Introduction to Risk Assessment Using Archer GRC Nancy

  • Slides: 70
Download presentation
Introduction to Risk Assessment Using Archer GRC Nancy Rainosek Statewide GRC Program Manager State

Introduction to Risk Assessment Using Archer GRC Nancy Rainosek Statewide GRC Program Manager State of Texas Department of Information Resources

SISAC Risk Assessment Subcommittee • • Kevin Kjosa, Co Chair – UT System Darrell

SISAC Risk Assessment Subcommittee • • Kevin Kjosa, Co Chair – UT System Darrell Bateman - TTU Kent Dyer - TDLR Shirley Erp – HHSC Dave Gray - CPA Ann Hallam - SORM Mark Herber - DFPS Jeff Mc. Cabe - TAMU • • Arturo Montalvo - OAG Matt Riemersma - DARS Brandon Rogers - GLO Charlotte Russell - UNTS Khatija Syeda - HHSC Lisa Wei - CPA Robert Myles - Symantec 2

Today’s Game Plan • • • Background Understand common terms and roles Risk assessment

Today’s Game Plan • • • Background Understand common terms and roles Risk assessment workflow Bulk upload files Case Study 3

Background

Background

TAC 202 § 202. 25/75 Managing Security Risks. A risk assessment of the agencies/institutions

TAC 202 § 202. 25/75 Managing Security Risks. A risk assessment of the agencies/institutions information and information systems shall be performed and documented.

TAC 202 (1) The inherent impact will be ranked, at a minimum, as either

TAC 202 (1) The inherent impact will be ranked, at a minimum, as either "High, " "Moderate, " or "Low“ and (2) The frequency of the future risk assessments will be documented. (3) Risk assessment results, vulnerability reports, and similar information shall be documented and presented to the Information Security Officer or his or her designated representative(s). (4) Approval of the security risk acceptance, transference, or mitigation decision shall be the responsibility of: a) the information security officer or his or her designee(s), in coordination with the information owner, for systems identified with a Low or Moderate residual risk. b) the state agency/institution of higher education head for all systems identified with a residual High Risk.

Understanding Common Terms and Roles

Understanding Common Terms and Roles

RISK ASSESSABLE UNIT The scope of a risk assessment. The risk assessable unit (RAU)

RISK ASSESSABLE UNIT The scope of a risk assessment. The risk assessable unit (RAU) is what is being assessed. It may be an application, a location such as a data center, etc. 9

Assessment Component Each piece that makes up the risk assessable unit is an assessment

Assessment Component Each piece that makes up the risk assessable unit is an assessment component. Application Database Data center Employee Time and Leave System

Assessment Questionnaire The list of questions asked during an assessment. Each assessment component has

Assessment Questionnaire The list of questions asked during an assessment. Each assessment component has its own questionnaire. Based on NIST 800 -53.

Security Categories Based on the security categorization from NIST 800 -60.

Security Categories Based on the security categorization from NIST 800 -60.

Risk Assessment Workflow

Risk Assessment Workflow

Archer Risk Assessment Process Risk Assessment Coordinator Determines scope of RAU Assigns questionnaires to

Archer Risk Assessment Process Risk Assessment Coordinator Determines scope of RAU Assigns questionnaires to assessors and reviewers Generates questionnaires C Assessor Completes questionnaire Reviewer (Optional) Review questionnaires Security Office (Optional) Review the assessment and related findings Reviewers either accept or reject Evaluate overall risk and either assessment accept or reject If accepted, then assessments generate findings Or reject and provide feedback

Archer Finding Resolution Process Assessor Labels the findings from a criticality / priority standpoint

Archer Finding Resolution Process Assessor Labels the findings from a criticality / priority standpoint Recommends to either accept or remediate the risk Assigns the remediation activity along with a due date. Reviewer (Optional) Review findings and remediation plans and risk acceptance. Risk Assessment Coordinator At RAU level, Reviews and sends to ISO/Business Owner. Accept risk acceptance or remediation plans Or reject and provide feedback ISO / Business Owner Approve risk acceptance / mitigation. Is residual risk = High Or reject and provide feedback Organization Head Approve risk acceptance / mitigation if residual risk = high Or reject and provide feedback

