depend
on other entities, such as suppliers, service providers, and so on, to help them bring their
products and services to market. These third parties often perform services that are out-
sourced from the organization because of a lack of infrastructure or simply a desire to not
perform these functions or services internally. A great example of a third-party service
provider is one that provides cloud services to businesses, such as data storage, applica-
tions, and even entire infrastructures to organizations that don't have the means or the
desire to create the internal structures needed to manage them internally. Sometimes it is
more cost effective for an organization to simply hire a third party to perform a function
or provide a service than it is to expend the resources to create and maintain all of the
equipment and processes itself.
Sometimes a portion of the risk an organization incurs during a particular business
or IT effort can also be offset by a third party. Transferring risk includes the use of third
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
48
parties to bear some of the risk in performing certain business functions. Insurance is the
classic example of transferring risk used in most risk management training texts, but this
instance usually only provides monetary funds in case of a disaster or liability scenario.
Transferring risk to third parties also includes outsourcing certain functions and services
to third parties, so this, too, is a standard risk treatment method. The organization, for
example, can reduce its risk of accounting and budget errors with a small, untrained staff
by outsourcing its accounting functions to a third-party accounting firm. It's important to
note that while this strategy of dealing with risk is effective and common, the organization
is transferring only risk, not responsibility. The organization almost always retains final
accountability and responsibility for functions and services outsourced to a third party.
For example, transferring a business's accounting functions to an outside firm mitigates
risk by transferring some of it to the third party; but the organization is still ultimately
responsible to its stockholders, government regulators, banks, and financial obligations,
even if the accounting firm makes an error. As another example, an organization that
makes use of cloud data storage services still maintains accountability and responsibility
for any data stored with a provider if the provider suffers a breach that results in the release
of sensitive information. While third-party providers may still incur some level ofliability
in these cases, the final liability rests with the organization that contracted with them.
Liability, accountability, and responsibility are also some of the key risk factors with third
parties that we'll discuss next.
Risk Factors
As indicated earlier, several risk factors relate to the legal aspects of dealing with third-
party providers. Most of these risk factors deal with trust in the third-party provider or
in dependencies the organization may have on the provider services. For example, the
organization must be able to trust that the third-party provider will provide adequate
security for any data that is maintained in its infrastructure. In addition to trust as a risk
factor, risk factors include interoperability with existing systems in the organization, data
protection and security, and legal liability. Remember we said earlier that an organiza-
tion can outsource risk to third-party providers, but the organization typically retains
accountability, responsibility, and legal liability. Some legal liability, however, is levied on
the third-party provider since it has a duty to provide services, as well as assurances that
those services will meet certain legal standards, as written in the contract between the
provider and the organization.
The risk factors relating to third-party providers depend upon the types of services
provided, as well as how the contract agreements are set up between the organization and
the provider. A document known as a service level agreement (SLA) is the key to reducing
risk factors when dealing with a third-party provider. The service level agreement stipu-
lates what the third party must provide in terms of level of service, performance, and so
on. It could also specify what security measures a third-party provider must take in order
to protect any organizational data in its custody.
Threats
Like the risk factors mentioned earlier, threats associated with dealing with third-party
providers primarily relate to trust and the contractual and legal aspects of those arrange-
ments. Threats include failure to provide services as specified in contracts, failure to meet
Chapter 2: Threats and Vulnerabilities in the Enterprise
49
performance or security levels, failure to protect data, and loss of availability for systems
or data to an organization's users. Third-party providers can certainly succumb to some
of the same threats that the organization would, such as natural disasters and so forth.
So, some of the threats could also include loss of service or data for the business in some
of these negative events. Third-party providers are also susceptible to hacking and mali-
cious insiders, the same as any organization would be. Therefore, threats of data loss or
disclosure are also present with third-party providers.
Vulnerabilities
Vulnerabilities that result from associations or dealings with third-party providers include
failure to adequately cover contingencies in contractual agreements, such as system or
data availability or loss, security protections, and service levels. Furthermore, any vulner-
abilities that the third-party provider has inherent to its own organization are, unfor-
tunately, indirectly incurred by any organization that deals with the third party since
those vulnerabilities could affect data in its custody or services it must provide to others.
Examples of internal vulnerabilities that could affect organizations for whom the third
party provides services include infrastructure vulnerabilities (such as loss of equipment or
hacking), organizational vulnerabilities (such as loss of revenue or bankruptcy), or even
technological vulnerabilities (such as lack of sufficient encryption strengths or strong
authentication methods). All these vulnerabilities could indirectly affect any organization
that has a contractual agreement with a third-party provider.
EXAM TIP While you will likely not be expected to know the details of
any specific SDLC model, be familiar with the generic phases of the SDLC:
Initiation, Requirements, Design, Development, Testing, Implementation,
and Disposal. Also keep in mind that different models may refer to these
phases by different names or even combine or separate phases to some
degree.
Development/ Disposal/
Initiation Requirements Design Implementation
Acqui sitio n Retirement
Threats
Threats to the SDLC manifest themselves when systems are produced that are not interop-
erable or compatible with other systems and their environment or systems that are not
secure. Other threats might include systems that do not meet the requirements they were
originally intended to meet. These threats would definitely affect both the functionality
and the performance of the system. Threats to the design process include faulty design
specifications, as well as faulty requirements input from the previous requirements phase.
Most of the threats to the SDLC come in the form of mismanagement, miscommunica-
tion, incorrect expectations, and lack of a commitment of resources or expertise.
Vulnerabilities
Many different vulnerabilities can affect the SDLC; again, a great many of them were
previously discussed as also affecting the project or program management process. These
vulnerabilities affect scope, schedule, and cost, of course, but can also affect the quality
of the system or product. In addition, the system's security, functionality, and perfor-
mance are also affected by these different vulnerabilities. While there are probably too
many to list here, examples of vulnerabilities that affect the SDLC start with a lack of
firm requirements and mixed expectations from the different system stakeholders. A lack
of documentation in all phases is also a significant vulnerability to the entire SDLC but
Chapter 2: Threats and Vulnerabilities In the Enterprise
53
particularly to the requirements and design phases. Failure to develop solid design speci-
fications and systems architecture is a vulnerability that can result in a faulty design that
does not meet system requirements. In the development phase, lack of adequate consid-
eration for system interfaces, as well as how subcomponents fail to support higher-level
components or meet technical requirements, can result in a shoddy system or software.
Failure to properly and thoroughly test systems, as well as their interaction with their
environment, may mean that serious functional or performance issues with the system
are not discovered until well after it is put into production. Vulnerabilities in the imple-
mentation phase include faulty implementation, lack of traceability to original require-
ments, and failure to properly maintain a sustained a system after it has been put into
production. And lastly, vulnerabilities associated with the disposal or retirement phase of
the SDLC can result in systems that are not properly replaced or not securely disposed
of. This can cost the organization money and potential liability.
Emerging Technologies
New or emerging technologies can present risks to organizations simply because there are
several different important considerations when integrating the latest technologies into
the existing infrastructure. Many organizations have an unfortunate tendency to rush
out, buy, and attempt to implement the latest and greatest technologies on the market,
without careful planning or consideration of the existing infrastructure and how it will
react to the new technologies. One of the primary considerations organizations must
look at is making a business case for the new technology, which may be to fill a gap that
the older technology does not provide or to provide a capability that the organization
must now have to compete in the market space. In other words, the company really must
justify new technologies to make them worth the risk they could incur.
Risk Factors
Emerging technologies have several risk factors inherent to their integration into the
existing infrastructure. If the organization has been able to justify the implementation
based on a true business need for the emerging technology, it must consider several risk
factors. One of the major risk factors is interoperability with existing infrastructure. Fre-
quently, newer technologies don't always work properly with older systems right out of
the box; there may be adjustments that need to be made to the existing infrastructure
to integrate the new technology, or bridging technologies may be needed to connect
the two. Interoperability doesn't just involve the right connections; it can involve data
formats and flows, security methods, and interfaces into other systems. These consider-
ations, and many others, are risk factors that must be taken into account before acquiring
and integrating new technologies.
Another risk factor is security. New technologies may have security mechanisms that
are not necessarily backward compatible with existing ones. Examples include encryption
algorithms and strengths, identification and authentication technologies, integrity mech-
anisms, and even redundant or backup systems. Additionally, the systems may involve a
learning curve that may intimidate users who must now learn new security methods for
the system. The human factor can be a weak link in the security chain, so either a lack
of training or a lack of adaptability to the new security mechanisms can introduce risk.
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
54
Earlier, when we discussed the SDLC model, we pointed out that system updates
and changes can be risky if not managed properly. Integrating new technologies into the
environment with older ones can introduce both intentional and unintended changes
into the environment, affecting the stability of the organization's SDLC with a particu-
lar system, so change is also a risk factor. Even in the disposal or replacement phase of
the SDLC, introducing new technologies to replace older ones can be problematic if
not planned and executed properly. New technologies that are not adequately tested for
functionality, performance, integration, interoperability, and security may not be able to
adequately replace older systems, resulting in extended costs and possibly even requiring
the extension of the older systems' life cycle.
Threats
Threats resulting from the introduction of new and emerging technologies into the exist-
ing infrastructure are numerous. If the organization has failed to adequately plan for
the new technology, then these threats can become significant. Some of these threats
include untested or unproven technologies, noninteroperability, incompatible security
mechanisms, and suitability of the technology for use in the organization. The organi-
zation could also incur additional cost and require more resources because of a faulty
implementation. These threats can be minimized by careful planning and integrating
new technologies using a stable SDLC model.
Vulnerabilities
As with threats, vulnerabilities that go along with working with emerging technologies
are numerous as well. Vulnerabilities could include a lack of trained staff committed to
managing and implementing the new technology. Lack of adequate project planning
is also a serious vulnerability that could affect the organization's ability to effectively
integrate new technologies. Another vulnerability could be a weak support contract or
other type of warranty, guarantee, or support for a new technology or system. Most of
these vulnerabilities appear when the new technologies are first implemented and tend
to become mitigated or lessened as the technology is integrated into the existing infra-
structure but still exists.
EXAM TIP The key areas of concern with emerging technologies are
interoperability and compatibility. These two concerns affect the security,
functionality, and performance of the new technologies when they are
installed into an existing infrastructure.
Management of IT Operations
Managing the IT infrastructure is one of the most work-intensive efforts in an organiza-
tion, especially in a larger business. The IT infrastructure in an organization covers a
broad scope of areas. Infrastructure, of course, covers employee workstations, printers, and
other end-user devices. It also covers the major pieces needed to conduct business, such
as servers, cabling, switches, routers, and a variety of other network and security devices.
Chapter 2: Threats and Vulnerabilities In the Enterprise
55
Most organizations also include wireless networks in their supporting equipment. Addi-
tionally, infiltration of mobile devices into businesses makes this a new and sometimes
difficult area to bring under the organization's infrastructure umbrella. Challenges with
the IT infrastructure include not only maintenance, upgrades, updates, and implement-
ing new technologies but also include some of the more typical traditional management
challenges, such as budgeting, project management, and staffing.
Key areas in IT operations management include server and infrastructure manage-
ment, end-user support, help-desk and problem escalation management, and, of course,
cybersecurity. IT managers must maintain and meet any internal agreements that cover
guaranteed service delivery in support of the different divisions within the organization,
as well as service level agreements with other organizations. While information security
personnel tend to focus more on IT risk, we find that most of the risk factors, threats,
and vulnerabilities affecting IT also affect all the operations within the business. In the
next few paragraphs, however, we'll focus on those that directly affect managing the IT
operation in an organization.
Risk Factors
The management of IT operations incurs risk factors previously discussed in other sec-
tions of this chapter. These include the size and complexity of the organization and its
IT infrastructure, the criticality and priority of the different systems that make up the
infrastructure, and the internal management processes of the organization. Resourcing
issues also affect the management piece ofIT operations, such as staffing the right people
who are trained on the various technologies the organization needs and creating and
maintaining a budget that supports maintaining the current level of support, as well as
future growth for IT. Additionally, compliance with legal and governance requirements
in the face of increased regulation is a risk factor the IT managers must deal with.
Organizational structure also affects IT operations because the IT infrastructure may
be managed on either a centralized or decentralized basis, sometimes by one centralized
IT shop or, in the case of larger organizations, by multiple areas within other divisions
that are delegated the task of managing their own piece of the infrastructure. IT might
also be managed on a functional basis; the accounting and human resources divisions
may have responsibility for managing the systems that support their mission. Addition-
ally, the IT infrastructure may be managed on a geographical basis, in the case of physi-
cally separated locations in large organizations. All of these structural considerations are
factors that contribute to risk in managing IT operations.
Also directly affecting IT operations risk are two key processes: the change and config-
uration management processes. We've already discussed risk factors that affect the SDLC
model in an organization, as well as how new and emerging technologies can affect the
existing infrastructure. These same risk factors also directly affect the daily management
of IT operations simply because they introduce change into the network. Some of this
change can be planned and carefully introduced, but often there is change, from the
large-scale network side all the way down to individual configuration items on hosts,
that may cause unforeseen changes and affect the network in different ways. How the
organization deals with change and configuration management is a risk factor that affects
not only the SDLC but also the day-to-day operations management.
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
56
Threats
Threats that affect the IT operations are similar to those that affect other areas of the
business and can be external or internal threats from a variety of sources. Some of these
threats have a ripple effect in that they may first affect other areas of business and in
turn affect IT. For example, the threat of a poor economy may affect the profitability
and sustainment of the business, resulting in making cuts, which often include IT
personnel or equipment. Obviously, there are also direct threats to the daily manage-
ment of the IT infrastructure. These include external threats such as hackers, of course,
but also more common ones such as increases in cost to maintain operations, issues
with external service providers, and disaster-related events (weather, fire, and so on).
Internal threats can include those carried out by malicious insiders or even careless
employees, such as theft, sabotage, accidental equipment breakage, and so on. Internal
threats can also come from management processes and include budget cuts, loss of
trained personnel, shifts in organizational priorities, and transitioning from one mar-
ket segment to another.
Vulnerabilities
Technical vulnerabilities are beyond the scope and purpose of this book; our focus here is
on those associated with the IT management aspect of the organization. Vulnerabilities
affecting IT management include faulty processes and procedures, lack of resources, and
lack of trained technical personnel. An end-user population that has not been trained or
held accountable for proper care and treatment of the infrastructure can also be a vulner-
ability. Other vulnerabilities might include a lack of infrastructure monitoring, lack of
control of sensitive information in IT systems, and failure to maintain a stable SDLC
throughout the entire infrastructure.
Data Management
Data management is a holistic way of controlling all the various information and data
that the organization uses and processes and includes considering its various formats,
how it is used, how it must be stored and transformed, and, of course, the confidentiality,
integrity, and availability of the data. While we won't be discussing the technical aspects
of a database management system (DBMS), we will discuss some of the various aspects
of managing data processed in those systems, as well as what risk factors they face, threats
to data, and vulnerabilities that plague data and database management systems.
Information technology and security personnel are responsible for the systems that
process data, as well as keeping data secure from a technical perspective. However,
typically there are personnel in the organization who are formally assigned as the
responsible party for the overall management of a particular class or set of data. That
position is called a data owner. The data owner has overall responsibility for determin-
ing who should access data, determining how it should be used, and making decisions
regarding its security and processing. In coordination with both technical and risk
management personnel, the data owner should be cognizant of risk potential with
data in database systems.
Chapter 2: Threats and Vulnerabilities In the Enterprise
57
Risk Factors
Some of the risk factors we're discussing in this section are part of a recurring theme; the
nature of the organization itself, including its market segment, how large it is, and how
complex it is affect not only the system aspects of IT in the organization but data and
database systems as well. Data in particular is subject to unique risk factors. Depending
upon the sensitivity or confidentiality of data, it may be subject to regulatory consider-
ations that affect risk. Laws and regulations may require that data be protected in specific
ways and at certain levels. Another risk factor might be the type of systems that data has
to be processed and transformed over. Some of these many systems may be incompatible
and require that data be in prescribed formats. If the data is not natively in one of these
formats, it may have to be transformed or changed into a different type of format. For
example, data in a flat-file database may have to be transformed in order to be fed into
a relational SQL-based database so that it can be used by another system. Data formats,
such as text or binary, also are factors in transformation. When transformed, there's a risk
that data may be lost or changed in unexpected ways. During the data transformation
process, the organization has to take care that sensitive data is not unintentionally modi-
fied or available for unauthorized personnel.
There are also risk factors that affect the availability of data. Backup types and sched-
ules, as well as processes on how to correctly back up organizational data, are risk factors
that affect availability. Additionally, backup systems that may be antiquated or may not
have the capacity for the organization's data can be factors. If an organization uses its own
infrastructure to store and process data, then trained personnel and adequate equipment
can affect backups. If an organization outsources to a cloud provider, for example, avail-
ability is still an issue if the organization has not adequately planned for contingencies by
negotiating them into the cloud provider agreement.
On the lower technical levels, database design can be a risk factor if it does not ade-
quately account for all the different data elements, their formats, and security mecha-
nisms built in to limit unauthorized access. Scalability can be an issue with database
design, in that the organization may be using systems that aren't scalable as more and
more data is fed into them or that aren't accessible by large numbers of users in the enter-
prise simultaneously. These are risk factors that relate not only to design but also to the
database management system selected for use in the organization.
Threats
Most of the threats that are common to data and database systems directly affect confi-
dentiality, integrity, and availability. Confidentiality threats come in the form of unau-
thorized access to data that ranges from unintentional access by unauthorized employees
to malicious insiders who purposefully attempt to access data to outside hackers who are
actively trying to infiltrate the organization's network and steal or modify data. Integrity
threats are a large concern with data simply because unauthorized modification can result
in many different types of processes in the organization being conducted with errors.
These can include financial transactions, healthcare transactions, or even erroneous
transactions with personal data. Finally, threats that affect availability include accidental
or intentional deletion of data, database system downtime, or any other instance where
users can't access the data they need in order to do their job.
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
58
Vulnerabilities
Likewise, vulnerabilities that data and database management systems incur also directly
affect the three goals of security: confidentiality, integrity, and availability. From a con-
fidentiality perspective, vulnerabilities might include the lack of adequate permissions
on database objects, such as tables or queries; lack of encryption for sensitive data; and
failure on the part of the data owner to adequately classify data based on sensitivity level.
Integrity vulnerabilities might include lack of permissions for personnel authorized to
change data, inability of the database system to control changes to the data, lack of a
transaction checking or rollback process in DBMSs, and, of course, old, unreliable stor-
age media that might affect data stored on it. Vulnerabilities that might affect availability
could include inadequate or faulty backup processes, lack of trained personnel, outdated
equipment, equipment that doesn't have the capacity to handle the organization's data
backup requirements, lack of redundant systems or capabilities, and so on.
Risk Factors
Resilience is a term that refers to the ability of the business to survive negative events and
continue with its mission and function. In other words, it could be said that resilience
is the ability of an organization to resist the effects of negative events and its ability to
bounce back after one of these events. Resilience can affect to what degree different risk
factors, as well as threats and vulnerabilities, impact the normal business operations of the
organization. A more resilient organization can better tolerate risk factors and the effects
they have on the organization's ability to prepare for and respond to negative events.
There are various risk factors that can affect the organization's ability to respond to
disasters, as well as continue the business and mission functions after it has recovered
from the disaster. Some of these risk factors are inherent to the organization itself; these
include size of the organization, its facilities, its people, and how well it has performed
business continuity and disaster recovery planning. A higher level of management com-
mitment to business continuity planning reduces the effect of risk factors on the busi-
ness; less commitment may render the organization more susceptible to these risk factors.
A larger organization may have more complexity in terms of numbers of people to take
care of during a disaster, as well as numbers of critical assets or processes that must be
planned for. Small organizations don't necessarily have an advantage, however; a small
organization may have fewer resources to adequately plan for and address business con-
tinuity and disaster recovery.
Another risk factor that an organization could face is physical location and geography.
For example, a business situated on the U.S. Gulf Coast is probably more susceptible
to adverse weather, such as hurricanes and tornadoes, than a business located inland.
Businesses that are located in areas that are prone to heavy flooding or have forest fires
or extreme snow storms at various times of the year should plan for these weather con-
ditions appropriately. Distance could also be a risk factor; if the organization is located
farther away from population centers or infrastructure services (such as fire departments,
police, hospitals, telecommunications providers, and so on), there is a greater risk that
the organization could not adequately respond to a disaster.
Earlier in the chapter we discussed risks associated with third-party providers, and
these providers can affect business continuity and disaster recovery as well. Yet another
risk factor could be the degree of outsourcing the organization is involved with. A busi-
ness that outsources some of its processes or key functions may have less control over
those functions or processes during an incident or disaster. They may be at the mercy of
the third party with whom they are contracted and subject to the third party's disaster
recovery strategies (or lack thereof). Business continuity and disaster recovery are two
areas that should be carefully considered when engaging in business with any external
provider, usually through a service level agreement or other method.
Chapter 2: Threats and Vulnerabilities In the Enterprise
61
In addition to the factors we discussed earlier, the nature of the organization's mission
or business could be a risk factor. Organizations that have critical processes or produce
critical goods and services that are time sensitive, for example, may incur more risk than
an organization that can afford to be down or out of service for a few days. Time sensitiv-
ity can increase the impact of a disaster on an organization so should be considered when
developing continuity and recovery strategies. Market factors, such as the perishability of
goods, for example, can become risk factors that an organization must deal with as well.
Threats
Most people associate the threats involved with business continuity and disaster recovery
with natural disasters. Obviously, there are the natural threats that exist, such as severe
weather, earthquakes, fires, and so on. These are threats that can't be typically prevented
or neutralized, but they can be planned for. Hardened facilities, adequate ventilation,
fire suppression systems, and other physical or environmental controls can mitigate the
damage from these threats. There are also human-made threats that can affect the abil-
ity of an organization to recover from an incident or continue to function. These can
be broken down into unintentional and intentional threats. Intentional threats include
those associated with hackers, terrorists, theft, and other malicious actors and activities.
Unintentional threats may be attributed to accidents that are caused by carelessness, lack
of training, and so on. All of these threats, both natural and human-made, are usually
the type that cause incidents or disasters. However, there are also threats to the continuity
management process.
Threats to the business's ability to manage its continuity and disaster recovery include
incomplete or inadequate planning, as well as limited resources to carry out any business
continuity planning (BCP)/disaster recovery planning (DRP) activities. Because of regula-
tory considerations in many cases, a business usually must have some degree of business
continuity planning accomplished; the real threat centers on whether it is enough and
adequately covers the different facets of recovery and continuity that the business must
consider. Usually, inadequate planning or insufficient resources committed to this area are
a result of shortsightedness on the part of the organization's leadership and management.
Vulnerabilities
A wide variety of vulnerabilities can affect the ability of an organization to respond to
and recover from an incident or disaster. The same vulnerabilities can also in turn affect
the organization's ability to continue to function at some level or degree after the disas-
ter. Some of these vulnerabilities involve the lack of resources, such as a lack of person-
nel, lack of equipment or facilities, or dedicated recovery resources. For instance, if the
organization has not acquired an alternate processing site, there may be no way it can
quickly recover its operations back to a functional state. Other vulnerabilities include
the lack of training for personnel tasked with disaster recovery or business continuity
responsibilities. Additionally, there are also process vulnerabilities. Process vulnerabilities
are those that result from a failure of the organization's management to adequately plan
for, staff, and equip continuity management efforts. For example, a lack of management
commitment is a vulnerability that will certainly lead to a lack of training, resources, and
personnel dedicated to continuity management. An inadequate or nonexistent business
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
62
impact assessment is a vulnerability because an organization won't be able to adequately
identify its critical processes or assets and determine how the loss of those critical items
impacts the organization. Another critical vulnerability could be faced if the organization
has failed to adequately test the response plan.
EXAM TIP Be familiar with the different business process areas and their
respective risk factors, threats, and vulnerabilities. Remember that risk
factors, while not a threat or a vulnerability, contribute to the overall risk
of the organization by increasing or decreasing the likelihood or impact
of threats exploiting vulnerabilities or the organization's resilience to
negative events.
Chapter Review
In this second part of our discussion on Domain 1 topics, we covered additional infor-
mation on threats, threat agents, vulnerabilities, and risk factors. We examined these
different elements from a business perspective, rather than from purely a technological
perspective. This is important because most of the risk a business incurs comes from
engaging in the normal business operations, both day-to-day and strategically. We looked
at risk from the different processes that go on in a business, such as the internal business
processes, dealings with third parties, the systems development life cycle process, and
business continuity and disaster management. We discussed the different risk factors,
threats, and vulnerabilities that are inherent to each of these processes and how they
introduce risk into the organization and affect its mission and goals.
Review Questions
Answers
This chapter covers different aspects of managing risk scenarios within an organization
as well as documenting and updating risks on a risk register. Now that we've discussed the
fundamentals of risk and its concepts, as well as identified threats and vulnerabilities as-
sociated with business processes, we'll cover the other aspects of managing risk that occur
before you even get the point of assessing or responding to risk.
The CRISC exam objectives we will discuss in this chapter include the remaining task
statements that apply to Domain 1, as well as the first task statement of Domain 2:
We will also cover the supporting knowledge statements that support these objectives.
69
CRISC Certified in Risk and Information Systems Control All-In-One Exam Guide
70
activities are presented in accordance with ISACA's objectives and knowledge statements
for the exam. These processes are generic but should be consistent with most popular
risk management frameworks and processes. The end goal of the identification part of
the process, the subject of this chapter, is to identify and document the risk scenarios
associated with the organization, based on different risk factors. These identified factors
and collected information are used to develop risk scenarios. While you may be able to
evaluate and analyze aspects of risk after this process, this is a separate part of the process
and is discussed in Chapter 4. You can also provide recommendations for risk response
as part of this process, but understand that risk response is the primary discussion of
Domain 3 and will be discussed in-depth starting in Chapter 5. For this chapter, we'll be
looking at risk identification, classification, and risk factors, as well as how they help us
develop risk scenarios.
Identifying Risk
To begin the process of developing risk scenarios, one of the first things you must do is
try to identify what risks the organization is subject to. To identify risk, you must first
identify all the components of risk that exist in the organization. This includes threats,
vulnerabilities, and the assets the organization places value on. To acquire knowledge of
all of these different elements, you may have to perform in-depth assessments to give you
this information. For example, you'll have to inventory all of your assets and determine
their value and priority to the organization. Value indicates how much they're worth
to the organization; this could be in terms of dollars to replace an asset or how much
revenue the organization will lose if that asset is lost. Priority could mean the relative
criticality of the asset to the organization; this could indicate how much protection the
organization believes an asset warrants and the urgency of protecting or restoring the
asset (or the capability it provides) if it is lost. Although the terms value, priority, critical-
ity, and urgency may seem to be ambiguous, they are all interrelated terms that the orga-
nization must define for each of its assets. For instance, assets that are deemed critical will
likely have a higher value to the organization, as well as a higher priority for restoration
if the asset is lost or damaged. There is a related term called exposure factor that describes
the level of loss an asset could suffer; we'll discuss this term in Chapter 4 when we talk
about quantitative and qualitative risk analysis techniques.
TIP Identifying and classifying risk are generic steps and really are intended
for you to get situational awareness of what risks your organization may
be exposed to. They should be considered precursor steps to developing
risk scenarios.
Risk Scenarios
Risk scenarios are created by developing an idea of potential events that can affect an
organization or its assets. The scenarios are based upon different risk factors that an
organization experiences. These can be factors that are internal to the organization, such
as personnel, training, technology, and so on; there could also be external factors such as
market space, regulation, and the economy, for example. There are several different ele-
ments that make up a risk scenario, which we will discuss in this section.
Threat Agent
Threat agents, as you recall from Chapter I, are the actors and initiate a threat event.
Threat agents could be internal or external, their motivation could be intentional or
accidental, and their focus or goals could be wide and varied. Threat agents are a neces-
sary part of risk scenario development simply because there has to be some entity that
initiates a threat. Remember that threats are merely negative events; there must be a
catalyst for them to occur. Developing risk scenarios requires that the organization be
aware that many different types of threat agents may potentially initiate negative events
against them. The threat agents should be matched to potential threat events, as well as
vulnerabilities that a threat might exploit.
CRISC Certified in Risk and Information Systems Control All-In-One Exam Guide
72
Threat
Threats are negative events; they are initiated by threat agents and exploit vulnerabilities
inherent to an asset, a process, people, technology, or an organization. Understanding
all of the potential realistic and relevant threat events that could affect an organization is
necessary to developing risk scenarios. The possible gamut of threat events that concern
the organization is developed through threat assessment and modeling methods.
Asset
Risk scenarios target and directly affect assets. Remember that assets are not only tangible
equipment or systems; they can also be a process, a proprietary manufacturing method,
people, facilities, equipment, or anything else the organization places a value on. Assets
can also be intangible items such as consumer confidence, customer loyalty, reputation,
and so on. These intangible assets are more difficult to develop risk scenarios around, but
they're no less important than the tangible ones. When developing risk scenarios, assets
should be identified as concretely as possible; even intangible assets, such as reputation,
might be defined in terms of dollar values derived from customer satisfaction surveys or
statistical analysis of return customer business. Identifying assets and prioritizing them
based on their importance to the organization is sometimes referred to as a criticality
analysis. In any event, identifying assets, as well as prioritizing them in order of impor-
tance to the organization, is an essential step in the process of developing risk scenarios.
Asset value is a critical concern in developing risk scenarios because it directly affects the
impact the organization bears when the risk scenario successfully affects an asset.
Vulnerability
Vulnerabilities are weaknesses inherent to assets. Threats directly affect vulnerabilities,
turning any "potential" for damage into real damage and impact if they are able to suc-
cessfully exploit those vulnerabilities. Risk scenario development directly depends upon
the organization thoroughly identifying all the potential vulnerabilities an asset may
have. If all the different vulnerabilities are not identified, then the organization could
have risk scenarios it is not even aware of. Recall that for risk to exist, there must be both
a threat and a matching vulnerability for it to exploit. Without adequate knowledge of
either, the risk scenario can't be developed.
EXAM TIP Keeping in mind the basic definitions of the four elements of
threat agent, threat, asset, and vulnerability will help you understand how
they contribute to risk scenarios in particular and risk in general. Threat
agents initiate threats, which exploit vulnerabilities, which are inherent
to assets. The two other factors that are considered with these four are
likelihood and impact. Together, all of these elements make up risk.
Figure 3-1
Elements of a risk Threat Agents
scenario (Internal/External)
Time/Location (When,
Duration, How Long to Threats
Detect and Respond, (Internal/External)
and Where?)
Risk Scenario
Assets
Vulnerabilities
(People, Processes,
(Weaknesses, Lack of
Faci lities, Equipment,
Controls)
Technologies)
CRISC Certified in Risk and Information Systems Control All-In-One Exam Guide
74
NOTE The time and location elements of a risk scenario are really
characteristics of the event itself; they actually describe details about the
occurrence of risk scenarios. They should be used to help develop the
scenarios to the extent that time and location factors could also affect the
likelihood and impact of the scenario.
Obviously, this scenario is generic and not very detailed at all. The risk scenarios
generated during the course of an organization's efforts would likely be much more con-
crete and detailed and apply to specific assets. In the previous example of a risk scenario,
you could break out each of these factors, following the illustration in Figure 3-1, as
in Table 3-1.
Note that what's missing here, completing this as a consideration of risk, are the ele-
ments of impact and likelihood. Keep in mind that risk scenarios are possibilities of what
could happen but without considering how likely they are or the impact they would
cause. These two elements are added to the equation and considered during risk evalua-
tion and analysis, which will be covered in Chapter 4.
EXAM TIP Risk scenarios are events that could occur, based on an
understanding of threat agents, threats, assets, vulnerabilities, and
time/location considerations. These are just possible events, without
consideration of likelihood and impact.
•
Asset ~ Vulnerabilities
I
....
Time and
~ Risk Scenarios
Location
EXAM TIP The top-down approach develops risk scenarios from a business
objective perspective, whereas the bottom-up approach is more general
and is designed to look at all possible scenarios, regardless of business
objective.
TIP The same internal and external factors are the ones that affect risk from
several different viewpoints. Not only do they affect risk scenarios, but they
also affect different business processes and activities within an organization,
as discussed in Chapter 2.
IT Infrastructure Factors
We've already discussed internal and external factors, as well as risk management pro-
cesses, and the effect these factors have on developing and dealing with risk scenarios. IT
infrastructure is both an internal and external risk factor since there are internal pieces
of the IT infrastructure that support the processes of the organization, as well as external
pieces that support its interaction with the outside world. Often the lines between inter-
nal and external IT infrastructure are blurred since there may be a seamless connection
between internal and external networks and the technologies that support all the differ-
ent business processes. Additionally, outsourcing to third parties makes the infrastructure
straddle both internal and external environments since some of the infrastructure may
be off-site and located in a different geographical location behind some other businesses
firewall yet process sensitive internal data.
