CRISC Session2 Slides
CRISC Session2 Slides
MODULE 2
Exam Relevance
This domain represents 20% of
the CRISC examination 22
(approximately 30 questions). 26
20
32
Domain 1 Domain 2
Domain 3 Domain 4
2
Topics
Risk Events
Risk Register
Learning Objectives
Define the types of risk events and threats an enterprise can
face.
4
Learning Objectives
Explain the risk assessment process
Risk Identification
6
Risk Identification Overview
Setting Context
Communication
Threats Frequency
8
Risk Events
Risk Events vs. Threat Events
• Describe the series of actions that may take place • Each element of risk
needs to be considered
• Often improperly categorized as risk individually and in
aggregate.
Review Question
Which of the following is MOST likely be addressed by risk
response?
10
Common Risk Event Examples
Wildfires, hurricanes,
New regulations Loss of key personnel flood or other natural
disasters
11
Risk Identification
Risk identification requires the documentation and analysis
Each element of risk must be considered
of the elements that comprise risk, such as:
individually and in aggregate.
Identification of risk depends on
• Consequences associated with specific assets
successful identification of assets, threats
to those assets and the vulnerabilities that
• Threats to those assets, normally requiring both intent
could be present that would allow an
(motivation) and capability
asset to be acted against.
• Vulnerabilities that a threat may attempt to exploit
12
Risk Factors Categories
13
Risk Factors
Example: Virus has been
Threat Actors written to exploit system
14
Risk Assessment
Threat identification requires understanding the
Identify Threats motivation, strategy, and techniques of those who
perpetrate threats.
15
Review Question
Which of the following is the MOST important reason for conducting
periodic risk assessments?
16
The Risk Practitioner’s Role
1
Work closely with business process owners to ensure
understanding operations, including external dependencies and
assumptions
3
Understand the purpose, processing and handling of data and
information across the enterprise
17
Systematic Approaches
• Vulnerability assessments and review of business continuity and disaster recovery plans
• Interviews and workshops with managers, employees, customers, suppliers and auditors
Inductive Methods
• Team examines a process to determine the possible point of attack or compromise
• Penetration testing
Existing Taxonomy
• Commonly used in governance, risk and compliance (GRC) systems or risk assessment systems
• Support an integrated view of system covering all aspects and risk resources
18
Changes in Risk Environment
Changes Monitor
• Enterprises and technologies • Vendor alerts
evolve • Reports from computer
• Threat actor focus on new emergency response
areas to attack teams (CERTs)
• New vulnerabilities discovered • Media stories
in systems and applications
• Changes in technology and
business practices
When a new issue arises, the risk practitioner should work with
the business and system owner to perform a threat analysis and
determine if and how the organization should respond.
19
Operational Integrity
Procedures for maintaining operational integrity
include, but not limited to:
21
Forecasting Risk
Document:
Collect insights Apply what was
What went Learn from past
from previous discovered from
wrong. events and
incidents, audit the incident
How can the allow the same
reports and response
system be errors to repeat
failures process
protected?
22
Threat Modeling and Threat Landscape
23
Threat Actors
Imaginative
Risk Practitioners
Threat Actors
Creative
Determined
24
Internal Threats
• Inadequate training • Compromise system
Threat
• Key personnel
• Poor treatment • Release data
moves to another
• Not enough time to • Coerced to share
enterprise
perform job trade secrets
Leaves gaps in
impacts, intentional or enterprise to legal and
knowledge and skills
unintentional reputational risk
25
26
Managing Employee Threats
Throughout Employment:
Upon Hire:
• Review organizational policies and
• Review the qualifications and
responsibilities through awareness sessions
attitude of prospective employees and regular management reviews
• Review and require signature of Hire
• Regularly interact with employees to
ethics and policies of the enterprise understand any frustrations, complaints or
and nondisclosure agreement
issues and to seek to resolve those issues
(NDA)
Employment Third Party:
Ending Employment:
• Vendor staff, business process outsourcing
• Ensure all organizational assets
staff or any other external individuals
are returned (ID badges,
equipment and uniforms) • Viewed as external threats
Termination
• Access to systems, network and • Usually have some internal access, higher
facility should be revoked knowledge and capabilities to potentially
immediately, prior to departure initiate a threat from within
27
Review Question
When a start-up company becomes popular, it suddenly is the target
of hackers. This is considered:
A. an emerging vulnerability.
B. a vulnerability event.
C. an emerging threat.
30
Additional Sources for Threat Information
Interviews
Self-assessment
Media Reports
Third-party Assurance
Observation
User Feedback
Logs
Vendor Reports
31
32
Threat Scenario Components
Threat Modeling
33
MODEL BENEFITS
STRIDE (Spoofing identity, Tampering with • Helps identify relevant mitigating techniques
data, Repudiation, Information disclosure, • Most mature
Denial of service, Elevation of privilege) • Easy to use but time consuming
PASTA (Process for Attack Simulation and • Helps identify relevant mitigating techniques
Threat Analysis) • Directly contributes to risk management
• Encourages collaboration among stakeholders
• Contains built-in prioritization of threat mitigation
• Laborious, but has rich documentation
LINDDUN (Linkability, Identifiability, • Helps identify relevant mitigating techniques
Nonrepudiation, Detectability, Disclosure of • Contains built-in prioritization of threat mitigation
information, Unawareness, Noncompliance) • Can be labor intensive and time consuming
Attack Trees • Helps identify relevant mitigating techniques
• Has consistent results when repeated
• Easy to use if a thorough understanding of the system is already in place
34
Vulnerability and Control Deficiency Analysis
35
36
Cloud Computing Advantages and Concerns
37
Private
IaaS
PaaS
Hybrid Public
SaaS
Community
38
Cloud Environment Migration Considerations
Migration to a cloud environment needs to be carefully weighed and considered in the
context of an enterprise’s strategic goals and objectives.