Scoping the Assessment SCOPE Risk Assessment Coordinator determines what will be assessed: This will

Scoping the Assessment SCOPE Risk Assessment Coordinator determines what will be assessed: This will be your Risk Assessable Unit (RAU)

Identify the Assessment Components Employee Time and Leave System Info System Location Network Infrastructure

Identify the Assessment Components Employee Time and Leave System Info System Location Network Infrastructure Security Program

Identify the Assessment Components Employee Time and Leave System Assessment Component Criticality 1. Information

Identify the Assessment Components Employee Time and Leave System Assessment Component Criticality 1. Information System: TLS application NIST Low 2. Information System: TLS database NIST Low 3. Information System: Server for database and system NIST Low 4. Network Infrastructure: Central IT NIST Low 5. Location: Data Center NIST Low

Assigning Roles Assign For each assessment component you need to assign an assessor, optional

Assigning Roles Assign For each assessment component you need to assign an assessor, optional reviewers and approvers.

Assigning Roles RAU: Employee Leave System Final Approver: ISO Assessment Component Assessor Level 1

Assigning Roles RAU: Employee Leave System Final Approver: ISO Assessment Component Assessor Level 1 Reviewer Level 2 Reviewer Information System: ELS Joe Smith Tom Jones Mary King Information System: ELS database Joe Smith Tom Jones Mary King Information System: Servers Allison Blue Bob Wright Mary King Network Infrastructure: Central IT John Brown Bob Wright Jerry Reynolds Location: Data Center John Brown Tom Jones Jerry Reynolds

Assigning Roles RAU Level Assessment Level

Assigning Roles RAU Level Assessment Level

Requesting New Users Support Request or send DIR template for bulk upload

Requesting New Users Support Request or send DIR template for bulk upload

Add Assessment Components Add You can add applications, locations and networks individually or send

Add Assessment Components Add You can add applications, locations and networks individually or send to DIR for bulk upload.

Add Assessment Components 24

Add Assessment Components 24

Assign Security Category Assign You add a security categories for an application. Location and

Assign Security Category Assign You add a security categories for an application. Location and network categories are inherited from application.

Security Categorization Identify Information Type Compensation Management Select Impact Level Confidentiality – Low Integrity

Security Categorization Identify Information Type Compensation Management Select Impact Level Confidentiality – Low Integrity – Low Availability - Low Assign Security Category Low 26

Number of Questions Security Program Location Network Application Low Moderate High 104 131 162

Number of Questions Security Program Location Network Application Low Moderate High 104 131 162 Detailed Low Detailed Moderate Detailed High 296 392 423 Detailed Low Detailed Moderate Detailed High 35 51 101 Detailed Low Detailed Moderate Detailed High 38 57 107 Detailed Low Detailed Moderate Detailed High 43 61 101 171 221 137 219 269 148 220 260

Generate the Questionnaire Generate an assessment questionnaire for each assessment component.

Generate the Questionnaire Generate an assessment questionnaire for each assessment component.

Launch the Assessment

Launch the Assessment

Demonstration

Demonstration

Exercise #1 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12.

Exercise #1 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. Log into the system with your account RACxx. Create a new Risk Assessable Unit. Add Network for your organization. Select NIST Low as your questionnaire type. Save the record. Add a new questionnaire for your Network. Add an Assessor and ISO as Reviewer and ISO. Save and close the Assessment Click Apply at the top of the RAU. Go back into the Network Questionnaire. Make sure you are assigned as the RAC. Edit the Questionnaire. Launch the assessment from the Questionnaire screen. Save and close the Questionnaire. Select “Assessments Launched” under Risk Assessment Coordinator Status and Save the RAU.

Complete the Questionnaire Complete The assessor completes the assigned assessment questionnaire.

Complete the Questionnaire Complete The assessor completes the assigned assessment questionnaire.

Completed all Questionnaires The Assessor receives an email when the questionnaire is launched.

Completed all Questionnaires The Assessor receives an email when the questionnaire is launched.