IT infrastructure affects the development of risk scenarios the same way other factors
do; the way the infrastructure is designed and implemented can increase or decrease
the likelihood or impact of the risk scenario and make the scenario more likely or not.
Outdated or overtaxed infrastructure introduces risk into the organization and exposes
the organization to many more risk scenarios than a more modern, robust infrastructure.
Because infrastructure can exist in both the internal and external environments simul-
taneously, this increases the risk and the number of possible scenarios it may encounter.
The IT infrastructure must be carefully considered when developing risk scenarios.
EXAM TIP Risk scenario stakeholders include anyone who is affected by the
scenario itself. These could be asset owners or managers, risk managers, or
anyone responsible for responding to risk in any way. Stakeholders could
also include people who manage processes that affect risk. Additionally, all
the stakeholders should be included in the scenario development process.
Risk Register
A risk register is a product or document that reflects the different risk scenarios and fac-
tors for a given context. It could be for a single system, for a component of the system, or
even for a higher-level organizational element. It also may address only a small portion of
the specific piece of risk. Normally the risk register has several components, which we'll
discuss in the next few paragraphs. The risk register is used to record and manage risk and
serves as a reference point for tracking risk through its life cycle.
If you've ever been exposed to Plan of Actions and Milestones documents found in
the Department of Defense and in NIST's Risk Management Framework, then you've
looked at one type of risk register. While there are different components that a risk
register should have, different organizations may have different entries or elements on
their own risk registers. We'll take a look at some of the more common elements of a risk
register in this section.
• Risk factors
• Threat agents, threats, and vulnerabilities
• Risk scenarios
• Criticality, severity, or priority of risk
• Asset information
• Impact of the risk on an asset
• Likelihood of the threat exploiting the vulnerability
• Current status of risk response actions
• Resources that may be committed to respond to risk
• Risk ownership information
• Planned milestones toward risk response
Chapter 3: Identifying and Managing Risk Scenarios
83
Risk Descri[1tion Likelih ood lmi:1act Risk Owner Resources Estimated Actual Current Comments
Required Comi:1letion Comi:1letion Status
(Hours, Date Date
Dollars, etc.)
Data th eft from Medium Hig h Engineering $10K for new Jan 2016 Assessing Purchase and
malicious user Department OLP system different implementation
(via risk OLP by Dec 2015
assessment on vendors
04/2015)
Loss of primary High High Accoun tin g 15Kfor Oct 20 15 Sep 20 15 Vendor Final purchase
accounting department backup selected and insta llation
server data syst em in August 2015
Any or all of these data elements could be included on the risk register. Addition-
ally, the risk register could span more than one document as part of a multidocument
package describing the overall risk toward the organizational asset. Essentially, the data
points that are included on the register need to be those that support the organization's
risk management strategy and plan and help it to adequately identify, manage, monitor,
and mitigate risk throughout its life cycle. Figure 3-3 illustrates how a basic risk register
might look.
NOTE These are only notional entries for a risk register but are the most
commonly used. Organizations should include the data most relevant to
their management needs.
Chapter Review
In this chapter, we discussed several aspects of managing risks, particularly those that
take place before risk evaluation, assessment, and response. We looked at developing risk
scenarios in-depth and the different factors and components that make up risk scenarios.
A risk scenario is a potential event that could affect the organization. It consists of a
threat agent, a threat, an asset, and a vulnerability. Risk scenarios are part of the overall
risk consideration, less the likelihood and impact calculations.
Finally, we discussed the purpose and elements of the risk register and how different
information and data points are recorded on the register. Some of these different data
points include risk scenario information, such as threat agents, threats, assets, and vulner-
abilities, as well as criticality, likelihood, and impact information. The risk register may
also include information on risk owners and other responsible parties that must manage
risk. Finally, it also may include resources that are dedicated to risk management and
mitigation. The risk register is a living document that allows the organization to manage
risk throughout its life cycle for given scenarios and assets.
Review Questions
1. Which term describes a potential risk event that can affect an organization?
A. Risk factor
B. Risk scenario
C. Risk consideration
D. Risk agent
2. Which of the following could initiate a risk scenario?
A. Threat agent
B. Threat
C. Asset
D. Vulnerability
3. Risk scenarios are all the elements of risk, except for _ _ _ _ _ and _ _ _ _ _.
(Choose two.)
A. Threat
B. Likelihood
C. Impact
D. Vulnerability
Chapter 3: Identifying and Managing Risk Scenarios
85
4. _ _ _ _ _ are elements that influence the development of risk scenarios, as
well as their likelihood and impact.
A. Risk agents
B. Risk indicators
C. Risk factors
D. Threat agents
5. All of the following are considered external risk factors affecting development of
risk scenarios, except which one?
A. Market
B. Economy
C. Legal governance
D. Organizational structure
6. You are developing risk scenarios and are considering how different circumstances
involving timing of the scenarios might affect their likelihood and impact. Which
of the following would most likely increase the likelihood and impact of different
risk scenarios?
A. A hacking attack that occurs during an out-of-state IT conference that most
of the organization's information security personnel would be attending
B. The loss of a production server while the company is hosting a local business
conference
C. Unscheduled maintenance downtime during the rollout of a new version of
the company's graphics software
D. Corruption of the company president's workstation hard drive data during her
absence because of a business trip
7. Which of the following approaches to risk scenario development begins with
business objectives and attempts to identify risk scenarios that could affect those
objectives?
A. Bottom-up approach
B. Top-down approach
C. Cross-functional approach
D. Quantitative approach
8. Which of the following approaches to risk scenario development "brainstorms"
all the possible risk scenarios that could occur in the organization?
A. Quantitative approach
B. Top-down approach
C. Bottom-up approach
D. Threat modeling approach
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
86
9. All of the following are organizational factors influencing risk scenarios, except
which one?
A. Policies
B. Structure
C. Resource allocation
D. Market trends
10. Which of the following are concerns with the IT infrastructure in terms of how it
affects risk scenarios? (Choose all that apply.)
A. Level of modernization
B. Level of performance
C. Internal and external interfaces and connections
D. Cost
11. Which of the following are two elements that are critical in risk scenario
development? (Choose two.)
A. Asset identification and valuation
B. Likelihood calculation
C. Impact calculation
D. Threat assessment
12. Which of the following would be considered primary stakeholders with regard to
risk scenario development?
A. Production control managers
B. Accounting executives
C. Vendors
D. Asset managers
13. Which of the following are factors of organizational structures that could have an
effect on likelihood and impact of a risk scenario? (Choose two.)
A. Technology upgrades
B. Budget or resource allocation
C. Strategic product development
D. Organizational chain of command
14. Compliance is a factor that influences risk scenarios as a direct result of
organizational _ _ _ __
A. Threats
B. Risk management strategy
C. Governance
D. Vulnerabilities
Chapter 3: Identifying and Managing Risk Scenarios
87
15. Which of the following levels of risk appetite and tolerance could contribute to
an increased number of risk scenarios, as well as higher likelihood and impacts?
(Choose two.)
A. Higher risk appetite level
B. Lower risk appetite level
C. Higher risk tolerance level
D. Lower risk tolerance level
16. Which of the following describes a management product that is used to track
risk scenarios?
A. Risk report
B. Vulnerability assessment
C. Threat assessment
D. Risk register
17. Which of the following determines how a risk register is created and maintained?
A. Risk assessment
B. Risk management strategy and plan
C. Risk scenario
D. Risk methodology
18. Who is responsible for creating and maintaining the risk register document?
A. Board of directors
B. Risk owner
C. Senior executive
D. Risk assessor
19. Which of the following do risk scenarios typically map to on the risk register?
A. Risk areas
B. Threats
C. Assets
D. Vulnerabilities
20. Which of the following data elements should be recorded on the risk register?
(Choose all that apply.)
A. Risk factors and scenarios
B. Information concerning assets
C. Impact and likelihood
D. Risk management strategy
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
88
Answers
1. B. A risk scenario describes a potential risk event that can affect an organization.
2. A. A threat agent could initiate a risk scenario.
3. B, C. Risk scenarios include all the different elements that make up risk, except
for likelihood and impact.
4. C. Risk factors are elements that influence the development of risk scenarios, as
well as their likelihood and impact.
5. D. The organization's structure would be considered an internal risk factor affecting
the development of risk scenarios.
6. A. A hacking attack that occurs while most of the company's IT security personnel
are away would have a serious impact on the entire organization, and could even
be more likely, if the attack were planned during this time.
7. B. A top-down approach starts with business objectives and attempts to identify
risk scenarios that could affect particular business objectives.
8. C. The bottom-up approach involves brainstorming all the different potential risk
scenarios that could affect an organization.
9. D. Market trends are not organizational factors.
10. A, B, C. All of these are concerns with how the IT infrastructure would influence
risk scenarios, except for cost. Cost would be a concern about how the IT
infrastructure is used to respond to risk but not necessarily its influence over the
likelihood or impact of a risk scenario.
11. A, D. To develop risk scenarios, you need to know details about assets, such as
criticality and their value, vulnerabilities, threat agents, and threats. Likelihood
and impact are not necessary to create risk scenarios, but they are necessary to
evaluate and assess risk.
12. D. An asset manager would be considered a primary stakeholder since that person
is directly responsible for the risk an asset incurs.
13. B, D. Both chain of command and resource allocation are factors of organizational
structure that could affect risk scenario likelihood and impact.
14. C. Compliance is a factor that influences risk scenarios as a direct result of
organizational governance.
15. A, C. Organizations that have a higher level of appetite and tolerance for risk
typically incur more risk scenarios, which could have a higher likelihood of
occurring and a greater impact.
16. D. A risk register is a management product that allows the organization to
track risk.
17. B. The organization's risk management strategy and plan determines how a risk
register is created and maintained.
Chapter 3: Identifying and Managing Risk Scenarios
89
18. B. The risk owner is responsible for creating and maintaining the risk register
document.
19. C. Risk scenarios typically map to assets on the risk register.
20. A, B, C. All of these pieces of data should be included on a risk register. The
organization's risk management strategy, however, is a higher-level document
that is not part of a risk register.
This page intentionally left blank
~----------------------------C..3..=..t.J..a
11
~ ..i.4111i;111111111111111 ~ I
Risk Assessment
and Analysis
In this chapter, you will:
• Review the processes of risk identification, evaluation, and assessment
• Learn about qualitative and quantitative risk assessment techniques
• Understand how to evaluate existing controls for effectiveness
• Assess gaps between current and target states of risk in the IT environment
• Consider risk ownership and accountability during risk analysis
• Be able to report risk results to appropriate levels of management
This chapter covers Domain 2 of the Certified in Risk and Information Systems Con-
trol (CRISC) exam objectives and knowledge statements and focuses on the risk evalua-
tion, assessment, and analysis processes. We will cover the overall process for evaluating
likelihood and impact for risk, examining both qualitative and quantitative assessment
methods. We will also cover how control effectiveness is examined and how you might
identify gaps between how effective controls are in the existing risk state and the desired
level of effectiveness at which controls need to be functioning. Finally, we'll discuss how
the results of the risk analysis are communicated to upper management and risk owners
and reported on the risk register.
The CRISC exam objectives covered during this chapter include the following task
statements:
• 2.2 Identify the current state of existing controls and evaluate their effectiveness
for IT risk mitigation
• 2.3 Review the results of risk and control analysis to assess any gaps between
current and desired states of the IT risk environment
• 2.4 Ensure that risk ownership is assigned at the appropriate level to establish
clear lines of accountability
• 2.5 Communicate the results of risk assessments to senior management and
appropriate stakeholders to enable risk-based decision making
• 2.6 Update the risk register with the results of the risk assessment
91
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
92
As indicated in previous chapters, these objectives and knowledge statements are
shown in order of how they are listed in the CRISC Job Practice areas, not necessarily
how they are presented in the chapter.
Some organizations see risk assessment as one large monolithic process, but many
frameworks and standards break it down into different steps. We'll take another look at
several important frameworks we briefly touched on in Chapter I, including the Nation-
al Institute of Standards and Technology (NIST) Risk Management Framework (RMF),
the ISACA Risk IT Framework, and others. In this chapter, however, we will go into
more detail and examine them from a risk assessment perspective.
NISTRMF
The NIST RMF, found in Special Publication 800-37, describes an overall risk man-
agement process that covers all aspects of the risk life cycle. For the assessment piece of
the RMF, NIST uses a four-step risk assessment process found in Special Publication
800-30, "Guide for Conducting Risk Assessments." You'll see that these four steps are
broken down into nine distinctive processes and are listed here:
Chapter 4: Risk Assessment and Analysis
93
Step 1: Prepare for assessment.
Step 2: Conduct assessment.
a. Identify threat sources and events.
b. Identify vulnerabilities and predisposing conditions.
c. Determine likelihood of occurrence.
d. Determine magnitude of impact.
e. Determine risk.
Step 3: Communicate results.
Step 4: Maintain assessment.
While we won't go through every step of this process like NIST does, the process is
similar to what we've been describing all along in this book, and it is similar to the other
frameworks we discuss in the next section. The NIST assessment process is a subset of the
integrated RMF, which includes not only assessments but categorizing assets according to
criticality and protection (a necessary first step in the process), as well as managing and
monitoring risk throughout the entire life cycle of a system or asset. The NIST RMF also
includes a control framework and methods for assessing the various controls, which we
will cover in upcoming chapters. Appendix A of this book covers the overall RMF and its
supporting publications in detail.
OCTAVE Methodology
As part of a U.S. government contract with Carnegie Mellon University, the Operation-
ally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) methodology was
developed to assist organizations in identifying and assessing information security risk.
The methodology was originally developed by the Software Engineering Institute (SEI)
at Carnegie Mellon University in 1999 and has been updated over the years to its current
version, OCTAVE Allegro, in 2007. OCTAVE uses a concept called workshops, made up
of members of an organization, sometimes including outside facilitators with risk man-
agement and assessment expertise. The methodology has prescribed procedures, which
include worksheets and information catalogs to assist organizational members, drawn from
all functional areas of an organization, to frame and assess risk based upon internal organi-
zational context (infrastructure, governance, business environment, and so on). OCTAVE
has three iterations: the original OCTAVE, OCTAVE-S, and OCTAVE Allegro.
OCTAVE Allegro
The OCTAVE Allegro methodology, introduced in 2007, expands the previous two
iterations but does not necessarily replace them. It includes a more business-centered
and operational risk approach to the assessment. It is also asset-centered in its approach;
it focuses on assets and their use or misuse, the environment they are used in, and how
threats and vulnerabilities specifically target and affect the assets. Allegro can be used
on a scaled basis; either individuals or workshop teams can use this method without the
need for a high degree of risk management or assessment knowledge and experience.
OCTAVE Allegro is divided into four phases, which include eight steps. These phases
and steps are described next.
Phase 1: Establish Drivers
Step 1: Establish risk measurement criteria. This step serves to develop and establish the
organization's methodology and measurement criteria used to assess risk. OCTAVE uses
a qualitative assessment methodology and measurements but can use quantitative meth-
ods for certain aspects of the overall process, such as determining likelihood and impact.
150/IEC Standards
ISO stands for the International Organization for Standardization, and IEC stands for
the International Electrotechnical Commission. Together, these two organizations are
responsible for a plethora of information technology standards that are used worldwide,
including several that apply to information security and risk management. We briefly
mentioned risk-related ISO/IEC standards in Chapter 1; in this chapter, we will go into
a bit more depth on these standards, focusing mainly on those that cover risk manage-
ment and assessment.
1S0/IEC 27005:2011
Standards in the ISO/IEC 27000 series are all about information security, and the
27005:2011 standard supports the common ideas promulgated in both ISO/IEC 27001
and 27002. The standard applies to risk management, providing a unified risk manage-
ment approach to organizational security. The standard doesn't necessarily offer a specific
risk management or assessment methodology, but it does serve to describe a formalized,
structured process of risk management, such as developing context, scope, methods, and
so on. It also describes the two primary types of assessment methodologies, qualitative
and quantitative. Additionally, it describes processes used to develop risk response strate-
gies, communication with stakeholders, and continuous risk monitoring.
ISO 31000:2009
ISO/IEC 31000:2009, "Risk Management-Principles and Guidelines," covers a
broader range of risk management and is not specific to IT or IT security. It generally
focuses on business risk and can be used by organizations of any size, regardless of which
business area or sector the organization occupies. It is useful for assisting organizations
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
96
in developing sound risk management frameworks, processes, and strategies. It replaced
a previous comprehensive standard on risk management, the AS/NZS 4360:2004 stan-
dard. 1S0/IEC 31000:2009 is the governing document for other risk-related docu-
ments in the 31000 series, such as the assessment document we'll cover next.
IEC 31010:2009
IEC 31010:2009 is where the meat of information regarding risk assessments is locat-
ed for the 1S0/IEC standards. This document, "Risk Management-Risk Assessment
Techniques," articulates with and extends the risk management principles of 1S0/IEC
31000:2009 and provides a concrete overview of the risk assessment process. This stan-
dard describes risk assessment as the combination of risk identification, analysis, and
evaluation, with a precursor step of establishing the risk context within the organization.
The standard also addresses communication and consultation with various stakeholders
and management, risk treatment (response), and monitoring risk.
While key risk indicators are discussed in upcoming chapters, for now you should know
that they allow the organization to monitor changes in risk for given scenarios, enabling
the organization to modify its risk profiles as these indicators change. Table 4-1 summa-
rizes some of the different risk assessment methodologies available to you.
controls may be tested to ensure that physical separation away from systems for unau-
thorized users is maintained.
The results of system security assessments (usually in the form of vulnerability assess-
ments or penetration testing, discussed further in Chapter 6) are consolidated with the
results from interviews, documentation reviews, and system observations to form a com-
prehensive data picture of the system or asset; these results further inform the controls
analysis and impact determination aspects of risk. Table 4-2 summarizes the different
data collection methods you can use during an assessment.
NOTE While you may not be directly tested on data collection methods, it
is a good idea to understand these methods, as in actual practice, you will
likely use them extensively.
TIP Threat and vulnerability assessments are discussed a great deal in this
and other chapters of this book. These two assessment processes are critical
to understanding the elements that formulate the risk for an asset.
Control Analysis
After you've accomplished asset categorization and determined threats and vulnerabili-
ties associated with those assets, then you must take stock of what existing controls or
mitigations you've implemented to determine the level of protection an asset currently
has. Based upon this existing level of protection, you should be able to determine the
impact to the asset if a particular vulnerability is exercised by a specified threat and how
likely that event is, given the protections you have in place. All of this information helps
to identify the basic risk involved. Chapters 5 and 6 go into much more detail on how
controls are managed, as well as on responding to risk after a risk assessment.
CAUTION Make sure you consider controls and their effectiveness when
analyzing risk since controls can help decrease likelihood or reduce impact,
thereby decreasing the assessed risk for an asset and the organization.
Evaluation involves the measurement of these two primary factors, likelihood and
impact. We've already discussed how there can be different ways to measure these factors,
based upon subjectivity or concrete values. This is where the discussion on qualitative
and quantitative techniques comes into play. We'll go into depth on those assessment
techniques next.
EXAM TIP Remember that risk assessments are comprised of the steps of
risk identification, evaluation, and analysis. Identification produces threat-
vulnerability pairs, asset inventories, and risk scenarios. Evaluation covers
likelihood and impact calculations, resulting in risk values. Analysis looks at
the overall application of these factors, as well as control analysis, to produce
a comprehensive picture of risk.
With an SLE of $10,000, you have to hope this scenario never happens. However,
based upon analysis of historical weather patterns in the area, and given the shoddy con-
struction and limited electrical protections of the building the server farm sits in, this
seems to be a likely possibility. So, you should determine how much the organization is
likely to lose, per year, on such a scenario. You can calculate this if you know a couple of
other pieces of information. First, you need to know about how often to expect a severe
Chapter 4: Risk Assessment and Analysis
105
storm in the area, say on an annual basis. This annualized rate of occurrence (ARO) could
be used with the SLE value given earlier to determine your loss expectancy for one year.
So, given that severe thunderstorms are historically shown to occur 15 times per year
in your area (likelihood), you could conclude the following:
The final piece of this puzzle is how much it would cost the organization to reduce this
risk. Let's examine all of the factors that the organization could influence. First, it could
not influence the weather, so the threat agent and threat can't be reduced or eliminated.
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
106
The organization could, however, address the vulnerability (the server building with its
ineffective protections against bad weather, in this case), reducing it somewhat by relo-
cating the server farm or even moving its applications and data to the cloud, for example.
The organization could also reduce the likelihood for that particular threat-vulnerability
pairing if it removed or changed the nature of the vulnerability itself, as described earlier.
The organization could also reduce the impact of this specific event in several ways.
It could create a real-time failover cluster for the servers in another location that would
instantly be available if said servers got struck by lightning, or it could at least have a hot
spare server and a recent backup, if nothing else. The organization can affect the risk
factors, but there is a cost for doing this. What is important in developing risk responses
is that the organization must balance the cost of mitigations (for example, acquiring
another facility, moving to the cloud, server clusters, or at least hot spares and better
backups) with how much it loses in terms of SLE and ALE and the added impact of lost
revenue per day, as in this example. The bottom line is that you must find a solution that
isn't more expensive or impacts the organization to a degree worse than the risk event
itself. Risk responses are covered in more detail in Chapter 5.
Qualitative
A qualitative risk analysis, on the other hand, involves using subjective scales. These
scales could be a numerical scale from one to ten or have subjective values of High,
Medium, and Low, for instance. Qualitative risk analysis can come from historical trend
analysis, experience, expert opinion, existing internal and external environmental factors,
governance, and other inputs that are not always necessarily quantifiable but exist and are
important nonetheless. Qualitative risk analysis is appropriate when you must evaluate
risk based upon factors that can be hard to quantify, such as those that are not typically
measured with concrete, repeatable values. For example, what numerical value could you
assign to a potential impact of loss of consumer confidence or damage to reputation?
You may attempt to frame it in terms of lost revenue (an educated guess at best) or loss
of business. You could also survey a sample population to determine how many people
would or would not do business with the organization after a data breach, for example,
but even that would be subjective and would offer only a small statistical insight into a
hard-to-define measurement.
That's not to say you couldn't assign numerical values to different risk factors, how-
ever. Instead of values such as Low, Medium, and High, you might assign numerical
values that roughly correspond to those levels. For example, you might use a type of Lik-
ert scale, which may have values such as 1 (Very Low), 2 (Low), 3 (Medium), 4 (High),
and 5 (Very High). This might characterize the subjective level of impact or likelihood
the organization wants to assign to a particular risk event. In assigning these subjective
values, you must also decide how they relate to each other, yielding an overall risk calcu-
lation. In other words, given likelihood values of 1 (Very Low), 2 (Low), 3 (Medium), 4
(High), and 5 (Very High), and identical values for impact, what would the overall risk
level be when these two dimensions of risk are viewed together? How do their values
affect each other? NIST Special Publication 800-30 offers a good example of how risk is
calculated using qualitative analysis.
Chapter 4: Risk Assessment and Analysis
107
In Figure 4-1, taken from NIST SP 800-30, you can see how the relationships of
likelihood and impact affect different risk levels. The values of each are correlated, and
a qualitative risk determination results. For example, according to this figure, a moderate
level of likelihood combined with a very high level of impact results in a level of risk deter-
mined as high. The determination of what constitutes a likelihood of moderate and what
is required for an impact level of very high is subjective but should be defined within the
organization for consistency and standardization.
Likelihood
(Threat Event Level of Impact
Occurs
and Results in
Adverse Impact) Very Low Low Moderate High Very High
Very Low Very Low Very Low Very Low Low Low
D t\
Event
Firewa ll Configuration
Appliance Error
No Rule Due to in Rule
Error
Unknown Nature t------f
ofTraffic
Malformed
Traffic
No Rule Due to
Firewa ll
Administrator Hard wa re
Software
Error or Lack Issue
Issue
ofTraining
Physical Controls
Work Outcome Frequency
Event Loss or Damage
Minimal High
Yes Yes Loss or Frequency
Damage
Maximum
Break-in Low
No Loss or
Frequency
Damage
No Loss
Medium
No or
Frequency
Damage
Bow-Tie Analysis
A bow-tie analysis uses diagrams to analyze and explain relationships between various
elements of risk, from causes (threats) to events and then to impacts (consequences). It
is similar to both the fault-tree analysis and the event-tree analysis since it looks at the
various causes of a risk event (fault tree) and also analyzes the consequences of the event
(event tree). The difference, however, is that the bow-tie analysis looks at the intervening
characteristics of the events and causes, such as the path by which the cause leads to the
event and then the consequences. Figure 4-4 illustrates a bow-tie diagram. In this figure,
the negative event is shown as the center of the bow tie, with potential causes on the left
and possible consequences on the right.
CRISC Certified In Risk and Information Systems Control All-In-One Exam Guide
110
Figure4-4 Potential Cause 1 Potential Consequence 1
An example of a
bow-tie analysis
diagram Potential Cause 2 Potential Consequence 2
Other Methods
As mentioned, there are too numerous other methods that exist to perform the different
types of assessments to mention here. Some of these methods focus on data collection,
while others emphasize different group analysis techniques. All are, again, some varia-
tion of either the qualitative or quantitative method and may require looking at specific
aspects of data to determine various elements of risk. Other examples of these techniques
include the Delphi method, which centers on expert opinion from questionnaires; the
Bayesian analysis method, which uses data distribution and statistical inference to deter-
mine risk probability values, checklists, scenario analysis, and business impact assessment
(briefly described in Chapter 2); root-cause analysis (discussed further in Chapter 6); and
various collaborative techniques, such as brainstorming. You won't be expected to know
all of these methods for the exam, but you should be familiar at least with the concepts
of qualitative and quantitative analysis and some of the techniques that use each. For
further knowledge on various assessment and analysis techniques, consult with ISO/IEC
31010:2009.
EXAM TIP You will not have to know any particular risk assessment method
in detail for the exam, but you should understand how the qualitative and
quantitative methods work.
Risk Analysis
Now that you've assessed impact and likelihood (using any of several qualitative or quan-
titative methods), it's time to perform the risk analysis. Risk analysis is just an extension
of what you've been doing all along so far; a risk analysis looks at impact and likelihood
values and determines what the level of risk is for a particular system, an asset, or even
the entire organization. Part of risk analysis involves discussing findings with risk and
control owners, as well as senior managers in the organization. During this discussion,
you may discover other factors that influence the levels of likelihood and impact or
even affect threats, vulnerabilities, and assets. You'll also look at the existing controls and
determine how effective they really are in meeting risk, as well as recommend additional
controls. Finally, after this process is complete, you will report risk analysis results to
senior managers and generate a risk report. We'll discuss all of these topics in more detail
in this section. Figure 4-5 shows a familiar variation of the 5x5 likelihood and impact
Chapter 4: Risk Assessment and Analysis
111
Impact
Likelihood
Very Low Low Medium High Very High
Very High Very Low Low Med iu m High Very Hig h
High Very Low Low Med ium High Very High
Medium Very Low Low Medium Med ium Hig h
Low Very Low Low Low Low Med ium
Very Low Very Low Very Low Very Low Low Low
Figure 4-5 Likelihood and impact are evaluated together to produce a risk level.
table, demonstrating how different levels of likelihood and impact are evaluated together
to produce a qualitative risk level.
Control Analysis
In this section, we will discuss control analysis in detail. You'll also receive some more in-
depth information on controls in the next three chapters, focusing on different aspects of
how controls are designed, implemented, and used to respond to risk. It's important to
understand how controls fit into the overall risk analysis process; you perform a control
analysis before actually determining risk since existing controls that are already in place
may be effective to varying degrees in mitigating risk. Simply examining threats, vulner-
abilities, assets, impact, and likelihood without taking into account existing controls and
protections in place doesn't do justice to the risk analysis process. Not accounting for
existing controls would dramatically skew risk assessments and render an unrealistic risk
determination. The goal here is to examine existing controls, determine how effective
they are, and use that determination in analyzing the impact to assets if threats exploit
vulnerabilities, as well as the likelihood of that exploitation. Typically, results of your
documentation, observation, interviews, and testing will likely also be part of your con-
trol analysis. We'll look at different aspects of control analysis in the next few sections.
Control:The organization:
Supplemental Guidance: Separation of duties addresses the potential for abuse of authorized
privileges and helps to reduce the risk of malevolent activity without collusion. Separation of
duties includes, for example: (i) dividing mission functions and information system support
functions among different individuals and/or roles; (ii) conducting information system support
functions with different individuals (e.g., system management, programming, configuration
management, quality assurance and testing, and network security); and (iii) ensuring security
personnel administering access control functions do not also administer audit functions. Related
controls: AC-3, AC-6, PE-3, PE-4, PS-2.
References: None.
Priority and Baseline Allocation:
Often, different control frameworks also provide guidance on assessing the effectiveness
of the controls in that particular framework. For example, the catalog of controls found in
NIST's Special Publication 800-53, "Security and Privacy Controls for Federal Informa-
tion Systems and Organizations," is supplemented by an assessment methodology found
in its companion volume, Special Publication 800-53A, ''Assessing Security and Privacy
Controls in Federal Information Systems and Organizations," which describes how to
assess and report the effectiveness of each control. Figure 4-6 shows an example of a NIST
control, from SP 800-53, and Figure 4-7 shows the corresponding assessment guidance
for the same control in SP 800-53A.
Control Gaps
A control gap is a situation where existing controls are not sufficient to provide adequate
protection for an asset, reducing either impact or likelihood (and thereby risk) to an
acceptable level. In this situation, after the lack of effectiveness of the control is estab-
lished, the organization has to look at remediating the situation. We won't go too much
in-depth on remediation here; that's really the subject of the Risk Response domain that
CRISC Certified in Risk and Information Systems Control All-In-One Exam Guide
114
AC-5 SEPARATION OF DUTIES
ASSESSMENT OBJECTIVE:
Determine if the organization:
you'll read about in the next chapter. However, during your analysis, you must identify
control gaps and may even make recommendations as to possible response options that
would close those gaps. You may identify gaps in physical, technical, or administrative
controls, even when there are other types of controls present that perform some secu-
rity and protection functions. For example, if an organization is implementing account
management processes, such as creating accounts in a standardized fashion, verifying
identities before user accounts are created, and so on, then it has operational and tech-
nical controls in place that help provide secure account management. However, if the
organization has no written policy in place that actually requires this process and dictates
that it be performed in a consistent manner, how can the organization be assured that
these procedures will always be followed uniformly and in a secure manner? If there is
no policy, then the organization leaves it up to individual account operators to perform
this function as they want, regardless of how "most people do it." In this case, a control
gap would be that although the organization is applying some level of control over this
process, there is no written policy ensuring that it is standardized.
Control Recommendations
Once you've identified existing controls, determined how effective they are, and iden-
tified gaps between the current and desired end states of controls, you should be in a
position to make sound, risk-based recommendations to senior managers on how con-
trols should be supplemented, added, or changed. Recommending controls is in itself
Chapter 4: Risk Assessment and Analysis
115
a risk-based process; remember that there is risk that you are trying to minimize, but
you must balance this between control functionality and economy of resources. There
are several considerations to keep in mind when making control recommendations.
• What more could be done to supplement or change existing controls to close the
gap between current and desired end states of risk?
• Should new or different controls be applied to replace existing ones?
• What are the costs involved in applying additional controls, and do they exceed
the value of the asset or the costs to replace it?
• Would additional controls require retooling or significantly changing the
infrastructure, processes, or asset itself?
• Would additional controls require new personnel or training for current
personnel?
• Can additional controls be implemented that also reduce risks in other areas
(economy of use)?
The answers to these questions, at least some of them, will determine how you make
the recommendations to management about closing the "control gap." Both the cost of
implementation and the return on investment received from implementing new con-
trols or strengthening existing ones are going to affect management's acceptance of the
recommendations. The asset value, or impact if it were significantly damaged or lost,
will also affect how well the recommendation is received. Implementing a costly control
to protect an asset that is worth less in terms of impact is not usually an economically
sound decision. Organizational levels of risk appetite and tolerance will also affect con-
trol recommendations since any new or additional controls must reduce risk enough to
fall within those levels. In general, when recommending ways to close the control gap,
whether it is by introducing new controls, modifying existing ones, or modifying the
infrastructure to reduce likelihood or impact, you should do the following:
• Try to leverage existing controls that can be used across the board to include
additional assets.
• Look for "quick wins" first-controls that are easily and inexpensively
implemented (such as policies, training, procedure changes, and so on).
• Prioritize control recommendations with risk; the greater the risk, the more
attention that should be paid to those particular control gaps.
