Appendix G: Risk Assessment

Introduction

Risk management is the process of selecting and implementing countermeasures to achieve an acceptable level of risk at an acceptable cost; beyond the cost–benefit analysis discussed previously in chapter “Understanding Forensic Readiness.” By examining in depth the potential threats faced by an organization, a better understanding of business risk can be gained that subsequently leads to identifying strategies, techniques, approaches, or countermeasures that reduce or mitigate impact. At a high level, this can be achieved by asking three basic questions:
• What can go wrong?
• What will we do?
• If something happens, how will we pay for it?
Thinking about these questions in context of a particular organization, it might become clear that there are some areas where risk management could be applied, such as weaknesses in the software development life cycle or manual processes that are prone to human error. Since the potential damage or loss to an asset exists, the level of risk is based on the value given to it by its owner and the consequential impact. Additionally, the probability and likelihood of a vulnerability to be exploited must also be taken into consideration. Therefore, as illustrated in Figure G.1, risk cannot exist without the intersection of three variables: assets, threats, and vulnerabilities.

What Is a Risk Assessment?

A risk assessment is simply a thorough examination of what could cause harm to assets so that an accurate decision of how to manage the risk can be made. Risk assessments do not require an overengineered approach of new processes, methodologies, or loads of paperwork. There are several industry-recognized methodologies available to use during the analysis stage of the risk management program.
Depending on the type of business offered by an organization, one methodology may be preferred over another; while others may be mandated through regulations to use a particular methodology or a decision is made to develop one that meets their specific business needs. Generally, organizations have the option of conducting a risk assessment by following one of these two approaches.

Qualitative Assessments

Qualitative assessments are focused on results that are descriptive as opposed to measurable; where there is no direct monetary value assigned to the assets and its importance is based on a hypothetical value. Organizations should typically look to conduct a qualitative assessment when the:
• assessors have limited expertise
• time frame allocated for the assessment is short
• organization does not have data readily available to accommodate trending

Quantitative Assessments

The primary characteristic of a quantitative assessment is its numerical nature. Use of variables, such as frequency, probability, impact, or other aspects of a risk assessment are not easily measured against mathematical properties like monetary value. Quantitative assessments allow organizations to determine whether the cost of a risk outweighs the cost of managing a risk based on mathematics instead of descriptive terms.
Organizations that have invested in gathering and preserving information, combined with the enhanced knowledge and experience of staff, are better equipped to conduct this type of assessment. For this reason, getting to end of job requires a larger investment in resource knowledge and experience, time, and effort.
Knowing that quantitative assessments follow a mathematical basis, organizations that decide to conduct this type of analysis should consider performing the following series of calculations.

Single Loss Expectancy

The first calculation to be completed is the single loss expectancy (SLE). The SLE is the difference between the original and remaining monetary value of an asset that is expected after a single occurrence of a risk against an asset. The SLE is calculated as

SingleLossExpectancy(SLE)=AssetValue(AV)× ExposureFactor(EF)

image

where AV is the monetary value assigned to an asset, and EF is an percentage representing the amount of loss to an asset.
For example, if the AV has been identified as $5000 and the EF is 40%, then the SLE would be calculate as

SingleLossExpectancy(SLE)=5000 × 0.40=2000

image

Annual Rate of Occurrence

Following the SLE, the next calculation to be completed is the annual rate of occurrence (ARO). The ARO is a representation of how often an identified threat will successfully exploit a vulnerability and generate some level of business impact within the period of a year. The ARO is calculated as

AnnualRateofOccurrence(ARO)=#impact/timeperiod

image

For example, if trending data suggest that a specific threat is likely to generate business impact one time over four periods, then the ARO would be calculated as

AnnualRateofOccurrence(ARO)=1/4=0.25

image

Annualized Loss Expectancy

Having values for both SLE and ARO, the next calculation to be completed is the annualized loss expectancy (ALE). The ALE is the expected monetary loss of an asset that can be realized as a result of actual business impact over a 1-year period. The ALE is calculated as

AnnualLossExpectancy(ALE)=SLE×ARO

image

For example, if the ARO is 0.25 and the SLE is 2000, then the ALE would be calculated as

AnnualLossExpectancy(ALE)=2000×0.25=500

image

With the ALE completed, organizations can use the resulting value directly in a cost–benefit analysis as described in, Appendix E: Cost–Benefit Analysis. For example, where a threat or risk has an ALE of $500, then the cost–benefit analysis would identify that investing $5000 per year on a countermeasure would not be recommended.