39
Risk can be incurred either through Technical and operational risk should
adoption or non-adoption of these consider that certain data elements may
capabilities be governed by regulatory or contractual
requirements and that data elements
may need to be centralized in one place
Changes in analytics capabilities can so that the data can be analyzed. In
introduce technical and operational some cases, this centralization can
risk compound technical risk.
Siloed
Use of data Requests for Quality
Poorly Evolving departments Lack of
by multiple change and problems
defined data regulatory and skilled data
enterprise workflow from data
ownership requirements enterprise analysis staff
departments changes deluge
structures
41
Gap Analysis
A gap analysis is based on the comparison of a current state or condition and the
desired state or condition, with the difference between the two states being a gap.
0% 100%
42
Review Question
Which of the following choices BEST helps identify information
systems control deficiencies?
A. Gap analysis
D. Countermeasure analysis
Vulnerability Assessment
• A process of identifying and classifying vulnerabilities
• Provides a careful examination of a target environment to
discover any potential points of compromise or weakness
Old or poorly
Disruption to Unreliable supply Untrained Inefficient maintained
utilities chain personnel (HR) processes equipment
44
Root Cause Analysis
Root cause analysis is a process of diagnosis to establish the origins of events to learn
lessons from consequences.
Risk Response
45
46
Root Cause Analysis
Implementation
48
Risk Scenarios
Tangible and assessable representation of risk:
Conceptualize
risk
• Describe a potential risk event with an
uncertain impact on the enterprise (positive
or negative)
• System failure
• Network outages
• Power failures
Previous Events
• Natural disasters
50
Risk Scenario Benefits
Facilitate communication
Gathering information
Inspire action
Framing information
51
Bottom Up
• Describing risk events specific to
individual enterprise situations
• Cyberthreat and vulnerability
52
Review Question
Risk scenarios should be created PRIMARILY based on which of the
following?
53
Decomposes the major components that • Entire methodology built on the OpenFAIR
comprise risk into smaller, manageable model
components that all for analysis to be performed. • Accounts for loss magnitudes at a discrete
Includes elements related to: level
• Loss Event Frequency • Factors in control objective maturity as a
• Loss Magnitude method to account for potential reductions in
overall loss magnitude estimations
55
FAIR
Source: Rubicon Advisory Group: ISACA CRISC Review Manual, page 115
Review Question
An enterprise learns of a security breach at another entity using
similar network technology. The MOST important action for a risk
practitioner is to:
58
Review Question
Risk scenarios are analyzed to determine the:
A. strength of controls.
Break
Risk Assessment Concepts, Standards and
Frameworks
61
62
Risk Assessment Techniques:
Concepts, Standards and Frameworks
63
1 3
2 4
65
Risk Map
An expression of risk evaluated using well-
defined and non-ambiguous impact criteria
66
Risk Owner
Each risk must be linked to an individual who owns the risk, according to
their job responsibilities and duties.
67
Indicate gaps
Advise whether Provide guidance
between current Communicate
these gaps are to judge the Document the
risk environment results of risk
within acceptable severity of the process used
and desired state assessment
levels identified issue
of I&T-related risk
68
Addressing Risk Exclusions
69
71
72
Review Question
Which of the following statements BEST describes the value of a risk
register?
74
Review Question
If risk has been identified, but not yet mitigated, the enterprise would:
75
76
Risk Analysis Methodologies
Qualitative Hybrid
Scenarios or Combination of
Quantitative
situations approaches
77
Review Question
The board of directors wants to know the financial impact of specific,
individual risk scenarios. What type of approach is BEST suited to
fulfill this requirement?
A. Delphi method
B. Quantitative analysis
C. Qualitative analysis
78
Review Question
The MOST significant drawback of using quantitative risk analysis
instead of qualitative risk analysis is the:
A. lower objectivity.
D. higher cost.
80
Business Impact Analysis
81
BIA Outcomes
Enabling: Defining:
83
Review Question
The GREATEST advantage in performing a business impact analysis
is that it:
A. does not have to be updated because the impact will not change.
84
BIA Resources
The BIA should also capture all the resources needed Data collect effort that provides other key benefits
to continue operations while in a diminished capacity. including:
Identified
Defined Documented Uncovered Validated
controls, threats,
weaknesses and recovery recovery team/staffing contact
gaps objectives methods requirements information
85
86
Review Question
The MOST effective starting point to determine whether an IT system
continues to meet the enterprise’s business objectives is to conduct
interviews with:
A. executive management.
B. IT management.
D. external auditors.
87
Incident Disaster
Impact Recovery
Resiliency
Planning
88
Additional Business Impact Areas
89
Review Question
Which of the following BEST facilitates cost-effective risk response?
90
Inherent, Residual and Current Risk
91
Risk is unavoidable in business. Risk is inherent in an enterprise. Some business processes may
have a higher level of risk than others, and the degree of risk varies from one activity, product or
service to another. The risk practitioner should understand risk and be able to assess and respond
to any risk that lies outside the organizational risk appetite in a way that reduces it to an
acceptable level.
92
Risk States
1 2 3 4
Risk
Inherent Current Residual
Transfer
93
94
Review Question
Which of the following is the PRIMARY objective of a risk
management program?
95
Review Question
Which of the following is the BEST way to ensure that an accurate
risk register is maintained over time?
A. Monitor key risk indicators and record the findings in the risk
register.
96
Summary
Risk Events
Threat Modeling and Threat Landscape
Vulnerability and Control Deficiency Analysis
Risk Scenario Development
Risk Assessment Concepts, Standards and Frameworks
Risk Register
Risk Analysis Methodologies
Business Impact Analysis
Inherent and Residual Risk
97
98