• Be realistic in your recommendations: You can't reduce risk to absolute zero, you
don't have all of the resources you would like at your disposal, and you don't have
to offer a 100 percent solution. Sometimes a 70 percent solution is better than a
0 percent solution.
• Provide alternatives to your primary recommendation for each control gap. Give
management alternatives based on cost, level of risk reduction, and effectiveness.
CRISC Certified in Risk and Information Systems Control All-In-One Exam Guide
116
Considering Risk and Control Ownership
Risk and control ownership are issues that must be taken into account during a risk anal-
ysis. Depending upon how the organization is structured and how the risk management
strategy has been developed, risk ownership may be assigned to one or several different
managers, spanning multiple functional areas. This is because the risk that affects one
area likely affects other areas as well, so many different people may have responsibility
over affected areas and be required to deal with and respond to risk. Control ownership
is also something that should be examined; often controls that provide protections for
a given asset or a number of systems may not fall under the operational purview of the
risk owner. Some controls span the entire organization and protect multiple assets, rather
than only a specific system. These are referred to as common controls, and the responsible
entity for these controls is the common controls provider. For example, consider physical
security controls. There may be a physical security officer for the organization that is
in charge of guards, personnel security, and access to secured areas. They may also be
responsible for locks, dosed-circuit televisions (CCTVs), and physical intrusion detec-
tion systems and alarms. All of these controls serve to protect information systems and
data assets that might be in a secure data center. Risks may be presented to the person
who is responsible for information systems in the data center, but the controls that serve
to protect them may belong to the physical security functional area. This will require
some coordination between the different functional areas if controls managed by one
functional area are insufficient to protect assets managed by another area. This may also
affect organizational structures, budget, and allocation of resources.
CAUTION Risk, asset, and control owners are not always the same person,
functional area, or even organization. It's important that you identify these
particular owners early in the assessment process and maintain careful
coordination and communication between these and other relevant
stakeholders, within the boundaries of your authority and assessment scope.
Different types of owners can result in politically sensitive issues that revolve
around resourcing, responsibility, accountability, and, sometimes, blame.
Resources
Required
(Hours, Estimated Actual
Risk Risk Dollars, Completion Completion Current
Description Likelihood Impact Owner etc.) Date Date Status Comments
Data theft Medium High Engineering $10,000for January 2016 Assessing Purchase and
from malicious department new DLP different implementation
user (via risk system DLP by December
assessment in vendors 2015
April 2015)
Loss of High High Accounting $15,000 October 2015 September 2015 Vendor Final purchase
primary department for backup selected and installation
accounting system in August2015
server data
Chapter Review
Risk assessments include risk identification, evaluation, and assessment. While iden-
tification involves developing risk scenarios by identifying threat agents, threat and
vulnerability pairs, and the affected assets, risk evaluation looks at the likelihood and
impact variables, which indicate how likely a threat and vulnerability pair is to occur,
causing a significant impact to an asset. Analysis also looks at controls and rolls the
assessment up into a comprehensive risk determination for the organization. In this
chapter, we also further reviewed different risk management and assessment frame-
works and standards, including NIST RMF, OCTAVE, the ISACA Risk IT Frame-
work, and the ISO/IEC standards.
We also reviewed the basic generic steps of conducting a risk assessment, including risk
identification, threat and vulnerability assessments, asset identification, categorization and
prioritization, and control analysis. We discussed key aspects of assessment that include
evaluating likelihood and impact and their relationships to the other risk elements.
We discussed the value of both qualitative and quantitative assessment methods.
Quantitative techniques primarily use quantifiable numerical values, such as cost and
statistical analysis, as factors in assessing likelihood and impact. Qualitative values are
subjective and are not easily definable or repeatable. Qualitative values might include a
range of values or designations such as High, Medium, and Low. Most risk assessments
use a combination of these techniques.
Finally, we looked at other aspects of risk analysis, including control evaluation and
gaps, as well as recommending additional controls for risk response. We discussed risk
and control ownership and communicating risk to these stakeholders. Reporting risk and
updating the risk register are also key parts of the assessment process, as are maintaining
risk profiles and monitoring risk on a continual basis.
Review Questions
1. What is the first step in risk management?
A. Risk evaluation
B. Risk classification
C. Risk identification
D. Risk response
CRISC Certified in Risk and Information Systems Control All-In-One Exam Guide
120
2. Which of the following steps in the four-step NIST risk assessment guidance
should be accomplished after identifying threat sources and events?
A. Determining magnitude of impact
B. Identifying vulnerabilities and predisposing conditions
C. Determining likelihood of occurrence
D. Determining risk
3. Which two of the following factors are the primary focus during risk evaluation?
(Choose two.)
A. Likelihood
B. Impact
C. Threat
D. Vulnerability
4. Which of the following techniques uses subjective terms for its evaluation?
A. Statistical
B. Quantitative
C. Asset valuation
D. Qualitative
5. Which of the following quantitative formulas is used to express the annualized
loss expectancy (ALE)?
A. EF X SLE
B. AVxARO
C. AVx EF
D. SLE xARO
6. Given an asset value (AV) of $20,000 and an exposure factor (EF) of 0.5, what is
the annualized loss expectancy (ALE) where a specific negative event is expected
to occur once every two years?
A. $10,000
B. $20,000
C. $5,000
D. $2,500
7. Which of the following assessment methodologies uses a workshop methodology
and is specifically intended for large organizations?
A. OCTAVE Allegro
B. OCTAVE-S
C. OCTAVE
D. The ISACA Risk IT Framework
Chapter 4: Risk Assessment and Analysis
121
8. Which of the following evaluation processes in the ISACA Risk IT Framework is
concerned with analyzing risk?
A. REI
B. RE2
C.RG3
D. RRI
9. Which of the following data collection methods is the most subjective?
A. Documentation reviews
B. Interviews
C. System observations
D. System security testing
10. You have a system administrator who you're working with during a risk assessment.
The system administrator insists that adequate permissions are assigned to system
files. Which of the following methods could you use to visually confirm the system
administrator's assertion?
A. Documentation review
B. Fault-tree analysis
C. Interviews
D. System observations
11. Which of the following must be examined after threats, vulnerabilities, assets,
likelihood, and impact are taken into consideration in order to adequately
analyze risk?
A. Controls
B. Threat actors
C. Risk ownership
D. Risk profiles
12. Which of the following types of analysis examines an event strictly from the cause
perspective?
A. Bow-tie analysis
B. Event-tree analysis
C. Fault-tree analysis
D. Brainstorming
13. Which of the following standards is primarily concerned with risk assessment?
A. ISO/IEC 31000
B. ISO/IEC 27005
C. ISO/IEC 31010
D. ISO/IEC 27000
CRISC Certified in Risk and Information Systems Control All-In-One Exam Guide
122
14. Which of the following terms describes the difference between how controls are
currently functioning and the level they need to be functioning at?
A. Control enhancements
B. Supplemental controls
C. Control effectiveness
D. Control gap
15. Which of the following terms describes an entity responsible for controls used
across several different assets and systems within the organization?
A. Common controls provider
B. Risk owner
C. Asset owner
D. Control owner
16. Once a risk assessment is completed and recommended controls are put into place,
at what level should residual risk fall?
A. Below the level that it costs to replace an asset
B. Within risk appetite and tolerance levels for the organization
C. Below the level of the priority of the asset
D. Within a range of values predetermined before the risk assessment
17. Which of the following is the most critical point to convey to managers when
communicating the results of a risk assessment?
A. The risk assessment methodology used
B. How impact and likelihood values are calculated
C. How much it will cost to remediate discovered risks
D. How IT risk relates to any impacts on business processes and operations
18. Who should a risk assessor communicate the results of a risk assessment to?
A. All senior executives
B. Senior executives and designated senior managers
C. The board of directors only
D. Only those personnel who have been formally designated and approved to
receive the information by senior management
19. Which of the following should be updated after a risk assessment, especially if
and when risk conditions change? (Choose two.)
A. Risk management strategy
B. Risk register
C. Risk profiles
D. Asset documentation
Chapter 4: Risk Assessment and Analysis
123
20. When performing a control analysis, which of the following is the main concern?
A. How much control costs to maintain
B. If the control could be replaced or reduced
C. How effective a control is at providing protection for an asset
D. How many personnel it takes to support the control
Answers
Risk Response
and Mitigation
In this chapter, you will:
• Learn about the risk response process
• Understand risk response options and how to align choices with business
objectives
• Become familiar with risk response standards and frameworks
• Understand how risk appetite and tolerance affect risk response choices
• Understand risk response action plans and how they are developed
• Understand how controls are designed, implemented, and executed
• Develop better project management skills to more effectively execute risk
response plans
• Learn methods to document and assess risk responses
• Determine how to best train personnel on risk responses
In this chapter, we will review the concepts that comprise Certified in Risk and Infor-
mation Systems Control (CRISC) Domain 3, which is focused on risk response and
mitigation. There is a natural progression from the risk assessment discussions in previ-
ous chapters that covered CRISC Domains 1 and 2, to the discussion on risk response
in this chapter; you will see that many of the outputs from those processes lead directly
to this chapter because an organization generally wants a positive response to any risk
assessment findings. After discussing how risk responses are chosen, we will discuss how
to implement those risk responses, including how to design, develop, and adjust controls.
The CRISC exam objectives covered during this chapter include the following task
statements:
• 3.1 Consult with risk owners to select and align recommended risk responses
with business objectives and enable informed risk decisions
• 3.2 Consult with, or assist, risk owners on the development of risk action plans
to ensure that the plans include key elements (e.g., response, cost, target date)
125
CRISC Certified in Risk and Information Systems Control All-In-One Exam Guide
126
• 3.3 Consult on the design and implementation or adjustment of mitigating
controls to ensure that the risk is managed to an acceptable level
• 3.4 Ensure that control ownership is assigned to establish clear lines of
accountability
• 3.5 Assist control owners in developing control procedures and documentation to
enable efficient and effective control execution
• 3.6 Update the risk register to reflect changes in risk and management's risk
response
• 3.7 Validate that risk responses have been executed according to the risk
action plans
Risk Response
Every organization has risk. The leaders of smart organizations, however, have deter-
mined how they will deal with that risk appropriately for their business context. Will
they accept all risks? Will they transfer some risks to a third party, such as an insurance
company? These are some questions that need to be considered within the risk response
process, discussed in this chapter.
We will also discuss the major risk frameworks within the field and how they incorpo-
rate risk response determination and implementation. Please note that risk is different for
every organization; risk within an educational context is different from a financial context,
which is different from a government context. Also keep in mind that IT risks are differ-
ent from business or mission-oriented risks. It's important to note that the mission of the
organization helps to shape risks and responses as well. This is why it's so important that
organizations conduct a thorough risk analysis and understand and prioritize the response
options that are right for them. You should also remember that the risks to the business,
the business goals and objectives, and the systems supporting those functions should all
be considered throughout the risk response process. It's easy as an IT professional to forget
that the business objectives are the top priority, but to maximize efficiency and effective-
ness (and especially to pass the exam), you should keep that in mind.
It's a good idea to think about this risk response action plan in a Plan-Do-Check-
Adjust (PDCA) life cycle, as shown in Figure 5-1. The PDCA model (often referred
to as the Plan-Do-Check-Act or Deming cycle) promotes continuous improvement.
FigureS-1
--.
Plan Do
Plan-Do-Check-
Adjust cycle
l
Check
Adjust
.__
Chapter 5: Risk Response and Mitigation
127
In this case, you are planning (designing), doing (implementing), checking (assessing),
and adjusting (adjusting and creating documentation) the quality controls that will
respond to risk.
NOTE You can find more general information on standards, frameworks, and
best practices (and the differences between the three) in Chapter 1.
Repeat as necessary
Step 1
---+
CATEGORIZE
Information Systems
Step6 FIPS 199/SP 800-60 Step2
MONITOR SELECT
Security Controls Security Controls
SP 800-137 RISK FIPS 200/SP 800-53
MANAGEMENT
i FRAMEWORK
Figure 5-2 The NIST Risk Management Framework (courtesy of NIST, from Special Publication
800-S3, revision 4)
Risk Governance Ensure that IT risk management Integrate with Enterprise Resource
practices are embedded in the Management, Make Risk-Aware
enterprise, enabling it to secure Business Decisions, Establish and
optimal risk-adjusted return Maintain a Common Risk View
Risk Evaluation Ensure that IT-related risks and Analyze Risk, Maintain Risk Profile,
opportunities are identified, Collect Data
analyzed, and presented in
business terms
Risk Response Ensure that IT-related risk issues, Manage Risk, React to Events,
opportunities, and events are Articulate Risk
addressed in a cost-effective
manner and in line with business
priorities
Table 5-1 Domains and Associated Processes Within the ISACA Risk IT Framework
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
130
Evaluation domain includes an understanding of the impacts to the business and the risk
scenarios, developed through the inclusion of internal and external environmental fac-
tors, risk management capability, IT capability, and IT-related business capability.
Since we've already given you a general overview of the other domains of this frame-
work in Chapter 1, we'll focus on risk response in particular here. The Risk Response
domain covers the risk response definition, risk response prioritization, and key risk indi-
cators (Krus). KRis are those that show a potential for risk that is beyond the organiza-
tion's risk appetite level, and we will cover them in much more depth in Chapter 6. The
framework also describes risk response options such as risk avoidance, risk mitigation,
risk sharing and transfer, and risk acceptance. If these sound familiar to you, they are the
same options described in NIST, as we mentioned earlier. Again, we'll go into depth on
them later in the chapter.
You'll see many areas of similarity between the ISACA Risk IT Framework and the
cruse exam, so it definitely wouldn't hurt to include it in your study plan.
COBIT
While ISACA's CO BIT doesn't focus solely on risk, it's still important for you to have a
cursory understanding of the framework and its supporting processes, inputs and out-
puts, and activities. Again, ISACA authored both the cruse and COBIT frameworks,
so you will see many of the same concepts interwoven across the two (as well as within
the Risk IT Framework discussed previously, which is quite complementary and often
grouped with the other two).
To refresh your memory, COBIT was designed to help businesses take advantage of
IT assets, increase compliance levels, and manage risk through an integrated framework.
This framework includes processes that have general inputs and outputs, objectives and
activities, and associated measures. The most recent version, COBIT 5, was released in
2012, with two updates published in late 2012 and 2013, respectively covering infor-
mation security and assurance. This should tip you off to the fact that while many IT
professionals are familiar with the COBIT framework, it is not meant to be IT-centric
or IT security-centric and was developed with organizational governance in mind as its
primary goal. Within COBIT, the activities considered key are grouped into domains,
which are broken down into processes, as described in Table 5-2.
The CO BIT processes associated with risk response are Monitor and Evaluate and are
used to ensure that risk response options are implemented and are consistent with the
organization's desired strategy for dealing with risk. Remember that with CO BIT, we are
talking governance, so this supports the governance perspective more so than an IT risk
perspective. These processes could be used to fulfill governance and regulatory require-
ments with regard to risk response.
Chapter 5: Risk Response and Mitigation
131
Domain Name ISACA Description Associated Processes
Plan and Organize Provides direction to solution Define strategic plans, manage
delivery and service delivery quality control
Acquire and Provides the solutions and passes Identify areas for automation,
Implement them to be turned into services implement change management
Deliver and Receives the solutions and makes Define service levels, identify costs
Support them usable for end users
Monitor and Monitors all processes to ensure Ensure compliance with
Evaluate that the direction provided is regulations, monitor and assess IT
followed performance
TableS-2 Domains and Associated Processes Within the ISACA COBIT Framework
Risk Mitigation
Risk mitigation generally involves the application of controls that lower the overall level
of risk by reducing the vulnerability, likelihood of the threat exploit, or impact to the
asset if the risk were to be realized. Mitigation actions come in a number of forms; a
policy requiring nightly off-site backups of critical data can mitigate the risk of data loss,
for instance. Similarly, applying a newly released web browser patch can mitigate the
risk of exploitation. The goal is to get the risk down to a level considered acceptable by
the organization's leadership. For the CRISC exam, you need to understand four main
types of controls: managerial, technical, operational, and preparedness. The following are
examples of each.
Managerial
• Requiring an acceptable use policy to dictate IT usage within the organization
• Starting a risk management program to identify, lower, and monitor unacceptable
risk levels within the organization
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
132
Technical
• Implementing additional firewalls to protect internal (non-public-facing) systems
• Adding 802. IX port-based network access control to deter unapproved assets
being added to the network
• Installing an intrusion detection system/intrusion prevention system (IDS/IPS)
to monitor for malicious activities or violations of policy
Operational
• Implementing delegation/separation of duties procedures to assure that one
person does not have the sole control over key duties
• Mandating security training and certification requirements to increase the
baseline knowledge of IT security-related issues and concepts
Preparedness
• Executing a tabletop exercise of the Continuity of Operations Plan to test its
effectiveness and identify gaps that should be addressed
Risk Sharing
Risk sharing (often referred to as risk transference) entails the use of a third party to
offset part of the risk. Risk sharing can involve the outsourcing of some activities to a
third party to reduce the financial impacts of a risk event in many cases. Sharing off-
site (co-location) assets and contractual obligations with other entities is one way that
organizations implement risk sharing; a cloud service provider can be used within this
scenario. The cloud provider might be contractually obligated to assume part of the
financial impact in the event of a breach, but be aware that there is a potential loss
of brand goodwill or other intangible assets that can be difficult to offload. Another
example of risk sharing is the use of an insurance service to cover the financial impacts
(at least partially) of a breach; however, the intangible losses mentioned previously
would still be present.
EXAM TIP Don't forget that use of a risk-sharing scheme does not totally
absolve an organization of its responsibilities; there may still be legal
liabilities involved.
Chapter 5: Risk Response and Mitigation
133
Risk Acceptance
There will always be some level of residual risk, no matter how many controls you
implement or the amount of insurance you purchase. Again, the goal is to get the risk
down to a level considered acceptable by the leadership. Risk acceptance occurs when
the active decision is made to assume the risk (either inherent or residual) and take no
further action to reduce it. The word active is critical here; risk acceptance is different
from being risk ignorant in that the risk is identified, alternatives are considered, and a
conscious decision is made to accept it. A good example of this is when a person inten-
tionally drives alone in the carpool lane during the hours where multiple people are
required to be in the vehicle; if that person is pulled over and ticketed for their lawless-
ness, that would incur a financial impact. However, they knowingly took the risk of this
action, understanding the consequences if caught and accepting it anyway. Similarly, a
company might choose to willfully ignore government-mandated control implementa-
tion that would incur fines or other financial penalties, assuming that the financial cost
incurred would be less than the controls would be to implement. Another common
situation is an organization choosing to work in a developing country, knowing there
is a high level of risk; the financial rewards of being adopted early could outweigh any
potential losses.
EXAM TIP It's important to note that risk acceptance doesn't insinuate
ignorance; it's an active acknowledgment and conscious decision to accept
risk as it is.
Risk Avoidance
Risk can be avoided through a number of methods. Can you remove the source of risk by
making a different choice? Perhaps you don't need to conduct the activity at all. Avoid-
ing risk can mean anything from eliminating risk associated with a particular activity
through the careful analysis of risks and subsequent changes to a plan to the complete
avoidance of a risk by not performing a planned activity. Risk avoidance is the option
taken when, after controls have been considered, the level of risk is still not acceptable.
An organization might choose not to take on a proposed project because of the probabil-
ity of failure and subsequent loss of capital, for example. Another scenario might be the
organization choosing to not adopt a cloud solution because of the level of sensitivity of
information that would be stored within the cloud.
Deferral
Risk Mitigation
Hooray! You've selected your risk responses carefully and prioritized them appropriately.
You're feeling good about how you're going to positively capitalize on good risk and mini-
mize bad risk, and you're going to do it efficiently and effectively. You're a risk response
rock star! Alas, now comes another challenge: implementing those risk response options.
In this section, we will talk a bit about how controls are implemented, as well as the con-
cepts of exception management and residual risk. Even the best-laid risk response plan
will need to account for these concepts.
Have you ever seen a manager act with a knee-jerk reaction to a sudden problem
that ends up costing more time and money implementing a solution than the actual
issue itself would have? Implementing risk responses properly should consider a few
key components, such as the ability to measure its success, proper documentation, and
appropriate training.
Earlier, we discussed a number of different risk response options, such as risk avoid-
ance, risk sharing (or transference), and risk acceptance. In this chapter, we will focus on
risk mitigation. Risk mitigation incorporates controls of varying types across an enterprise
to lower risks to an appropriate level. These controls can be anything from a written
document to a sophisticated, comprehensive technical solution, but they should all be
designed to most effectively and efficiently mitigate the risk they are associated with. At
the end of the day, control should provide the organization with some level of assurance
that they can meet their business objectives and deal with any events that occur in a man-
ner that is acceptable to the leadership of the organization.
Control Types
As you may have gathered by now, there are many types of controls to choose from. How-
ever, you can generally group these controls into a number of broad categories by their
intended function; the most common are compensating, corrective, detective, deterrent,
directive, and preventative. You may notice some significant overlap between these cat-
egories, and that is why some experts do not distinguish between, for example, deterrent
controls and preventative controls. Table 5-3 lists each control type, its definition, and an
example control.
1 Bu.sine~!; p8r'lne,
engagement
1 0oc11menl en-terprn;e
KEY TAS KS .arehf!ectura
Tra nsiticm JllB.nning 3 Identify/specify 1i pplicable
policies& laws
Component disposal
_» ! Develop C, I, & A. objectNlls
Media sallitn.ation '- ;J Informa tion & information s'(Stem
lnfonnatlon archiving secu rity courgorlt11111on
6- Pro-eurement $pedflcatlon developme.nl
~
~E;M: :a~:/c1;mtrol&aud1lll'l!I
2
J
Continuous mor11lo1Jn51
A~certif1t111Wn
00~Pree:~·~::;,~ 7
LEGEND
Figure 5-4 NIST 800-53 security controls identifiers and family names (courtesy of NIST, from
Special Publication 800-53, revision 4)
NIST 800-53
NIST Special Publication 800-53, "Security and Privacy Controls for Federal Informa-
tion Systems and Organizations," is a key catalog of controls to be aware of if you are
doing business in the U.S. government but is also a great resource even if you're not.
With its latest revision (revision 4, as of this writing), it includes controls for assuring
privacy as well as security and is meant to be policy and technology neutral, meaning
that the controls are broad enough to be applied to any architecture. If you're looking for
a document to tell you the steps of how to configure your router securely, this isn't the
document for you; it's perfect, though, if you're looking for a comprehensive view of the
scope and magnitude of a system-level control solution. Figure 5-4 lists the families of
security controls and their unique identifiers from NIST 800-53.
ISO 27002
While NIST 800-53 is used heavily within the U.S. government, International Standards
Organization (ISO) 27002 is used much more widely internationally. Much like 800-53,
27002 groups controls into families, such as the following:
Since its birth, versions of 27002 specific to different industries, such as healthcare,
have been developed that are tailored to their specific contexts, laws, and regulations.
Using this equation, a low-impact system would need to have most or all the confiden-
tiality, integrity, and availability (CIA) elements with a low impact; a moderate-impact
system would have a mixture of low and moderate and potentially high elements; and
a high-impact system would have most or all of the CIA elements with a high impact.
Note that higher-impact systems will usually have more controls applied to them, reflect-
ing their higher sensitivity and criticality within the organization, and these controls will
normally be applied with a higher degree of effort or rigor. It is important to understand
the SC because it will help you determine how much money, time, and other resources
you want to devote to any particular control. As discussed earlier, you are looking for
low-risk, high-reward controls. Understanding the impact of the system allows you to
plan and design more cost-effective controls.
After determining your security category, you will want to understand the common
controls. These are controls that are common across your organization and are shared
between more than one information system. For example, you may have more than one
information system being housed within the same server room in your headquarters
building. Perhaps a previously accredited system review already ensured that you have a
strong lock and a heavy door between those servers and the rest of the world. This would
be a common control between the old system and your new system. Other possibilities
Chapter 5: Risk Response and Mitigation
141
could be continuity of operations, policies, and procedures; guards at entrances; biomet-
rics; and so on. These should have already been documented in a plan (we hope!), so a
great place to start is to review the security plans for other systems within your organiza-
tion. Don't forget the advent of the cloud has created situations where you are sharing
data and systems among more than one organization, often supported by another third-
party organization, so you may have common controls among all of your organizations
that need to be considered. Also, be constantly aware that any common controls that
do not meet your specific requirements (let's say there's a strong door but no lock) will
require you to add a compensating control to meet your standards.
Selecting the appropriate controls for you and developing them often depend on your
context (for example, government, healthcare, banking, or some other specific context
that mandates a certain regulatory or legal standard for your security). Further, you
already developed your security category, as discussed earlier, so you know the impact
of the system if it was lost for a period of time. After determining the common controls,
you now know where the gaps between the two points are. Now is the time to begin
documenting those gaps in the risk response action plan. Don't forget, if you are dealing
with a third party or cloud-based provider, you should also be considering any service
level agreements or other legal documentation that will need to be drawn up as part of
your risk response action plan.
• Quantifiable
• Consistent and repeatable
• Valid beyond the "now" timeframe
• Thorough
• Compliant to individual and local laws and the human right to privacy
Even if you do not intend to use the OSSTMM framework, it is a useful reference
document that contains handy rules of thumb for gauging testing time and sample rules
of engagement.
Documentation
Risk response options must also be thoroughly documented, with a clear owner defined,
whether it is a new process, control, team, policy, or any other solution. Just imagine a
risk being uncovered that requires a set of procedures for storing, handling, and destroying
sensitive information. The procedures are developed and put on a shelf until an incident
occurs. In the meantime, the procedures go stale (locations change, for example), and no
clear owner was defined to be responsible for maintaining the documentation. The proce-
dures, in this event, are as good as useless. Substitute any situation where documentation
is not only helpful but necessary, and you can quickly see why this is so important.
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
144
By this point, you've no doubt made a number of changes to your organizational
security posture, and these changes should be documented within your security plan.
You should write security plans assuming that the personnel who are currently active
within your organization could leave at any time (the old story about someone being hit
by a bus and was the only one who knew how to perform a specific function), so it's best
to always prepare for contingencies such as this by having your security plan as heavily
documented as possible. You need to make sure to include a functional description of all
controls that were applied to the system, any decisions that were made leading to these
controls being implemented, any interdependencies, and any other relevant information.
Finally, you also want to include any documentation from testing that occurred and
remediations that were made based on testing results.
Any risk response planning should outline a rough timeline for implementation, a
rough estimate of costs, who is responsible for the implementation, and any required
tools (such as software, hardware, and so on) required to complete the tasks. More detail
is always better! A lack of clarity is not your ally, especially if the plan is handed over to a
team that wasn't involved in the initial planning process.
Finally, you'll want to track the status of your risk response implementation. This is
usually done using a risk register, discussed previously in Chapter 3. To recap, the risk
register is a document that tracks various elements of the identified risks, such as the risk
name, risk impact, risk probability, risk mitigation, action owner, and action suspense
date. This risk register can be used to track the implementation of the mitigations and
assure that timelines are met.
Do you have any metrics in place that can determine the success of the risk response?
Metrics help you quantify the effectiveness of your implemented risk response over its
life. Monitoring comes into play here because it facilitates your ability to understand
your performance against the metric. Monitoring can be done through a tool, through a
team, or through a combination of both.
Exception Management
It's easy to say that your risk response options should always be implemented. You care-
fully considered the risks to the organization through the risk analysis process, selected
appropriate responses, and monitored your risk levels diligently. How could you pos-
sibly not implement a control? That would be crazy! However, there are exceptions,
and you need to have a process in place to manage those exceptions and keep them
minimized. Consider the situation where an operating system patch cannot be applied
because of a legacy application that's critical to the organization's mission. This miti-
gation is important but less important than the legacy application and its associated
mission. What to do? Exception management comes into play here; you need to docu-
ment this as an accepted exception to the policy and track it. Perhaps the patch can
be implemented in the future, or another mitigation could come along and make the
exception moot. This is another aspect of risk acceptance; you are asking management
to accept an ongoing risk, as an exception, because the response cannot be implemented
for whatever reason. Either way, keeping a close eye is key to not letting these exceptions
slip through the cracks.
Chapter 5: Risk Response and Mitigation
145
NOTE Don't forget to track exceptions and remove any that aren't valid! It's
easy to let them slip through the cracks.
~ NOTE Chapter 1 has more information on the concept of risk tolerance and
Q how it relates to risk acceptance.
CRISC Certified In Risk and Information Systems Control All-In-One Exam Guide
146
Training
After all is said and done and the controls have been implemented and documented, it
is important that you conduct regular and traceable training that covers a number of
aspects. On top of the usual cyber security, privacy, and acceptable user training that
most organizations (should) have in place, it is imperative that the employees responsible
for the care and feeding of your controls are properly trained on both the content of the
controls and the context of the controls. What does this mean? Content means that a
network administrator in charge of your infrastructure, and the subsequent controls,
understands the latest evolutions and revolutions in both current threats and vulnerabili-
ties. Context means that the same network administrator in a highly sensitive govern-
ment environment (think missiles, space, and so on) should know that they should be
extra prudent and consider the limitations inherent to their systems and how they inter-
act with other systems (if not the larger Internet). Without both of these, content and
context, as part of the training portfolio for all personnel charged with implementation
of controls, you may well likely find that one or the other is neglected.
ID FAMILY ID FAMILY
AC Access Contro l MP Media Protection
AT Awareness and Training PE Physical and Environmental Protection
AU Audit and Accountability PL Planning
CA Security Assess ment and Authorization PS Person nel Security
CM Configuration Management RA Ri sk Assessment
CP Contingency Planning SA System and Services Acquisition
IA Identification and Authentication SC System and Communications Protection
IR Incident Response SI System and In formation Integrity
MA Maintenance PM Program Management
Figure 5-5 NIST 800-64 System Development Life Cycle (courtesy of NIST, from Special Publication
800-64)
Chapter 5: Risk Response and Mitigation
147
Initiation
In the initiation phase, the need for a system is determined, and its purpose is documented
formally. Within the initiation phase, it is critical to consider your control development
and integration early and often. In fact, you will save yourself many headaches, time, and
eventually money by considering your controls at every step along the way. Within the
initiation phase, security is often expressed as a business risk or a risk to project comple-
tion or the business itself. Outputs for the initiation phase could include the following:
Acquisition/Development
Within the acquisition/development phase, the risk assessment is often conducted, along
with any security testing and development of documentation for system certification
and accreditation (as required). Risk assessment is covered in-depth in Chapter 2, but
just note that an effective risk assessment is built on the initiation phase having been
conducted appropriately and thoroughly. This is also the phase where the bulk of your
control development will occur.
Implementation/Assessment
Within the implementation/assessment phase, the system is installed in its new environ-
ment and evaluated for its readiness, both operational and security. Here you do a final
certification and accreditation review, and the authorizing official or other accrediting
authority will take responsibility for the security posture of the system. Any documenta-
tion to connect the system to any external entity should be completed within this phase.
Outputs for the implementation/assessment phase could include the following:
• Accreditation package
• System authorization
• System security plan
Operations/Maintenance
Within the operations/maintenance phase of the SDLC, the system is actively operat-
ing, so you can leave it alone here, right? Not likely. You need to constantly be looking
for ways to improve and enhance the system, and any improvements or enhancements
need to be considered for their security ramifications. Furthermore, the system must be
assessed periodically based on regulatory, legal, or other guidelines to ensure that it con-
tinues to maintain a risk level that aligns with the company's risk tolerance. Outputs for
the operations/maintenance phase could include the following:
Project Management
Risk responses should be implemented in a controlled, defined, and monitored manner
as discussed previously. One tried-and-true way to do this is through the tenets of project
management. The Project Management Body of Knowledge (PMBOK), a publication
of the Project Management Institute, defines a project as "a temporary endeavor to cre-
ate a unique product, service, or result." Project management, then, is "the application
of knowledge, skills, tools, and techniques to project activities to meet project require-
ments." Note that a project in this context is indeed temporary in nature, with a defined
beginning and end. Risk management is distinct from project management on this point
because project management incorporates concepts to lower project risk but ends with
the project, while risk management activities can continue indefinitely.
Project management is a great concept to know as a professional because it can be
helpful in completing any set of tasks, but for the CRISC exam, you obviously need to
keep your risk hat on. In this section, we will discuss the most common project manage-
ment frameworks and the vital concepts you need to understand for the exam. We're not
advocating for a particular standard to be adopted; in fact, you'll notice a great deal of
similarity among all of the major frameworks. Most importantly, you need to understand
that implementing controls is like any other project, in that, as the PMBOK states, it is
"the application of knowledge, skills, tools, and techniques to project activities to meet
project requirements." The project activities are the activities you are conducting to meet
the project requirement: a set of controls implemented and functioning properly.
