Time
1 hour 27 minutes
Difficulty
Intermediate
CEU/CPE
2

Video Description

In this lesson, Subject Matter Expert (SME) Kelly Handerhan discusses the importance of the following documents in understanding and using the Risk Management Framework: - FIPS-199 and its standards for security standardization (low, moderate, and high risks and the application of the high water mark in assessing risk) - FIPS-200 and its minimum security requirements for the categories defined in federal information and information systems (definition of 17 security-related categories – plus an additional one used in RMF -- and implementation of customized minimum baselines for security controls) - NIST SP 800-30, REV 1 – a guide for conducting risk assessment - NIST SP 800-39 – managing information security risk In this lesson you will learn: - the three levels of impact of security breaches - how to determine an information security system category based on specific criteria - how to implement the minimum baseline of security controls - integration of security controls and an organization's goals - the risk assessment three-step process in the context of four risk factors - types of risk assessments - how to manage information security risk - making risk management user friendly THE DISCUSSION OF THE IMPORTANT RMF DOCUMENTS CONTINUES IN LESSON 3.

Video Transcription

00:04
Okay, so let's go ahead and take a look specifically at 51 99. And as you can see, 51 99 provides us with the standards for the security categorization. And essentially, what we get here is we get the definition of impact is being low, moderate or high. So what we're addressing here is
00:23
if we lose confidentiality or integrity or availability,
00:27
what would it mean to say it has a low impact, the medium medium impact in a high impact. So it's gonna have a low impact if it has a limited adverse effect.
00:38
Moderate is if it has a serious adverse attack effect. And, of course, if the impact would be severe or catastrophic than it's gonna be high, this a good little chart because it kind of helps you understand. Okay, so we've got the three elements of the C I A. Triad confidentiality, integrity and availability.
00:56
And then okay, So with confidentiality
00:59
to be classified or categorized is a better way of saying it categorized as having low impact. The unauthorized disclosure of information could be expected to have limited adverse effect.
01:11
All right, here's what it would be moderate in high so it's a good little chart to help. You kind of keep in mind the levels of impact
01:19
Now if it's 90 Not 1 99 also describes a low impact system, a moderate impact system and a high impact system. So again, the idea here is the degree of damage. Now, for a system to be a low impact system to be categorized as low impact,
01:38
that means all three elements of the C I A Triad
01:42
would be listed as low.
01:44
Okay, moderate.
01:47
Ah, would essentially be any element is no higher than moderate and high. Any of the elements is high. I don't know if that makes sense, but what this comes that has to do with this something called the High Watermark, which is explained in Phipps 200. But ultimately what it says
02:07
is
02:08
the highest degree of impact is the impact at which that system is categorized. So let me give you an example. All right, so we've got a financial company that manages personal financial information, so think about that for a minute. That's gonna be very, very sensitive information.
02:24
All right, so we determined that if there's a loss of confidentiality,
02:29
that's obviously gonna be very high, right? Personal financial information Confidentiality laws will have a high impact, but also integrity compromise will have a high impact as well.
02:42
But we've decided that the availability is only of a moderate impact. So essentially, the high water mark says, whatever the highest level of impact is, that is true for the entire system. So in this instance, and I don't know if you can see the print that's in red,
03:00
the confidentiality is high. Integrity is high,
03:02
availability is moderate. Therefore, the high water mark states that the system's categorization would be high impact. So hopefully that makes sense. And again, that came from Phipps 200. And this particular standard is all about what are the minimum security requirements.
03:23
And let me go back to the idea of risk management, We said the very first step is to identify, evaluate your assets.
03:29
Why?
03:30
Because by understanding how valuable my assets are to me, I can make good decisions on how to protect them. Obviously, if I have a high impact system, I would be willing to spend more money to protect it than a low impact system.
03:46
So Phipps 200 essentially says, OK, let's take that categorization
03:51
that we looked at with 1 99 and let's figure out the minimum security requirements for each category. So what Phipps 200 does is it gives a 17 security related categories that they refer to as families. So 17 elements that affect security
04:11