Advantages and Disadvantages

Depending on the goals for performing an assessment, both the qualitative and quantitative approach present its own benefits. Neither approach should be overlooked as a tool for performing risk assessment because they are unique in how they demonstrate risk to stakeholders.
With qualitative assessments, the approach is simpler because it does not require the in-depth analysis of numerical values through formulas and calculations. Analysis results are simpler for stakeholders to understand because it leverages business terms to communicate the level of risk involved. However, there is no escaping the fact that qualitative assessments are more subjective because they are based on the organization’s experience and judgment which makes it more difficult to defend. The ability to monitor the implementation of countermeasures using labels and terms is difficult because it cannot be measured.
On the other hand, a quantitative assessment is considered objective because it is not influenced by subjective experience or judgment. It relies on predetermined formulas and calculations to arrive at the valuation of a risk decision based on numerical measurements. However, this approach requires organizations to have existing data, more experience, and be willing to invest more time because it is based on factual numbers and predetermined formulas.

Tools, Methodologies, and Techniques

Tools

Given the availability of industry resources, completing a risk assessment does not need to be an overly complicated process. Several tools are readily accessible to make the risk assessment tasks easier; including software, checklists, and templates.
Depending on volumes, gathering and processing data can be demanding and require significant efforts. Organizations should look to invest in automated tools that can alleviate the time needed to complete these tasks. Regardless of whether the organization plans on purchasing or building tools, this decision should be based on aspects such as appropriate timelines, skill sets, and the need to follow a proper system development life cycle (SDLC).
As organizations perform more risk assessments, they will begin to identify patterns where there are similarities in tasks being completed, such as cataloging threat agents and threats. In these situations, the use of checklists may be beneficial to ensure that the risk assessment considers all relevant information even if it may not apply in each instance.
Reviewing existing policies and procedures for relevant security gaps can be a complex and time-consuming task. When used properly, templates can be effective in improving operational efficiencies and accuracy of the risk assessment results.

Methodologies and Techniques

Generally, all risk assessments follow a similar methodology consisting of the same techniques to arriving at a final risk decision, including analyzing threats and vulnerabilities, asset valuation, and risk evaluation.
However, there is no single risk assessment methodology that meets the needs of every organization because they were not designed to be “one-size-fits-all.” Ultimately, each organization is unique in its own respect and has their own reasons for why they would complete risk assessments. Therefore, a variety of industry-recognized risk assessment methodologies have been developed to address the varying needs and requirements.
Contained in the “Resources” section of this chapter, a series of different risk assessment methodologies have been provided as references. It is important to note that inclusion of a methodology below does not suggest that these are better or recommended over other models that were not included.

Risk Life Cycle Workflow

Visualizing Risk

Challenges with demonstrating business risk to stakeholders are largely attributed to delivering information in a format that is difficult to interpret. Illustrated in Figure G.4, a mind map is an excellent tool for conceptually representing risk in a nonlinear format to build out the framework for assessing and managing the risk.
Mind maps are a type of diagram that is based on a centralized concept or subject, such as risk management, with the components revolving around it like a spiderweb. The use of a mind map not only enhances communications through the use of categorized groupings, but also allows the risk management team to quickly record and capture ideas being discussed during meetings.