PM I-PM BOK
The Project Management Institute (PMI) Project Management Body of Knowledge
is perhaps the most recognized project management framework internationally. The
PMBOK divides project management into process groups, knowledge areas, and associ-
ated processes. The five process groups are as follows:
Within the Initiating phase, you conduct your project kickoff. This is where you get
authorization to move forward with the project, and you create the project charter. Next,
you conduct the Planning phase, where the work plan is developed. The Executing phase
is where all your hard work planning pays off; you implement your plan and watch it
come to life. Monitoring and Controlling covers the critical points of tracking progress
against established milestones, goals, and objectives, and conducting remediation actions
as necessary. Finally, as discussed previously, all projects have a definite life span and must
be closed out in the Closing phase, with appropriate lessons learned documented.
There are also a number of certifications associated with the PMBOK framework,
including the Project Management Professional (PMP), the Certified Associate in Pro-
gram Management (CAPM), and the Program Management Professional (PgMP). While
you don't need to know about these certifications within the scope of the CRISC exam,
it's good to be aware of their existence because they are some of the more widely held and
respected credentials within the Project Management field.
CMMI
The Capability Maturity Model Integration (CMMI) framework is an internationally
recognized standard for improving processes within organizations. Developed by Carn-
egie Mellon University, the CMMI is used to gauge the process maturity within the
organization and to place it within a "maturity level." There are CMMI frameworks
for a number of sectors, including CMMI for Acquisition (CMMI-ACQ), CMMI for
Services (CMMI-SVC), CMMI for Development (CMMI-DEV), Data Management
Maturity (DMM), and the People CMM. You'll see many large companies boasting
about their CMMI level; it's considered to be a solid gauge of the process maturity
within an organization. Why does this matter? If you want to, for example, hire an
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
150
external software developer to create and maintain an enterprise-wide budget tool, their
CMMI rating would give you insight of how they deal with processes such as change
management.
The maturity levels range from 1 through 5.
CMMI doesn't discuss risk as overtly as the PMBOK, but you can see the same over-
arching elements of processes being used to manage the different aspects of a project,
including the tracking and optimization. CMMI puts particular value on the concept of
process improvement, and organizations operating at CMMI level 5 are actively review-
ing and improving their processes-including dealing with risk-on a regular basis.
Agile
Agile project management frameworks have been used within the software development
sector for some time. The Agile methodologies look to improve-you'll never guess-
agility by improving collaboration, reducing bureaucracy and red tape, and facilitating
ad hoc groups creating products in a rapid fashion. The Agile Manifesto, released by the
Agile Alliance, reflects the following principles:
• The highest priority is to satisfy the customer through early and continuous
delivery of valuable software.
• Welcome changing requirements, even late in development. Agile processes
harness change for the customer's competitive advantage.
• Deliver working software frequently, from a couple of weeks to a couple of
months, with a preference to the shorter timescale.
• Businesspeople and developers must work together daily throughout the project.
• Build projects around motivated individuals. Give them the environment and
support they need and trust them to get the job done.
• The most efficient and effective method of conveying information to and within
a development team is face-to-face conversation.
• Working software is the primary measure of progress.
• Agile processes promote sustainable development. The sponsors, developers, and
users should be able to maintain a constant pace indefinitely.
• Continuous attention to technical excellence and good design enhance agility.
Chapter 5: Risk Response and Mitigation
151
• Simplicity-the art of maximizing the amount of work not done-is essential.
• The best architectures, requirements, and designs emerge from self-organizing
teams.
• At regular intervals, the team reflects on how to become more effective and then
tunes and adjusts its behavior accordingly.
Within this manifesto, you notice the concepts of welcoming change (not common
within many project management frameworks) and a self-organized team (as opposed
to having a project manager formalize team membership). Finally, the concept of
iteration-from the team members reflecting regularly on their own effectiveness and
tuning accordingly to the delivery of regular products-is central to the Agile mind-set.
While its more flexible, ad hoc project management methodology might not be ideal
for every organization, you can definitely see how it would appeal to a certain subset of
company such as a startup.
The Agile framework (as well as the Lean framework, discussed in the next section)
differs from the PMBOK and the CMMI in its approach and rigidity. Both Agile and
Lean value the ability to make quick changes and the ability to be more ad hoc through
the use of self-organizing teams. There is much less emphasis on tracking through the use
of metrics, and a discussion of project risk is almost nonexistent. Still, in an organization
using these project management frameworks, risk should be considered and incorporated
into the project processes from beginning to end.
Lean
The Lean mind-set is derived from the manufacturing sector and is looking to "lean"
organizations through less waste; in this context, it means less waste within projects.
Waste can be found within too much unnecessary time spent on a project or unnecessary
personnel involved who could be utilized elsewhere. Anything that does not bring value
to the project is a target for "leaning" or improving, perhaps even removal. Value should
be defined early in the project by the end customer and often means what they will be
willing to pay in the end for any segment or part. Lean project management differs from
other frameworks by focusing efforts on improving processes to compress the overall
project schedule to reduce the project cost and improve the profitability of the project.
A common tool used within Lean projects is the value stream map (VSM). Within
the process of creating the VSM, the team will detail the steps, information flows, and
any delays currently resident within existing processes. This will allow the team to better
understand the current state of the processes within the company and look for areas to
reduce waste. At this time, another, updated VSM is created to depict the leaner process.
Chapter Review
In this chapter, we covered the risk response process from top to bottom. We discussed
three major risk frameworks, the NIST RMF, the ISACA IT Risk Framework, and the
ISACA COBIT. The NIST process is comprised of six steps: security categorization,
security control selection, security control implementation, security control assessment,
information system authorization, and security control monitoring, and it has an impor-
tant consideration of continuous monitoring. The ISACA IT Risk Framework has three
domains: Risk Governance, Risk Evaluation, and Risk Response. COBIT is not risk-
centric or IT security-centric but is largely focused on governance. These frameworks all
differ in their scope and content but have the same underlying goal of helping identify,
deal with, and monitor risks within an organization. We discussed how risk response is
an essential topic within all three frameworks.
We then covered the risk response process that includes the selection of risk response
options, the prioritization of risk response options, and the implementation of the risk
response plan. Each of these facets contains a number of key steps involving analysis, proper
communication, and consideration of the organizational risk tolerance and risk appetite.
We then developed an understanding of the different risk response options, includ-
ing risk avoidance, risk mitigation, risk sharing or transference, and risk acceptance.
Each one of these options has advantages and disadvantages. We also discussed how risk
responses should be selected and appropriately prioritized. This requires an understand-
ing of whether a response is a quick win (a situation where the response is high benefit
and low cost), requires a business case to be made, or necessitates a deferral (where the
risk does not outweigh the potential cost). Each risk response choice requires careful
consideration of these options to determine the best course of action; also, when it's time
to implement the risk responses, knowing how to incorporate metrics, document thor-
oughly, and manage exceptions to the plan is key.
We also discussed how to implement the risk mitigations after they've been chosen,
through the use of frameworks, both for controls and for the overarching project man-
agement. You learned how risk responses are assessed, through documentation review,
Chapter 5: Risk Response and Mitigation
153
technical assessment, and interviews. We discussed how to properly document risk
responses and any exceptions and report the activities to leadership. Finally, we covered
training for both content and context as a regular, repeatable activity for personnel
charged with implementing any controls.
Review Questions
Answers
In this chapter, we will review the concepts that comprise CRISC Domain 4, which is
focused on risk control monitoring and reporting. In the previous chapters, we discussed
the elements of risk and information system controls, and this chapter shows you how to
most effectively and efficiently monitor those elements for maximum impact.
The CRISC exam objectives covered during this chapter include the following task
statements:
• 4.1 Define and establish key risk indicators (KRis) and thresholds based on
available data, to enable monitoring of changes in risk
• 4.2 Monitor and analyze key risk indicators (KRis) to identify changes or trends
in the IT risk profile
• 4.3 Report on changes or trends related to the IT risk profile to assist management
and relevant stakeholders in decision making
• 4.4 Facilitate the identification of metrics and key performance indicators (KPis)
to enable the measurement of control performance
• 4.5 Monitor and analyze key performance indicators (KPis) to identify changes
or trends related to the control environment and determine the efficiency and
effectiveness of controls
• 4.6 Review the results of control assessments to determine the effectiveness of the
control environment
• 4.7 Report on the performance of, changes to, or trends in the overall risk profile
and control environment to relevant stakeholders to enable decision making
159
CRISC Certified in Risk and Information Systems Control All-In-One Exam Guide
160
Control Monitoring
In Chapter 5, we discussed the development and implementation of controls to help
you reduce risks within your organization. In this section, we will discuss how you can
assess and monitor the efficiency and effectiveness of those controls. Understanding how
controls are operating within your organization is an important input to your risk man-
agement strategy.
Threat Assessment
Threat assessments determine how threats, both of the natural and human-made type,
might harm your systems and, subsequently, the data residing on those systems. Remem-
ber from Chapter 1 that a threat is a danger of harm that can be enacted on an asset. The
asset has to be in danger from this threat; theoretically, if there is no danger, then there
is no threat. Threats exploit specific vulnerabilities, as discussed in the following section.
Chapter 6: Control and Risk Monitoring
161
A threat must have a matching weakness in a system that it can exploit, or act upon, if
it is to be an effective threat. Threat assessments, then, are often conducted to identify
matching threat and vulnerability pairings, as well as the threat agents that could exercise
a threat. Like a vulnerability assessment, the assessment does not have to necessarily be
part of but can definitely support risk management. Threat assessments are conducted
using a wide variety of data, including historical trends, statistical analysis, industry data,
and other information from sources including the government, vendors, and even the
organization itself. A threat assessment entails gathering as much information on the
potential organizational harms, similarly to what a threat agent (or something or some-
one who causes or initiates a threat against a vulnerability) would do. There are a number
of sources for this data, including law enforcement and counterintelligence organiza-
tions, that are resident experts on your particular geographic area, industry, industrial,
or technological specialization. Quality information regarding threats is also often avail-
able from historical or statistical information that may apply to your particular industry
or area. Larger organizations often have their own threat or intelligence units that are
tracking threats to their domain. Threat assessments should consider, at a minimum,
the following:
• Natural disasters, such as flood, fire, or earthquake, that cause physical damage
to assets
• Equipment malfunction, from normal wear and tear to catastrophic failure
• Employees, both malicious users and those with poor practices
• Intruders/hackers, unauthorized people attempting to compromise controls to
gain access or even damage assets
It's important that a threat assessment consider the organization you work for, the
particular industry you reside within, and what the particular targets within your orga-
nization would be. One example is healthcare, where specific threats might target both
personal and protected health data that could be used for a number of malicious ends;
information concerning these threats can be gathered from other healthcare organiza-
tions or government agencies. Another industry that might be targeted is education,
where an educational institution is conducting applied research in conjunction with the
defense industry. This happens quite frequently for cutting-edge technologies, which are
just the type of thing an adversary would be deeply interested in. In this situation, an
intelligence entity might be able to supply information on foreign intelligence services
and their collection priorities, the likelihood of industrial espionage, and other relevant
threats. Your organization must use the expertise it has at its disposal in order to deter-
mine to what level and how these threats would affect its infrastructure and data.
Vulnerability Assessments
In Chapter 1 we discussed vulnerabilities, and you'll recall that vulnerabilities are weak-
nesses in a system, operation, or facility that would make these resources susceptible to
being exploited by a threat. Vulnerabilities can exist in the way a system processes, trans-
mits, or stores data; they can also exist in the technologies that make up a system or even
CRISC Certified in Risk and Information Systems Control All-In-One Exam Guide
162
in its design. Vulnerability assessments are designed for a (generally) third party to come
into an organization, take stock of the assets that will be covered within the scope of the
assessment, conduct scans and other tests against those assets, and provide a report of the
vulnerabilities that have been found. Often, a report recommending possible remediation
measures is also included within the deliverables. Vulnerability assessments often occur
from an internal point looking across the organization; the team will host its equipment
within the network to get the best look at the vulnerabilities without the interference of
the perimeter protections, such as firewalls. Many vulnerability assessment teams also
have the benefit of administrator or root credentials, rather than basic user credentials.
This allows an "open kimono" look at the patches that are missing, incorrect configura-
tions, and other flaws in the system that should be corrected to improve the control set.
A vulnerability assessment is commonly included within a risk assessment.
Penetration Testing
Penetration tests, unlike vulnerability assessments, are designed to actually exploit weak-
nesses on a system. Penetration tests take a vulnerability assessment a step (or ten) further
in that they tell you all of the actual vulnerabilities based on their having been exploited,
not just the probability. While vulnerability assessment is largely nonintrusive, becom-
ing intrusive only when a scan brings a system down because of a misconfiguration or
other situation causing a reboot or a crash of the system, a penetration test attempts to
bypass security controls and exploit any vulnerability that is identified. If a vulnerability
is indeed identified, the tester will attempt to "own" the system, often leaving a marker
showing that they were there. The really high-speed, real-world tests will even attempt
to conduct a denial-of-service attack or steal data, just like an attacker would do. The
results from penetration tests can be used to better determine how to protect the system,
by mitigating the vulnerabilities that the tester was actually able to exploit.
There are a couple of different types of penetration test that you should understand.
A black-box test, or blind test, means that a penetration test is performed with no prior
knowledge about the system design and architecture, personnel and organizational struc-
ture, and other attributes that could shed light on inherent weaknesses. In the same
manner as a malicious actor, the tester would have to use reconnaissance activities to
determine weaknesses.
Another type of penetration test is the gray-box test, in which the tester has some
knowledge, albeit limited, of the organization and its infrastructure. This could be lim-
ited to just information that can be found in certification and accreditation or other
sensitive internal documentation. Finally, there's the white-box test, where the tester has
full knowledge of the network, access to diagrams of the network, information in detail
of hosts and services on the network, and potentially documentation from previous test-
ing events.
Within a black-box (blind) test, as noted, the testers do not have prior access to the
information regarding the organization and its infrastructure. In a double-blind test,
those charged with defending the network are unaware of the testing and are tested on
their ability to react and defend as if a real-world attack were taking place. Figure 6-1
shows the NIST SP 800-115 penetration testing cycle. As NIST points out, this is an
example of how the penetration process can be divided into phases. However, there are
Chapter 6: Control and Risk Monitoring
163
Figure6-1
The NIST SP 800-
11 S four-stage
r Add..
1t1ona ID.1scovery7
~
Reporting ~
many acceptable ways of grouping the actions involved in performing penetration test-
ing, and other models are available for your use.
Within the planning phase, the rules of engagement are set, and management approves
the testing parameters. Without the due diligence in the planning phase, you could have
any number of disastrous situations, from a lack of management support to overstepping
boundaries because of a lack of agreement. The discovery phase includes reconnaissance,
or information gathering, as well as vulnerability analysis. Vulnerability analysis requires
the systems-and their resident operating systems and software-to be scanned, gener-
ally using automated tools, and compared to accepted vulnerability databases.
The attack phase can be delineated into steps: gaining access to the system, elevat-
ing privileges to gain administrator (or root) access, browsing the system, and installing
additional tools. At any point in time, a new system could be discovered, and the cycle
would loop back; this is depicted in Figure 6-2.
Additional Discovery
,1. I
Attack Phase I
Install
Discovery ____. Gaining
~
Escalating
~
System
~ Additional
Phase Access Privileges Browsing
Tools
t I
I I
Enough data If only user- The Additional
has been level access information- penetration
gathered in was obtained gathering testing tools
the discovery in the last process are installed
phase to step, the begins again to gain
make an tester will to identify additional
informed now seek to mechanisms information or
attempt to gain complete to gain access or a
access the control of the access to combination
target system additional of both
(administrator systems
-level access)
Figure 6-2 The NIST SP 800-115 attack phase steps with loop back to discovery phase
CRISC Certified in Risk and Information Systems Control All-In-One Exam Guide
164
Finally, reporting is occurring continuously throughout the process; the reporting
requirements are often laid out within the rules of engagement or management approval
documentation. Generally there is a big final report at the end that details all the find-
ings, but there could be weekly, or even daily, reports that are required, as well as "spot
reports" in the event of an incident or a major finding. Be sure you detail what is expect-
ed for reporting up front!
Protocol Analyzer
A protocol analyzer is often known as a sniffer and is dedicated hardware or software
that collects network traffic for the purposes of examination, either to determine net-
work issues or to capture plain-text usernames, passwords, or other sensitive information
being sent in the clear. Encryption helps protect against the malicious use of a protocol
analyzer; while the data can still be captured, the encrypted data is gibberish until it's
unencrypted.
Port Scanner
A port scanner allows the tester to determine which ports on the system are listening for
requests; this is a crucial step in determining what can be exploited. There are a standard
set of ports, including 65,535 TCP ports and User Datagram Protocol (UDP) ports, avail-
able for running services on a system. The first 1,024 are well-known or common ports,
such as FTP (21), SMTP (25), DNS (53), HTTP (80), and HTTPS (443). After the first
Chapter 6: Control and Risk Monitoring
165
1,024 ports are port ranges used by applications, services, and other devices. Table 6-1 lists
the most common services and their corresponding TCP/IP ports.
Vulnerability Scanner
When a tester has determined which systems are available on the network, the next step
is to determine the associated vulnerabilities. A vulnerability scanner is a piece of software
designed to scan a system to determine what services the system is running and whether
any unnecessary open ports, operating systems and applications, or back doors can be
exploited because of a lack of patching or other flaw. Administrators commonly use the
same tools to test and remediate any flaws existing within the system. Vulnerability scan-
ners can include previously mentioned tools within their kit, such as port scanning, net-
work scanning and mapping, and operating system and application server scanning, and
can include a database of known weaknesses vulnerabilities. The scanner will execute one
or more of those tools against the targets to determine whether any of the vulnerabilities
listed in its database exist.
• Specific
• Measurable
• Attainable
• Relevant
• Timely
When a KPI is S.M.A.R.T., it is tailored to the organization and the area being mea-
sured. Are you attempting to measure availability? And you may want to look at a metric
that measures how often your systems go down or, the converse, the percentage of time
that your systems are up. Measurable KPis can be measured somehow, in a way that can
be assured that it is accurate. In the instance of the availability measurement, how would
you measure this accurately? Perhaps you would determine how often the systems went
down based on the uptime command in the Unix operating system. However, there are
other ways to measure this such as "When a KPI is attainable, it is readily achievable."
While it is admirable to shoot for the stars, you wouldn't want to, for instance, shoot for
100 percent uptime in a situation where you have an entirely new staff, new equipment,
new management, and so on. Perhaps 85 percent is more achievable, and then you can
work toward that 100 percent mark. KPis that are relevant matter to your organization.
If you're in a situation where time is of the essence, such as stock trading, availability is
essential. Without availability, your systems cannot buy or sell stocks, and your user base
will quickly move on to another organization that values availability as much as they do.
However, other contexts, such as educational institutions, may not care so much about
availability. Usability might be the word of the day, or it might be the ability to access
content via mobile applications or other cutting-edge technologies. Think about what's
important or relevant to your organization when determining your KPis. Finally, timely
KPis allow the data to be collected when needed to quickly determine the performance
of your measured initiative. Data should be able to be obtained relatively easily from
existing sources and repositories.
A number of academic institutions have done some really great work on KPis and
metrics that is useful for anyone looking to define solid KPis. For example, Cornell
University has conducted research on the business of KPis and has determined that KPis
should include the following attributes:
The Oak Ridge Institute for Science and Education has also published questions that
can help you determine the quality of your metrics.
NIST also has some great information on performance measurement within its Special
Publication 800-55, revision I, "Performance Measurement Guide for Information Secu-
rity." In this document, NIST lists three types of measures: implementation measures,
Chapter 6: Control and Risk Monitoring
169
effectiveness/efficiency measures, and impact measures. NIST states that implementa-
tion measures are used to demonstrate progress in implementing information security
programs, specific security controls, and associated policies and procedures. Effective-
ness/ efficiency measures are used to monitor if program-level processes and system-level
security controls are implemented correctly, operating as intended, and meeting the
desired outcome. Finally, impact measures are used to articulate the impact of informa-
tion security on an organization's mission. To that end, NIST 800-55 lists the following
security requirements that are a great basis for lowering risk within an organization and
an excellent basis for KPis:
Root-Cause Analysis
Finally, it is important to use indicators that measure the root cause of any issue and
don't focus on the symptoms themselves. Root-cause analysis (RCA) has its roots in
rocket science, and NASA has used it to determine faults within its programs. Essentially,
RCA looks to establish a causal relationship between the root cause (or causes) and the
problem as it has manifested itself. While we won't get into the details (or even basics)
of rocket science, it is easier to understand how the culture of space exploration, and
attempting to lower risk in such a complex environment, helps you to understand the
importance of digging deep for the root cause. For example, the tragic Challenger shuttle
disaster manifested itself with an explosion 73 seconds after liftoff. That is the problem,
with a loss of seven crewmember lives, but the root cause is deeper and must be critically
analyzed. In the end, root-cause analysis showed that a rubber 0-ring failed, causing the
disintegration of the spacecraft and the loss of all lives. Understanding that root cause has
saved dozens oflives in subsequent space missions because of redesigns and modifications
that were made as a result.
Reporting
At the end of the day, risk professionals need to make sure they have a clear understand-
ing of the exposures their organization faces, the active mitigations for those exposures,
and the indicators that are being used to measure the success or failure of the control
set, as well as the current risk posture as measured against the risk appetite. This all
needs to be communicated to the stakeholders. Articulating risk should not be under-
estimated; this is the place where you win hearts and minds through improving the
bottom line by reducing negative risk and capitalizing on positive risk. Responsible
reporting involves helping leadership understand the risks to the organization and how
critical it is to support their reduction through compliance with appropriate controls, as
well as identifying business opportunities in areas that can withstand risk. This needs to
be done in the most clear and concise manner possible, understanding the concepts of
risk, the indicators that have been chosen, and the current statuses that allow leadership
to make the best-informed decisions possible. Without the best possible information,
you cannot expect leadership to make informed decisions. You also need to interpret
technical findings and perhaps portray information in a manner that is less technical
and more "business speak." What does this mean? When is the last time that you heard
a senior leader within your organization use purely technical jargon to describe ongo-
ing business performance? Maybe if you are at a tech company, this is normal, but for
the rest of us, we need to still place this information in a format that is understandable
for leadership. By doing this, you will not only make the point that the risk program is
useful and worthwhile and is supporting business goals and objectives but also identify
opportunities for the risk program (and associated reporting) to integrate throughout
the enterprise more cleanly.
NOTE Communicating clearly will help you receive more useful guidance
from your organization's leadership; while that may sound like a drag, in fact,
it will facilitate all of those previous "good news" opportunities.
Chapter Review
In this chapter, we discussed how you can assess and monitor the efficiency and effec-
tiveness of controls and risk. We discussed different types of testing and assessment,
including threat assessment, vulnerability assessment, and penetration testing. Threat
assessments determine how threats, both of the natural and human-made type, might
harm your systems and, subsequently, the data residing on those systems. Vulnerability
assessments are designed, often by a third party, for an organizational inventory that
includes scans and other tests against those assets and includes a report of the vulner-
abilities that have been found. Penetration tests, unlike vulnerability assessments, are
designed to actually exploit weaknesses on a system. Penetration tests take a vulnerability
assessment a step further in that they tell you all of the actual vulnerabilities based on
their having been exploited, not just the probability of them. Black-box tests, or blind
tests, mean that penetration testing is performed with no prior knowledge about the sys-
tem design and architecture, personnel and organizational structure, and other attributes
that could shed light on inherent weaknesses. The gray-box test differs in that the tester
has some knowledge, albeit limited, of the organization and its infrastructure. Finally,
there's the white-box test, where the tester has full knowledge of the network and access
to diagrams of the network, information in detail of hosts and services on the network,
and potentially documentation from previous testing events.
We then covered the tools that are often used to conduct those assessments and tests,
both passive and active. Passive tools are used when you desire no interference with daily
activities and listen for network traffic or monitor the hosts they reside on quietly and
with little to no impact on the ongoing operations. At the opposite end of the spectrum,
active tools interact actively with a system, which has pros and cons as well. These tools
can often give you a more realistic perspective of vulnerabilities and the overall control
effectiveness but can cause performance issues, sometimes even denials of service. We
subsequently detailed a sampling of tools, including protocol analyzers, port scanners,
and vulnerability scanners.
We then covered indicators associated with measuring and reporting performance
and current risk levels accurately and efficiently. Key performance indicators are used
to understand and enable the measurement of control performance. Key risk indicators
are considered to be highly probable indicators designed to accurately predict important
levels of risk based on defined thresholds. Both KPis and KRis should be specific, mea-
surable, attainable, relevant, and timely, and the root cause should be taken into account
to ensure that indicators measure the root cause of any issue and don't focus on the symp-
toms themselves. We then discussed the need to determine what data you can collect to
help measure indicators effectively.
Chapter 6: Control and Risk Monitoring
175
Review Questions
1. _ _ _ _ _ are often conducted to identify matching threat and vulnerability
pairings.
A. Vulnerability assessments
B. Threat assessments
C. Penetration tests
D. Gray-box tests
2. _ _ _ _ _ often occur from an internal point looking across the organization
to get the best look at the vulnerabilities without the interference of the perimeter
protections.
A. Threat assessments
B. Penetration tests
C. Vulnerability assessments
D. Black-box tests
3. _ _ _ _ _ are designed to exploit weaknesses on a system.
A. Threat assessments
B. Penetration tests
C. Vulnerability assessments
D. White-box tests
4. A _____ means that a penetration test is performed with no prior
knowledge about the system design and architecture, personnel and organizational
structure, and other attributes that could shed light on inherent weaknesses.
A. Clear test
B. White-box test
C. Gray-box test
D. Blind test
5. In a _ _ _ _ _ test, those charged with defending the network are unaware
of the testing and are tested on their ability to react and defend as if a real-world
attack were taking place.
A. Double-blind
B. Gray-box
C. White-box
D. Penetration
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
176
6. Jim wants to conduct a scan using a tool that can be used during business hours
with minimum disturbance to operations. Which is the most likely to support
his needs?
A. Active tools
B. Impact tools
C. Penetration tools
D. Passive tools
7. A _ _ _ _ _ is dedicated hardware or software that collects network traffic
for the purposes of examination, either to determine network issues or to
capture plain-text usernames, passwords, or other sensitive information being
sent in the clear.
A. Port scanner
B. Protocol analyzer
C. Vulnerability scanner
D. Penetration tester
8. A _ _ _ _ _ allows the tester to determine which ports on the system are
listening for requests.
A. Port scanner
B. Protocol analyzer
C. Vulnerability scanner
D. Penetration tester
9. A _ _ _ _ _ is a piece of software designed to scan a system to determine
what services the system is running and whether any unnecessary open ports,
operating systems and applications, or back doors can be exploited because of a
lack of patching or other flaw.
A. Port scanner
B. Protocol analyzer
C. Vulnerability scanner
D. Penetration tester
10. John is reviewing the results of a vulnerability assessment on his Unix-based
network and finds a Windows patch missing. What is the likely finding?
A. False positive
B. False negative
C. False flag
D. False vulnerability
Chapter 6: Control and Risk Monitoring
177
11. _ _ _ _ _ are used to understand and enable the measurement of control
performance.
A. Key performance indicators
B. Key control indicators
C. Key risk indicators
D. Key monitoring indicators
12. _ _ _ _ _ are considered to be highly probable indicators designed to accurately
predict important levels of risk based on defined thresholds.
A. Key performance indicators
B. Key control indicators
C. Key risk indicators
D. Key monitoring indicators
13. _ _ _ _ _ measurements can be derived from historical trend analysis,
experience, expert opinion, existing internal and external environmental factors,
governance, and other inputs that are not always necessarily quantifiable.
A. Quantitative
B. Objective
C. Solid
D. Qualitative
14. _____ methods use concrete (nonsubjective) numerical values and statistical
analysis to calculate the likelihood and impact of risk. (Choose the best answer.)
A. Quantitative
B. Objective
C. Solid
D. Qualitative
15. When a KPI is S.M.A.R T., it is which of the following? (Choose all that apply.)
A. Short
B. Measurable
C. Right
D. Timely
16. What NIST SP 800-55 security requirement requires organizations to limit access
to authorized users?
A. Awareness and training
B. Audit and accountability
C. Access control
D. Configuration management
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
178
17. What NIST SP 800-55 security requirement states that organizations must
establish and maintain baseline configurations and inventories of organizational
information systems?
A. Awareness and training
B. Audit and accountability
C. Access control
D. Configuration management
18. ISACA's Risk IT Framework includes which criteria? (Choose two.)
A. Impact
B. Meaningfulness
C. Reliability
D. Efficiency
19. The process of _ _ _ _ _ helps to determine a causal relationship between a
cause and the manifested problem.
A. Causal analysis
B. Root-cause analysis
C. Indicator analysis
D. Exploratory analysis
20. _ _ _ _ _ can contain valuable information about past and ongoing activities
and, when handled properly, can be timely.
A. Metrics
B. Accreditations
C. Indicators
D. Logs
Answers
Information Systems
Control Concepts
In this chapter, you will:
• Learn the basic concepts of controls
• Examine different control frameworks
We've discussed controls throughout this book so far, but always from a risk identifica-
tion, assessment, analysis, and response perspective. There's a lot more to be learned
about security controls and how they are designed and implemented. In this chapter, we
will begin to change direction a bit and focus on controls from those perspectives. We
will review some basics regarding controls, and you will learn about how you select them
to perform specific functions in protecting systems and data. We'll also review a few key
control frameworks in detail, including the National Institute of Standards and Technol-
ogy (NIST) control catalog, COBIT, and Val IT.
The CRISC exam objective covered in this chapter includes coverage of the following
task statement:
You'll find that this chapter only begins to cover this objective; coverage on con-
trol design and implementation is also the focus of Chapter 8. This chapter essentially
covers the prerequisite knowledge on controls that you should have before an in-depth
discussion on their use in managing risk, as well as in designing and implementing con-
trols. Control selection, as well as their use in mitigating and managing risk, is discussed
further in Chapter 8 and has also already been briefly touched on in Chapters 4 and 6.
Additionally, you'll find that this chapter covers much more material than you might
find on the exam; this is for two important reasons. First, it's important that you under-
stand foundational and conceptual knowledge about controls and some of the relevant
control frameworks you will find both on the exam and in the real world as a risk and
control assessor. Second, this book is intended to be not only a study guide for the exam
but also a comprehensive reference you will use even after you have passed the CRISC
exam.
181
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
182
EXAM TIP Controls are measures implemented to reduce the likelihood and
impact elements of risk and may target specific vulnerabilities in an asset or
be used to generally protect several assets.
Control libraries or catalogs are defined sets of controls that can be used in a given
set of circumstances, market, or area. Controls are often tied to governance directives
and frameworks, but this isn't always the case. Sometimes different regulations or even
process frameworks reference controls only to the extent that a control framework is
required, but not to specify which control catalog must be used. The Health Insurance
Portability and Accountability Act (HIPAA) is a good example of this scenario because
HIPAA requires security and risk controls, but it does not specify which control set
must be used (although HIPAA guidance does recommend the NIST control catalog).
As another example, while references to controls are specifically called out in the ISACA
Risk IT Framework (RR 2.1, "Inventory Controls," and RR 2.4, "Implement Controls"),
the framework itself does not give any clear guidance on how controls are defined, select-
ed, or implemented. The assumption is that implementing the framework will show you
how to use and evaluate whichever control set you choose, especially if it's the CO BIT
5 or Val IT control sets, which are also associated with ISACA. The NIST Risk Man-
agement Framework (RMF), in contrast, does provide guidance on how its controls are
constructed, used, and assessed, devoting two entire publications to this subject.
Specific product or market environments may require the use of specific controls that
are context-related, as indicated in Table 7-1.
Controls in a given framework are often organized according to a particular area or
context, usually by functionality or relevance. For instance, NIST controls are broken
down into families, which are categories that apply to a specific context. As an example,
Physical and Environmental Protection (PE) controls address physical and environmen-
tal concerns such as physical access control and environmental factors (lighting, humid-
ity, and temperature), while the Program Management (PM) control family addresses
management processes that often appear as administrative controls, such as formally
Chapter 7: Information Systems Control Concepts
183
Area or
Environment Oovernance Corresponding Control Set
appointing a responsible information security officer, for example. Most other control
frameworks discussed in this chapter similarly categorize controls, usually by process area
or other relevant aspect of context.
TIP You'll find that most control libraries similarly group controls into
specific categories based upon function or context, and most use specific
identifiers for each control.