from different types of controls.
04:14
Management, operational and technical controls. Usually, when we talk about a layer defense and we always want a layer defense, we don't want to rely too heavily on technical controls or just physical controls or just management controls,
04:30
management controls or policies. Procedures that we put in place
04:34
operational controls would be things like physical security. And then, of course, technical controls would be encryption, firewalls and all those elements. But ultimately,
04:45
Phipps 200 specifies the need for defense in depth gives us those 17 families, and it's going to talk about how we implement implement what we refer to as minimum baseline security, or you may hear it refer to his MSB
05:02
minimum security baseline. It just depends on the document that you're looking at.
05:06
So ultimately here are the 17 families that are part of Fits 200. These will map to the 70. I'm sorry, toothy 18 families that the risk management framework lists. However, risk management framework adds one more for program management.
05:25
Onley 17 from Phipps 200.
05:28
But again, Ah, so much overlap. You know, risk management framework doesn't stand alone. It uses all of these other documents as input to each of the elements there. So you can see the things that are going to affect security access control, configuration management, contingency planning, incident response,
05:46
personnel security, risk assessment. All of these different areas
05:50
these air considered to be families of security functions. Okay, So those are the two big Phipps documents that I would look at Phipps 1 99 and Phipps 200. So, once again, 1 99 was categorizing systems fits 200 was determining the minimum security Baseline.
06:10
Now we're gonna move over to some special publications that mist has given us,
06:15
uh, to further provide some input into the risk management framework. So here we start off with risk. 800-30 and again, very, very important document. When we look at 800-30. Revision one specifically. This is our guide for conducting risk assessments.
06:32
Everything revolves around the world of risk.
06:35
You know, security is a function of risk. Risk is essentially the precursor to security.
06:44
So ultimately, when we look at 800-30 we talk about how we go about conducting a risk assessment. What do we have? What's it worth? What are the threats and vulnerabilities? What air? The likelihood. Uh, what's the likelihood these threats would materialize? And if they do, so what sort of impact?
07:02
And we get that from the State 100-30.
07:05
Now, um, we also have, uh, missed 800-39. There is an element called assessing risk. Ah, from a special publication on risk management. So 800 s 39 has a little bit of input, but ultimately,
07:25
what are the risk assessment concepts
07:27
toe all three tiers in the risk management hierarchy? We haven't talked about the multi tier hierarchy, but we have to think about the organization as a whole. We have to think about individual business processes, and then we have to think about individual systems,
07:43
and our risk management approach and philosophy should be integrated. Should be a very holistic
07:48
approach. Rather than thinking, How do we secure this system. How do we secure this system in such a way that it enables us to meet the objectives for our organization as a whole?
08:00
That's the thought process again missed 800. Dash 30 tells us that when we're going to conduct a risk, we have three steps. We're gonna prepare for the assessment, conduct the assessment and maintain the assessment.
08:13
The idea there with maintenance is the risks as they exist today are gonna be different from the risks as they exist tomorrow, new risks will come off. Mitigation strategies will succeed or fail.
08:28
Our environment will change, So risk management is very much an ongoing process. Now, when we talk about these three, these three steps there are four elements that we look at in the context of risk. These air. Really, What risk is all about threats, vulnerabilities, likelihood and impact
08:48
threats? What are those negative forces that can negatively affect your assets? What air? There's negative forces that can calls lost to the value of your assets. And remember, our assets are not always tangible. Yeah, I have a system, and vandalism could damage that system.
09:09
But MME. Or more valuable than the system itself. It's the information
09:13
more valuable even than that is its effect on the business as a whole may be my company's reputation, So don't be narrow sighted when you're thinking about impact and when you're thinking about the assets and the potential for loss. There are many things that we as an organization value.
09:31
All right, so threats, negative impact on an asset vulnerabilities. What weakness do we have?
09:37
And it's the vulnerabilities that allow the threats to create the impact.
09:43
If we have no vulnerability, the threats don't matter.
09:46
Unfortunately, it's very difficult to have no vulnerability.
09:50
