{"id":5592,"date":"2018-10-09T09:45:50","date_gmt":"2018-10-09T14:45:50","guid":{"rendered":"https:\/\/www.poweradmin.com\/blog\/?p=5592"},"modified":"2018-09-28T09:33:47","modified_gmt":"2018-09-28T14:33:47","slug":"tips-on-security-risk-assessment-2","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/tips-on-security-risk-assessment-2\/","title":{"rendered":"Tips on Security Risk Assessment"},"content":{"rendered":"<p><span style=\"color: #000000; font-family: verdana, geneva, sans-serif; font-size: 14px;\"><strong>By Des Nnochiri<\/strong><\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">Performing a security risk assessment has become an economic and functional necessity in the digital economy. Cyber-threats and many of the legal and operational aspects of data-handling now constitute as much of a challenge to enterprise success as effective marketing, and continuous service delivery.<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">\u00a0<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">A strong security posture, responsible data governance, and hitch-free network administration are just some of the essentials for business success in a digital marketplace. Each of these elements is continuously under threat from a number of different vectors, ranging from direct assault to technical failures, human error, and mismanagement.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/08\/security-risk-management-where-companies-fail-and-succeed.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-5596 size-medium\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/08\/security-risk-management-where-companies-fail-and-succeed-300x225.jpg\" alt=\"\" width=\"300\" height=\"225\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/08\/security-risk-management-where-companies-fail-and-succeed-300x225.jpg 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/08\/security-risk-management-where-companies-fail-and-succeed.jpg 350w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/a><\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">Threats, vulnerabilities, and unknown factors, with the potential to adversely affect enterprise security and operations, make up the risk landscape which an organization must navigate its way through. One of the principle tools available for doing so is a comprehensive risk assessment.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">In this article, we\u2019ll be offering recommendations on how to conduct that risk assessment with an eye for the latest business trends and strategies in this area.<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: normal; text-autospace: none;\"><span style=\"font-family: verdana, geneva, sans-serif; color: black;\">\u00a0<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Start with the Fundamentals<\/span><\/h2>\n<p style=\"margin-bottom: .0001pt; line-height: normal; text-autospace: none;\"><span style=\"font-family: verdana, geneva, sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">Before proceeding, it\u2019s essential to first understand what actually constitutes a risk and then to identify the security risks which are relevant to your enterprise.<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">\u00a0<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">Risks may be defined as those known and unknown factors that are capable of having an adverse effect on the workings of your organization. In general terms, these risks may stem from your physical work environment and personnel, conditions of the market or your industry sector, connections to the outside world (including communications channels, partnerships, and the internet), or external agencies and actors.<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">\u00a0<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">In terms of security, the National Institute of Standards and Technology (NIST) defines risk as \u201ca function of the likelihood of a given threat-source exercising a particular potential vulnerability, and the resulting impact of that adverse event on the organization.\u201d<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">\u00a0<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">The \u201cvulnerability\u201d that this definition refers to might stem from an error or weakness in your organization\u2019s security policy and procedures or their associated technologies and controls. Threats or risks must be identified and assessed in terms of their potential to disrupt operations, cause system damage, or produce security breaches by affecting or exploiting these avenues.<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">\u00a0<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">Taking an inventory of your data, personnel, and other aspects of your operation should be followed by a \u201ccrown jewel analysis\u201d to identify the most highly valued or critical assets and the building up of models describing how data flows through and out of your organization. It\u2019s then necessary to establish which of your assets may become vulnerable to various kinds of threats and the nature of the threats themselves. <\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">\u00a0<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">As a guide in constructing the risk assessment, <a href=\"https:\/\/itsm.tools\/2018\/04\/17\/10-tips-to-make-information-security-risk-management-less-risky\/\" rel=\"nofollow\" target=\"_blank\">several frameworks are available<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>. These include:<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">\u00a0<\/span><\/p>\n<ul>\n<li><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">NIST