Which controls from the various frameworks are used by an organization depends
on several factors, including governance, market segment or area, level of regulation,
and internal factors such as risk tolerance, appetite, and maturity of risk management
processes. We cover more of how controls are selected, designed, implemented, and used
later in this chapter and in the next chapters, but suffice it to say for now that con-
trols are usually developed and applied to specific risk scenarios. These risk scenarios
are developed by the organization or industry as part of their risk identification process.
They describe threats, threat actors, events, time, and other circumstances, but of course,
control assignment and use may be required by legal or regulatory governance, as well as
the needs of the organization that intends to employ them. It's also fairly common that
an organization will use more than one control set or framework because it may apply
differently to various aspects of the business or mission areas in an organization. For
example, a hospital may use NIST controls for some areas but may also be required to
use PCI-DSS controls because it may process payments from credit cards as patients pay
for medical services.
In examining the various control frameworks, you'll also find that there are many sim-
ilarities between controls in some instances; often a control in one framework has a close
equivalent in another framework. For example, CO BIT control PO? loosely maps to the
NIST training control, AT- I, but describes a more generic process than the equivalent
NIST control. There will also be controls that have no matching control or even context
in another framework; these are often controls that deal with specific instances of risk or
security requirements unique to a particular environment.
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
184
NOTE Most control catalogs have controls that can be easily mapped to
controls in other catalogs, although in some cases, this mapping may be
imprecise, may not be as detailed, or may even map to multiple controls in
another control library.
Control Classification
We discussed in earlier chapters how different controls are classified and categorized, and
those different categorizations are worth repeating here. The first way of categorizing
controls is in terms of their application to different aspects of security. We often catego-
rize controls in terms of administrative, technical, and physical controls. Administrative
controls, if you remember correctly, are those that apply to policies, procedures, person-
nel, training, and so on. For example, a formally documented policy detailing how often
backups should be made, to what type of media, and under what circumstances would be
considered an administrative control. Related to that would be a technical control, which
would be the backups themselves since data is backed up, preventing its loss. Obviously,
the physical control aspect in this particular example would be the physical protection of
the backup media, in terms of physical access, storage, and transport.
Yet another way of categorizing controls that we have discussed is according to func-
tion. Previously we identified several different functions that controls can fulfill and
noted that some controls may serve more than one function at a time. Typically, these
functions are normally considered to be deterrent, preventative, detective, corrective,
compensating, and recovery. Note that different security texts and frameworks may cat-
egorize these functions differently. A deterrent control is one that prevents an action or
issue from occurring, as does a preventative control. The difference here, however, is
that a deterrent control must be known to someone in order to prevent an action. For
example, a firewall rule that prevents someone from sending sensitive data outside the
organization will work regardless of whether someone realizes the rule is in place. This
would be considered a preventative control in this case. A deterrent control, however, is
designed to keep an individual from even attempting to do so. A deterrent control in this
case might be simply a warning message that pops up when someone attempts to send a
specific type of sensitive data outside the network, in an e-mail, for example. A preven-
tative control will work regardless of whether the individual is aware of it. A deterrent
control relies on knowledge of the control in order to perform its deterrent action but
may still prevent the action from taking place.
Detective controls serve to alert the proper individuals and management that a secu-
rity issue has occurred. An example would be an intrusion detection system or a building
alarm. Corrective controls typically are used to remediate an immediate or temporary
Chapter 7: Information Systems Control Concepts
185
deficiency or weakness; you may see them put into place if a regular or permanent con-
trol is not performing its function sufficiently. Similar to a corrective control is a com-
pensating control. A compensating control is used to make up for a deficiency in an
established control. Corrective and compensating controls may be temporary in nature,
until a more permanent solution can be found, either by strengthening the existing con-
trol or by completely replacing it with a better solution. Often, the same solution that
was considered a corrective or compensating control, once it is considered permanent,
may be considered simply a deterrent or preventative control, for instance. A recovery
control is one that is used to recover the organization, system, or data to its previous
state in the event of an incident. Restoring a system from backup might be considered
a recovery control, even though actually backing up the data in the first place would be
considered a preventative control. As previously mentioned, controls could be considered
to be fulfilling several different functions simultaneously, so how you would categorize
control with regard to these functional areas would depend upon the context in which
you're discussing it.
Control Selection
Controls are applied to a system, data, process, or even organizational element to address
a weakness or vulnerability or to counter a specific threat. Often, controls are applied to
address a specific risk response strategy, such as risk reduction/mitigation, transference,
avoidance, and acceptance. Controls are applied to reduce the impact and likelihood ele-
ments of risk, as follows:
Note that none of the scenarios listed earlier describes a case where a control prevents
a threat or a threat actor. Threats and threat actors exist, and controls can't really prevent
their existence. Controls can, however, affect how they interact with vulnerabilities and
assets. Also note that all these strategies may be pursued simultaneously in the case of
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
186
controls that are well designed and effective, using the concept of economy of scale and
multiple use of controls.
EXAM TIP Remember that controls can affect the likelihood or impact risk
elements only by reducing vulnerabilities or protecting assets. They cannot
eliminate or reduce threats or threat actors; they only serve to reduce
likelihood or impact resulting from an attempted or successful exploitation
of a vulnerability by a threat.
Control Frameworks
Now that we've covered some generalities about controls, it's time to look at various
control frameworks that you might use in your professional career. Keep in mind that
some control frameworks go more in-depth than others on their controls; some controls
in a given framework may treat a particular subject area lightly, while others may go into
detail on a particular subject area. Also keep in mind that some control frameworks are
geared toward specific environments or areas, and not all frameworks are necessarily
geared toward security specifically; some frameworks apply to a broad general business or
risk management area but may have security controls built into them for specific needs
or direct security actions from a higher level. Not all control frameworks are technical
in nature either; some frameworks apply to security and risk from a business process
perspective rather than a technical perspective. The control frameworks we'll describe in
the following sections are just some of the more popular ones that you may encounter in
your professional career. You'll also see that we spend more time talking about the NIST
control catalog than we do the others; this is because it is simply one of the more popular
frameworks and one of the more comprehensive. It's also applicable to a wide variety of
risk management programs and efforts. It's flexible, lending itself to almost any type of
management framework an organization could use. However, we will also describe some
of the other control frameworks you will encounter.
NIST
The U.S. Department of Commerce's NIST has produced several documents, some
of which we have already discussed, that relate to risk management. The entire Risk
Management Framework, and all of its different components, spans several documents.
We will provide a comprehensive review of the framework and its related documents in
Appendix A, but for now we'll examine a particular piece of the framework, the controls
catalog. NIST Special Publication 800-53, "Security and Privacy Controls for Federal
Information Systems and Organizations," is the control catalog supporting the RMF.
The NIST controls are a comprehensive set of security measures and processes intended
to mitigate and reduce risk from an IT security perspective.
The NIST control catalog is divided into 18 control groups, called families, each
related to a particular aspect ofIT security. Table 7-2 lists these families.
Chapter 7: Information Systems Control Concepts
187
Control Number of
Control Family Designation Controls In Family
Access Control AC 25
Awareness and Training AT 5
Audit and Accountability AU 16
Security Assessment and Authorization CA 9
Configuration Management CM 11
Contingency Planning CP 13
Identification and Authentication IA 11
Incident Response IR 10
Maintenance MA 6
Media Protection MP 8
Physical and Environmental Protection PE 20
Planning PL 9
Program Management PM 16
Personnel Security PS 8
Risk Assessment RA 6
System and Services Acquisition SA 22
System and Communications Protection SC 44
System and Information Integrity SI 17
Table 7-2 The NIST Control Families
As you can see, the NIST control families span a great deal of subject areas. Also note
that each family has several controls in it; there are smaller families (such as the Aware-
ness and Training family, for example) that may have as few as five controls, but there are
others that have many different controls that go into great detail on security measures; an
example is the System and Communications Protection (SC) control, with 44 controls.
One thing to keep in mind about the numbers of controls for each family is that often, as
the control catalog goes through editing or revisions, some controls may be merged with
others or withdrawn entirely; this does not change the control numbering in subsequent
revisions for backward compatibility and reference purposes. So, for example, the SC fam-
ily, with 44 controls listed, actually has only 41 controls because three have been "with-
drawn," but their numerical placeholder remains to avoid confusion with later versions.
Supplemental Guidance:This control applies regardless of whether the logon occurs via a local or
network connection. Due to the potential for denial of service, automatic lockouts initiated by
information systems are usually temporary and automatically release after a predetermined time
period established by organizations. If a delay algorithm is selected, organizations may choose to
employ different algorithms for different information system components based on the capabilities
of those components. Responses to unsuccessful logon attempts may be implemented at both the
operating system and the application levels. Related controls: AC-2, AC-9, AC-14, IA-5.
Control Enhancements:
Figure 7-1 An example of a NIST control {AC-7), from NIST Special Publication 800-53
Chapter 7: Information Systems Control Concepts
189
guidance that helps to further detail the control and amplify what the control is about.
Some controls also have control enhancements, which serve to further refine or restrict
the controls, typically in environments that require a higher-level security or more in-
depth application of the control. Control enhancements get into the finer details and are
more specific than the basic control. There may also be, where appropriate, references
that apply to the control; usually these are from other publications or sources that give
further guidance on the logic and reasoning behind applying the control, or even best
practices associated with it. Many of these references are NIST-related or other types of
publications. The last parts of the control that we will cover are the priority and baseline
elements. All controls are assigned a particular priority, from PO through PS, which indi-
cates the relative order in which a control should be applied. Controls marked as a P 1, as
the highest priority, given budgetary, resource, or environmental constraints, should be
applied prior to controls that have a lower-priority rating, such as a P2 or P3. Controls
marked as PO are actually the lowest priority. In the case of the example in Figure 7-1,
this control is considered a P2.
The baseline is considered a select level of security or assurance based upon the earlier
step in the RMF of security categorization (discussed further in Chapter 8). Properly
done, security categorization indicates the level of sensitivity or level of security at which
the asset should be protected. These baselines, in NIST, are designated as low, moderate,
and high. Sets of controls are assigned to one or more levels of security baselines. In the
case of the example in Figure 7-1, the AC-7 control should be applied to all three security
baselines, although other controls in other instances may be applied only to medium or
high baselines, depending upon the security categorization of the data asset or the needs
of the organization. All controls listed in the NIST catalog have these elements; this con-
trol is actually one of the simpler examples since many controls have many more control
enhancements and may also belong to different levels of security baselines. You should
take the time to review and try to understand how controls are laid out in NIST Special
Publication 800-53.
EXAM TIP You will likely not be tested on any specific NIST controls;
however, it's a good idea to have this knowledge in order to differentiate
among the different control frameworks you may see on the exam, as well as
for real life.
Figure 7-2 An example of how to assess a NIST control (AC-6(10)), from NIST Special
Publication 800-53A
COBIT
COBIT (previously known as Control Objectives for Information and Related Tech-
nology but now typically referred to by its acronym) is a management and governance
framework developed and used extensively by ISACA in its various risk management and
business process frameworks. COBIT version 5, the current version, has incorporated
other ISACA-related frameworks, such as the Risk IT Framework and Val IT. COBIT
controls cover various areas, including auditing, compliance, information assurance, IT
operations, and security risk management, but typically from a higher-level perspective
than you might see in the NIST framework. As a governance and management control
framework, COBIT focuses more on the process level, rather than the implementation
details. We presented some basic information about COBIT in Chapter 1, but to refresh
your memory, the following are the CO BIT governance and management domains:
You may notice some similarities to the NIST framework described earlier; controls
are broken down into relevant areas, similar to NIST families, and numbered appro-
priately. Like NIST, these controls have subcategories with lower-level breakdowns. For
instance, APO12: Manage Risk breaks down into subprocesses that include the follow-
ing: APO12.0l, Collect Data; APO12.02, Analyze Risk; APO12.03, Maintain a Risk
Profile; and so on. While there's no one-to-one matching of CO BIT controls to NIST,
obviously there are some generalities that could be considered equivalent. In the previous
example, COBIT's APO12: Manage Risk process might map loosely to the NIST Risk
Assessment (RA) family of controls.
EXAM TIP Remember that COBIT 5 has integrated both Val IT (discussed in
the upcoming section) and the Risk IT Framework and serves as the "parent-
level" framework for implementing both of these frameworks.
Val IT
A discussion of Val IT may be a moot point in this chapter regarding control frameworks,
but it's worth mentioning because it is part of CO BIT and works closely with the Risk
IT Framework. Val IT is a governance and management framework developed by the IT
Governance Institute. Previously used in more of a stand-alone context, it has primarily
been absorbed as part of CO BIT 5. It consists of three main domains: Value Governance
(VG), Portfolio Management (PM), and Investment Management (IM). While its pur-
pose is to obtain business value from IT investments and infrastructures, it can be used as
the logistical and mechanical business process and governance framework used to justify
control implementation and security programs that affect IT and business risk. It can
also be used as guidance in managing IT portfolios and programs, including the security
aspects of those programs. The three domains in Val IT are broken up as follows:
As you can see from the domain processes, Val IT seeks to derive and monitor value
from IT; it also closely corresponds with other processes discussed throughout this book
that help to control and minimize both IT and business risk, such as the system develop-
ment life cycle (SDLC) and portfolio and project management processes.
EXAM TIP While you won't be expected to know Val IT's domains and
breakdowns in detail, it's a good idea to at least have a basic understanding
of the framework and its purpose.
PCI-D55
The Payment Card Industry Data Security Standard (PCI-DSS) is a set of security
requirements levied on merchants that process credit card transactions. The standard
was developed jointly by the major payment card industry players, including Discover,
Visa, MasterCard, and American Express. The standard was developed in an effort to
impose security requirements and controls on retailers (merchants and service providers)
to reduce credit card fraud and identity theft. Note that PCI-DSS is not a law; rather, it
is an effort by the credit card industry to self-regulate. While not a law, it does have the
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
194
Control Objective Requirement
Build and 1. Install and maintain a firewall configuration to protect cardholder data.
Maintain a Secure
2. Do not use vendor-supplied defaults for system passwords and other
Network and
security parameters.
Systems
Protect 3. Protect stored card holder data.
Cardholder Data
4. Encrypt transmission of card holder data across open, public networks.
Maintain a 5. Protect all systems against malware and regularly update anti-virus
Vulnerability software or programs.
Management
6. Develop and maintain secure systems and applications.
Program
Implement Strong 7. Restrict access to card holder data by business need to know.
Access Control
8. Identify and authenticate access to system components.
Measures
9. Restrict physical access to card holder data.
Regularly Monitor 10. Track and monitor all access to network resources and card holder data.
and Test Networks
11. Regularly test security systems and processes.
Maintain an 12. Maintain a policy that addresses information security for all personnel.
Information
Security Policy
Table 7-3 PCI-DSS Control Objectives and Requirements
effect of being mandatory governance requirements; retailers must comply with PCI-
DSS to be allowed to process credit cards from the major industry brands. A few U.S.
states, however, have codified into their laws the use of PCI-DSS standards.
The PCI-DSS (currently in version 3.1 as of this writing) is a set of 6 control objec-
tives, broken down into 12 major requirements, which are further broken down into
subrequirements. Table 7-3 lists the basic PCI-DSS requirements.
On the surface, these objectives and requirements don't seem to go much in depth.
Understand, however, that PCI-DSS further decomposes the requirements into detailed
processes and procedures. The standard also provides guidance for testing at the control
level. For example, requirement 5, "Protect all systems against malware and regularly
update anti-virus software or programs," breaks down into four subrequirements, some
of which break down even further. Requirement 5.1.2, continuing the example, specifies
continuous monitoring and evaluation of hosts for malware threats. All in all there are
actually more than 200 subrequirements, the equivalent of controls.
EXAM TIP You likely won't be asked any control-specific questions on the
exam, but you should keep in mind where it's applicable: to merchants
and retailers that process credit card transactions. You can find more
detailed information on the PCI-DSS standards at the website of the PCI
Security Standards Council at https://www.pcisecuritystandards.org/
security_standards/.
Chapter 7: Information Systems Control Concepts
195
Other Control Frameworks
We've only scratched the surface of the many different control sets and frameworks avail-
able to risk practitioners and organizations. In some cases, an organization may settle on
one control framework, but this usually isn't the case. Many times an organization will
have additional control sets it must use to meet a variety of governance requirements or
to apply to specific parts of its business. Hospitals, for example, must abide by HIPAA
regulations, which recommend (but do not require) the use of NIST controls. Simulta-
neously, they may also be subject to PCI-DSS controls since they likely use credit cards
to process financial transactions for patient billing. Other governance may require that
they adhere to other control frameworks, such as the International Organization for
Standardization (ISO) and the International Electrotechnical Commission (IEC) stan-
dards. Obviously, we can't cover all the potential control sets and frameworks you will
encounter in the field, but we've covered the major ones and will touch upon a few others
of significance in the following sections.
1S0/IEC Controls
Although we've primarily discussed different control sets that originate in the United
States (such as PCI-DSS and NIST), most of the various control frameworks map to,
and in some cases, originate from standards used worldwide and developed by interna-
tionally respected governing bodies. In Chapter 4, we briefly mentioned some of these
standards, including those from ISO and IEC. The ISO and IEC produce informa-
tion technology standards that are used internationally, including several that apply to
information security and risk management. You may see individual standards prepared
by each of these organizations, but you may also see combined standards, usually indi-
cated as ISO/IEC for those standards that are jointly developed. We discussed standards
that applied more specifically to risk assessments in Chapter 4, but there are also ISO/
IEC standards that are essentially control requirements. Two examples are ISO/IEC
27001, "Information Technology-Security Techniques-Information Security Manage-
ment Systems-Requirements," and ISO/IEC 15408, "Information Technology-Security
Techniques-Evaluation Criteria for IT Security" (more widely known as the Common
Criteria).
In addition to the mapping that the NIST Cybersecurity Framework provides to dif-
ferent control sets and requirements (discussed in an upcoming section), NIST Special
Publication 800-53, the NIST control set, provides a convenient mapping as well to both
ISO/IEC 27001 and 15408 control sets in its appendixes. Figure 7-3 shows a snippet
mapping NIST controls to ISO/IEC 27001, and Figure 7-4 shows the reverse mapping.
Figure 7-5 illustrates the mapping ofISO/IEC 15408 to the NIST 800-53 controls. All
three figures were taken from NIST Special Publication 800-53.
In examining these control mappings, a few points should stand out. First, there's not
necessarily a straight one-to-one mapping of controls. In some cases, the requirements
for a given control in a control set may map to one, many, or even none of the other
control set's controls. Second, controls tend to follow similar patterns and requirements,
such as acceptable use, password requirements, media storage, encryption, and so on.
Most controls from the various control sets have these commonalities because all of them
CRISC Certified In Risk and Information Systems Control All-In-One Exam Guide
196
NIST SP 800-53 CONTROLS ISO/IEC 27001 CONTROLS
AC-1 Access Control Policy and Procedures A.5 .1. 1, A.5.1.2, A.6.1.1, A.6.1.2, A.6.1.3, A.8. 1.1, A.10.1.1,
Al 0.8.1, A.11.1.1, A.11 .3.3, A.11.4.1, A 11.6.1, A.11.7.1,
A.11.7.2, A.12.3.2, A.15.1.1, A.15.2.1
AC-2 Accou nt Management A.8.3.3, A.11.2.1 , A.11.2.2, A.11.2.4, A.11.5.2, A.11.5.5,
A.11.5 .6
AC-3 Account Enforcement A.7 .2.2, A.10.6.1 , A.10.7.3, A.10.7.4, A.10.8.1, A.10.9.1,
A.1 0.9.2, A.10.9.3, A.11 .2.2, A.11.5.4, A.11 .6.1 , A 12.4.3,
A.15 .1.3
AC-4 Information Fl ow Enforcement A.7.2.2, A.10.7.3, A.10.8.1 , A.11.4.5, A.11.4.7, A.12.5.4
AC-5 Separation of Duties A.10 .1.3
AC-6 Lea st Privileqe A.11 .2.2, A.11.4.1, A.11 .4.4, A.11.5.4, A.11.6.1, A.12.4.3
AC-7 Un successful Logan Attempts A.11.5 .1
AC-8 System Use Notification A.6.2.2, A.11.5 .1, A.15.1.5
AC-9 Previou s Loqon (Access) Notification A.11.5 .1
AC-10 Concurrent Session Control None
AC-11 Session Lock A.11.3.2, A.11.3.3, A.11.5.5
Figure 7-3 NIST controls mapped to ISO/IEC 27001 (from NIST Special Publication 800-S3)
A.12.3 Backup
A.12.3.1 Information backu p CP-9
A.12.4 Logg ing and monitoring
A.12.4.1 Event logging AU-3, AU-6, AU-11, AU-12, AU-14
A.12.4.2 Protection of log information AU-9
A.12.4.3 Admini strator and operator log s AU-9, AU-12
A.12.4.4 Clock synchronization AU-8
A.12.5 Control of operational software
A.12.5 .1 In stallation of software on operational system s CM-5, CM-7(4), CM-7(5), CM-11
A.12.6 Technical vulnerability management
A.12.6.1 Management of technical vulnerabil ities RA-3, RA-5, 51-2, 51-5
A.12.6.2 Restriction s on software in stallation CM-11
A.12.7 Information systems audit considerations
A.12.7.1 Information system s audit controls AU-5*
A.13 Communications sec urity
A.13.1 Network security management
A.13.1.1 Network controls AC-3, AC-17, AC-18, AC-20, SC-7, SC-8, SC-10
A.13.1.2 Security of network services CA-3, SA-9
Figure 7-4 ISO/IEC 27001 control requirements mapped to NIST 800-S3 controls (from NIST
Special Publication 800-S3)
Chapter 7: Information Systems Control Concepts
197
ISO/IEC 15408 REQUIREMENTS NIST SP 800-53 CONTROLS
FAU_GEN.2 Security Audit Data Generation AU-3 Content of Audit Records
User Identity Association
FAU_SAA.1 Security Audit Analysis 51-4 Information System Monitoring
Potential Violation Analysis
FAU_SAA.2 Security Audit Analysis AC-2(12) Account Management
Profile-Based Anomaly Detection Account Monitoring/ Atypical Usage
51-4 Information System Monitoring
FAU_SAA.3 Security Audit Analysis 51-3(7) Malicious Code Protection
Simple Attack Heuristics Non Signature-Based Protection
51-4 Information System Monitoring
FAU_SAA.4 Security Audit Analysis 51-3(7) Malicious Code Protection
Complex Attack Heuristics Non Signature-Based Protection
51-4 Information System Monitoring
FAU_SAR.1 Security Audit Review AU-7 Audit Reduction and Report Generation
Audit Review
FAU_SAR.2 Security Audit Review AU-9(6) Protection of Audit Information
Restricted Audit Review Read Only Access
FAU_SAR.3 Security Audit Review AU-7 Audit Reduction and Report Generation
Selectable Audit Review AU-7(1) Audit Reduction and Report Generation
Automatic Processing
AU-7(2) Audit Reduction and Report Generation
Automatic Sort and Search
FAU_SEL.1 Security Audit Event Selection AU-12 Audit Generation
Figure 7-5 ISO/IEC 15408 controls mapped to NIST controls (from NIST Special
Publication 800-53)
in some way trace back to the three goals of security (confidentiality, integrity, and avail-
ability), as well as the supporting elements that include identification, authentication,
and authorization. This is generally true regardless of which security control framework
you examine.
NOTE You'll find that many control frameworks are derived from and map to
the ISO/IEC standards. They are international standards and can be applied
across most industries and market spaces.
=
Obviously, these 20 controls map to other control frameworks we've discussed but
aren't intended to replace them. They are simply recommendations for organizations
to implement as the controls that can be the most effective in protecting systems and
data. You can find more information on the Critical Security Controls at www.sans.org/
critical-security-controls/.
TIP The SANS CSC Critical Security Controls cover only the top 20 "critical"
controls considered to be the most important in an information security and
risk management program, as recommended by the industry. They do not
go into as much depth as other control catalogs.
Chapter 7: Information Systems Control Concepts
199
Australian Signals Directorate"Strategies to Mitigate
Targeted Cyber Intrusions"
The Australian Signals Directorate have developed a set of "top 35" security controls
(referred to as mitigation strategies). This document is called "Strategies to Mitigate
Targeted Cyber Intrusions," and it prioritizes controls such as application whitelisting,
patching, restriction of administrative privileges, and so on. The document offers pre-
dicted levels of security effectiveness (in subjective terms of Essential, Excellent, Good,
and Average), as well as predicted user resistance to these controls, up-front resource cost,
and maintenance cost (all in subjective terms of High, Medium, and Low). The strate-
gies also define what function the mitigation supports (for example, detecting intrusions,
preventing code execution, stopping network propagation, and preventing data exfiltra-
tion). The entire set of mitigation strategies (controls) was updated in 2014 and can be
viewed at www.asd.gov.au/infosec/top-mitigations/mitigations-2014-table.htm.
ISA
The International Society of Automation (ISA) has developed standards and controls
that apply to automated systems, such as industrial control systems (ICS) and supervisory
control and data acquisition (SCADA). Since so many of these systems are now using
traditional computers and networks to process and carry data, they are also subject to the
same attacks, data modification, loss, and other risks as traditional information systems
and data. Examples of the many uses of industrial control and SCADA systems include
those found in nuclear power plants, electric power facilities, production factories, medi-
cal devices, and other critical infrastructures.
Obviously, then, these types of systems require at least the same level of risk man-
agement and protection through security controls as traditional systems. While some
traditional security controls and frameworks have been applied to these types of sys-
tems (particularly NIST controls), there are also specific control sets developed by that
industry that address vulnerabilities. There are particular standards and controls that
ISA has developed that specifically can be applied to information security requirements.
While ISA, in conjunction with the American National Standards Institute (ANSI),
develops a wide variety of standards, some dealing with safety, electrical equipment, and
so on, specific security-related ISA standards include the ISA 62443 series (for example,
ISA 62443-2-1:2009 and ISA 62443-3-3:2013).
NOTE While the ISA controls specifically apply to ICS and SCADA systems,
they are meant to be supplemented by other controls, such as those found
in NIST.
Function Category
Unique Function Unique Category
Identifier Identifier
.. Protect
PR.DS Data Security
PR.MA Maintenance
RS.CO Communications
RS.Ml Mitigation
RS.IM Improvements
RC.CO Communications
Figure 7-6 NIST's cybersecurity functions and categories (from the"Framework for Improving
Critical Infrastructure Cybersecurity" publication, February 2014)
Chapter 7: Information Systems Control Concepts
201
Function Category Subcategory Informative References
Response Plan ni ng (RS.RP): , COBIT 5 BAI0 l . l 0
Response processes and , ccs csc 18
procedures are excuted and RS. RP-1 : Response p lan is executed , ISA 62443-2- 1:20094.3.4.5.1
maintained, to ensure timely duri ng or after an event 0 I5O/IEC 27001:2013 A. 16.1.5
response to detected , NIST SP 800-53 Rev. 4 CP-2, CP-10, IR-4, IR-8
cybersecurity events.
Figure 7-7 Mapping functions to subcategories and controls in the NIST Cybersecurity Framework
(from the"Framework for Improving Critical Infrastructure Cybersecurity" publication, February 2014)
The framework, taking into account that different organizations use different control
frameworks and control sets, also provides for a convenient mapping to various con-
trol libraries, some of which we have discussed. Figure 7-7 shows how the cybersecurity
framework maps its critical security functions to a variety of control sets and frameworks,
including NIST, CO BIT 5, ISO/IEC, ISA, and others. The purpose of this mapping is
to help provide standardization to organizations that use different control sets to map to
defined security functions. This can help organizations convert to equivalent control sets
when dealing with auditors or partners and provide a path forward when determining
risk strategy and management. It also helps users who may be under different governance
requirements to use multiple control sets to leverage their efforts to meet the require-
ments of more than one control set simultaneously.
Chapter Review
In this chapter, we went over the basic concepts of controls and examined different con-
trol frameworks. Controls are security measures implemented to ensure that processes are
performed to a certain standard, degree, or depth; they offer detailed guidance relevant to
a specific requirement. Controls directly address a known risk or vulnerability in a given
system, environment, or program. Controls can be classified as administrative, technical,
and physical controls. They can also be classified in terms of function, such as deterrent,
preventative, or corrective controls. Controls are used to reduce likelihood and impact
factors in risk and protect assets by reducing vulnerabilities.
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
202
We examined the NIST control framework from Special Publication 800-53, which is
a comprehensive catalog of controls covering all aspects of information system and data
security. We defined the different attributes of a NIST control, such as the baseline and
priority aspects. We also looked at its counterpart, Special Publication 800-53A, which
provides guidance on assessing those same controls.
We then looked at COBIT, a management and governance framework, developed
and used extensively by ISACA in its various risk management and business process
frameworks. CO BIT controls cover various areas, including auditing, compliance, infor-
mation assurance, IT operations, and security risk management, but at a higher-level
perspective. CO BIT version 5 also incorporates the Val IT governance and management
framework. Val IT consists of three main domains: Value Governance (VG), Portfolio
Management (PM), and Investment Management (IM); it is used to help obtain business
value from IT infrastructure.
PCI-DSS is a set of security requirements levied on merchants that process credit card
transactions, developed by major card providers. Although not a law in itself, it is con-
sidered mandatory for retailers and service providers that process credit card transactions
and has actually been incorporated into several U.S. state laws. PCI-DSS controls are
broken down into 6 control objectives and 12 requirements, which are further broken
down into specific controls.
We also looked at a variety of other control frameworks, such as international standards
promoted by ISO and IEC. These included ISO/IEC 27001 and ISO/IEC 15408; we
demonstrated how these standards and other control sets have much in common and can
often be mapped to each other, allowing for standardization and cross-utilization. The
SANS lnstitute's Top 20 Critical Security Controls were developed based upon recom-
mendations from government and industry as high-priority measures that organizations
should take to protect information systems and data. They include controls that address
areas such as device inventory, secure configuration, and application software security, to
name just a few. In another example of a non-U.S. control standard, we briefly looked
at the Australian Signals Directorate's Strategies to Mitigate Targeted Cyber Intrusions,
a list of 35 mitigation strategies (security controls). This standard covers critical control
areas such as application whitelisting, patching, and restriction of administrative privi-
leges, among others. Then we took a brief look at standards and controls that apply to
automated systems, such as industrial control systems and supervisory control and data
acquisition. Specifically, examples of these specialized types of controls are those devel-
oped by the International Society of Automation.
Finally, we looked at NIST's Cybersecurity Framework, which defines five key
security-related functions, divides them into categories and subcategories, and also maps
them to various control libraries. These five functions are as follows: Identify (ID), Pro-
tect (PR), Detect (DE), Respond (RS), and Recover (RC). The functions can be mapped
to almost any of the various control sets discussed throughout the book, grouping similar
functions together and identifying the controls associated with those functions.
Chapter 7: Information Systems Control Concepts
203
Review Questions
1. Security measures implemented to ensure that processes are performed to a
certain standard, degree, or depth are called _ _ _ __
A. Risks
B. Objectives
C. Requirements
D. Controls
2. All of the following statements describe characteristics of controls except
which one?
A. Controls are defined and implemented in terms of addressing a specific
vulnerability or deficiency in asset protection.
B. They are used to specify what measures should be taken to ensure security and
reduce risk.
C. Controls are designed to be effective in completely eliminating a
particular risk.
D. Specific control sets may be required by legal governance.
3. Which of the following would be considered an administrative control?
A. Documented policy on firewall rules and exceptions
B. Physical or logical placement of the firewall within the IT infrastructure
C. Rule configuration on the firewall
D. Traffic exceptions listed in the firewall ruleset
4. Which of the following would be considered a preventative control?
A. Warning sign stating that unauthorized personnel may not enter a restricted
area
B. A security fence
C. A server's audit logs
D. A full data backup used to restore a server after a disk failure
5. Which of the following elements of risk can controls be used to reduce? (Choose
two answers.)
A. Likelihood
B. Impact
C. Threat
D. Threat agent
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
204
6. Which of the following is the catalog of controls published by the National
Institute of Standards and Technology?
A. ISO/IEC 27001
B. ISO/IEC 15408
C. Special Publication 800-53
D. Special Publication 800-53A
7. Which control family is not included in NIST's 18 families of controls?
A. Privacy
B. Personnel Security
C. Media Protection
D. Incident Response
8. Which of the following management and governance frameworks incorporates
both the Risk IT Framework and the Val IT framework?
A. ISO/IEC 27001
B. SANS Top 20 CSC
C. NIST SP 800-53
D. COBIT 5
9. All the following are domains of the Val IT framework except which one?
A. Value Governance
B. Security Management
C. Portfolio Management
D. Investment Management
10. Which control framework is not normally legally required but is mandated by the
members of its industry and is imposed on merchants and retailers?
A. ISO/IEC 15408
B. NIST SP 800-53
C. PCI-DSS
D. Val IT
11. Which of the following control objectives is specific to PCI-DSS?
A. System and Services Acquisition
B. Build and Maintain a Secure Network and Systems
C. Manage Business Process Controls
D. Monitor, Evaluate, and Assess Performance and Conformance
Chapter 7: Information Systems Control Concepts
205
12. Which of the following control sets are considered internationally developed and
accepted standards? (Choose two answers.)
A. NIST SP 800-53
B. COBIT 5
C. ISO/IEC 27001
D. ISO/IEC 15408
13. Which of the following control standards is commonly known as part of the
Common Criteria?
A. ISO/IEC 15408
B. ISO/IEC 27005
C. ISO/IEC 31010
D. ISO/IEC 27001
14. Which of the following control libraries was developed based upon
recommendations from government and industry as high-priority measures
that organizations should take to protect information systems and data?
A. SANS Top 20 Critical Security Controls
B. NIST SP 800-53A
C. COBIT 5
D. ISO/IEC 27001
15. Which of the following sets of terms describes how the Australian Signals
Directorate offers predicted levels of security effectiveness for its controls?
A. High, Medium, and Low
B. Essential, Excellent, Good, and Average
C. Levels 1-10
D. Very Low, Low, Moderate, High, and Very High
16. Which control framework might be specifically applied to industrial control
systems?
A. COBIT 5
B. ISO/IEC 15408
C. ISA 62443-3-3:2013
D. Australian Signals Directorate's "Strategies to Mitigate Targeted Cyber
Intrusions"
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
206
17. Which the following is not one of the five key security-related functions defined
in NIST's Cybersecurity Framework?
A. Identify
B. Protect
C. Detect
D. Manage
18. Which of the following control libraries contains BAI04: Manage Availability and
Capacity?
A. COBIT 5
B. NIST SP 800-53
C. ISO/IEC 27001
D. ISA 62443-3-3:2013
19. Which of the following can be used to assess controls under NIST SP 800-53?
A. NIST SP 800-37
B. NIST SP 800-30
C. NIST SP 800-53A
D. FIPS 199
20. Which of the following control sets would AC-7 belong to?
A. NIST SP 800-53
B. COBIT
C. PCI-DSS
D. ISA 62443-2-1:2009
Answers
Designing and
Implementing Controls
In this chapter, you will:
• Learn business perspectives of information controls
• Examine the information system security engineering process and its relationship
to control design and implementation
• Review effective control design principles
• Learn about information categorization and how it affects control selection
• Learn about implementing information controls
In Chapter 7 we covered the basics of controls, and in previous chapters we've discussed
how to assess controls as part of the overall risk assessment process, but we haven't yet
covered the finer points of how controls are designed and implemented. In this chapter,
we'll discuss controls from the design and implementation perspectives. We will look
at business perspectives on information controls, as well as the value of business cases
in justifying control implementation or modification. We'll also cover these controls
and frameworks from the governance view, including the governmental, financial, and
healthcare views. You'll learn about the information system security engineering (ISSE)
process and how it affects the control life cycle, as well as how controls are selected to per-
form specific functions in protecting systems and data. We'll cover some of the principles
of effective control design, as well as how to implement controls.
The CRISC exam objectives that we will continue to cover during this chapter include
the following task statements:
• 2.2 Identify the current state of existing controls and evaluate their effectiveness
for IT risk mitigation
• 2.3 Review the results of risk and control analysis to assess any gaps between
current and desired states of the IT risk environment
• 3.3 Consult on the design and implementation or adjustment of mitigating
controls to ensure that the risk is managed to an acceptable level
209
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
210
• 3.4 Ensure that control ownership is assigned to establish clear lines of
accountability
• 3.5 Assist control owners in developing control procedures and documentation to
enable efficient and effective control execution
Notice that we've also partially covered these objectives in previous chapters, but more
in the context of discussing risk assessment than control design and implementation.
We'll touch on some previously discussed topics, as well as introduce some new con-
cepts to round out the discussion of these objectives. Like in the previous chapter, you'll
find that this chapter covers more material than you might find on the exam; again, it's
important that you understand foundational and conceptual knowledge about control
design and implementation both for the exam and in the real world when dealing with
information systems and their controls. And, to reiterate, this book is intended to be not
only a study guide for the exam but also a comprehensive reference you will use even after
you have passed the CRISC exam.
IT
TIP Don't neglect discussing liability issues in a business case. Often this
could be the make-or-break decision for implementing a control since
liabilities could subject the business to legal fees and fines that cost far more
than the control itself.
Governance
Obviously, governance can be used to drive a business case as well. Since governance
can't easily be ignored, even in the face of limited resources, it's worthwhile to include
governance requirements for controls in any business case that supports implementing
particular information system controls. Governance requirements can be used to justify
the cost, as well as the need to implement security controls. The particular types of gover-
nance your organization is subject to will need to be carefully examined before inclusion
in any business case to ensure that they are properly interpreted. We'll discuss particular
types of governance later in this chapter.
NOTE Like the liability issues mentioned earlier, governance can also be a
make-or-break decision for implementing a control since the organization
may be legally required to implement certain data protection controls and
failure to do so may be breaking the law. You definitely want to include any
potential governance or legal compliance issues in business cases because
senior management needs to be aware of any potential compliance issues
involved with the decision.
EXAM TIP Keep in mind the different considerations you should include in
a business case: support for security goals, governance, due care, diligence,
liability; as well as control effectiveness, efficiency, and economy of use.
The business case should also discuss the pros and cons of implementing a
control versus not implementing the control, as well as the risk involved.
Chapter 8: Designing and Implementing Controls
213
Figure8-2
Factors used
to support a [ ~ B u s i n e s - s c a s e~ ]
business case
Control
Economy of use
effectiveness/efficiency
Due care,
Security goals diligence, and Governance
liability
EXAM TIP PCI-DSS standards are typically not legally mandatory, except in a
few states. The standards are industry imposed; they are not actually laws or
regulations unless they have been mandated for use by a particular law.
EXAM TIPHIPAA does not mandate any particular control framework but
recommends NIST controls.
Chapter 8: Designing and Implementing Controls
215
The Gramm-Leach-Bliley Act
The Gramm-Leach-Bliley Act (GLBA) was passed with the primary goals of allowing
certain types of corporate structure changes, such as mergers, and changing the con-
flict-of-interest requirements for company officers. It also includes clauses that provide
for the safeguarding of client financial and personal information. This falls under the
GLBA Safeguards Rule, which requires, among other things, a senior person formally
appointed to manage information security, analyze and manage risk, and develop and
maintain an information security program. Parts of the act also attempt to reduce the
risk of social engineering by reducing pretexting, that is, by gaining protected per-
sonal or financial information under false pretenses through phishing and other social
engineering techniques. The act requires that covered financial institutions create and
maintain a formalized, written information security plan, which addresses, in particular,
managing and training employees, securing information systems, and detecting and
managing system failures.
GLBA describes in detail what requirements organizations must fulfill to comply
with the act (see https://www.ftc.gov/tips-advice/business-center/guidance/financial-
institutions-customer-information-complying) but does not specifically call out any
particular control framework. In reviewing these requirements, you can see how a vari-
ety of controls might be implemented to meet the Safeguard Rule. Obviously, both the
NIST and COBIT frameworks might be used to meet these requirements, as well as
PCI-DSS, as needed.
~ NOTE All U.S. government federal agencies are subject to FISMA, which in
~ turn requires adherence to NIST standards and use of the RMF.
Internal Functions
Internal functions are those that are specific to the internal workings of a business orga-
nization. This could include functions such as human resources, accounting, security,
Chapter 8: Designing and Implementing Controls
217
production, marketing, and so on. Controls may be necessary to protect information
systems within the organization, typically from an access control perspective. In other
words, based upon the sensitivity of systems and information, different employees or
personnel may not have access to all systems or data within an organization. It's not
uncommon to find accounting servers and data, for example, encrypted and protected
by internal firewalls to prevent access by other employees. It's also not uncommon to find
different segmented secure areas where certain groups of employees are allowed to access
those areas and others are not.
Control design and implementation should take internal functions into consideration
simply because often internal functions are not always given the same level of protection
as data and systems that cross organizational boundaries into the Internet or a third-
party organization. Frequently businesses don't do as good a job of protecting internal
assets from employees as they do protecting these same assets from external entities.
Internal security is often overlooked. Controls should be considered that protect data
on the internal infrastructure, using access controls, rights, permissions and privileges,
encryption, and so on. Policies are also important controls that protect internal systems
and information. These administrative controls direct the actions and behavior of orga-
nizational personnel, so they primarily serve to protect internal assets. When developing
business cases for controls, don't neglect internal systems and data. Internal controls
serve to protect data from threats such as malicious insiders, employee complacency and
neglect, and accidental access, modification, or destruction.
External Functions
Most organizations put a higher priority on protecting external functions, such as exter-
nal websites, and other potentially publicly accessible data. The typical example of a
control that protects external functions is a firewall, of course, but that's not the only
control available and certainly shouldn't be the only control an organization uses. Strong
authentication, encryption, third-party agreements, and other access controls should be
used to protect external functions and data since these functions are often on stand-alone
servers in a DMZ configuration or on third-party servers and networks, which may not
be as protected as internal assets, and could potentially be accessible from the public,
including resourceful malicious hackers.
Cross-boundary Functions
Closely related to external functions are those functions that tend to cross the physical
and logical boundaries of the organization between the internal and external networks.
These can be the functions that are most difficult to secure simply because data must
pass between the internal and external boundaries of the infrastructure to enable the
business to carry out its day-to-day mission, so they can't be completely closed off from
the outside world. This can widen the attack surface of the organization's protected
network. Again, firewalls are the ubiquitous security control used to protect and sepa-
rate internal and external boundaries; this definitely shouldn't be the only type of con-
trol used. For example, strong authentication should be used for any entity that needs
to come from the external network into the internal network for any reason. Usually
multifactor authentication is preferred in those cases. Also, data encryption is a must,
CRISC Certified In Risk and Information Systems Control All-In-One Exam Guide
218
rl Interna l functions
1
• HR Controls: policies,
-1~
procedures,
• Accounting
authentication,
• Production encryption, auditing
rl__ c r_
os_s_
-b_ou_n_d_ar_y _
f u_nc- ti_o _
ns_ _ _ _ _ _ _ _ _ _ _ ~]t-------
• Business partner extra net
Controls:
• Customer support website (with connections to interna l connections)
authentication,
, Third-party data exchange encryption, security
• VPN devices
Externa l functions
Figure 8-3 Examples of internal, external, and cross-boundary functions and controls
since data traversing in either direction should be protected from unauthorized access
and interception. Even the architectural design of the boundaries between the internal
network and the external world serves as a security control. For example, a DMZ con-
figuration serves as a boundary layer between the Internet and the internal network,
consisting of multiple firewalls, routers, and segmented networks. Examples of cross-
boundary traffic might include VPN traffic, business extranets, and public access to
an e-commerce website. Controls must be selected and implemented that protect and
restrict any and all access that is actually allowed from the external to the internal net-
work, and vice versa. Figure 8-3 illustrates the concepts of internal, external, and cross-
boundary functions, with appropriate functions and control examples.
CAUTION Ensure that you consider data sensitivity and segmentation when
designing controls for internal, external, and cross-boundary interfaces.
This might mean implementing controls such as network segmentation
and VLANs, different authentication credentials for systems with data of
different sensitivity levels, and restrictive access rights and permissions.
It also includes implementing perimeter security controls, such as a DMZ,
internal and external firewalls, and separated extranets, as well as strong
authentication and encryption mechanisms.
EXAM TIP You likely won't be asked about any specific ISSE model on the
exam, but it's a good idea to be aware of some of the basic ones and how
ISSE affects control design and implementation.
1. Discover Needs
2. Define System Requirements
3. Design System Architecture
4. Develop Detailed Design
5. Implement System
6. Assess Effectiveness
Each of these phases is broken down into specific activities particular to that phase.
Although the model is sequential in nature, phase 6, Assess Effectiveness, is intended to
be conducted simultaneously with all the other phases, allowing practitioners to check
to ensure that the goal of the phase has been accomplished before moving on to the
next phase. The IATF has not been updated since 2002, with the community generally
waiting for and moving toward a new !SSE-related publication anticipated from NIST,
discussed next.
NIST SP 800-160
NIST has also produced an informative guide on ISSE, in the form of its Special Pub-
lication 800-160, "Systems Security Engineering: An Integrated Approach to Building
Trustworthy Resilient Systems." Previously, NIST had published its SP 800-64, "Secu-
rity Considerations in the System Development Life Cycle," in 2008. This older guid-
ance simply looked at security engineering processes in the greater context of the SDLC,
rather than as a separate, broader discipline. It made recommendations on security pro-
cesses and activities that should be considered during the initiation, development/acqui-
sition, implementation/assessment, operations/maintenance, and disposal (the particular
version of the SDLC phases defined in this publication). The newer SP 800-160 looks
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
222
at systems security engineering as a discipline in its own right and defines technical and
nontechnical processes for integrating security activities into the system life cycle. This
guidance has a system security model highly reminiscent of the IATF model and includes
the following phases from the technical processes:
SP 800-160 also maps its phases to processes found in a number of specific sys-
tems engineering processes defined in various ISO/IEC and IEEE standards, including
15288:2008, "Systems and software engineering - System life cycle processes." Note
that as of this writing, NIST SP 800-160 is still in its draft form, which was published
in May 2014.
1S0/IEC 21827:2008
This standard offers a view of a system's security engineering process model, known as
the Systems Security Engineering Capability Maturity Model. It does not detail exact
processes; rather, it covers industry best practices related to system security engineering.
The model describes the security engineering life cycle and phases, as well as their sup-
porting activities. It takes a holistic view of the organization's management and engineer-
ing processes and their interactions, as well as the interactions between systems, software,
compliance, development, and acquisition activities.
TIP Understand that the ISSE process is intended to ensure the security is
included in all phases of the SDLC model so that security is "baked in" to a
system and not"bolted on" after the fact. In this way, it helps reduce risk by
considering security early on in the system life cycle.
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
224
Design Considerations
Now that we've discussed business requirements, governance, and information security
engineering as contributing to the design and implementation process involved with
selecting and using controls to protect systems and data, we'll cover some basic design
principles to keep in mind when considering controls. Note that these principles aren't
specific to a particular type or function of a control; they should be considered for all
controls and control functions. These considerations normally are looked at after busi-
ness and governance requirements are considered since those requirements are usually
mandatory or not easily negotiated. These considerations, however, should be considered
throughout the ISSE and SDLC processes.
Effectiveness
The effectiveness of a control is determined by how well it fulfills its intended security
function and protects assets. If a control is ineffective, it is not performing the intended
security function for which it was designed or implemented, or it's not performing it to
the degree it needs to, leaving an asset vulnerable to threats and allowing an unacceptable
level of risk to the asset or organization. In these cases, control gaps, already discussed
previously in the book, exist and must be closed (or reduced) by supplementing the con-
trol, adding additional controls, or replacing the control. Control effectiveness may not
necessarily be the fault of the system administrators or security professionals on the job;
in fact, it may not even be a faulty control. Sometimes ineffective controls can be traced
back to poorly defined requirements from the SDLC or ISSE process (if any were even
considered at all). Measuring control effectiveness is closely related to the concepts of key
risk indicators (KRis) and key performance indicators (KPis), as well as security metrics,
discussed earlier in Chapter 6 and again later in Chapter 9.
Efficiency
Efficiency isn't the same thing as effectiveness; effectiveness relates to if the control fulfills
its intended function and how well it does so. Efficiency, on the other hand, relates more
to how well the control does in relation to other factors, such as cost, maintainability,
interoperability, and so on. Even if a control is effective at what it's supposed to be doing,
is it costing too much to maintain it? Does it use up too many resources (manpower,
electricity, spare parts); or, in the case of a nontechnical control, does it require overly
complicated processes? Is it interoperable with other systems or processes?
In looking at efficiency, the organization must consider controls that are not only
effective but reasonable to operate and maintain in terms of the value they add and the
level of protection they afford consistent with the asset's value. An older firewall already
in place that does the job but is no longer supported by its manufacturer and is therefore
hard to get maintenance work or spare parts for, is not necessarily an efficient control. If
it requires specialized training that is hard to find or costly, it may be less efficient to use
that particular firewall. Process efficiency should also be a consideration in control selec-
tion and use. A particular backup system, while effective, may require additional work
processes or equipment to ensure its effectiveness or may add components and complex-
ity to the infrastructure. These are definitely aspects to think about while selecting and
implementing controls.
Chapter 8: Designing and Implementing Controls
225
EXAM TIP Keep in mind that control effectiveness relates to how well it
performs its assigned function in protecting an asset. Control efficiency
relates to how the control interacts with its environment, in terms of cost,
interoperability, complexity, staffing requirements, processes, and so forth.
Economy of Use
The term economy of use, in this context, refers to the smart design and employment of
controls such that they can be used to protect multiple assets at once or provide mul-
tiple security functions. Controls that are used to protect only one single asset, or are
single-function, tend to be not as useful because additional controls that provide other
functions and protect other assets are required. Likewise, controls that are highly spe-
cialized in terms of function or level of protection tend to be more expensive, require
more training, and may require more personnel or hours to manage and maintain. An
example might be a traffic-filtering firewall that performs only that single function versus
a multifunctional security appliance that can provide firewall, IDS, and proxy services.
Another example might be the use of several security appliances deployed at different
points in the network, which could be consolidated and deployed at a more central point
in the physical and logical architecture, covering more than one subnet or segment. Yet
another instance could be the use of VLANs implemented on a single powerful layer 3
switch, instead of having multiple subnets from many different physical switches. Sup-
pose a system requires specialized hardware encryption devices, which can be expensive.
If you have other systems that also require encryption, you could possibly expand the use
of these devices to include those other systems, thus providing protection for multiple
systems and getting more for the investment than you would if you protected only one
system. This is yet another example of the principle of economy of use.
To achieve economy of use, you should examine different aspects of the architecture,
data sensitivity and protection requirements, and common protection requirements of
assets. Additionally, you can look at the different levels of functionality and features of
security technologies and controls to see whether there are better solutions available than
single-purpose controls. Of course, cost should be considered and balanced with looking
at where a better investment can be made; if a control technology is better suited for econ-
omy of use but seems to cost more, in the long run it may represent a cost savings to the
organization, as well as help to simplify the sustainment and maintenance of the control.
Control Redundancy
On the surface, it may seem to be a violation of the design principles of economy of
use, efficiency, and common sense, not to mention a waste of resources, to have redun-
dant controls. But think of it like this: What if a control fails or is circumvented by a
threat, enabling a vulnerability to be exploited and an asset damaged? If you've heard the
term defense in depth, then you know that this principle actually encourages multiple,
redundant controls, implemented at different levels of the infrastructure or at various
points in the system or data-processing cycle to provide sustained protection in the
event a single control fails. For example, if a centrally managed anti-malware solution
is implemented on your company's e-mail and other infrastructure servers but not on
client machines, there's still a possibility a virus could infect the network through other
means. That's why you also have the redundant control of having anti-malware soft-
ware installed on workstations and other client devices, just in case. That redundancy
provides defense in depth, maintaining protection against threats. The same could be
said for redundant physical controls (multiple security fences, secure doors, and so on).
These are all in place in case one fails, still preventing an unauthorized person from
entering a secure area.
Control redundancy should be looked at to provide effective protection for an asset
but still should be balanced with good design principles. Redundant controls that cover
many systems at once and several different types of data, or even serve different security
functions simultaneously, should be looked at and implemented. A good example is a
unified threat management (UTM) appliance, which provides several services at once,
including firewall, intrusion detection and prevention, anti-malware, and content filter-
ing functions. This would be more effective and efficient than having separate security
appliances that perform an individual function and having to install multiple instances of
each all over the network. Having multiple UTM appliances, placed at various strategic
and critical points in the infrastructure, would ensure control redundancy and defense
Chapter 8: Designing and Implementing Controls
227
in depth, while being more efficient than having multiple separate appliances scattered
throughout the infrastructure. The same could apply to other security technologies and
even processes.
Control Selection
We touched on control selection in Chapter 5, from a risk response perspective, but
in this section we'll look once again at this process, more from an implementation and
design perspective. Selecting the controls that will be used to protect a particular asset
involves categorizing the information in terms of sensitivity across the areas of confi-
dentiality, integrity, and availability, as well as selecting an appropriate baseline set of
controls for the asset in question. It also involves the concepts of business function and
needs, governance, and the SDLC and ISSE processes discussed earlier, which may influ-
ence data sensitivity and required protection levels. Additionally, control selection should
involve an understanding of the existing threat landscape the organization resides in since
controls must be able to protect against specified threats.
Information Categorization
Control selection has a great deal to do with information classification and data sensitiv-
ity. Controls are selected and put into place to protect data, so the right controls have to
be implemented to provide the right amount of protection. So, it naturally follows that
you must determine the data sensitivity and protection needs first (coincidentally, the
first step in the IATF ISSE model discussed earlier). This is where a well-thought-out and
well-written data sensitivity and classification policy comes into play. Then, you must
look at each data type and determine its impact on the organization if it were to be lost,
destroyed, or otherwise unavailable or compromised.
If you follow the NIST RMF process model, the first step in the model is security
categorization. This means that data is identified and categorized with sensitivity levels
that relate to impact in three areas: confidentiality, integrity, and availability. The level of
impact to the organization is determined for each of these areas individually, in terms of
high, moderate, and low (per FIPS 199). Then, the overall security categorization (SC)
is formulated as follows:
When the values of high, moderate, or low are assigned for each security goal, the
highest-valued impact generally becomes the overall security categorization. For exam-
ple, suppose you had the following levels of impact determined:
In this case, the highest impact value is for integrity and has been determined to be
high, so the overall security categorization would be assigned as high. This uses the high
water mark concept to determine the overall SC of the asset. In short, a system considered
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
228
to have an SC of low impact is an information system in which all three of the security
objectives are determined to be low. An information system determined to have an SC
of moderate is one in which at least one of the security objectives is moderate and no
other security objective is rated at a level higher than moderate. Of course, a high-impact
system is an information system in which at least one security objective is rated as high.
EXAM TIP You will not be required to know the specifics of security
categorization for the exam, but you may encounter questions that assume
you have already performed the security categorization of an asset, or at
least know how to do so.
Implementing Controls
Now that you've seen how to categorize information and select the various controls you
need for your control baseline, we'll discuss the actual implementation of controls. By
and large, this simply means that once the controls have been approved and resourced
by management (to include hardware/software purchases, creation of policies and pro-
cedures, and staffed with trained personnel), they are put in place. Often this means
Chapter 8: Designing and Implementing Controls
229
CNTL
/'.: INITIAL CONTROL BASELINES
ii:
CONTROL NAME 0
NO. ii:
0.. LOW MOD HIGH
Access Control
AC-1 Acce ss Control Policy and Procedures Pl AC-1 AC-1 AC-1
AC-2 Account Management Pl AC-2 AC-2 (1) (2) (3) AC-2 (1) (2) (3)
(4) (4) (5) (11) (12)
(13)
AC-3 Access Enforcement Pl AC-3 AC-3 AC-3
AC-4 Information Flow Enforcement Pl Not Selected AC-4 AC-4
AC-5 Separation of Duties Pl Not Selected AC-5 AC-5
AC-6 Least Privilege Pl Not Selected AC-6 (1) (2) (5) AC-6 (1) (2) (3)
(9) (10) (5) (9) (10)
AC-7 Un successful Logon Attempts P2 AC-7 AC-7 AC-7
AC-8 System Use Notification Pl AC-8 AC-8 AC-8
AC-9 Previous Loqon (Access) Notification PO Not Selected Not Selected Not Selected
AC-10 Concurrent Session Control P3 Not Selected Not Selected AC-10
AC-11 Session Lock P3 Not Selected AC-11 (1) AC-11 (1)
AC-12 Session Termination P2 Not Selected AC-12 AC-12
AC-13 Withdrawn - - - -
AC-14 Permitted Actions without P3 AC-14 AC-14 AC-14
Identification or Authentication
AC-15 Withdrawn - - - -
AC-16 Security Attributes PO Not Selected Not Selected Not Selected
AC-17 Remote Access Pl AC-17 AC-17(1) (2) AC-17(1)(2)
(3) (4) (3) (4)
AC-18 Wireless Access Pl AC-18 AC-18 (1) AC-18 (1) (4)
(5)
Figure 8-5 Controls and their corresponding security control baselines (from NIST SP 800-53)
CAUTION Always test controls after they have been modified, supplemented,
replaced, or added to. You want to test for both security and interoperability.
Vulnerability testing, penetration testing, and integration testing are key test
types that you will want to consider when modifying or changing controls.
Documenting Controls
Once controls have been implemented and determined to be efficient, be effective, and
meet the original (or new) security requirements, you must also make sure that they are
well-documented, for several reasons. First, documentation helps to maintain the control
history, that is, the records of installing, updating, supplementing, adding, or changing
controls necessary for change and configuration management processes. Second, docu-
mentation serves as objective evidence of compliance when being audited. Documenta-
tion also serves to help support the risk assessment process (remember in Chapter 4,
when we discussed reviewing documentation as part of the assessment methodology?).
Finally, documentation can help when you are troubleshooting issues with the controls
or measuring control effectiveness.
Control owners are generally responsible for maintaining control documentation, but
often they are assisted in preparing and maintaining this documentation by technical
personnel and risk management practitioners. Control documentation includes configu-
ration settings, architectural diagrams, control procedures, and, of course, policies relat-
ing to particular controls. This documentation not only provides compliance validation
for controls but also assists in effective control execution. Documentation should be
consistent, be standardized, and clearly state how the control protects an asset. It should
also be mapped to a formally defined security requirement, for traceability purposes.
Chapter 8: Designing and Implementing Controls
233
Control documentation is part of the greater risk documentation library, contributing to
risk profiles, plans of action and milestones, and risk registers.
Chapter Review
In this chapter, you took a deeper look at controls, focusing on design and implementa-
tion concepts. First, you looked at the business perspectives of controls and learned how
important the business case may be when justifying supplementing or adding to controls.
Business cases are useful for justifying controls when there are cost versus effectiveness
issues, and the requirement for a control must be matched to a business need. Some of
the supporting reasons for a good business case include support for security goals, gover-
nance, due diligence, liability, efficiency, and cost effectiveness. You also looked at regula-
tory guidance and how the selection of controls is influenced by laws, regulations, and
other external requirements imposed on businesses. Some examples we covered included
the PCI-DSS standards, HIPAA, GLBA, SOC, and FISMA. We also discussed business
functions and their relationships to controls, since controls are implemented to reduce
IT risk and in turn reduce business risk. We explained internal, external, and cross-
boundary functions that influence the design and implementation of security controls.
We then explained the role that the information system security engineering process
plays in control development and implementation. We discussed how ISSE ensures that
security is built into systems throughout the life cycle, all the way from concept through
design and development, through acquisition and implementation, and finally to dis-
posal or retirement. We discussed several different ISSE models, including those from
the IATF, NIST, and ISO/IEC.
There are several design considerations that we covered as well, to ensure that the
design process is well considered and takes into account control effectiveness, efficiency,
economy of use, and redundancy. We also stressed that controls must meet the original
security requirements they were designed to fulfill in asset protection.
Control selection is based upon several factors, including information categorization,
which attempts to assign a level of impact to the organization if the asset is lost. After
information is categorized, a baseline set of controls is assigned to it, based upon those
factors. We then looked at actual control implementation and included several processes
that occur when controls are implemented, as well as maintained. These processes include
evaluating the effectiveness of existing controls, through performance monitoring and
testing, as well as adjusting existing controls to reduce any identified control gaps. We
also covered the value of supplementing existing controls versus adding or replacing
controls. Finally, we looked at managing control and risk ownership to ensure that indi-
viduals are held accountable for sound decisions and allocating resources involved with
designing, implementing, maintaining, operating, and documenting controls, as well as
the risk they are intended to mitigate.
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
234
Review Questions
1. Which of the following is the ultimate goal ofIT controls?
A. Reduce IT risk
B. Reduce business risk
C. Eliminate risk
D. Eliminate threats
2. Which of the following best describes the reason to create a business case for IT
control implementation?
A. To determine the cost to the organization if a control is implemented
B. To help create the organization's risk profile
C. To justify the resources expended in implementing the IT control
D. To inform control owners about the potential risk of a control
3. All of the following are valid supporting factors in building a business case to
justify implementing an IT control, except which one?
A. Profitability
B. Security goals
C. Liability
D. Governance
4. Which of the following two factors relating to how well a control can be used for
multiple purposes, and how it compares to other controls in terms of cost and
interoperability, are used in business cases? (Choose two.)
A. Economy of use
B. Support for security goals
C. Efficiency
D. Threat reduction
5. Which of the following governance sources explicitly requires the use of NIST
controls as the preferred control framework to support it?
A. SOX
B.GLBA
C. HIPAA
D. FISMA
Chapter 8: Designing and Implementing Controls
235
6. Which of the following is not necessarily a mandatory legal standard for
governance but is imposed by its industry?
A. HIPAA
B. PCI-DSS
C. FISMA
D. SOX
7. Which of the following control frameworks does HIPAA governance recommend
but is not mandatory?
A. NIST
B. ISO/IEC 27001
C. COBIT
D. PCI-DSS
8. Which of the following was enacted into law to ensure the safeguarding of client
financial and personal information by specified financial institutions?
A. PCI-DSS
B. SOX
C.GLBA
D. HIPAA
9. Which of the following laws uses CO BIT and COSO, among other control
frameworks, to enforce auditing and information governance requirements?
A. HIPAA
B. PCI-DSS
C. SOX
D. FISMA
10. Which type of business functions are concerned with data flows and system
interfaces between internal and external networks and organizations?
A. Cross-boundary functions
B. External functions
C. Internal functions
D. E-commerce functions
11. How can ISSE processes assist the control design and implementation process?
A. By ensuring security is considered throughout the entire SDLC process
B. By minimizing threats to assets and threat actors
C. By ensuring that vulnerabilities are not exposed to threats
D. By eliminating risk for a particular asset as it is designed, developed, and
implemented
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
236
12. Which design principle relates to how well a control performs its intended
function in protecting an asset?
A. Efficiency
B. Effectiveness
C. Economy of use
D. Control redundancy
13. Which of the following design principles is concerned with how well a control
operates within its environment, in terms of cost, interoperability, ease of use,
and so on?
A. Effectiveness
B. Economy of use
C. Efficiency
D. Meeting requirements
14. Which of the following concepts supports the principle of control redundancy?
A. Defense in depth
B. Effectiveness
C. ISSE
D. Economy of use
15. Per FIPS 199, when formulating a security categorization, all of the following are
considered in the levels of impact to an organization if an asset is lost or damaged,
or in terms of criticality to the organization, except which one?
A. Confidentiality
B. Integrity
C. Availability
D. Accountability
16. Which of the following best describes how security categorization for data is
calculated?
A. SC information system = {(vulnerability, impact), (threat, impact),
(asset, impact)}
B. SC information system = {(confidentiality, impact), (integrity, impact),
(authorization, impact)}
C. SC information system = {(confidentiality, impact), (integrity, impact),
(availability, impact)}
D. SC information system = {(confidentiality, risk), (integrity, risk),
(availability, risk)}
Chapter 8: Designing and Implementing Controls
237
17. Which the following are ways to evaluate control effectiveness? (Choose two.)
A. Monitoring control performance
B. Calculating reduced likelihood
C. Calculating reduced impact to the asset
D. Testing
18. Which of the following scenarios best describes a control gap?
A. Permissions on a sensitive network share that allow all users to read the
contents
B. A firewall that successfully blocks all traffic except for that specifically allowed
C. Encryption settings that encrypt both sensitive and nonsensitive data
D. Whitelisting only specific applications that are allowed on a workstation
19. Which of the following options should be considered to close control gaps?
(Choose two.)
A. Reducing threats
B. Supplementing existing controls
C. Adding new controls
D. Upgrading the system
20. When considering control and risk ownership, which of the following is the main
concern?
A. How much a control costs to maintain
B. Accountability
C. Organizational structuring
D. Ensuring that risk and control owners are separate to ensure that there is no
conflict of interest
Answers
1. B. While IT security controls do reduce IT risk, the ultimate goal is to reduce the
overall risk to the business.
2. C. A business case is used to justify the resources expended to implement a
control, balancing cost with the risk incurred if the control is not implemented.
3. A. Profitability is not a valid supporting factor in building a business case to
support implementing an IT control.
4. A, C. Economy of use (relating to multipurpose controls) and efficiency (relating
to cost and interoperability) are two design principles often used in business cases
to justify the implementation of controls.