Communication

Communication is an integral component of risk management. It is essential that the key stakeholders responsible for managing risk throughout the organization, such as upper management, understand the reasons why decisions are being made and why the selected strategies, techniques, approaches, and countermeasures are necessary.For this reason, the communication activities performed in this workflow should not be viewed as a sequential stage, but instead represented as a continuous activity.
By having consistent communication, risk information can be more effectively reused throughout the organization; reducing the need to conduct more than one risk assessment on the same area for different purposes (ie, planning, auditing, resource allocations). When defining communication activities, organizations might include details that provide direction on the:
• types of information that needs to be communicated at various stages (ie, what information do stakeholders need or want)
• target audience for the various types of information (ie, management)
• means used to distribute communication to the target audiences

Stage #1: Identify

Risk cannot be managed without first recognizing, describing, and having a solid understanding of what potential risks can significantly impact an organization. To start, stakeholders (ie, employees, investors, etc.) should be provided with clear direction on what the organization’s expectations are when it comes to identifying risk. Once informed, all stakeholders should be provided with the appropriate tools and techniques—such as training, workshops, checklists, etc.—that will be used to accurately identify risk.

Stage #2: Analyze

Having identified all relevant assets, threats, and vulnerabilities that constitute risk, the next step is to individually analyze and prioritize all risks that have any potential of generating business impact. Analyzing each risk individually helps to prioritize them so that organizations can focus resources and efforts to managing the most appropriate risk first. When defining assessment activities, organizations might include details that provide direction on:
• who should be involved
• the level of detail required
• what type of information needs to be gathered
• how the risk assessment should be documented to deal, for example, with planning activities
Output from the risk assessment will create an understanding of the nature of the risk and its potential to affect business operations and functions. After determining the impact of each risk, which is the combination of likelihood and severity, the risk management mind map can be expanded further to include the specific components of the identification stage as illustrated in Figure G.6.

Stage #3: Manage

Mitigate risk, where likelihood is high but severity is low, through the implementation of countermeasures to reduce the potential for impact
Avoid risk, where likelihood and severity are high, by keeping clear of activities that will generate the potential for impact
Where the organization has determined that the best response to a risk is by implementing countermeasures, it is important to remember that these controls can be applied in the form of administrative, physical, or technical controls. After determining the best response, the risk management mind map can be expanded further to include the specific components of the identification stage as illustrated in Figure G.8.

Stage #4: Monitor

Generally, risk is all about uncertainty. Even though a formalized risk management program has been implemented, and up to this stage has been able to identify and get control over known risks, organizations need to ensure that the process is not performed as a one-time activity. Instead, the need to implement continuous monitoring within the risk management program has two fundamental aspects that are essential to ensuring its effectiveness.

Review

Activities performed while reviewing the risk management are an important aspect of continuous process improvement. Reviewing the collective risk management approach and process is essential to providing stakeholders (ie, management, investors, etc.) with awareness and assurance that the organization’s overall risk management approach is performing effectively, efficiently, and is still relevant. For this reason, the review activities performed in this workflow should not be viewed as a sequential stage, but instead represented as a continuous activity.
Information gathered during review activities helps organizations to identify opportunities to improve their risk management approach and process to ensure its overall performance remains consistent. To support the activities performed during the review stage, organizations should consider:
• clearly defining the accountabilities, roles, and responsibilities of all stakeholders involved in maintaining the performance of the risk management approach and process
• using existing governance and assurance functions (ie, internal audit) to assess the performance of the risk management approach and process
• documenting the expected outcomes of risk response decisions, such as reducing negative impact or capitalizing on opportunities
• defining key performance indicators (KPI) to measure the performance of the risk management approach and process
• building the necessary systems, processes, etc. to demonstrate the findings relevant to the performance of the risk management approach and process
• establishing a timeline for when and how (1) governance and assurance assessments will be conducted; (2) the outcome decisions will be communicated to stakeholders

Summary

Resources

Peltier, T.R., 2000. Facilitated Risk Analysis Process (FRAP). http://www.ittoday.info/AIMS/DSM/85-01-21.pdf. CRC Press.
Ionita, D., Hartel, P., 2013. Current Established Risk Assessment Methodologies and Tools. http://doc.utwente.nl/89558/1/%5Btech_report%5D_D_Ionita_-_Current_Established_Risk_Assessment_Methodologies_and_Tools.pdf. University of Twente.