RMF: NIST\u2019s Risk Management Framework<\/span><\/li>\n<li><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">FAIR: Factor Analysis of Information Risk<\/span><\/li>\n<li><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">TARA: Transference, Avoidance, Reduction, or Acceptance<\/span><\/li>\n<li><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">OCTAVE: Operationally Critical Threat, Asset, and Vulnerability Evaluation<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Remember What\u2019s at Stake<\/span><\/h2>\n<p style=\"margin-bottom: .0001pt; line-height: normal; text-autospace: none;\"><span style=\"font-family: verdana, geneva, sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px; color: #333333;\">In making your risk assessment, it\u2019s necessary to keep in mind the potential costs associated with each of the threats that your organization faces. These costs aren\u2019t likely to be simply financial \u2013 they may also include the possibility of disruption to your network and business operations, negative effects on product or service delivery, damage to your business reputation or brand image, and even legal repercussions.<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px; color: #333333;\">\u00a0<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px; color: #333333;\">These costs will have varying effects on the enterprise, some being more tolerable than others. So a risk assessment should include what\u2019s known as a \u201crisk appetite statement\u201d, setting out your organization\u2019s levels of risk tolerance, and establishing a formal policy to describe the level of acceptance of each risk that\u2019s identified.<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px; color: #333333;\">\u00a0<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px; color: #333333;\">Don\u2019t forget to factor in the effects and demands of the law, industry standards, governmental controls, and regulatory compliance, as these may have a significant impact on determining security policy and establishing security controls.<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: normal; text-autospace: none;\"><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px; color: #333333;\">\u00a0<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Look Beyond the IT Department<\/span><\/h2>\n<p style=\"margin-bottom: .0001pt; line-height: normal; text-autospace: none;\"><span style=\"font-family: verdana, geneva, sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; color: #333333; font-size: 14px;\">It may be tempting to focus solely on the IT division of your enterprise \u2013 both as the source of the risks you face, and as the provider of solutions to mitigate their effects. But today\u2019s economy requires a more global view and a more holistic approach to risk assessment and management.<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; color: #333333; font-size: 14px;\">\u00a0<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; color: #333333; font-size: 14px;\">Enterprises in the digital economy have a much wider reach than before, with infrastructure, data assets, equipment, and personnel distributed potentially across the globe and existing in an ecosystem that includes cloud resources, supply chain partnerships, internet, wireless and mobile connectivity, in addition to the more traditional landscape of the on-site data center.<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; color: #333333; font-size: 14px;\">\u00a0<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px; color: #333333;\">In this environment, security has to become the responsibility and concern of everyone in the enterprise. This <a style=\"color: #333333;\" href=\"https:\/\/www.csoonline.com\/article\/3055835\/security\/how-to-perform-a-risk-assessment.html\" rel=\"nofollow\" target=\"_blank\"><span style=\"color: #0000ff;\">\u201centerprise-wide risk management\u201d approach<\/span><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> is now being widely practiced by many leading companies.<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: normal; text-autospace: none;\"><span style=\"font-family: verdana, geneva, sans-serif; color: #333333; font-size: 14px;\">\u00a0<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Assemble the Necessary Skills<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; color: #333333; font-size: 14px;\">With an increasingly sophisticated and continuously evolving threat landscape, risk assessment and risk management now require a more specialized skill-set \u2013 one that factors in not only the technical and procedural aspects of security management, but also maintains an awareness of the relevance and value of risk assessment to the actual workings of the business.<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; color: #333333; font-size: 14px;\">\u00a0<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; color: #333333; font-size: 14px;\">In practical terms, this may require the assembly of a dedicated risk assessment team, drawn from different lines of business and collectively representing those desired skills.<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: normal; text-autospace: none;\"><span style=\"font-family: verdana, geneva, sans-serif; color: black;\">\u00a0<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Get Management on Board<\/span><\/h2>\n<p style=\"margin-bottom: .0001pt; line-height: normal; text-autospace: none;\"><span style=\"font-family: verdana, geneva, sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; color: #333333; font-size: 14px;\">The involvement of top levels of management in the areas of risk assessment and risk handling is now more desirable than ever. Input is required from all levels of an organization if the key risk indicators of the business are to be identified and risk thresholds established that are acceptable to stakeholders across the board.