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
238
5. D. FISMA explicitly requires the use of NIST controls as the preferred control
framework to support it.
6. B. PCI-DSS standards are not necessarily a mandatory legal governance but are
imposed by the card payment industry.
7. A. HIPAA governance recommends, but does not require, the use of the NIST
control framework.
8. C. GLBA was enacted into law to ensure, among other things, the safeguarding
of certain client financial and personal information by banks and other financial
institutions.
9. C. SOX uses CO BIT and COSO, along with other control frameworks, to
enforce auditing and information governance requirements.
10. A. Cross-boundary functions are those concerned with data flows and system
interfaces between internal and external networks and organizations.
11. A. ISSE contributes to the control design and implementation process by
ensuring that security is considered throughout the entire SDLC process.
12. B. Control effectiveness refers to how well a control performs its intended function
in protecting an asset.
13. C. The design principle of efficiency is concerned with how well a control operates
within its environment, in terms of cost, interoperability, and complexity, among
other factors.
14. A. The concept of defense in depth supports the principle of control redundancy
because it allows for multiple controls to be in place in case a single control fails.
15. D. Accountability is not considered in the levels of impact to an organization
if an asset is lost or damaged or in terms of criticality during a security
categorization.
16. C. Security categorization for an information system is calculated as follows:
SC information system = {(confidentiality, impact), (integrity, impact),
(availability, impact)}
17. A, D. Monitoring control performance and testing are two ways to evaluate
control effectiveness.
18. A. Permissions on a sensitive network share that allow all users to read the
contents would be considered ineffective in protecting sensitive information,
thus showing a control gap; all the other examples are of effective controls or,
even in some cases, controls that may be configured too securely.
19. B, C. Both supplementing existing controls and adding new controls should be
considered to close control gaps.
20. B. Accountability is the main concern when considering control and risk
ownership.
1~1~-------------------------------.C..3..=..t..J..:.j..jllllljlllli;- A i
This chapter reviews real-world examples of metrics designed to measure the risk and
control effectiveness. The following are the CRISC exam objectives from Domain 4 that
we'll review and apply within this chapter:
• 4.2 Monitor and analyze key risk indicators (KRis) to identify changes or trends
in the IT risk profile.
• 4.3 Report on changes or trends related to the IT risk profile to assist
management and relevant stakeholders in decision making.
• 4.4 Facilitate the identification of metrics and key performance indicators (KPis)
to enable the measurement of control performance.
• 4.5 Monitor and analyze key performance indicators (KPis) to identify changes
or trends related to the control environment and determine the efficiency and
effectiveness of controls.
• 4.7 Report on the performance of, changes to, or trends in the overall risk profile
and control environment to relevant stakeholders to enable decision making.
NOTE More information on the controls measured within KRls and KPls is
available in Chapters 7 and 8. It is critical that you understand what should
be measured, and how it relates to improving the risk posture, before you
develop either KPls or KRls.
239
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
240
Key Performance Indicator Review
As discussed, you use key performance indicators (KPis) to understand and enable the
measurement of control performance. Control performance can be anything from how
often your firewall blocks malicious incoming traffic to how often you exercise your
continuity of operations plan. The level of "performance" can be different for each orga-
nization; it's important that you not borrow the KPis from another organization as a
whole but really focus on how your KPis meet your organizational objectives and what
your risk appetite is.
NOTE A hospital might have a KPI or KRI related to systems having proper
redundancy to support medical operations during a crisis situation. That
level of performance would not be appropriate to a university's local area
network. Understand the context in which you're working to build the best
measures of success.
KPis should be S.M.A.R.T. to be most effective. This stands for the following:
• Specific
• Measurable
• Attainable
• Relevant
• Timely
When a KPI is S.M.A.R T., it is tailored to the organization and the area being mea-
sured. As discussed earlier, the metric will differ greatly depending on whether you are
wanting to measure availability in a stock trading environment versus, say, a college net-
work. It's incredibly important to think about what's relevant to your organization when
determining your KPis.
Field Data
between departments. One common access control consideration is remote access, often
used to allow users to telecommute or work from home. Table 9-6 provides a sample
KPI that shows the percentage of legitimate remote access points used to gain authorized
access to an organization.
Chapter 9: Measuring Risk and Control Effertlveness
247
Field Data
Awareness and Training It's important that organizations have proper training
and awareness programs that teach employees about current threats, laws, regulations,
policies, and the implications of poor behaviors. These programs help improve user
behavior through awareness of the risks associated with negative activities and ensur-
ing that they are trained appropriately to carry out their duties safely. This is even more
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
248
Field Data
Field Data
Field Data
Responsible • Information owner: This is defined by the organization (for example, the
Parties system owner).
• Information collector: This is defined by the organization (for example,
system administrator).
• Information customer: This could be the chief information officer (CI0),
information system security officer (ISS0), senior agency information security
officer (SAIS0) (for example, chief information security officer [CIS0]).
Data Source This includes audit log reports.
Reporting This is a bar chart showing the number of systems with average audit log
Format reviews in each of the five categories within the Implementation Evidence field.
Table 9-8 Audit Record Review Measure (Adapted from NIST Special Publication 800-55)
Field Data
Field Data
Field Data
Field Data
Field Data
Field Data
Field Data
Field Data
Chapter Review
In this chapter, we discussed how you can assess and monitor the efficiency and effec-
tiveness of controls and risk through the use of key performance indicators. KPis are
used to understand and enable the measurement of control performance. KPis should
be specific, measurable, attainable, relevant, and timely. We discussed the template for
KPis adapted from NIST Special Publication 800-55 and presented KPis associated with
availability; configuration management; system and services acquisition; contingency
planning; access control; awareness and training; audit and accountability; certifica-
tion, accreditation, and security assessments; identification and authentication; incident
response; maintenance; media protection; physical and environmental protection; plan-
ning; personnel security; risk assessment; system and communications protection; and
system and information integrity.
Review Questions
1. When a KPI is S.M.A.R T., it is which of the following? (Choose all that apply.)
A. Short
B. Measurable
C. Right
D. Timely
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
264
2. It's critical when developing a KPI that you use which of the following?
(Choose all that apply.)
A. A standard format
B. An industry best practice
C. NIST frameworks
D. Evidence
3. The KPI category of ___ deals with maintaining baselines of systems and
applications.
A. Awareness and training
B. Audit and accountability
C. Access control
D. Configuration management
4. The KPI should include a statement of whether it measures which of the
following? (Choose all that apply.)
A. Effectiveness
B. Accountability
C. Efficiency
D. Impact
5. The KPI measure should be a statement.
A. Strong
B. Numeric
C. Simple
D. Qualitative
6. The CISO wants to understand how the organization's KPI implementation
metrics are trending weekly because there is a concern that the schedule is
slipping. What is the KPI consideration that will make sure the data is collected
on a timely basis?
A. Frequency
B. Evidence
C. Target
D. Data source
7. Who will receive the data from a KPI?
A. Information owner
B. Information collector
C. Information customer
D. Information analyst
Chapter 9: Measuring Risk and Control Effertlveness
265
Answers
We've discussed the National Institute of Standards and Technology (NIST) Risk Man-
agement Framework (RMF) throughout this book, albeit in specific pieces relevant to
the context of each chapter. Here, in Appendix A, we've gathered this information all in
one place, for easier reference and understanding. The NIST RMF is not testable on the
exam; however, you'll find that more and more risk management professionals are being
exposed to it and having to learn and apply it to their own organization's risk management
strategy and programs. If you work in the U.S. government, compliance with the RMF is
becoming mandatory by almost all government agencies and, by extension, to their con-
tractors and anyone else they exchange official information with. If you work in a medical
facility, such as a doctor's office, clinic, or hospital, you may have to apply the NIST RMF
to your organization's risk management program because HIPAA recommends the RMF
and NIST controls in its implementation guidance. In the private/commercial world,
the RMF also has value in that it is comprehensive and tailorable and it provides solid,
in-depth guidance for managing information risk throughout its life cycle for organiza-
tions of almost any size. Additionally, it's free. That can't be said for some of the other
risk management frameworks discussed throughout the book because their standards can
cost a great deal and because finding people specially trained in those standards to help
administer them in a risk management program can also be difficult and more costly. Yet
another good reason for using the NIST RMF is its generality and interoperability with
almost any other risk management framework you can find. All in all, the NIST RMF
is the risk management framework of choice for many organizations. That's not to say it
fits every situation or organization; as we've stated in the book, other frameworks may be
more appropriate to use, either in place of or in conjunction with NIST, because of unique
industry, market, and operating environment factors or governance standards.
NIST's Risk Management Framework is the product of many years of research and
refinement by the U.S. government and NIST, based upon research, standardization
throughout the industry, best practices, and recommendations from security professionals
just like you. NIST employs a staff of experienced security professionals who come from all
different aspects of the information security world, whose full-time job it is to develop and
continually improve the standards that make up the Risk Management Framework. In this
appendix, we'll discuss the RMF, including its applicability, publications, and detailed steps.
267
CRIS( Certified In Risk and Information Systems Control All-In-One Exam Guide
268
Overview
The Federal Information Security Management Act of 2002 (44 U.S.C. § 3541, also
known as FISMA) is Title III of the E-Government Act of 2002. This act requires that
federal agencies develop, document, and implement agencywide programs to ensure
information security for the systems and data under their control. FISMA tasked NIST
to develop the standards that federal organizations must use to secure their information
systems and data. The result was the Risk Management Framework, which was initially
developed in 2005 and has been through several iterations. The framework provides
all supporting publications, controls, and assessment methods for its implementation,
although all agencies typically implement it a bit differently, according to their own needs
and regulations. For example, the Department of Defense implements the RMF differ-
ently than the Department of the Treasury would, because it applies RMF to military
weapons systems versus financial and record-keeping systems.
Tiered Approach
You'll notice in Figure A-1 that the NIST RMF looks at risk at three separate levels, or
tiers. The first tier, the organizational level, looks at risk from a management and gover-
nance perspective (that is, from the top down) at the strategic level. At this level, risk isn't
looked at from a technical perspective; it is viewed in terms of risk governance, the orga-
nization's risk appetite and tolerance levels, its risk management processes, and its overall
risk strategy. Policies, procedures, and standards are also examined at this level (and may
be examined at lower levels as well) to determine how they articulate with higher-level
governance and to ensure they support the overall risk strategy of the organization.
STRATEGIC RISK
TIER2
MISSION/BUSINESS PROCESSES
TIER3
INFORMATION SYSTEMS
TACTICAL RISK
Figure A-1 The Risk Management Framework tiered approach (from NIST SP 800-S3, revision 4)
Appendix A: The NIST Risk Management Framework
269
At the second tier, encompassing mission and business processes, business functions
are examined. These functions are the core of the business or organization, and they cover
major business areas and their related processes, as well as the processes that interact with
and between different business areas. An example of this process may be particular poli-
cies and procedures that relate to privacy or data sensitivity, for example. Technical risk
is also not examined at this level; it's more at an operational level that risk is managed.
Policies, procedures, and processes that could affect multiple systems, business areas, and
technical areas are the focus at this level.
The last tier concerns itself with the actual information systems in the organization and
the risk they represent. This is the tactical level of risk. At this level, technical risk is defi-
nitely considered, but there's still an examination of policies, procedures, and processes,
albeit from a specific information systems viewpoint. While viewing all three tiers at once
gives a holistic view of risk throughout the organization, the RMF also allows practitio-
ners to focus on risk at each of these three levels separately as well, depending on the needs
of the organization in a specific set of circumstances. As Figure A-1 illustrates, however,
communication and risk awareness travel throughout all three levels, in both directions.
Applicability
As mentioned, the RMF is required for use by most U.S. government organizations. Even
the Department of Defense, which previously had its own unique security management
framework, called the Defense Information Assurance Certification and Accreditation
Program (DIACAP), has begun the process of converting to the risk management frame-
work. Even nongovernmental agencies that do business with the federal government,
such as contractors, for example, may be subject to the RMF as part of their contractual
agreements with the government. Also, private organizations, while not required to use
the RMF, may certainly find it useful since it is a matured, developed process that can be
applied and scaled to any information system or organizational infrastructure. An orga-
nization's governance may recommend or require the RMF as an adopted and enforced
standard.
As far as scaling goes, the RMF can be applied to both small and large organizations.
The RMF is both tailorable and scalable, allowing organizations to follow the steps, use
the controls, and assess risk on one system or a thousand. The RMF can be applied to
a wide variety of industries and market segments, including healthcare organizations,
industrial control systems, administrative and general service systems, and even special-
purpose systems.
Publications
The core document of the RMF is Special Publication 800-37, but the entire NIST
library of special publications could be considered part of the RMF because steps in
the process often require performance to a relevant standard published by NIST. For
example, cryptographic controls in SP 800-53 must meet the requirements set forth
in Federal Information Processing Standards (FIPS) 140-1 and 140-2, although these
publications aren't necessarily part of the RMF. You can see that you could conceivably
go down a great many "rabbit holes" while navigating the RMF and going through each
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
270
step, as well as implementing the NIST controls. Table A-1 lists the most commonly used
publications related to the RMF, in order by publication number. The table also lists the
applicable RMF steps and describes the publication. Note that although the RMF pre-
scribes particular publications for each step, in practice you'll find that you may use more
publications than those specifically assigned to a step, and in some cases you may actually
use some of these publications, as well as others, throughout all six steps.
RMF Steps
Although there are six steps listed in the RMF process, each step has many subprocesses
to it. While NIST does not necessarily prescribe a rigid set of processes for each step, each
organization to use the RMF must develop its own internal processes to support RMF
steps. Although these were presented earlier in the book, we'll discuss the steps again
here to bring all of this into context with other discussions of the RMF. Figure A-2 shows
the high-level view of the RMF life cycle, depicted in six steps.
Although this life cycle seems to be sequential and ending with step 6, keep in mind
that this is a continual process, and often previous steps must be revisited. For example,
assessing security controls must be done on a frequent basis, to make sure those controls
are still effective and mitigate the risk for which they were intended. Keep in mind that
the typical risk management activities involving threat and vulnerability assessment also
occur throughout all six steps, and the security posture of information systems, includ-
ing adjustments to controls, are maintained accordingly based upon those assessments.
Repeat as necessary
Step 1
CATEGORIZE
Information Systems
Step6 Step2
FIPS 199/ SP 800-60
MONITOR SELECT
Security Controls Security Controls
SP 800-137 FIPS 200/SP 800-53
RISK
MANAGEMENT
t FRAMEWORK
AUTHORIZE IMPLEMENT
Information Systems Security Controls
SP 800-37 Step4
SP800-160
ASSESS
Security Controls
SP 800-53A
Note: CNSS Instruction 1253 provides guidance for RMF Steps 1 and 2 for National Security Systems (NSS).
Figure A-2 The NIST Risk Management Framework (From NIST SP 800-53, revision 4)
during step 1. It uses high water marks for information to determine security baselines.
So, if the aggregate value of information or a system has been rated as high, for example,
then the high baseline of security controls is employed for that system. Once the security
control baseline has been established, the organization has the latitude and flexibility
to add or subtract security controls from the baseline as it sees fit based upon different
factors including the applicability of some controls, the environment the system oper-
ates within, specific organizational governance, or even other risk factors. Controls are
typically selected from SP 800-53 and combined with any other control frameworks the
organization is required to use.
ISACA's Risk IT
Framework
We've discussed the ISACA's Risk IT Framework, as well as the NIST RMF, through-
out this book, albeit in specific pieces relevant to the context of each chapter. Here, in
Appendix B, we've gathered this information all in one place, for easier reference and
understanding. The Risk IT Framework is not testable on the exam; however, you'll find
that many unique ISACA concepts and terms on the exam come from the framework,
so it's a good idea to be familiar with it. In this appendix, we'll discuss some particulars
about the framework, including its relationship to CO BIT 5 and the Val IT framework.
We'll also break down some of the processes the framework describes.
ISACA published the Risk IT Framework in 2009, and it was a joint effort from many
different industry partners and professionals. The framework is not simply a product of the
United States, like the NIST framework is, but was developed and influenced by professionals
and organizations from all over the world. Because ISACA is an independent professional
organization and not tied to any particular governmental organization, the framework is
suitable for deployment and use not only in the United States but everywhere in the world.
This makes it especially attractive to non-U.S. entities that prefer not to use the NIST
framework or to entities for which the NIST framework doesn't satisfy their needs. ISACA's
framework is a subset of CO BIT 5, which covers management and governance principles,
processes, and requirements. The Risk IT Framework approaches risk from business perspec-
tive, while integrating IT risk into the overall risk management process for the organization.
Overview
The framework is based on COBIT 5 and, as such, articulates well with COBIT, as well
as Val IT, since COBIT version 5 has absorbed that framework as well. The terminol-
ogy, organization, processes, and concepts all articulate with each other, making it much
easier to integrate all three in a comprehensive risk management strategy. The framework
is broken down into several sections, which explain its purpose, its intended audience, and
the benefits and outcomes of using the framework. It also describes basic risk IT principles
before going into the meat of the framework. The three basic concepts of the Risk IT
Framework include Risk Governance, Risk Evaluation, and Risk Response. There are major
sections devoted to each of these three key areas. The framework emphasizes that IT risk is,
275
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
276
in fact, business risk; either it is an entity that benefits and adds value to the organization
by providing opportunities for growth or it can create negative situations by increasing risk,
via not protecting and preserving assets, which could result in business failure or, at mini-
mum, missed opportunities as well as liabilities. The framework embraces enterprise risk
management (ERM) principles, such as those found in the COSO framework and other
frameworks, but does not necessarily require their implementation in order to be used.
However, the use of ERM may be a necessary foundation for the successful implementation
of the Risk IT Framework. The framework also discusses the integration of the CO BIT, Val
IT, and Risk IT frameworks. Essentially, COBIT covers IT management and governance
practices from a top-down view. The Risk IT Framework focuses specifically on risk man-
agement, and, of course, Val IT is concerned with gaining value from an organization's IT
portfolio. Although included in Chapter 7, for reference sake, the COBIT 5 and Val IT
framework controls are included here in Tables B-1 and B-2, respectively.
Figure B-1 illustrates the relationship between these three frameworks.
The relationships between these controls are complementary; that is, they are not sub-
sets of each other, nor are they interchangeable with each other. They can be mapped to
each other, however, and since we are discussing the Risk IT Framework primarily here,
it's worth noting that the appropriate and applicable COBIT and Val IT controls are
mapped to the various processes that make up the Risk IT Framework. As they all cover
different context areas, they are used in unison to cover management and governance, IT
portfolio value, and risk management areas of an organization.
Finally, the framework's glossary and its higher-level mapping to other frameworks
and standards round it out as a practical standard to reference in establishing and main-
taining a solid risk management strategy. The framework is freely available from ISACA
as a downloadable document; however, there are other documents that are necessary to
implement the framework that require you become a member of ISACA to access. We'll
discuss a few of those later in this appendix.
FigureB-1
The relationships
between the
COBIT, Val IT,
and Risk IT
Frameworks
I \
-----~--
Val IT I I Risk IT
•~-F-ra_m_e_w_o_rk-~
Appendix B: ISACA's Risk IT Framework
277
Domain Control
Applicability
The Risk IT Framework can be applied to almost any organization but typically works
better in organizations that have a solid infrastructure and are more mature with regard
to attitudes toward risk and risk appetite and tolerance and have the people and resources
to implement it. As mentioned, since its development was influenced by international
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
278
Domain Control
Value Governance (VG) • VG1: Establish informed and committed leadership
• VG2: Define and implement processes
• VG3: Define portfolio characteristics
• VG4: Align and integrate value management with enterprise financial
planning
• VGS: Establish effective governance monitoring
• VG6: Continuously improve value management practices
Portfolio Management • PM 1: Establish strategic direction and target investment mix
(PM) • PM2: Determine the availability and sources of funds
• PM3: Manage the availability of human resources
• PM4: Evaluate and select programs to fund
• PMS: Monitor and report on investment portfolio performance
• PM6: Optimize investment portfolio performance
Investment • IM 1: Develop and evaluate the initial program concept business case
Management (IM) • IM2: Understand the candidate program and implementation options
• IM3: Develop the program plan
• IM4: Develop full life-cycle costs and benefits
• IMS: Develop the detailed candidate program business case
• IM6: Launch and manage the program
• IM7: Update operational IT portfolios
• IMS: Update the business case
• IM9: Monitor and report on the program
• IM 1O: Retire the program
Table B-2 Val IT Domains and Controls
professionals and organizations, it can be implemented all over the world. Since it uses
higher-level processes, it can also be used in conjunction with other frameworks, such
as NIST, PCI-DSS, and ISO/IEC standards, although the standards would typically
be used to support the higher-level risk IT framework processes as lower-level controls.
The Risk IT Framework also may be better suited for medium to large organizations that
have the resources to adequately embrace it.
Publications
In addition to the basic Risk IT Framework document, you will probably need additional
documents to gain a better understanding of the framework, as well as put it into practice.
One particular publication is the Risk IT Practitioner Guide, which is a comprehensive
document detailing practical approaches to the process model the Risk IT Framework
promulgates. This document can be purchased only from ISACA or obtained for free
by joining the organization. Other documents, some freely available and some avail-
able only to ISACA members, include those that focus on both COBIT and Val IT.
An organization serious about implementing the Risk IT framework should not only
Appendix B: ISACA's Risk IT Framework
279
invest in professional membership in ISACA because this provides a wide variety of use-
ful resources but also download and integrate all the necessary documentation required
to implement the framework.
We'll provide a detailed look at each of these domains and processes in the remainder
of this appendix; however, you should also take the time to download the Risk IT Frame-
work for yourself and read through it prior to the CRISC examination. This appendix
merely summarizes the framework.
Risk Governance
Risk Governance covers areas that relate to developing the organization's risk appetite, its
risk tolerance, and its entire culture and attitude with regard to risk. In this process, roles
and responsibilities are defined, and relevant governance is examined for requirements that
must be fulfilled in managing risk. Additionally, risk programs are established, particular-
ly those that affect risk awareness and training. Communication guidelines between risk
practitioners and managers, between managers and the general organizational populace,
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
280
and between other internal, as well as external communication lines, are defined. The
Risk Governance domain covers three process areas, discussed in the next sections.
Risk Evaluation
The Risk Evaluation processes in the ISACA framework cover risk identification and
assessment. In RE processes, business impact is framed and described, and risk scenarios
are also developed. Risks are assessed and analyzed, as well as presented to the organization's
Appendix B: ISACA's Risk IT Framework
281
management. The RE processes are further broken down into three process areas, which
we will describe here in more detail.
RE 1: Collect Data
The data collection process aligns with some of the risk identification processes previously
described. During this process, risk management personnel develop a model for data col-
lection, which provides for standardized data formats, measurements, and common data
definitions. Data is collected on the various aspects of the organization and risk scenarios,
including the business's operating environment, risk factors, threat sources and events,
vulnerability data, and asset data. Data is also collected on the effectiveness of existing
controls in the organization.
Risk Response
Risk Response options are considered by management to reduce or offset risk, using the
standard risk treatment options of risk avoidance, reduction or mitigation, sharing or
transfer, and risk acceptance. In this process, the organization determines and communi-
cates risks to all stakeholders actively managing the risk and reacting to risk events. We'll
describe these processes next.
This e-book comes complete with Total Tester customizable practice exam
software.
System Requirements
The Total Tester software requires Windows XP or higher and 30MB of
hard disk space for full installation, in addition to a current or prior major release
of Chrome, Firefox, Internet Explorer, or Safari. To run, the screen resolution must
be set to 1024 x 768 or higher.
285
Appendix C: About the Download 286
To take a test, launch Total Tester and select the exam suite from the
Installed Question Packs list. You can then select Practice Mode, Exam Mode, or
Custom Mode. After making your selection, click Start Exam to begin.
Technical Support
Technical Support information is provided in the following sections by feature.
acceptable use policy (AUP) Organizational policy that describes both accept-
able and unacceptable actions when using organizational computing resources, as well as
the consequences of violating the policy.
287
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
288
business continuity The process, generally detailed in a supporting plan, that
keeps the company operating and functioning in the event of a power outage, IT mal-
function, or major disaster.
business impact assessment The process of analyzing the critical missions and
business processes and the systems used to complete those tasks and of determining the
impact to the mission of a loss or disruption in access to those systems.
capability The ability for the organization to implement a risk response.
COBIT Control Objectives for Information and Related Technology (but now typ-
ically referred to by its acronym). This management and governance framework was
developed and is used extensively by ISACA in its various risk management and business
process frameworks. It is currently in version 5.
common controls Controls spanning the entire organization and protecting mul-
tiple assets rather than only a specific system. Physical controls are good examples of
common controls, and the responsible entity for these controls would be the common
controls provider.
confidentiality The goal of protecting systems and information from unauthorized
disclosure.
control A measure put in place to increase protection for an asset, to make up for a
lack of protection for an asset, or to strengthen a weakness for an asset. Controls can be
administrative, technical, or physical and operational. They can also be further divided
by functionality, including deterrent, preventative, detective, and so on.
control baseline The initial set of controls selected, based on security categoriza-
tion, that are to be applied to systems and data and maintained throughout their life cycle.
control gap analysis The process of determining the difference between the exist-
ing state of a control's effectiveness and its desired state.
cost The financial impacts of any decision, as well as the less-easily quantified aspects
such as loss of goodwill, loss of brand status, and other hard-to-define attributes. Cost
also includes the maintenance of the responsive mitigation over its required life span.
data sensitivity The level of protection information or data required based upon
its impact to the organization if it were disclosed to unauthorized people, subject to
unauthorized modification, or otherwise lost.
deferral When risk response options simply don't make good business sense, risk is
assumed temporarily, perhaps until the costs are reduced, alternate measures are adopted,
or risk is ultimately accepted.
disaster recovery (DR) The process of reacting to an incident or disaster and
recovering an organization, its personnel, and systems to a functioning state.
Glossary
289
economy of use The design principle that states that you should attempt to design
and implement controls that can be applied to more than one system or set of data
or that provide more than one function in effectively mitigating risk. The goal is to
minimize single-use controls (controls that apply only to a specific system or set of data)
because they can be more expensive and specialized to implement.
effectiveness The extent to which the response reduces the likelihood or the impact
of the risk event to the organization; also the degree and depth that a control fulfills its
security requirements.
efficiency The interaction of a control with its environment, affecting factors such
as cost, reliability, supportability, and interoperability.
exception management The documentation and tracking of accepted excep-
tions to policy.
false negative When a vulnerability isn't detected but it does actually exist.
false positive When a vulnerability is reported that isn't actually legitimate.
Family Educational Rights and Privacy Act (FERPA) U.S. law designed to
protect the privacy of students in educational institutions. FERPA covers access con-
trol over data, as well as the circumstances under which information may be disclosed
about students from educational records. The law, in particular, prescribes access control
requirements for students older than 18 with regard to parents' rights of access to data,
including grades, financial, and other records.
framework An overall methodology prescribing higher-level processes.
governance The legal or corporate standards that prescribe how an organization
will conduct itself with regard to its behavior in handling information and data.
Gramm-Leach-Bliley Act (GLBA) U.S. law that requires financial institutions
(to include banks, loan companies, insurance, and investment companies) to protect
sensitive financial data and make their information-sharing practices known to their
customers. Of particular interest to security professionals is the Safeguards Rule incorpo-
rated into GLBA, which requires institutions under the jurisdiction of the Federal Trade
Commission to have specific measures in place to protect customer information.
Health Insurance Portability and Accountability Act (HIPAA) Law
passed in 1996 requiring the U.S. government's Health and Human Services Depart-
ment to establish requirements for protecting the privacy and security of personal health
information (PHI). The two important elements of HIPAA of interest to security pro-
fessionals are the HIPAA Privacy Rule and the HIPAA Security Rule, which set forth
specific standards on how to protect electronic PHI.
identification The process of initially presenting credentials to a system for the
purposes of identifying an authorized user.
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
290
impact The level of potential harm or damage to an asset or the organization if a
given threat were to exploit a given vulnerability.
Information System Security Engineering (ISSE) The processes and meth-
ods used to manage the security life cycle of information and systems. ISSE typically
follows and is adapted to the organization's system development life-cycle model but
embeds security processes into each phase of the life cycle so that security is considered
early on in the development process, rather than as an afterthought when the system is
implemented and data produced.
integrity The goal of preventing unauthorized modification to a system or data.
ISO/IEC standards The International Organization for Standardization (ISO) and
the International Electrotechnical Commission (IEC), which together are responsible
for a majority of information technology standards that are used worldwide, including
several that apply to information security and risk management.
key performance indicators (KPls) Used to understand and enable the mea-
surement of control performance.
key risk indicators (KRls) Highly probable indicators designed to accurately pre-
dict important levels of risk based on defined thresholds.
least privilege A security principle that dictates that entities should be given only
the minimum level of rights, permissions, and privileges necessary to perform their des-
ignated functions or jobs, and no more than that.
likelihood The level of certainty that an incident will occur; often expressed statisti-
cally as a probability of occurrence.
need-to-know A security concept that requires an individual have an actual require-
ment to access systems or data, based upon their job requirements.
NIST The U.S. Department of Commerce's National Institute of Standards and Tech-
nology.
NIST Risk Management Framework (RMF) The overall risk management
methodology published and promulgated by the National Institute of Standards and
Technology (NIST).
nonrepudiation The security concept that requires an individual to be accountable
for their actions, such that they cannot deny that they took an action.
OCTAVE The Operationally Critical Threat, Asset, and Vulnerability Evaluation
(OCTAVE) methodology developed by Carnegie Mellon University and the U.S. gov-
ernment to assist organizations in identifying and assessing information security risk.
passive tools Passive tools listen for network traffic or monitor the hosts they reside
on, quietly and with little to no impact on the ongoing operations; used when there is a
desire for no interference with daily activities.
Glossary
291
PCI-DSS A set of security requirements levied on merchants that process credit card
transactions by the major payment card industry providers, including Discover, Visa,
MasterCard, and American Express. PCI-DSS was developed in an effort to impose secu-
rity requirements and controls on retailers (merchants and service providers) in order to
reduce credit card fraud and identity theft.
penetration testing Designed to exploit weaknesses on a system based on their
having been exploited, not just the probability.
platform A hardware or software infrastructure upon which to base computing oper-
ating systems, applications, and networks. It may involve different operating systems,
network protocols, or particular types of hardware.
port scanner Allows a tester to determine which ports on the system are listening
for requests.
portfolio A grouping of programs, managed as a whole. Portfolio management is
the oversight and management of several different programs by a senior person in the
organization.
practice A proven, standardized methodology or way of performing particular tasks
or processes.
program A grouping of similar projects; programs are usually ongoing and longer-
term in nature and may also encompass several individual projects, as well as other activi-
ties specific to processes that may have an indefinite duration.
project A limited-duration set of activities geared toward a particular goal; projects
have definitive start and stop dates, resource allocations, scope, schedule, and costs.
project management A set of processes covering a defined project from start to
finish, generally looking to cut costs such as time, scope, and overall project cost.
protocol analyzer Often known as a sniffer; dedicated hardware or software that
collects network traffic for the purposes of examination, either for determining network
issues or for capturing plain-text usernames, passwords, or other sensitive information
being sent in the clear.
qualitative assessment An assessment technique that uses subjective values,
such as low, moderate, and high, to describe various components of risk, such as likeli-
hood and impact. Qualitative techniques rely on data that is often not easily described
in numerical terms.
quantitative assessment An assessment technique that uses nonsubjective val-
ues, such as numerical or other quantitative data, to describe various components of risk,
such as likelihood and impact. Quantitative techniques rely on data that is numerically
derived and not easily subject to individual opinion.
quick wins Risk responses that are high reward and low cost, which are both effec-
tive and efficient.
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
292
recovery point objective (RPO) The maximum tolerable time period in which
data can be lost by the organization because of an incident or disaster.
recovery time objective (RTO) The maximum amount of time that can be
allowed to pass between an incident and recovering the business to an operational state.
resilience The ability of the business to survive negative events and continue with
its mission and function.
risk The possibility of harm that can come to an asset or an organization.
risk acceptance When an active decision is made to assume risk (either inherent or
residual) and take no further action to reduce it.
risk appetite The organization's overall acceptable level of risk for a given business
venture.
risk assessment The process of identifying and assessing various factors, including
threats, threat actors, vulnerabilities, assets, and likelihood, to determine their impact on
the organization.
risk avoidance An option taken when, after controls have been considered, the
level of risk is still not acceptable, and the project isn't started or is canceled.
risk culture The overall attitude toward risk, promulgated and supported by the
organization's leadership.
risk factor Any factor that may contribute to an increase or decrease in risk; risk
factors could be external or internal, and they could affect either likelihood or impact
should a risk event actually occur.