Completing the Questionnaire Responses defined: Implemented = 0 The full extent of the requirement

Completing the Questionnaire Responses defined: Implemented = 0 The full extent of the requirement has been put into place, documented, and communicated; and is consistently applied. Partially Implemented* =. 5 Some of the characteristics of the control requirement are being performed, but may not be documented and communicated, nor consistently applied. Not Implemented* =1 The control requirement is not currently being performed or has not been put into practice. Unknown* =1 It cannot be determined whether the control requirement is being performed or has been put into practice. N/A =0 The specific control requirement is not applicable to the component being assessed.

Completing the Questionnaire

Completing the Questionnaire

Submit for Review

Submit for Review

Reviewing the Questionnaire Review If assigned, the reviewer performs a review of the assessment

Reviewing the Questionnaire Review If assigned, the reviewer performs a review of the assessment questionnaire

Reviewing the Questionnaire

Reviewing the Questionnaire

Reviewing the Questionnaire Review The security office performs a review of the assessment questionnaire.

Reviewing the Questionnaire Review The security office performs a review of the assessment questionnaire.

Reviewing the Questionnaire

Reviewing the Questionnaire

Demonstration

Demonstration

Exercise #2 1. 2. 3. 4. Log off and log on as Assessor. XX.

Exercise #2 1. 2. 3. 4. Log off and log on as Assessor. XX. Access the RAU by accessing current RAU records Access the Network Questionnaire Click Edit and answer the questions on the Questionnaire. Answer every question as “Implemented” except for 2 or three, where you should answer “Not Implemented” 5. Click “Save and Continue” 6. Make sure the Progress % = 100%. 7. Click “Submit for Review” and save an close. . 8. Log off and log on as ISOxx. 9. Access the RAU by accessing current RAU records 10. Access the Network Questionnaire. 11. Approve the questionnaire as both the Reviewer and Security Office.

Findings are Generated

Findings are Generated

Findings are Generated Respond The assessors review findings, establish criticality and indicate whether remediation

Findings are Generated Respond The assessors review findings, establish criticality and indicate whether remediation or risk acceptance.

Findings are Generated

Findings are Generated

Reviewing Findings Review The Reviewer, if assigned, performs a review of the findings and

Reviewing Findings Review The Reviewer, if assigned, performs a review of the findings and remediation or risk acceptance.

Completed all Questionnaires The Risk Assessment Coordinator receives an email when all questionnaires for

Completed all Questionnaires The Risk Assessment Coordinator receives an email when all questionnaires for an RAU are complete.

Completing the RAU Review The Risk Assessment Coordinator sends to the ISO after all

Completing the RAU Review The Risk Assessment Coordinator sends to the ISO after all questionnaires for the RAU are completed.

Completing the RAU The Risk Assessment Coordinator generates workflow to the ISO when they

Completing the RAU The Risk Assessment Coordinator generates workflow to the ISO when they select “Submit for Approval”.

Approving the Risk Assessment Approve The ISO in coordination with the Business Owner approves

Approving the Risk Assessment Approve The ISO in coordination with the Business Owner approves the RAU.

Approving the Risk Assessment The ISO can reject, approve, or approve and submit to

Approving the Risk Assessment The ISO can reject, approve, or approve and submit to the organization head if residual risk is high.

Approving the Risk Assessment Approve If residual risk is high, the organization head approves

Approving the Risk Assessment Approve If residual risk is high, the organization head approves the Risk Assessment.

Approving the Risk Assessment The organization head can log on and approve, or ….

Approving the Risk Assessment The organization head can log on and approve, or ….

Approving the Risk Assessment The RAC can mark as approved and upload evidence of

Approving the Risk Assessment The RAC can mark as approved and upload evidence of the Organization Head’s approval.

Demonstration

Demonstration

Exercise #3 1. 2. 3. 4. 5. 6. 7. Log off and log into

Exercise #3 1. 2. 3. 4. 5. 6. 7. Log off and log into the system as Assessor. XX. Access the network questionnaire and click Edit. Expand the findings so you can answer them. Click on each Finding. Click edit. Answer Criticality, Accept or Remediate the risk and complete the finding response. Submit the findings for approval. Save the questionnaire. Log off and log into the system as the RACxx. Under Risk Assessment Coordinator Status, Submit the findings to the ISO for approval. Log off and log into the system as ISOxx. Exit the RAU. Click on the ISO/Business Owner Approval Tab. Click “Accepted Final Approval” and save the record.

