Risk Assessment Framework

Risk Assessment Framework

1 HoliRisk – Risk Assessment Framework Carlos Martins Instituto Superior Técnico Av. Cavaco Silva, Taguspark, Oeiras, Portugal [email protected] Abstract – HoliRisk is a generic platform that gives framework requirements and, in section IV, the support to risk assessment in multiple implementation; the evaluation of the platform is organizational contexts, such as departments, described in section V and, the conclusions, in projects or activities. HoliRisk will allow a holistic section VI. point of view of the risks involving assets instead of a fragmented vision, diluted in various contexts. II. RELATED WORK Keywords – Risk Register, Risk Assessment, Risk, Risk Management, Web Application, Decision A. Principles support system, Framework The ISO 31000 standard defines risk as "the effect I. INTRODUCTION of uncertainty on objectives" [1, p. 1], and defines the principles that an organization must have to Risk management define and manage policies and effectively manage risks. Risk management: controls to address the risks that affect assets in 1. It creates and protects value; various organizational contexts, for example, within 2. It an integral part of all organizational a department; a project; an activity; throughout the processes; organization. This diversity is the biggest challenge 3. It is part of the decision process; in risk management within an organization, being 4. Explicitly addresses uncertainty; made in very specific and focused silos, oriented 5. It is systematic, structured and timely; features and disjoint risk management activities. As 6. It is based on the best available information; a direct consequence we find an idea of fragmented 7. It is adapted; risk, with different words, parameterization and 8. It takes human and cultural factors into measures that lead to highly complex solutions that account; can not be reused. For example, within the same 9. It is transparent and inclusive; organization, it may be the case of a financial 10. It is dynamic, iterative and responsive to manager and a marketing manager use a definition, change; and or different risk measure on the same asset - the 11. Facilitates continuous improvement of the first individual measures likelihood to break a glass organization; with the range of values [low, medium, high]; already the second measures the same probability The process described in ISO 31000 standard is with the values [very low, medium, high, very high]. based on the premise that risk management is an The management of the organization needs to iterative process with several stages, as shown in perform extra work to cross the two views and then Figure 1. take results. This paper proposes a framework flexible and generic enough to integrate the identified risk data for further analysis and mapping, designed taking into account the risk management principles of ISO 31000 [1], which will give support to stages of the risk process assessment in the risk management process. The paper is organized as follows: section II describes related work; in section III the Figure 1 - Risk management process 2 The first phase is to establish the context. This you to centralize the information on a server, requires identifying strategic objectives and criteria giving the possibility not only of integration as to determine which the acceptable consequences of well as collaboration. this context are. After setting the context, we can begin to identify, analyse and assess the risks. This 2) Acuity Stream – Acuity Stream is a risk is called risk assessment. Ending the evaluation, we management tool used in information security. spent the treatment of risks, if necessary. There are With a very strong focus on the organization's techniques that lead to mitigate, transfer or avoid assets, this nicely integrates risk management risk. in the organization. Any identified risk is always related to one or more assets. His greatest The phases that make up the risk assessment are: quality is the report not only through reports, Risk identification; Risk analysis; Risk Assessment but also through dashboards, represented in (see Figure 1). The identification is necessary to Figure 2, which in real time can be monitored identify the threats and vulnerabilities that can affect and also interact in order to apply controls to a the organization and its assets. In the analysis, we risk that has exceeded the desired level. examine the nature of the identified risks and not It runs through a central system where only qualify but also quantify the impact on the operators collaborate in the recording of organization that risk may have to check. After this identified risks and can trigger alerts to we evaluate and define whether the risks are interested parties through email or on the acceptable or tolerable, or if you need to define dashboard. techniques to control them. Contains data specific risk in the context of security information that can be used to load Risk Register, sometimes called in the literature by the domain model, which makes the Risk Log is defined in ISO Guide 73 standard for initialization and configuration of a simple tool. recording information of identified risks [2, p. 12]. The Risk Register is an information system to record all identified risks, which will support the various stages that make up the assessment of risks, and serves not only to register, but if it is implemented in a technology platform that enables, report information through risk reports. It is a support tool considered essential for the consultation, communication and monitoring of the identified risks. Figure 2 - Auity Stream dashboard B. Risk Management Tools 3) EBIOS – Ebios is a tool developed by the Central Information Systems Security Division There are many tools in the market not only to which belongs to the French Ministry of register, but also to report risks. ENISA, European Defence. It is a tool to support the five phases Union Agency for Network and Information Security, of EBIOS method 2010 [4], also developed by has generated an inventory1 with a total of twelve them. This method analyses, evaluates and Risk Management / Risk Assessment tools. For this takes actions related to risks in information paper there were selected the most relevant tools, systems, with the aim of generating security as they have interesting characteristics to it. policies tailored to the needs of organizations. 1) Verinice – It is a tool licensed by IT- This tool is used not only by the French Grundschutz for information security government, but also by organizations that management, replacing the discontinued somehow need to interact with the defence GSTOOL tool. With this tool you can perform ministry. risk analysis in the field of information security, based on ISO 27005 [3]. Of the most 4) Spreadsheets – Spreadsheets are currently interesting features, it allows you to import and the most used tool when referring to export data across multiple file formats, and if management and risk management is no the organization holds the paid version allows exception. Spreadsheets have several 1 https://www.enisa.europa.eu/topics/threat-risk- management/risk-management/current-risk/risk- management-inventory/rm-ra-tools 3 problems not only for large and medium-sized type. The type can be: plain text; text with enterprises, but also small. From the outset multiple lines; integer; floating point there are organizational problems from the number; Boolean; date and time; or a point of view of information, such as storage, range of values (set default values by the versioning, sharing, collaboration, user). communication or integration, but also a spreadsheet, being a general purpose tool, not [R2.2] Values Range Management – May even provide a good interface for a more be necessary to predefine a set of values specific analysis of risk management. It is a for an attribute to be used. A set of values tool that with some ingenuity can be used for is defined by the name, it is quantitative, this, and presents some challenges for other qualitative or a table, whether it is public, tools, since it is basic knowledge of use, with it is sortable and the respective values. limited but simple capacity to implement and above all reading and writing easy due to the . Qualitative – Set of qualitative values aspect tabulate. that are used to define categories and represent a classification. For example {high, medium, low} or {male, female} III. FRAMEWORK REQUIREMENTS are two ranges of qualitative values. Quantitative – Set of quantitative The requirements of this platform can be divided values that are numerical values and into: access management; domain management; are used to measure within domain model management; and domain data quantitative scales. The range of management. values from 1 to 5, or {1, 2, 3, 4, 5, 6, 7, 8, 10} are two ranges of quantitative [R1] Access Management – According to the values. ISO 31004 standard information a risk register . Tables – Previous sets are able to is sensitive. It is necessary not only to ensure define lists of values. However there is confidentiality, security and privacy in the a need to create even more complex information collected and stored on the assemblies that resemble sets of sets. platform. Access to the platform is done in two These sets were named tables. steps: user registration; user authentication. A Examples such as [{1, high}, {2, user is defined by the username, email and medium}, {3, down}] or [{event x occurs password. Authentication uses a user 10h}, {event y occurs 11h}, {z event mechanism\keyword and authorizes occurs 12h}] are examples of such management domains created by himself or tables. domains that are public, but can not do the [R3] Domain Model Management – To set the management of these domains. risk register of the domain model is it required to define the concepts and properties that [R2] Domain Management – Authenticated define the entities and relationships between users can create new domains, change, or them.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    9 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us