<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: normal; text-autospace: none;\"><span style=\"font-family: verdana, geneva, sans-serif; color: black;\">\u00a0<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Act on the Assessment <\/span><\/h2>\n<p style=\"margin-bottom: .0001pt; line-height: normal; text-autospace: none;\"><span style=\"font-family: verdana, geneva, sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; color: #333333; font-size: 14px;\">Rather than being a passive process, a risk assessment must also include risk treatment plans, recommended methods of risk reduction or remediation, and plans of action that should be taken as a consequence of<\/span> <span style=\"font-family: verdana, geneva, sans-serif; color: #333333; font-size: 14px;\">what\u2019s been discovered. <a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/08\/img_1762-2148.jpeg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-5619 size-full\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/08\/img_1762-2148.jpeg\" alt=\"\" width=\"350\" height=\"233\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/08\/img_1762-2148.jpeg 350w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/08\/img_1762-2148-300x200.jpeg 300w\" sizes=\"auto, (max-width: 350px) 100vw, 350px\"><\/a>Having determined what\u2019s necessary to reduce the risk of each threat, it\u2019s also advisable to create a dedicated risk budget, allocating resources to each established line of action.<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; color: #333333; font-size: 14px;\">\u00a0<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; color: #333333; font-size: 14px;\">Depending on the size and nature of your organization, it may be necessary to assemble a working group or committee to oversee and review the risks, and organize the necessary implementations. <\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: normal; text-autospace: none;\"><span style=\"font-family: verdana, geneva, sans-serif; color: #333333; font-size: 14px;\">\u00a0<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Document the Process<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; color: #333333; font-size: 14px;\">For purposes of internal communication and stakeholder buy-in, it\u2019s essential to document and distribute the results of your risk assessment \u2013 especially if it contains guidelines and best practices that are intended to have a positive effect on the security practices and business operations of the enterprise.<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; color: black;\">\u00a0<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Make Risk Assessment a Continuous Process<\/span><\/h2>\n<p style=\"margin-bottom: .0001pt; line-height: normal; text-autospace: none;\"><span style=\"font-family: verdana, geneva, sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; color: #333333; font-size: 14px;\">Finally, security risk assessment needs be an ongoing and continuous process, reflecting the changes in your working environment, the threat landscape, and the world at large. Information may be pulled in from a number of different sources (market reports, industry news, cyber-threat intelligence platforms, etc.), to assist in this.<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; color: #333333; font-size: 14px;\">\u00a0<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; color: #333333; font-size: 14px;\">Risk-related information also needs to be disseminated throughout your organization via security advisories, notifications, and periodic sessions of security awareness training.<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; color: #333333; font-size: 14px;\">\u00a0<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; color: #333333; font-size: 14px;\">In this way, it\u2019s possible to foster and maintain <span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"http:\/\/www.risklimited.com\/risk-tips.htm\" rel=\"nofollow\" target=\"_blank\">an enterprise-wide culture<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span> in which security best practices, risk assessment, and risk management strategies become part of daily life.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Des Nnochiri \u00a0 Performing a security risk assessment has become an economic and functional necessity in the digital economy. Cyber-threats and many of the legal and operational aspects of data-handling now constitute as much of a challenge to enterprise success as effective marketing, and continuous service delivery. \u00a0 A strong security posture, responsible data [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":5595,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,42],"tags":[54,53,29],"class_list":["post-5592","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-security","tag-assessment","tag-risk","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/5592","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=5592"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/5592\/revisions"}],"predecessor-version":[{"id":5630,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/5592\/revisions\/5630"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/5595"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=5592"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=5592"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=5592"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}