Calculating Risk Scores High Medium Low 20% Scale < 20% 20. 01 -40% 40.

Calculating Risk Scores High Medium Low 20% Scale < 20% 20. 01 -40% 40. 01 -60% 60. 01 -80% 80. 01 -100% 33% Scale <33. 33% 33. 33 -66. 33% 66. 34 -100% Graduated <60% 60 -70% 70 -80% 80 -90% 90 -100%

Calculating Risk Scores Program Location Network Application Total # Questions High (20% = Y)

Calculating Risk Scores Program Location Network Application Total # Questions High (20% = Y) High (33% = Y) 113 90 76 35 28 23 47 38 31 48 38 32 243 194 162 High (60%=Y) 45 14 19 19 97

Calculating Risk Scores High Moderate Low 20% Scale < 20% 20. 01 -40% 40.

Calculating Risk Scores High Moderate Low 20% Scale < 20% 20. 01 -40% 40. 01 -60% 60. 01 -80% 80. 01 -100% 33% Scale <33. 33% 33. 33 -66. 33% 66. 34 -100% Graduated <60% 60 -70% 70 -80% 80 -90% 90 -100% Example: We have 194 incorrect answers. If 130 are remediated and risk is accepted on 74, then 243 -74 or 169 are correct. 169/243 = 69. 6%. We are using the graduated scale.

Bulk Upload Files - Users

Bulk Upload Files - Users

Bulk Upload Files - Locations

Bulk Upload Files - Locations

Bulk Upload Files - Networks

Bulk Upload Files - Networks

Bulk Upload Files - Applications

Bulk Upload Files - Applications

Number of Questions Security Program Location Network Application Low Moderate High 104 131 162

Number of Questions Security Program Location Network Application Low Moderate High 104 131 162 Detailed Low Detailed Moderate Detailed High 296 392 423 Detailed Low Detailed Moderate Detailed High 35 51 101 Detailed Low Detailed Moderate Detailed High 38 57 107 Detailed Low Detailed Moderate Detailed High 43 61 101 171 221 137 219 269 148 220 260

Bulk Upload Files - Organization You can pull your organization from the spreadsheet on

Bulk Upload Files - Organization You can pull your organization from the spreadsheet on the last tab.

Bulk Upload Files – Information Type

Bulk Upload Files – Information Type

Security Categorization Identify Information Type Compensation Management Select Impact Level Confidentiality – Low Integrity

Security Categorization Identify Information Type Compensation Management Select Impact Level Confidentiality – Low Integrity – Low Availability - Low Assign Security Category Low 67

Case Study

Case Study

Case Study 1. 2. 3. 4. Log into the system with your account RACxx.

Case Study 1. 2. 3. 4. Log into the system with your account RACxx. Instance is 24121. Password is Archer 123! Create a Risk Assessable Unit. Add a fake application and add it’s security category. Select NIST low as your questionnaire. Add the Central Server Room, Central Network and the existing Organizational Security Program Assessment to your RAU. 5. Save the RAU. 6. Launch the assessment from the Questionnaire screen. 7. Log off and log on as Assessor. XX. 8. Answer the questions on the Application Assessment for your fake application. 9. Submit the Questionnaire for review. 10. Log off and log on as ISOxx. 11. Approve the questionnaire.

Case Study 12. 13. 14. 15. 16. Log off and log into the system

Case Study 12. 13. 14. 15. 16. Log off and log into the system as Assessor. XX. Access the questionnaire and answer the findings. Submit the findings for approval Log off and log into the system as the RACxx. Submit the findings to the ISO for approval. Log off and log into the system as ISOxx. Approve the findings.

Questions? Contact us at GRC@dir. texas. gov 71

Questions? Contact us at GRC@dir. texas. gov 71