Risk IT Framework ISACA's own risk management methodology; it is strongly tied
to and integrated with CO BIT 5. The Risk IT Framework merges traditional IT models
with a more risk-focused mind-set.
295
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
296
business continuity planning {Cont.) illustrated, 17
recovery strategies in, 59 relationship between Risk IT, Val IT,
resilience and, 60 and,276
risk factors in, 60-61 Val IT incorporated into, 190, 192
threats and vulnerabilities for, 61-62 Committee of Sponsoring Organizations
business processes, 42-62. See also business {COSO) framework, 16,215
cases; business continuity planning; common controls, 116, 140-141, 272-273
organizations communications
about, 42 communicating risk results, 117
business functions, 216-218 penetration test result reports, 164
business information as data, 20-21 reporting control monitoring results,
environmental risk factors for, 42-44 173-174
exam tips for, 62 compatibility with emerging technology, 54
mitigating operational risks in, 132 compensating controls, 138, 185
in risk scenarios, 78-79 confidentiality
access controls supporting, 4
C data risks and vulnerabilities for, 57-58
as security goal, 2
capabilities of risk response, 134
configuration management KPI, 244, 245
Capability Maturity Model Integration
content and context of controls, 146
{CMMI) framework, 149-150
contingency planning KPI, 244, 247
CCS {Council on CyberSecurity), 198
continuity management, 58-60
certification and accreditation KPI, 251, 252
control analysis, 111-115
Certified in Risk and Information Systems
control gaps, 113-114
Control exam. See CRISC exam objectives
evaluating effectiveness of existing controls,
CIA triad. See also availability; confidentiality;
111-113,229-230
integrity
exam tip for, 113
about, 2-3
ownership of risk and controls, 116
equation for control of, 140
recommending controls, 114-115
illustrated, 3
control catalogs
classifying
about, 182
controls, 184-185
mapping controls to other, 184
data, 5
NIST, 186-187
risk factors, 70-71
control enhancements, 189
CMMI {Capability Maturity Model
control families
Integration) framework, 149-150
COBIT, 192
CO BIT 5 {Control Objectives for
NIST, 186-187
Information and Related Technology)
control gaps, 113-114, 230-231
domains and processes within,
control libraries, 182, 183
130-131,277
control monitoring, 159-180. See also KPis
framework of, 16-18
about, 174
function of, 18
against metrics, 144
governance and management control
assessment tools for, 164-165
domains for, 190-192
collecting and analyzing data, 172-173
guidance on controls in, 182, 183
exam objectives for, 159
Index
297
KPis for, 166-171 NIST RMF, 13-16, 186-190
KRis for, 166, 171-172 objective and requirements for PCI-DSS,
making threat assessments, 160-161 193-194
measuring effectiveness, 230 other frameworks for, 195
reporting results of, 173-174 overview, 201-202
review questions and answers, 175-180 recommending, 114-115
security controls, 15-16, 159,274 reduction of likelihood or impact with, 186
testing and assessing controls, 160, 162-164 review questions and answers, 203-207
using root-cause analysis, 172 selecting and implementing, 14, 15,
vulnerability assessments for, 161-162 185-186,227-228,229
Control Objectives for Information and testing and assessing risk response, 141-143
Related Technology. See CO BIT 5 Val IT framework, 190, 192-193
control redundancy, 226-227 Cornell University KPis, 167-168
control selection, 14, 15, 227-228, 229 Corporate Governance ofInformation
controls, 181-207. See also control analysis; Technology (ISO/IEC), 16
control monitoring; designing and corrective controls, 138, 184-185
implementing controls COSO {Committee of Sponsoring
assessing risks for, 102 Organizations), 16,215
assessment techniques for, 142, 143 costs
business functions and, 216-218 risk and threat factors for, 45, 46
categories of, 138, 200, 201 risk response, 134
choosing standards for, 199 Council on CyberSecurity {CCS), 198
classification of, 184-185 credit card industry standards, 29, 30, 183,
CO BIT governance and management 193-194
domains, 190-192 CRISC exam objectives
common, 116, 140-141, 272-273 about exam, xviii-xix, 2
defined, 4, 182 controls, 181
designing effective, 140-141, 224,225, designing and implementing controls,
229-230 209-210
developing for risk response, 138 enterprise threats and vulnerabilities, 37
effectiveness of existing, 111-113, 229-230 KPis and KRis, 239
employee training for content/context managing risk scenarios, 69
of, 146 mitigation, 125-126
evaluating risk likelihood/impact for, 103 monitoring controls, 159
exam objectives for, 181 practice area map, xix-xxii
exam tips, 189, 193, 194 risk assessment and analysis, 91-92
implementing and adjusting, 141 risk concepts, 1
industrial control systems, 199 risk response, 125-126
information security concepts for, 182-186 threats and vulnerabilities, 37
interoperability of, 184 Critical Security Controls {CSC), 197-198
ISO 27002 on, 139-140 criticality analysis, 72
mapping ISO/IEC to NIST controls, cross-boundary business functions, 217-218
195-197 cryptography, 261-262, 269
monitoring, 15-16 CSC {Critical Security Controls), 197-198
NIST 800-53 on, 139, 140 cybersecurity controls, 200-201, 202
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
298
D exam tips, 212,221,225,226,228,230
FISMA, 216
data. See also CIA triad
GLBA Safeguards Rule, 215
business information as, 20-21
governance requirements, 212
collecting for risk assessment and analysis,
IATF phases ofISSE, 221
98-101
implementing controls, 228-229
confidentiality of, 2
information categorization, 227-228
data segmentation, 218
ISSE models for SDLC, 218-221
integrity of, 2
managing control ownership and risk, 232
inventorying for RMF, 14
meeting defined requirements, 225-226
KPI/KRI for collecting and analyzing,
overview, 233
172-173
review questions and answers, 234-238
managing risk factors for, 57
Sarbanes-Oxley compliance, 215-216
ownership of, 56
sensitivity and access levels when, 218
Risk IT collection process for, 96
supplementing existing controls, 231
risks introduced by databases, 24
supporting HIPPA Security Rule, 214
sensitivity of, 4-5, 218
supporting security goals, 211
threats and vulnerabilities of, 56-58
using ISSE model, 223-228
using documentation in risk assessment,
detective controls, 138, 184
99-100
deterrent controls, 138, 184
defense in depth, 226
development/acquisition phase (SDLC),
Defense Information Assurance Certification
51,147
and Accreditation Program (DIACAP), 29,
DIACAP {Defense Information Assurance
216,269
Certification and Accreditation Program),
deferral, 135, 136
29,216,269
Deliver, Service, and Support (DSS)
directive controls, 138
management domain (COBIT), 191,277
disaster recovery plans, testing, 59
Deming cycle, 126-127
disposal/retirement phase (SDLC), 51
design phase (SDLC), 51
documentation
designing and implementing controls, 209-238
control, 232-233
adding controls, 23-232
risk assessment and analysis results, 116, 118
adjusting control gaps, 230-231
risk register, 82-83
applying PCI-DSS standards, 213-214
risk response options, 143-144
business cases for IT controls, 210-221
using system and data, 99-100
considering regulatory guidance, 213
DoD {Department of Defense), 128,216,268
control redundancy, 226-227
domains and processes
control selection, 14, 15, 227-228, 229
COBIT 5, 130-131, 277
documenting controls, 232-233
Risk IT Framework, 279
due diligence, due care, and liability when,
Val IT, 192-193,278
211-212
double-blind tests, 162
economy of use, 212,213,225
DSS {Deliver, Service, and Support)
effectiveness of design, 140-141, 224,
management domain (COBIT), 191,277
225,229-230
due care, 211-212
efficiency ofuse, 212,213, 224-225
due diligence, 211-212
exam objectives for, 209-210
Index
299
E identifying legal, regulatory, and
contractual requirements, 30
£-Government Act of 2002, 268
qualitative and quantitative risk
economy of use, 212,213,225
assessments, 108
EDM {Evaluate, Direct, and Monitor)
external risks
management domain {CO BIT), 190, 277
defined, 71
effectiveness. See also measuring risk and
factoring into risk scenarios, 77, 78, 79
control effectiveness
control design, 224, 225
evaluating existing control, 111-113, F
229-230 false positives and negatives, 165
monitoring and testing control, 230 fault- and event-tree analysis, 108-109
risk response, 134 Federal Information Processing Standards.
efficiency See FIPS
control design, 212,213, 224-225 Federal Information Security Management
risk response, 134 Act (FISMA), 29,216,268
electronic protected health information Financial Privacy Rule, 29
(EPHI), 29 FIPS {Federal Information
emerging technologies, 53-54 Processing Standards)
employees about, 13
environmental risks associated FIPS 140-1 and 140-2, 269-270
with, 43 FIPS 199, 14, 15,270,271
project risks associated with, 45 FIPS 200, 15,271
training in control content and FISMA {Federal Information Security
context, 146 Management Act), 29,216,268
enterprise risk management {ERM), 5 nines, 243
11,276,280 "Framework for Improving Critical
entries in risk register, 83 Infrastructure Cybersecurity" {NIST),
environmental risks for businesses, 42-44 200,201
EPHI {electronic protected health frameworks. See also specific frameworks
information), 29 COBIT 5, 16-18, 130-131, 190-192
ERM {enterprise risk management), defined, 12-13
11,276,280 NIST cybersecurity, 200
Evaluate, Direct, and Monitor {EDM) Risk IT, 18-19,96-98
management domain {CO BIT), 190, 277 risk response, 148-151
events steps in NIST Risk Management
event-tree analysis, 108-109 Framework, 13-16, 127-129
reacting to, 283 studying about, 19
exceptions in risk response, 144-145 Val IT, 192-193
exercises
assessing risk, 119 G
choosing control standards, 199
GLBA {Gramm-Leach-Bliley Act), 29,183,215
creating risk scenarios, 79
government and management domains for
determining vulnerabilities, 41-42
COBIT 5, 190-192
developing risk awareness program, 28
gray-box tests, 162
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
300
H information categorization, 14, 15, 227-228
information security
HIPAA {Health Insurance Portability and
access controls supporting, 4
Accountability Act)
control concepts for, 182-186
about, 28-29
elements supporting security goals, 3-7
controls required by, 182, 183
goals of, 2-3
designing controls supporting, 214
information systems. See also ISSE
architecture for, 22
I categorizing, 14, 15, 227-228
IATF {Information Assurance Technical Information Systems Audit and Control
Framework), 221 Association. See ISACA
identification information technology. See IT
asset categorization and, 101 Information Technology Infrastructure
authentication and, 5 Library (ITIL), 16
difference in authentication, authorization, inherent risks, 11
and,6 initiation phase {SDLC), 50, 51, 147
identifying risk factors, 70 integrity
KPI for identification and authentication, access controls supporting, 4
251,253 data risks and vulnerabilities for, 57-58
impact KPI for system and information, 262-263
analyzing assessments of likelihood as security goal, 2
and, 110-111 internal risks
contributing to risks, 10-11 defined, 71
defined, 9-10 factoring into risk scenarios, 77-78, 79
evaluating in risk assessments, 102-103 International Electrotechnical Commission.
organizational factors affecting, 80-81, 82 See ISO/IEC standards
qualitative assessment of, 107 International Organization for
relationship to other risk elements, 11 Standardization. See ISO/IEC standards
risk scenarios and, 72, 74, 80 interoperability risks of technology, 54
technological factors affecting, 81-82 interviews for risk assessments, 99
implementation phase {SDLC), 51,147 Investment Management {IM) domain
implementing controls {Val IT), 193
about, 228-229 ISA {International Society of Automation)
adding controls, 231-232 standards, 199
adjusting control gaps, 230-231 ISACA {Information Systems Audit and
documenting controls, 232-233 Control Association). See also CO BIT 5;
evaluating existing control effectiveness, Risk IT Framework
111-113,229-230 approaches to risk scenarios, 75-77
exam tips, 230 COBIT 5 framework, 16-18, 130-131,
managing control ownership and risk, 232 190-192
supplementing existing controls, 231 exam tips, 98
incident response KPI, 253-254 publications for Risk IT, 278-279
industrial control systems {ICS), 199 Risk IT framework, 18-19, 96-98,
Information Assurance Technical Framework 129-130,275-283
(IATF), 221 studying frameworks of, 13
Index
301
ISO/IEC standards maintenance, 255
ISO 27001 control requirements, 195 media protection, 256
ISO 27002, 139-140 NIST, 168-171
ISO/IEC 15288:2008, 223 Oak Ridge Institute for Science and
ISO/IEC 15408 controls, 195, 197 Education, 168
ISO/IEC 21827:2008, 220, 223 personnel security, 259
ISO/IEC 27001, 195-196 physical and environmental protection, 257
ISO/IEC 27005:2011, 95 planning, 258
ISO/IEC 31000:2009, 95-96, 108 risk assessment, 260
ISO/IEC 38500-2008, 16 S.M.A.R.T. mnemonic for, 167,240
risk assessment and analysis using, system and communications protection,
95-96,98 261-262
ISSE {information system security system and information integrity, 262-263
engineering). See also SDLC system and services acquisition, 244, 246
approach to SDLC model, 218-221 template for NIST, 241
control design and, 223-228 KRis {key risk indicators)
exam tips, 221 collecting and analyzing data for, 172-173
IATF phases in model of, 221 defined, 130, 166
ISO/IEC 21827:2008, 220, 223 developing, 171-172
NIST SP 800-160 on, 221-223 exam objectives for, 239
IT {information technology). See also Risk IT Framework, 171
information security; risks S.M.A.R.T. mnemonic for, 172
factoring infrastructure in risk scenarios, 78
threats and vulnerabilities in management L
of, 54-56
Lean mind-sets, 151
ITIL {Information Technology Infrastructure
legal and governance standards. See also FIPS;
Library), 16
frameworks; NIST; and specific standards
about, 28
K controls and regulatory guidance, 213
KPis {key performance indicators), 242-263 defined, 13
access control, 244, 246, 248 exercise choosing control, 199
applying, 239 influence on control design and
audit and accountability, 250-251 implementation, 212
availability, 243 ISA and ANSI, 199
awareness and training, 247, 249 laws, 28-29
certification and accreditation, 251, 252 PCI-DSS, 29, 30, 183, 193-194, 213-214
collecting and analyzing data for, 172-173 liability, 211-212
configuration management, 244, 245 life cycle. See also SD LC
contingency planning, 244, 247 PDCA, 126-127
criteria for, 166-171, 240 RMF in security, 15, 128
defined, 166 system development, 49-53
developing, 240, 242 likelihood
exam objectives for, 239 analyzing assessments of impact
identification and authentication, 251, 253 and, 110-111
incident response, 253-254 contributing to risks, 10-11
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
302
likelihood {Cont.) risk assessment KPI, 260
defined, 10 system and communications protection
evaluating in risk assessments, 102-103 KPI, 261-262
factoring into risk scenario, 72, 74 system and information integrity KPI,
organizational factors affecting, 80-81, 82 262-263
probability vs., 80 system and services acquisition KPI,
qualitative assessment of, 107 244,246
relationship to other risk elements, 11 types of KP Is, 242
risk scenarios and, 80 media protection KPI, 256
technological factors affecting, 81-82 metrics. See also KPis; KRis
KPis as, 242
M monitoring against, 144
quality of, 242
maintenance KPI, 255
mitigation, 137-152
management ofIT operations, 54-56, 131
about, 152-153
mapping
adjusting control gaps, 230-231
controls to other control catalogs, 184
evaluating as risk response, 131-132
functions to NIST subcategories and
exam objectives for, 125-126
controls, 201
implementing controls as, 211
ISO/IEC to NIST controls, 195-197
with OCTAVE Allegro, 95
MEA {Monitor, Evaluate, and Assess)
review questions and answers, 153-157
management domain {CO BIT), 192, 277
strategies for, 199
measuring risk and control effectiveness,
Monitor, Evaluate, and Assess {MEA)
239-265. See also KPis; metrics
management domain {CO BIT), 192, 277
access control KPI, 244, 246, 248
monitoring. See control monitoring
applying KPI, 239
audit and accountability, 250-251
availability KPI, 243 N
awareness and training KPI, 247,249 National Institute for Standards and
certification and accreditation KPI, Technology. See NIST
251,252 National Security Agency {NSA), 221
configuration management KPI, 244, 245 networks, risks introduced by, 23
contingency planning KPI, 244, 247 NIST {National Institute for Standards and
criteria for KPI, 166-171, 240 Technology), 13. See also NIST Special
developing KPI, 240, 242 Publications; RMF
exam objectives, 239 CO BIT control families vs., 192
identification and authentication, 251, 253 control exam tips for, 189
incident response KPI, 253-254 control library supporting HIPAA, 214
maintenance KPI, 255 control-related SDLC from, 146-148
media protection KPI, 256 cybersecurity framework, 200
overview, 263 implementing FISMA requirements,
personnel security KPI, 259 216,268
physical and environmental protection, 257 ISO/IEC 15408 controls mapped to, 197
planning KPI, 258 mapping controls to ISO/IEC 27001,
review questions and answers, 263-265 195-196
Index
303
Risk Management Framework, 13-16, Open-Source Security Testing Methodology
92-93 Manual (OSSTMM), 143
supplementing ISA controls with those operating system risks, 24
of, 199 Operationally Critical Threat, Assets, and
template for KPis, 241 Vulnerability Evaluation. See OCTAVE
NIST Risk Management Framework. See RMF operations/maintenance phase {SDLC), 147
NIST Special Publications organizations. See also business processes
about, 16 authorizing RMFs, 14-15
SP 800-30, 16, 40, 92-93, 98, 107, business goals and objectives for risk,
271,273 19-20
SP 800-34, 60 business information criteria, 20-21
SP 800-37, 15, 16, 92, 127, 128, 268, business perspectives of controls for,
269,271,272,273 210-212
SP 800-39, 129, 271 business processes in risk scenarios, 78-79
SP 800-53, 14, 15, 113, 114, 128, 139, communicating risk analysis, 117
140,183, 186-188, 195,214,228,229, considering IT risks to, 24
268,269,271,272 continuity and disaster recovery for, 58-62
SP 800-53A, 15, 113, 128, 189-190, external business functions of, 217, 218
271,273 identifying risks of opportunities, 136-137
SP 800-55, 168-171, 240-242, 245, information systems architecture for, 22
246,247,248,249,250-251,252,253, legal, regulatory, and contractual
254,255,256,257,258,259,260,261, requirements of, 30
262-263 making risk-aware business decisions, 280
SP 800-60, 14, 15,128,228,270,271,272 management as factor in risk scenarios, 78
SP 800-64, 244 mitigations options for, 131-132
SP 800-66, 214 protecting internal business functions,
SP 800-115, 142, 162-163 216-217,218
SP 800-137, 15,128,271,272,274 reporting control monitoring results,
SP 800-160, 15,128,220, 221-223, 173-174
271,272 reporting risk response activities to, 145
nonrepudiation, 6-7 resilience of, 60
risk culture of, 12
0 risk ownership within, 25
securing cross-boundary business
Oak Ridge Institute for Science and
functions, 217-218
Education, 68
senior management and risk tolerance, 26
OCTAVE {Operationally Critical Threat,
structures of, 21-22
Assets, and Vulnerability Evaluation), 93-95
threat assessments for controls, 160-161
exam tip for, 95
training employees in control content and
OCTAVE Allegro, 94-95
context, 146
OCTAVE and OCTAVE-S, 93, 95
transferred risks and responsibilities, 49
review of, 98
using ERM, 11
Open Group Architecture Forum,
vulnerability assessments for controls,
The (TOGAF), 16
161-162
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
304
OSSTMM {Open-Source Security Testing preventative controls, 138
Methodology Manual), 143 PRINCE2 {Projects in Controlled
ownership Environments 2), 16
asset, 116 prioritizing risk responses, 134-136
control, 116, 232 privacy, NIST control families for, 187
data, 56 probability, 80
risk,24-30, 116,232,283 processes. See business processes; domains
risk response action plans and, 137 and processes
Project Management Body of Knowledge
p (PMBOK), 16, 148, 149
Project Management Institute Project
passive vs. active control testing tools, 164
Management Body of Knowledge
PCI-DSS {Payment Card Industry Data
(PMI-PMBOK), 16, 148, 149
Security Standards)
project/program management
about, 29, 30, 183
Agile framework for, 150-151
applying, 213-214
CMMI, 149-150
control objective and requirements for,
defined,44
193-194
illustrated, 47
PDCA (Plan-Do-Check-Adjust) life cycle,
implementing as risk response, 148
126-127
Lean mind-set, 151
penetration testing, 162-164
PMI-PMBOK framework, 16, 148, 149
personnel security KPI, 259
risk management and, 151-152
physical and environmental protection KPI, 257
risks, threats, and vulnerabilities, 44-47
physical controls, 184
Projects in Controlled Environments 2
physical locations, 60
(PRINCE2), 16
Plan-Do-Check-Adjust (PDCA) life cycle,
protocol analyzer, 164
126-127
publications. See also NIST Special
planning
Publications
business continuity, 58-62
Risk IT Framework, 278-279
KPis for, 244, 247, 258
risk response, 126-127
risk response action plans, 137 Q
testing disaster recovery plans, 59 qualitative KPI, 166
platforms, 22-23 qualitative risk assessments
PMBOK {Project Management Body of combining with quantitative techniques,
Knowledge), 16 107-108
PMI-PMBOK {Project Management Institute performing, 108
Project Management Body of Knowledge), using, 103, 106-107
16,148,149 quantitative KPI, 166
port scanners, 164-165 quantitative risk assessments, 103-106
portfolio management, 44 about, 103-104
Portfolio Management {PM) domain combining with qualitative techniques,
{Val IT), 193 107-108
practices, 13 exam tip for, 105
preparedness, 132 scenario using, 104-106
Pretexting Protection, 29 quick wins, 135
Index
305
R documenting results of, 118
exam objectives, 91-92
RCA {root-cause analysis), 172
exam tips, 98, 103, 105, 110
recovery controls, 185
exercise assessing risk, 119
recovery point objective (RPO), 59
fault- and event-tree analysis, 108-109
recovery time objective (RTO), 59
identifying asset threats and
remote access control measure, 244,
vulnerabilities, 102
246,248
ISACA Risk IT Framework, 18-19, 96-98
reporting results
ISO/IEC standards, 95-96, 98
control monitoring, 173-174
likelihood determination and impact
penetration testing, 164
analysis, 102-103
risk assessment and analysis, 116
NIST RMF steps for, 92-93
of risk response activities to
OCTAVE methodology for, 93-95, 98
organizations, 145
other methods of, 110
requirements phase (SDLC), 50, 51
performing qualitative and quantitative
residual risks, 11, 117
assessments, 108
resilience, 60
processes in, 92, 103
results documentation, 116-118
qualitative techniques for, 103, 106-107
retirement phase (SDLC), 51
quantitative techniques for, 103-106
review questions and answers, 119-124
reporting results of, 116
control monitoring, 175-180
review questions and answers, 119-124
controls, 203-207
system testing during, 100-101
designing and implementing controls,
risk assessment KPI, 260
234-238
risk avoidance, 133
measuring risk and control effectiveness,
risk awareness, 26-28
263-265
about, 26
risk assessment and analysis, 119-124
developing program for, 27-28
risk management concepts, 31-36
exercise in developing program, 28
risk response, 153-157
tools and techniques of, 26-27
risk scenarios, 84-89
risk culture, 12
threats and vulnerabilities, 62-67
Risk Evaluation {Risk IT), 129-130, 280-282
risk acceptance, 133
Risk Governance {Risk IT), 129-130, 279-280
risk appetite
Risk IT Framework, 275-283
defined, 12
applicability of, 277-278
factoring into business plan, 19, 20
exam tips for, 130
senior management and, 26
focus areas of, 279
risk assessment and analysis, 91-124. See also
guidance on use of controls in, 182
risk scenarios
KRis for, 171
analyzing assessments, 110-111
managing risk response with, 129-130
analyzing controls, 102, 111-115
overview, 275-277
asset identification and categorization, 1O1
publications for, 278-279
bow-tie analysis, 109-110
relationship between CO BIT, Val IT,
collecting data for, 98-101
and,276
communicating risk results, 117
risk assessment and analysis using, 18-19,
determining risk from, 117
96-98
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
306
Risk IT Framework {Cont.) risk sharing for, 132
Risk Evaluation domain, 129-130, RMF steps for, 127-129
280-282 standards and frameworks for, 127-131
Risk Governance domain, 129-130, training employees in control content and
279-280 context, 146
Risk Response domain, 129-130, 282-283 Risk Response {Risk IT), 129-130, 282-283
Risk IT Practitioner Guide, The (ISACA), 18 risk scenarios, 60-90
risk management concepts, 1-36 about, 69-70
business perspectives, 19-24 analyzing, 80
elements supporting security goals, 3-7 bottom-up approach, 76-77
exam topics for, 1 business processes in, 78-79
information security goals, 2-7 classifying risks, 70-71
information systems architecture, 22 developing, 75, 79, 80
legal and governance standards, 28-30 elements of, 71-74
networks, 23 exam objectives, 69
overview, 30-31 exam tips for, 71, 72, 75
platforms, 22-23 factoring infrastructure in, 78
review questions and answers, 31-36 identifying risks, 70
risk awareness, 26-28 identifying stakeholders, 79
risk ownership, 24-30 internal and external risk factors,
terminology used, 8-19 77-78, 79
Risk Management Framework. See RMF IT factors in, 78
risk profiles, 97-98, 281 likelihood and impact, 80
risk register, 82-83, 118 organizational factors in, 78, 80-81
risk response, 125-137 pursuing low-cost responses to, 136
about, 152-153 review questions and answers, 84-89
creating plan for, 126-127, 137 risk register, 82-83
developing controls, 138-140 sample, 74
documentation of options for, 143-144 time and location factors in, 72-74
evaluating options for, 131-137 top-down approach, 75-76, 77
exam objectives for, 125-126 using quantitative assessments, 104-106
exam tips, 132, 136 risk sharing, 132
managing exceptions to, 144-145 risk tolerance
methods of project management for, defined, 12
148-152 factoring into business plan, 19, 20
mitigation as, 131-132 senior management and, 26
parameters of, 134 risks. See also impact; likelihood
prioritizing, 134-136 acceptance of, 133
reporting activities in, 145 applications and, 23-24
review questions and answers, 153-157 business cases for controls and IT, 210-211
risk acceptance as, 133 business continuity and disaster recovery,
risk avoidance as, 133 60-61
Risk IT framework for, 129-130, 282-283 classifying, 70-71
Index
307
communicating assessment of, 117 SC {security categorization), 227-228
culture, appetite, and tolerance of, 12 scale
elements of, 10-11 developing for threat assessments, 39, 40
emerging technologies, 53 RMF applicability and, 269
exercise assessing, 119 scenarios. See also risk scenarios
identifying, 70, 136-137 identifying threat, 95
information technology management, 55 scheduling vulnerabilities
inherent and residual, 11 about, 46
introduced by databases, 24 scope creep and, 44
OCTAVE Allegro for measuring/ scope
mitigating, 94 developing for threat assessments, 39, 40
operating systems and, 24 risk factors associated with, 45
organizational structures and approach scope creep, 44
to, 21-22 threats and vulnerabilities from project, 46
ownership of, 24-30, 116, 232, 283 SDLC {system development life cycle), 49-53
platforms and, 22-23 about, 49-50
Risk IT analysis of, 97 ensuring security inherent in, 223
SDLC, 52 model and phases of, 50-51
third-party management, 48 NIST control-related, 146-148
threats and vulnerabilities contributing risks, threats, and vulnerabilities of,
to, 38 52-54
RMF {Risk Management Framework). See also security. See also security goals
NIST Special Publications HIPAA requirements for, 214
about, 267 meeting defined requirements for controls,
applicability of, 269 225-226
control families for, 186-187 NIST RMF control families for,
DIACAP replaced with, 29 186-187
families of controls in, 182, 183 risk factors when using emerging
illustrated, 15, 128, 268 technologies, 53
overview, 268-270 RMF process throughout life cycle
publications applicable to, 269-270, of, 15, 128
271,272 security categorization {SC), 227-228, 229
security categorization in, 227-228, 229 security controls. See controls
steps in, 13-16, 127-129, 270, 272-274 security goals
tiered approach of, 268-269 access controls supporting, 7
using in risk assessment and analysis, CIA, 2-3
92-93 controls mitigating risks for, 211
elements supporting, 3-7
s illustrated, 7
security professionals, 14, 15
Safeguards Rule, 29
security training KPI, 247, 249
SANS (SysAdmin, Audit, Networking, and
sensitivity, data classification and, 4-5
Security) Critical Security Controls, 197-198
service level agreement {SLA), 48
Sarbanes-Oxley Act {SOX), 183, 215-216
SLA {service level agreement), 48
CRISC Certified In Risk and Information Systems Control All-In-One Exam Gulde
308
S.M.A.R.T. mnemonic, 167,172,240 threat actor, 38, 185-186
sniffers, 164 threat agents
software development life cycle. See SDLC characteristics of, 40
SOX {Sarbanes-Oxley Act), 183, 215-216 contributing to risks, 10-11
stakeholders, risk scenario, 79 defined,8-9,38
standards. See legal and governance standards; exam tips, 72
and specific standards factoring into risk scenarios, 71, 73, 74
"Strategies to Mitigate Targeted Cyber relationship to other risk elements, 11
Intrusions" {Australian Signals threat assessments
Directorate), 199 about, 38-40
sunset {disposition) phase {SDLC), 148 characteristics of threat agents, 40
supervisory control and data acquisition defined, 9
(SCADA), 199 illustrated, 40
system and communications protection NIST SP 800-30 on, 16, 40, 92-93,
KPI, 261-262 98, 107
system and information integrity KPI, 262-263 reviewing controls with, 160-161
system and services acquisition KPI, 244, 246 threat modeling. See threat assessments
system development life cycle. See SDLC threat scenarios, 95
system documentation for risk assessment, threats and vulnerabilities, 37-67
99-100 assessments of, 39-41
business continuity and disaster recovery
T management, 58-62
contributing to risks, 10-11
technical controls, 184
data management, 56-58
technology
defined,8-9,38
assessing vulnerability of, 41, 44
determining vulnerabilities, 41-42
mitigating risk for, 132
effect of controls on, 185-186
terminology, 8-19
emerging technologies, 53-54
testing
evaluating for business processes, 42
additional controls, 232
exam objectives for, 37
controls, 160, 162-164
exam tips, 38, 39, 62, 72
disaster recovery plans, 59
factoring into risk scenarios, 71, 73, 74
effectiveness of controls, 230
identifying, 38-39, 94
penetration, 162-164
inherent to assets, 102
risk assessment using system, 100-101
management ofIT operations, 54-56
risk response of controls, 141-143
pairing of, 38, 39
tools for passive vs. active control, 164
project and program management, 44-47
the nines, 243
relation to other elements, 11
The Open Group Architecture Forum
review questions and answers, 62-67
(TOGAF), 16
system development life cycle, 49-53
third-party management
third-party management, 47-49
about, 47-48
threat agents and, 38
effect on continuity and disaster recovery, 60
types of environmental risks, 43-44
risks, threats, and vulnerabilities, 48-49
Index
309
time and location factors, 72-74 V
tools
Val IT
control monitoring assessment,
domains and controls of, 192-193, 278
164-165
incorporated into COBIT 5, 190, 192
risk awareness, 26-27
relationship between Risk IT, CO BIT,
top-down approach to risk scenarios,
and,276
75-76, 77
Value Governance (VG) domain {Val IT), 192
tracking risk response exceptions,
value stream map (VSM), 151
144-145
vulnerabilities. See also threats and
training
vulnerabilities
employees in control content
assessing, 41-42, 161-162
and context, 146
contributing to risks, 10-11
KPI for awareness and, 247, 249
defined, 8, 38
risk awareness, 26-27
relationship to other risk elements, 11
technology, 41, 44
u vulnerability scanner, 165
uptime, 243
U.S. Department of Defense, 128,216,269
UTM {unified threat management),
w
white-box tests, 162
226-227
work breakdown structure (WBS), 46
This page intentionally left blank
Complete coverage
of today•s top
IT SECURITY
certification exams
•: Lfl.fu.Q11e Is Alt J'ou .\f•('t/."
I_
I CSSLP' I
_ / .\/./.I\"" '
r/~~,
1
;_-. . ,;.;~, ·
"·\l,'lkr,n,i:,-,,,,_"1.1,
;-:-
I
1,~,IU~h •t.X~h.,;;~:· ... - I
I I
•
0-07-183557-1 • $70.00 0-07-183156-8 • $50.00 0-07-183976-3 • $60.00