So another way to say that is,
09:52
and this is just conceptual. But threats, times, vulnerabilities, equal risk.
09:58
So if either of those is zero, there no threats, but you're very, very vulnerable.
10:03
If they're no threats, you still don't have a risk.
10:07
There are 1,000,000 threats, threats, threats, but you're invulnerable.
10:11
Well, there's no risk, so we don't generally talk about zero threats or zero vulnerabilities. But what we want to do is we want to look at the level of risk in relation to what are the vulnerabilities that we have and what are the threats that would exploit them.
10:26
Now, when we're looking at getting a value for risk to main pieces, we look at probability
10:33
that can also be expressed. His likelihood? An impact.
10:37
How often is the risk event gonna happen? And when it does happen, what will it cost me?
10:41
Okay, so those are the elements that are defined in mist 800. Dash 30 is part of our risk assessment.
10:50
And when we do look at the different types of assessments, we often start with a qualitative assessment. If I don't secure this network,
10:58
any network and you can think about this, what are some threats that are likely to materialize?
11:05
Okay, I've got 15 computers. Networks were connected to the Internet.
11:11
No security at all. Right now, what are some things that will happen?
11:15
Well, we're gonna have external compromise, will lose confidentiality of our information. We may become subject now of service attacks. We may have corrupted systems. And even in addition to that, we're still potentially gonna have hardware failures,
11:33
lost lines, things that don't necessarily indicate
11:37
a Nintendo. Chinna ll compromise, but that would still affect the CIA of my organization. Okay, what we're doing now is we're brainstorming right we're just thinking, Okay, this could happen. This could happen. All these negative impacts could come up
11:50
when your brain storming chances air Good. You're doing qualitative risk assessment.
11:54
Okay? Because what's gonna follow us, just going through enlisting outs and potential threats is we're gonna say OK, out of all of these things that we've just named what he thinks the most likely toe happen,
12:09
Let's say a compromise of integrity, more compromising confidentiality. Let's say we store health care information and we have no security. Well, that's a high value target. So we're gonna decide that. Yeah, probably. Our greatest concern is the privacy of information
12:24
that's qualitative. When you're using words like high medium load
12:28
when you're saying this is probably gonna happen or yeah, that makes sense. Those air very subjective terms in nature. That's qualitative analysis. Qualitative analysis is our starting point, and we must start with qualitative analysis. Let's brainstorm. Let's talk about the threats and vulnerabilities.
12:46
Let's get some things on paper up on a white board so that we can discuss it.
12:52
However,
12:54
it's very difficult to make business decisions on purely qualitative analysis. So, for instance, okay, privacy is my top concern. How much money will I spend to protect these systems?
13:05
I don't know, because I don't know, a dollar value of the systems. I want to know a percent of likelihood that an attack would happen. And I would like to know the impact should the information be compromised, that is quantitative.
13:20
Quantitative, essentially is gonna back up, which he thought was true from qualitative and put numbers to it. Give me a dollars out. You know, I won't say that. Quantitative analysis always ends with the dollar number, because it doesn't.
13:35
But
13:37
most things in this world revolve around the dollar. And when we talk about loss and lost potential, almost always, you can track that down to money.
13:48
And what we're really looking to get out of the quantitative analysis is the basis for a cost benefit analysis.
13:54
I'm not gonna pay $50 for safe to protect a $20 bill. Right? So what quantitative analysis does is it gives me a dollar value frequently, uh, for the potential for loss, and I'll use that as the basis to determine what sort of mitigation strategy I wanna put in place.
14:13
So we need that quantitative analysis
14:16
Now you can have sort of a hybrid of the two Ah Cimini quantitative analysis so that ultimately you can rank these on scales and these scales are very, very subjective. They're just out there, but ultimately you're still sort of assigning numeric value. But, um,
14:35
most of the time I want to see a tangible dollar number, right? I want to know I have on 80% chance of losing $10,000. That's an $8000 value to me. I'm going to spend $12,000 to mitigate that risk, but I might spend five.
14:52
Okay, so that's what we're looking for from our types of assessments. Now our next n'est special publication, 800-39 here. I had just mentioned the three tiered approach to risk management and 800-39
15:09
eyes going to specify that three tiered approach. But it ultimately revolves around the idea
15:13
off managing information, security, risk
15:16
managing information, security risk and ultimately, with this all comes down to is let's get an understanding that no longer do we think of business risk and information security risk
15:31
because information security risk is business risk. Let's look at incorporating and getting a true understanding of the value of our information, our data, and understand how we protect that information in such a way that it continues to support the business. And the mission of the organization is a hole
15:50
we don't want too much. We don't want to little. We want to find the right amount
15:56
based on cost benefit analysis that continues to support and enhance the organization. So what this particular document does is it helps me to understand that,
16:07
um,
16:10
that we don't implement security just for the sake of security, that it's all based on how we can benefit the organization. Another piece that it stresses is
16:21
integrate security into your system. Design and architecture and build and operations. And monitoring rather than thinking of security is an afterthought. So long we have asked ourselves to questions in relation to systems and software. First question is, does it work?
16:41
Second question is,
16:41
is it secure?
16:44
And what next 800 Dutch 39 essentially says we need to do is stop thinking about it like that? Does it work securely? Work does not work at all, and the way we make it work secure securely is that we focus on security throughout the entire system development life cycle. It's such an important concept
17:03
that we really haven't done very well.
17:06
Historically, the idea also is to get to our technicians and work with their technicians toe, understand how they can responsibly implement security in such a way again that it supports the overall organization. The thing that we want to stress about security,
17:23
there is always a trade off.
17:26
Security is never free.
17:29
It can cost dollars. Of course. You know, you got my new firewall. You're gonna drop thousands of dollars. Ah, you buy new system. It's gonna cost money. But often what we failed to overlook is the many other costs of security. You know, when you implement security within an organization,
17:47
usually there's a tradeoff for performance.
17:49
Security often slows things down,
17:52
you know, think about going through the airport today versus 15 years ago, before the events of September 11th pretty much just cruise through security at the airport, there was no taking off your shoes and all of these different things that we have to do today. Well, we needed enhanced security that slows us down
18:10
a performance we've got to find that balance between are necessary performance and the degree of security that we need is, well, there are times when we choose performance over security. As a matter of fact, I would say performance and ease of use are frequently
18:26
chosen over security. As a matter of fact, when you go and buy a product and you pull it out of the debate, the box nine times out of 10 it's focused on being something that's easy to set up and install. It just works, right? We've heard the phrase plug and play for years and years and years. 20 years now. Well,
18:45
the benefit of that, you know, it just appeals to people. You plug it in and you could go with it.
18:51
Well,
18:52
the reason you can plug it in and go with it is because it has no security. Security slows things down, so we've got to find that trade off
19:00
eso performance ease of use. We've got to think about backwards compatibility because the most secure elements today may not be compatible with our devices that are three years old, eight years old, whatever they may be,
19:12
and then a final cost. Uh four security is user acceptability.
19:18
Users don't like hassle
19:22
now. That's not to say that that's our primary concern. When we're implementing security is we don't want to slow, you know, aggravate our users. But what we have to do is we have to implement in such a security in such a way that it's a seamless as possible to the users, right. We want to minimize the exposure
19:41
that users have to our security controls.
19:44
We'd love these things that happen in the background as opposed to the user having to do this for security, that for security we'd like them to go about their normal business and have our applications interact securely with other applications. We'd like to implement a public key infrastructure so that
20:00
access to ah internal resource is happens is again smoothly
20:04
and seamlessly as possible. So, yes, user acceptability is a concern, and the easier we can make it on our users, the better off we'll be

Up Next

Risk Management Framework

The National Institute of Standards and Technology (NIST) established the Risk Management Framework (RMF) as a set of operational and procedural standards or guidelines that a US government agency must follow to ensure the compliance of its data systems.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor