Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Compliance and operational security Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP the summer semester of the year 2014/2015 Overview of context establishment Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Input: All information about the organization relevant to the information security risk management context establishment. Output: The specification of basic criteria, the scope and boundaries, and the organization for the information security risk management process. Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Remarks: It is essential to determine the purpose of the information security risk management as this affects the overall process and the context establishment in particular. This purpose can be: Supporting an Information Security Risk Management Process, Legal compliance and evidence of due diligence, Preparation of a business continuity plan, Preparation of an incident response plan, Description of the information security requirements for a product, a service or a mechanism. Basic Criteria Compliance and operational security At least: Risk evaluation criteria, Impact criteria, Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk acceptance criteria, should be addressed. Basic Criteria Compliance and operational security At least: Risk evaluation criteria, Impact criteria, Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk acceptance criteria, should be addressed. Additionally, the organization should assess whether necessary resources are available to: Perform risk assessment and establish a risk treatment plan Define and implement policies and procedures, including implementation of the controls selected Monitor controls Monitor the information security risk management process Basic Criteria Risk evaluation criteria Compliance and operational security Risk evaluation criteria should consider: The strategic value of the business information process Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The criticality of the information assets involved Legal and regulatory requirements, and contractual obligations Operational and business importance of availability, confidentiality and integrity Stakeholders expectations and perceptions, and negative consequences for goodwill and reputation Additionally, risk evaluation criteria can be used to specify priorities for risk treatment. Basic Criteria Impact criteria Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Impact criteria should be developed and specified in terms of the degree of damage or costs to the organization caused by an information security event considering the following: Level of classification of the impacted information asset Breaches of information security (e.g., loss of confidentiality, integrity and availability) Impaired operations (internal or third parties) Loss of business and financial value Information security risk communication Disruption of plans and deadlines Information security risk monitoring and review Damage of reputation Contingency Planning Guide for Federal Information Systems (NIST SP Breaches of legal, regulatory or contractual requirements Basic Criteria Risk acceptance criteria Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP An organization should define its own scales for levels of risk acceptance. The following should be considered during development: Risk acceptance criteria may include multiple thresholds, with a desired target level of risk. Risk acceptance criteria may be expressed as the ratio of estimated profit to the estimated risk. ... Basic Criteria Risk acceptance criteria Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ... Different risk acceptance criteria may apply to different classes of risk (e.g., risks that could result in noncompliance with regulations or laws may not be accepted, while acceptance of high risks may be allowed if this is specified as a contractual requirement.) Risk acceptance criteria may include requirements for future additional treatment, e.g. a risk may be accepted if there is approval and commitment to take action to reduce it to an acceptable level within a defined time period. Basic Criteria Risk acceptance criteria Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk acceptance criteria may differ according to how long the risk is expected to exist, e.g., the risk may be associated with a temporary or short term activity. Risk acceptance criteria should be set up considering the following: Business criteria Legal and regulatory aspects Operations Technology Finance Social and humanitarian factors The scope and boundaries Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Study of the organization, List of the constraints affecting the organization, List of the legislative and regulatory references applicable to the organization, List of the constraints affecting the scope. The scope and boundaries Study of the organization Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The study of the organization recalls the characteristic elements defining the identity of an organization. The organization’s main purpose: The main purpose of an organization can be defined as the reason why it exists (its field of activity, its market segment, etc.). Its business: The organization’s business, defined by the techniques and know-how of its employees, enables it to accomplish its missions. It is specific to the organization’s field of activity and often defines its culture. Its mission: The organization achieves its purpose by accomplishing its mission. To identify its missions, the services provided and/or products manufactured should be identified in relation to the end users. ... The scope and boundaries Study of the organization Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment ... Its values: Values are major principles or a well-defined code of conduct applied to the exercise of a business. This may concern the personnel, relations with outside agents (customers, etc.), the quality of products supplied or services provided (e.g., punctuality and safety of delivery). Structure of the organization: Divisional structure: each division is placed under the authority of a division manager responsible for the strategic, administrative and operational decisions concerning his unit Functional structure: functional authority is exercised on the procedures, the nature of the work and sometimes the decisions or planning (e.g., production, IT, human resources, marketing, etc.) Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ... The scope and boundaries Study of the organization Compliance and operational security ... Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Organization chart: The organization’s structure is represented schematically in an organization chart. This representation should highlight the lines of reporting and delegation of authority, but should also include other relationships, which, even if they are not based on any formal authority, are nevertheless lines of information flow. The organization’s strategy: This requires a formal expression of the organization’s guiding principles. The scope and boundaries List of the constraints affecting the organization Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The list of constraints includes but is not limited to: Constraints of a political nature: These may concern government administrations, public institutions or more generally any organization that has to apply government decisions. Constraints of a strategic nature: Constraints can arise from planned or possible changes to the organization’s structures or orientation. They are expressed in the organization’s strategic or operational plans. Territorial constraints: The organization’s structure and/or purpose may introduce specific constraints such as the distribution of sites over the entire national territory or abroad. ... The scope and boundaries List of the constraints affecting the organization Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ... Constraints arising from the economic and political climate: An organization’s operation may be profoundly changed by specific events such as strikes or national and international crises. Structural constraints: For example, an international structure should be able to reconcile security requirements specific to each country. Functional constraints: For example, an organization that operates around the clock should ensure its resources are continuously available. Functional constraints arise directly from the organization’s general or specific missions. ... The scope and boundaries List of the constraints affecting the organization Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ... Constraints concerning personnel: They are linked to: level of responsibility, recruitment, qualification, training, security awareness, motivation, availability, etc. For example, the entire personnel of a defence organization should have authorisation to handle highly confidential information. Constraints arising from the organization’s calendar: These constraints may result from restructuring or setting up new national or international policies imposing certain deadlines. For example, the creation of a security division. ... The scope and boundaries List of the constraints affecting the organization Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ... Constraints related to methods: For example, a typical constraint of this kind is the need to incorporate the organization’s legal obligations into the security policy. Constraints of a cultural nature: In some organizations work habits or the main business have led to a specific “culture” within the organization, one which may be incompatible with the security controls. Budgetary constraints: While it is not always appropriate to base security investments on cost-effectiveness, economic justification is generally required by the organization’s financial department. (cf. the rule: the total cost of security controls should not exceed the cost of the potential consequences of the risks). The scope and boundaries List of the legislative and regulatory references applicable to the organization Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The regulatory requirements applicable to the organization should be identified. These may be laws, decrees, specific regulations in the organization’s field or internal/external regulations. This also concerns contracts and agreements and more generally any obligations of a legal or regulatory nature. All or only the most relevant ones? Relavant for what? For information security? The scope and boundaries List of the constraints affecting the scope Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Constraints arising from pre-existing processes: Application projects are not necessarily developed simultaneously. Some depend on pre-existing processes. Even though a process can be broken down into sub-processes, the process is not necessarily influenced by all the sub-processes of another process. Technical constraints: Generally arise from installed hardware and software, and rooms or sites housing the processes. Financial constraints: The implementation of security controls is often restricted by the budget that the organization can commit. However, the financial constraint should still to be the last to be considered as the budget allocation for security can be negotiated on the basis of the security study. ... The scope and boundaries List of the constraints affecting the scope Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ... Environmental constraints: Environmental constraints arise from the geographical or economic environment in which the processes are implemented: country, climate, natural risks, geographical situation, economic climate, etc. Time constraints: The time required for implementing security controls should be considered in relation to the ability to upgrade the information system; if the implementation time is very long, the risks for which the control was designed may have changed. Time is a determining factor for selecting solutions and priorities. Constraints related to methods: Methods appropriate to the organization’s know-how should be used for project planning, specifications, development and so on. Organization for the information security risk management process Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The organization and responsibilities for the information security risk management process should be set up and maintained. This organization should be approved by the appropriate managers of the organization. Organization for the information security risk management process Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The organization and responsibilities for the information security risk management process should be set up and maintained. This organization should be approved by the appropriate managers of the organization. The main roles and responsibilities of this organization are: Development of the information security risk management process suitable for the organization Identification and analysis of the stakeholders Definition of roles and responsibilities of all parties both internal and external to the organization ... Organization for the information security risk management process Compliance and operational security The main roles and responsibilities of this organization are: Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance ... Establishment of the required relationships between the organization and stakeholders, as well as interfaces to the organization’s high level risk management functions (e.g., operational risk management), as well as interfaces to other relevant projects or activities Information security risk communication Definition of decision escalation paths Information security risk monitoring and review Specification of records to be kept Contingency Planning Guide for Federal Information Systems (NIST SP Overview of the information security risk assessment process Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Overview of the information security risk assessment process Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Input: Basic criteria, the scope and boundaries, and the organization for the information security risk management process being established. Overview of the information security risk assessment process Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Input: Basic criteria, the scope and boundaries, and the organization for the information security risk management process being established. Action: Risks should be identified, quantified or qualitatively described, and prioritized against risk evaluation criteria and objectives relevant to the organization. Overview of the information security risk assessment process Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Input: Basic criteria, the scope and boundaries, and the organization for the information security risk management process being established. Action: Risks should be identified, quantified or qualitatively described, and prioritized against risk evaluation criteria and objectives relevant to the organization. Output: A list of assessed risks prioritized according to risk evaluation criteria. Overview of the information security risk assessment process Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk assessment consists of the following activities: Risk analysis, which comprises: Risk identification Risk estimation Risk evaluation Overview of the information security risk assessment process Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk assessment is often conducted in two (or more) iterations: First a high level assessment is carried out to identify potentially high risks that needs further assessment. The next iteration can involve further in-depth investigation of potentially high risks indicated by the previous iteration. Overview of the information security risk assessment process Risk analysis - step one: risk identification Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk identification is conducted by the following activities: Identification of assets, Identification of threats, Identification of existing controls, Identification of vulnerabilities, Identification of consequences, Overview of the information security risk assessment process Risk analysis - step one: risk identification Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Identification of assets: Input: Scope and boundaries for the risk assessment to be conducted, list of constituents with owners, location, function, etc. Output: A list of assets to be risk-managed, and a list of business processes related to assets and their relevance. An asset is anything that has value to the organization and which therefore requires protection. For the identification of assets it should be remembered that an information system consists of more than hardware and software. Overview of the information security risk assessment process Risk analysis - examples of asset identification Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Two kinds of assets can be distinguished: The primary assets. The supporting assets – on which the primary elements of the scope rely. Overview of the information security risk assessment process Risk analysis - examples of asset identification Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The primary assets: Business processes & activities Information. Overview of the information security risk assessment process Risk analysis - examples of asset identification Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The supporting assets: Software Network Personnel Site Organization’s structure Overview of the information security risk assessment process Risk analysis - examples of asset identification Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The identification of primary assets is carried out by a mixed work group representative of the process (managers, information systems specialists and users). Overview of the information security risk assessment process Risk analysis - examples of asset identification Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The identification of primary assets is carried out by a mixed work group representative of the process (managers, information systems specialists and users). The primary assets are usually the core processes and information of the activity in the scope. Other primary assets such as the organization’s processes can also be considered, which will be more appropriate for drawing up an information security policy or a business continuity plan. Depending on the purpose, some studies will not require an exhaustive analysis of all the elements making up the scope. Overview of the information security risk assessment process Examples of asset identification - Business processes & activities Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Business processes (or sub-processes) and activities, for example: Processes whose loss or degradation make it impossible to carry out the mission of the organization Processes that contain secret processes or processes involving proprietary technology Processes that, if modified, can greatly affect the accomplishment of the organization’s mission Processes that are necessary for the organization to comply with contractual, legal or regulatory requirements Overview of the information security risk assessment process Examples of asset identification - Information Compliance and operational security Primary information mainly comprises: Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Vital information for the exercise of the organization’s mission or business Personal information, as can be defined specifically in the sense of the national laws regarding privacy Strategic information required for achieving objectives determined by the strategic orientations High-cost information whose gathering, storage, processing and transmission require a long time and/or involve a high acquisition cost Overview of the information security risk assessment process Examples of asset identification - supporting assets Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Supporting assets have vulnerabilities that are exploitable by threats aiming to impair the primary assets of the scope (processes and information). They are of various types: Hardware: Data processing equipment (active): automatic information processing equipment including the items required to operate independently. Transportable equipment: portable computer equipment. Examples: laptops, mobile phones and PDAs. Fixed equipment: Computer equipment used on the organization’s area. Examples: server, microcomputer used as a workstation. ... Overview of the information security risk assessment process Examples of asset identification - supporting assets Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Supporting assets: Hardware: ... Processing peripherals: Equipment connected to a computer via a communication port (serial, parallel link, etc.) for entering, conveying or transmitting data. Data medium (passive): these are media for storing data or functions. Electronic medium: An information medium that can be connected to a computer or computer network for data storage. These media may be of compact size and contain a large amount of data. They can be used with standard computing equipment. Examples: floppy disc, CD ROM, back-up cartridge, removable hard disc, memory key, tape. Other media: Static, non-electronic media containing data. Examples: paper, slide, transparency, documentation, fax. Overview of the information security risk assessment process Examples of asset identification - supporting assets Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Supporting assets: Software: Operating system: depending on the architecture, an operating system may be monolithic or made up of a micro-kernel and a set of system services. The main elements of the operating system are all the equipment management services (CPU, memory, disc, and network interfaces), task or process management services and user rights management services. Service, maintenance or administration software: software characterised by the fact that it complements the operating system services and is not directly at the service of the users or applications (even though it is usually essential or even indispensable for the global operation of the information system). ... Overview of the information security risk assessment process Examples of asset identification - supporting assets Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Supporting assets: Software: ... Package software or standard software: Standard software or package software are complete products commercialised as such with medium, release and maintenance. They provide services for users and applications, but are not personalised or specific in the way that business applications are. Examples: data base management software, electronic messaging software, groupware, directory software, web server software, etc. Business application: Standard business application: This is commercial software designed to give users direct access to the services and functions they require from their information system in their professional context. Examples: accounts software, machine tool control software, customer care software, etc. Overview of the information security risk assessment process Examples of asset identification - supporting assets Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Supporting assets: Software: Business application: ... Specific business application: This is software in which various aspects (primarily support, maintenance, upgrading, etc.) have been specifically developed to give users direct access to the services and functions they require from their information system. Examples: Invoice management of telecom operators’ customers, real time monitoring application for rocket launching. Overview of the information security risk assessment process Examples of asset identification - supporting assets Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Supporting assets: ... Network: Medium and supports: Ethernet, GigabitEthernet, ADSL, WiFi 802.11, FireWire, . . . Passive or active relay: bridge, router, hub, switch, automatic exchange, Communication Interfaces: are connected to the processing units, but are characterised by the media and supported protocols. Examples: General Packet Radio Service, Ethernet adaptor. Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ... Overview of the information security risk assessment process Examples of asset identification - supporting assets Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Supporting assets: Personel Decision maker: the owners of the primary assets (information and functions) and the managers of the organization or specific project. Users: the personnel who handle sensitive elements in the context of their activity. They may have special access rights to the information system to carry out their everyday tasks. Operation/ Maintenance staff – They have special access rights to the information system to carry out their everyday tasks. Examples: system administrator, data administrator, back-up, Help Desk, application deployment operator, security officers. Developers: are in charge of developing the organization’s applications. They have access to part of the information system with high-level rights but do not take any action on the production data Overview of the information security risk assessment process Examples of asset identification - supporting assets Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Supporting assets: Site - The site type comprises all the places containing the scope or part of the scope, and the physical means required for it to operate. Location: External environment: all locations in which the organization’s means of security cannot be applied (e.g., homes of the personnel, premises of another organization). Premises. Zone: It is obtained by creating physical barriers around the organization’s information processing infrastructures (e.g., offices, reserved access zone, secure zone). Communication: Telecommunications services and equipment provided by an operator (telephone line, internal telephone network). Utilities: power supply, water suply, waste disposal, etc. Overview of the information security risk assessment process Examples of asset identification - supporting assets Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Supporting assets: Organization: Authorities: organizations from which the studied organization derives its authority. They impose constraints on the studied organization in terms of regulations, decisions and actions. Structure of the organization: this consists of the various branches of the organization (e.g., human resources management, IT management, purchasing management, business unit management, building safety service, fire service, audit management). Project or system organization: concerns the organization set up for a specific project or service (e.g., new application development project, information system migration project). Overview of the information security risk assessment process Risk analysis - step one: risk identification Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Identification of assets - asset valuation: The next step after asset identification is to agree upon the scale to be used and the criteria for assigning a particular location on that scale to each asset, based on valuation. Criteria: The criteria used as the basis for assigning a value to each asset should be written out in unambiguous terms. This might be difficult – values of some assets may have to be subjectively determined and many different individuals are likely to be making the determination: original cost costs of replacement or re-creation costs incured due to loss of confidentiality, integrity and availability costs of business implications of security incidents, abstract values – e.g., organization’s reputation. Overview of the information security risk assessment process risk identification: asset valuation Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Assets may have several values assigned. For example a business plan: may be valued based on the labour expended to develop the plan, it might be valued on the labour to input the data, it could be valued based on its value to a competitor. Each of the assigned values will most likely differ considerably. The assigned value may be e.g.: the maximum of all possible values or may be the sum of some or all of the possible values. Overview of the information security risk assessment process risk identification: asset valuation Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance At the end all asset values need to be reduced to a common base. The criteria that may help: Impairment of business performance Negative effect on reputation Breach associated with personal information Endangerment of personal safety Adverse effects on law enforcement Breach of public order Information security risk communication Breach of confidentiality Information security risk monitoring and review Financial loss Contingency Planning Guide for Federal Information Systems (NIST SP Disruption to business activities Endangerment of environmental safety Overview of the information security risk assessment process risk identification: asset valuation Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment More detailed criteria: Interruption of service (inability to provide the service) Loss of customer confidence loss of credibility in the internal information system damage to reputation Disruption of internal operation disruption in the organization itself additional internal cost Information security risk assessment Information security risk treatment Information security risk acceptance Disruption of a third party’s operation: Information security risk communication disruption in third parties transacting with the organization various types of injury Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ... Overview of the information security risk assessment process risk identification: asset valuation Compliance and operational security More detailed exemplary list of issues to be considered: ... Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Inability to fulfill legal obligations Inability to fulfill contractual obligations Danger to personnel / user safety Attack on users’ private life Financial losses Financial costs for emergency or repair: Information security risk communication in terms of personnel, in terms of equipment, in terms of studies, experts’ reports Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ... Overview of the information security risk assessment process risk identification: asset valuation Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP More detailed criteria: ... Loss of goods / funds / assets Loss of customers, loss of suppliers Judicial proceedings and penalties Loss of a competitive advantage Loss of technological / technical lead Loss of effectiveness / trust Loss of technical reputation Weakening of negotiating capacity Industrial crisis (strikes), government crisis, material damage. Overview of the information security risk assessment process risk identification: scale of asset valuation Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP After establishing the criteria to be considered, the organization should agree on a scale to be used organization-wide. The first step: decide on the number of levels to be used. No strict rules: More levels provide a greater level of granularity but a too fine differentiation may make consistent assignments throughout the organization difficult Normally, any number of levels between 3 (e.g. low, medium, and high) and 10 can be used as long as it is consistent with the approach the whole organization is using. Overview of the information security risk assessment process risk identification: asset valuation Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Levels of the scale (e.g., “low”, “medium”, or “high”): If consequences may be expressed in numerical values (e.g. for possible financial loss, they should be given in monetary values) then levels on the scale may correspond to intervals of the values. For considerations such as endangerment of personal safety, monetary (numerical) valuation can be complex and may not be appropriate for all organizations. It is entirely up to the organization to decide what is considered as being “low” or a “high” consequence. A consequence that might be disastrous for a small organization could be low or even negligible for a very large organization. Overview of the information security risk assessment process risk identification: asset valuation Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Levels of the scale (e.g., “low”, “medium”, or “high”): If consequencen may be expressed in numerical values (e.g. for possible financial loss, they should be given in monetary values) then levels on the scale may correspond to intervals of the values. For considerations such as endangerment of personal safety, monetary (numerical) valuation can be complex and may not be appropriate for all organizations. It is entirely up to the organization to decide what is considered as being “low” or a “high” consequence. A consequence that might be disastrous for a small organization could be low or even negligible for a very large organization. Overview of the information security risk assessment process risk identification: asset valuation Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Dependencies: the more relevant and numerous the business processes supported by an asset, the greater the value of this asset. Overview of the information security risk assessment process risk identification: asset valuation Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Dependencies: the more relevant and numerous the business processes supported by an asset, the greater the value of this asset. Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Thus dependencies of assets on business processes and other assets should be identified because this might influence the values of the assets. Overview of the information security risk assessment process risk identification: asset valuation Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Examples of dependencies: The confidentiality of data should be kept throughout its life-cycle, at all stages, including storage and processing, i.e. the security needs of data storage and processing programmes should be directly related to the value representing the confidentiality of the data stored and processed. If a business process is relying on the integrity of certain data being produced by a programme, the input data of this programme should be of appropriate reliability. The integrity of information will be dependent on the hardware and software used for its storage and processing. Also, the hardware will be dependent on the power supply and possibly air conditioning. Overview of the information security risk assessment process risk identification: asset valuation Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Information about dependencies will assist in the identification of threats and particularly vulnerabilities. Overview of the information security risk assessment process risk identification: asset valuation Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Information about dependencies will assist in the identification of threats and particularly vulnerabilities. It will help to assure that the true value of the assets (through the dependency relationships) is assigned to the assets, thereby indicating the appropriate level of protection. Overview of the information security risk assessment process risk identification: asset valuation Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Information about dependencies will assist in the identification of threats and particularly vulnerabilities. It will help to assure that the true value of the assets (through the dependency relationships) is assigned to the assets, thereby indicating the appropriate level of protection. If the values of the dependent assets (e.g., data) are lower or equal to the value of the asset considered (e.g., software), its value remains the same. Overview of the information security risk assessment process risk identification: asset valuation Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Information about dependencies will assist in the identification of threats and particularly vulnerabilities. It will help to assure that the true value of the assets (through the dependency relationships) is assigned to the assets, thereby indicating the appropriate level of protection. If the values of the dependent assets (e.g., data) are lower or equal to the value of the asset considered (e.g., software), its value remains the same. If the values of the dependent asset (e.g. data) is greater, then the value of the asset considered (e.g. software) should be increased according to: The degree of dependency The values of the other assets Overview of the information security risk assessment process risk identification: asset valuation Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Last but not least: an organization may have some assets that are available more than once, like copies of software programmes or the same type of computer used in most of the offices: In greater number the asset is available in the organization, the greater value could be assigned (consider e.g. support by the service). On the other hand: asset redundancy may be used to reduce availability problems. Overview of the information security risk assessment process risk identification: output of the asset identification and valuation Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The final output of this step is a list of assets and their values relative to disclosure (preservation of confidentiality), modification (preservation of integrity, authenticity, non-repudiation and accountability), nonavailability and destruction (preservation of availability and reliability), and replacement cost. Overview of the information security risk assessment process risk identification: output of the asset identification and valuation Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment The final output of this step is a list of assets and their values relative to disclosure (preservation of confidentiality), modification (preservation of integrity, authenticity, non-repudiation and accountability), nonavailability and destruction (preservation of availability and reliability), and replacement cost. Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP cf. page 7 in http://www.podpisosobisty.pl/images/Wyniki_ projektu/analiza_bezpieczenstwa.pdf Overview of the information security risk assessment process risk identification: remark for asset valuation Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP We should distinguish between asset valuation and impact assesment of a security incident: An information security incident can impact more than one asset or only a part of an asset. Impact is related to the degree of success of the incident. Impact is considered as having either an immediate (operational) effect or a future (business) effect that includes financial and market consequences. Follow asset dependencies in impact analysis! However, implemented controls may reduce the impact, but value of the assets remains unchanged. Overview of the information security risk assessment process Risk analysis - step one: risk identification Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk identification is conducted by the following activities: Identification of assets, Identification of threats, Identification of existing controls, Identification of vulnerabilities, Identification of consequences, Overview of the information security risk assessment process risk identification: identification of threats Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP A threat has the potential to harm assets such as information, processes and systems and therefore organizations. Threats may be of natural or human origin, and could be accidental or deliberate. Overview of the information security risk assessment process risk identification: identification of threats Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP A threat has the potential to harm assets such as information, processes and systems and therefore organizations. Threats may be of natural or human origin, and could be accidental or deliberate. Identification of threats Input: Information on threats obtained from incident reviewing, asset owners, users and other sources, including external threat catalogues. Action: Threats and their sources should be identified. Output: A list of threats with the identification of threat type and source. Overview of the information security risk assessment process risk identification: identification of threats Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Type of threat (notation): deliberate (D): used for all deliberate actions aimed at information assets, accidental (A): used for all human actions that can accidentally damage information assets, environmental (E): used for all incidents that are not based on human actions. Overview of the information security risk assessment process risk identification: identification of threats Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Type of threat - physical damage: Fire (A, D, E), Water damage (A, D, E), Pollution (A, D, E), Major accident (A, D, E), Destruction of equipment or media (A, D, E), Dust, corrosion, freezing (A, D, E), Overview of the information security risk assessment process risk identification: identification of threats Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Type of threat - natural events: Climatic phenomenon (E), Seismic phenomenon (E), Volcanic phenomenon (E), Meteorological phenomenon (E), Flood (E). Overview of the information security risk assessment process risk identification: identification of threats Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Type of threat - Loss of essential services: Failure of air-conditioning or water supply system (A, D), Loss of power supply (A, D, E), Failure of telecommunication equipment (A, D). Overview of the information security risk assessment process risk identification: identification of threats Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Type of threat - disturbance due to radiation: Electromagnetic radiation (A, D, E), Thermal radiation (A, D, E), Electromagnetic pulses (A, D, E), Overview of the information security risk assessment process risk identification: identification of threats Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Type of threat - Compromise of information: Interception of compromising interference signals (D), Remote spying (D), Eavesdropping (D), Theft of media or documents (D), Theft of equipment (D), Retrieval of recycled or discarded media (D), Disclosure (A, D), Data from untrustworthy sources (A, D), Tampering with hardware (D), Tampering with software (A, D), Position detection (D). Overview of the information security risk assessment process risk identification: identification of threats Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Type of threat - Technical failures: Equipment failure (A), Equipment malfunction (A): LED burnout e.g., Saturation of the information system (A, D): DoS or heavy traffic due to schedule, Software malfunction (A), Breach of information system maintainability (A, D), Overview of the information security risk assessment process risk identification: identification of threats Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Type of threat - Unauthorised actions: Unauthorised use of equipment (D), e.g., monitoring system or surveillance system, Fraudulent copying of software (D), Use of counterfeit or copied software (A, D), Corruption of data (D), i.e., errors in data, Illegal processing of data (D) - e.g., personal data, Overview of the information security risk assessment process risk identification: identification of threats Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Type of threat - Compromise of functions: Error in use (A), Abuse of rights (A, D): for private matters for example. Forging of rights (D), Denial of actions (D), Breach of personnel availability (A, D, E). Overview of the information security risk assessment process Risk analysis - step one: risk identification Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk identification is conducted by the following activities: Identification of assets, Identification of threats, Identification of existing controls, Identification of vulnerabilities, Identification of consequences, Overview of the information security risk assessment process risk identification: Identification of existing controls Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Input: Documentation of controls, risk treatment implementation plans Action: Existing and planned controls should be identified Output: A list of all existing and planned controls, their implementation status and usage status Overview of the information security risk assessment process risk identification: Identification of existing controls Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Identification of existing controls should be made to avoid unnecessary work or cost, e.g. in the duplication of controls, its an opportunity to make a check to ensure that the controls are working correctly (information from previous audits), Consideration should be given to the situation where a selected control (or strategy) fails in operation and therefore complementary controls are required to address the identified risk effectively. A way to estimate the effect of the control is to see how it reduces the threat likelihood and ease of exploiting the vulnerability, or impact of the incident. Controls that are planned to be implemented should be considered in the same way like those already implemented. Overview of the information security risk assessment process risk identification: Identification of existing controls Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP An existing or planned control might be identified as ineffective, or not sufficient, or not justified. the control should be checked to determine recommendations: remove, replace or let to stay for cost reasons. Overview of the information security risk assessment process risk identification: Identification of existing controls Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP For the identification of existing or planned controls the following activites should be considered: Reviewing documents containing information about the controls (for example, risk treatment implementation plans) – depends on quality of ISMS. Checking with the people responsible for information security and the users as to which controls are really implemented for the information process or information system under consideration. Conducting an on-site review of the physical controls, comparing those implemented with the list of what controls should be there, and checking those implemented as to whether they are working correctly and effectively. Reviewing results of internal audits. Overview of the information security risk assessment process Risk analysis - step one: risk identification Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk identification is conducted by the following activities: Identification of assets, Identification of threats, Identification of existing controls, Identification of vulnerabilities, Identification of consequences, Overview of the information security risk assessment process risk identification: Identification of vulnerabilities Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Input: A list of known threats, lists of assets and existing controls. Action: Vulnerabilities that can be exploited by threats to cause harm to assets or to the organization should be identified Output: A list of vulnerabilities in relation to assets, threats and controls; a list of vulnerabilities that do not relate to any identified threat for review. Overview of the information security risk assessment process risk identification: Identification of vulnerabilities Compliance and operational security Vulnerabilities may be identified in following areas: Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Organization Processes and procedures Management routines Personnel Physical environment Information system configuration Hardware, software or communications equipment Dependence on external parties Overview of the information security risk assessment process risk identification: Identification of vulnerabilities Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The presence of a vulnerability does not cause harm in itself, as there needs to be a threat present to exploit it. A vulnerability that has no corresponding threat may not require the implementation of a control, but should be recognized and monitored for changes. That is why the output has two subcomponents. Overview of the information security risk assessment process risk identification: Identification of vulnerabilities Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Proactive methods such as information system testing can be used to identify vulnerabilities depending on the criticality of the system and available resources (e.g., allocated funds, available technology, persons with the expertise to conduct the test) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Test methods: Automated vulnerability scanning tool Information security risk communication Security testing and evaluation Information security risk monitoring and review Penetration testing Contingency Planning Guide for Federal Information Systems (NIST SP Code review Overview of the information security risk assessment process risk identification: Identification of vulnerabilities Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Automated vulnerability scanning tool It is used to scan a group of hosts or a network for known vulnerable services. Some of the potential vulnerabilities identified by the automated scanning tool may not represent real vulnerabilities (false positives). Overview of the information security risk assessment process risk identification: Identification of vulnerabilities Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Security testing and evaluation (STE) It includes the development and execution of a test plan (e.g. test script, test procedures, and expected test results). The purpose of system security testing is to test the effectiveness of the security controls. The objective is to ensure that the applied controls meet the approved security specification for the software and hardware and implement the organization’s security policy or meet industry standards. Overview of the information security risk assessment process risk identification: Identification of vulnerabilities Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Penetration testing: When used in the risk assessment process, can be used to assess system’s ability to withstand intentional attempts to circumvent system security. Penetration tools and techniques can give false results unless the vulnerability is successfully exploited. To effectively exploit particular vulnerabilities one needs to know the exact system/ application/ patches setup on tested system. Ability not only to exploit but to crash or restart a tested process or system is a vulnerability as well. Overview of the information security risk assessment process risk identification: Identification of vulnerabilities Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Code review: Code review is the most thorough (but also most expensive) way of vulnerability assessment. Overview of the information security risk assessment process risk identification: Identification of vulnerabilities Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Other activities in identification of vulnerabilities: Interview people and users Questionnaires Physical inspection Document analysis Overview of the information security risk assessment process Risk analysis - step one: risk identification Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk identification is conducted by the following activities: Identification of assets, Identification of threats, Identification of existing controls, Identification of vulnerabilities, Identification of consequences, Overview of the information security risk assessment process risk identification: Identification of consequences Compliance and operational security Identification of consequences: Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Input: A list of assets, a list of business processes, and a list of threats and vulnerabilities, where appropriate, related to assets and their relevance. Action: The consequences that losses of confidentiality, integrity and availability may have on the assets should be identified. Output: A list of incident scenarios with their consequences related to assets and business processes. Overview of the information security risk assessment process risk identification: Identification of consequences Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Action - implementation guidance: Damage or consequences to the organization that could be caused by an incident scenario should be identified. An incident scenario is the description of a threat exploiting a certain vulnerability or set of vulnerabilities in an information security incident. Overview of the information security risk assessment process risk identification: Identification of consequences Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Action - implementation guidance: Damage or consequences to the organization that could be caused by an incident scenario should be identified. An incident scenario is the description of a threat exploiting a certain vulnerability or set of vulnerabilities in an information security incident. The impact of the incident scenarios is to be determined considering impact criteria defined during the context establishment activity. It may affect one or more assets or part of an asset. Overview of the information security risk assessment process risk identification: Identification of consequences Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Action - implementation guidance: Damage or consequences to the organization that could be caused by an incident scenario should be identified. An incident scenario is the description of a threat exploiting a certain vulnerability or set of vulnerabilities in an information security incident. The impact of the incident scenarios is to be determined considering impact criteria defined during the context establishment activity. It may affect one or more assets or part of an asset. Thus assets may have assigned values both for their financial cost and because of the business consequences if they are damaged or compromised. Overview of the information security risk assessment process risk identification: Identification of consequences Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Action - implementation guidance: Damage or consequences to the organization that could be caused by an incident scenario should be identified. An incident scenario is the description of a threat exploiting a certain vulnerability or set of vulnerabilities in an information security incident. The impact of the incident scenarios is to be determined considering impact criteria defined during the context establishment activity. It may affect one or more assets or part of an asset. Thus assets may have assigned values both for their financial cost and because of the business consequences if they are damaged or compromised. Consequences may be of a temporary nature or may be permanent as in the case of the destruction of an asset. Overview of the information security risk assessment process risk identification: Identification of consequences Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Exemplary categories of operational consequences of incident scenarios: Investigation and repair time (Work)time lost Opportunity lost Health and Safety Financial cost of specific skills to repair the damage Image reputation and goodwill Overview of the information security risk assessment process Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk analysis, which comprises: Risk identification Risk estimation Risk evaluation Overview of the information security risk assessment process Risk estimation Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk estimation Risk estimation methodologies Assessment of consequences Assessment of incident likelihood Level of risk estimation Overview of the information security risk assessment process Risk estimation Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk estimation methodologies Assessment of consequences Assessment of incident likelihood Level of risk estimation Overview of the information security risk assessment process Risk estimation - methodologies Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP An estimation methodology may be qualitative or quantitative, or a combination of these, depending on the circumstances. Qualitative estimation uses a scale of qualifying attributes to describe the magnitude of potential consequences (e.g. Low, Medium and High) and the likelihood that those consequences will occur. (easy to understand, but subjective). Quantitative estimation uses a scale with numerical values (rather than the descriptive scales used in qualitative estimation) for both consequences and likelihood, using data from a variety of sources. Overview of the information security risk assessment process Risk estimation - methodologies Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Qualitative estimation is often used first to obtain a general indication of the level of risk and to reveal the major risks. Later it may be necessary to undertake more specific or quantitative analysis on the major risks because it is usually less complex and less expensive to perform qualitative than quantitative analysis. Overview of the information security risk assessment process Risk estimation - methodologies Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Quantitative estimation: The quality of the analysis depends on the accuracy and completeness of the numerical values and the validity of the models used. Quantitative estimation in most cases uses historical incident data. A disadvantage is the lack of such data on new risks or information security weaknesses. If factual data are not available then quantitative estimation creates an illusion of accuracy of the risk assessment. Overview of the information security risk assessment process Risk estimation Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk estimation Risk estimation methodologies Assessment of consequences Assessment of incident likelihood Level of risk estimation Overview of the information security risk assessment process Risk estimation - assessment of consequences Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Assessment of consequences Input: A list of identified relevant incident scenarios, including identification of threats, vulnerabilities, affected assets, consequences to assets and business processes. Action: The business impact upon the organization that might result from possible or actual information security incidents should be assessed. Output: A list of assessed consequences of an incident scenario expressed with respect to assets and impact criteria. Overview of the information security risk assessment process Risk estimation - assessment of consequences Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Assessment of consequences - implementation guidance: Values of assets should be taken into account while assessing the consequences. Asset valuation begins with classification of assets according to their criticality, in terms of the importance of assets to fulfilling the business objectives of the organization. Valuation is then determined using two measures: Information security risk assessment the replacement value of the asset: the cost of recovery cleanup and replacing the information (if at all possible), and the business consequences of loss or compromise of the asset, such as the potential adverse business and/or legal or regulatory consequences from the disclosure, modification, non-availability and/or destruction Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ... Overview of the information security risk assessment process Risk estimation - assessment of consequences Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Assessment of consequences - implementation guidance: ... Asset valuation is a key factor in the impact assessment of an incident scenario, because the incident may affect more than one asset (e.g. dependent assets), or only a part of an asset. Consequences or business impact may be determined by modelling the outcomes of an event or set of events, or by extrapolation from experimental studies or past data. Consequences may be expressed in terms of monetary, technical or human impact criteria, or other criteria relevant to the organization. In some cases, more than one numerical value is required to specify consequences for different times, places, groups or situations. Overview of the information security risk assessment process Risk estimation - assessment of consequences Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP There is an important difference between the asset value and the impact resulting from the incident: an information security incident can impact more than one asset or only a part of an asset. Impact is considered as having either an immediate (operational) effect or a future (business) effect (financial and market consequences). Immediate (operational) impact is either direct or indirect. Note that the first assessment (with no controls of any kind) will estimate an impact as very close to the (combination of the) concerned asset value(s). For any next iteration, the impact will be different (normally much lower) due to the presence and the effectiveness of the implemented controls Overview of the information security risk assessment process Risk estimation - assessment of consequences Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Direct impact: The financial replacement value of lost (part of) asset The cost of acquisition, configuration and installation of the new asset or back-up The cost of suspended operations due to the incident until the service provided by the asset(s) is restored Impact results in a information security breach Overview of the information security risk assessment process Risk estimation - assessment of consequences Compliance and operational security Indirect impact: Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Opportunity cost (financial resources needed to replace or repair an asset would have been used elsewhere) The cost of interrupted operations Potential misuse of information obtained through a security breach Violation of statutory or regulatory obligations Violation of ethical codes of conduct Overview of the information security risk assessment process Risk estimation Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk estimation Risk estimation methodologies Assessment of consequences Assessment of incident likelihood Level of risk estimation Overview of the information security risk assessment process Risk estimation - assessment of incident likelihood Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Assessment of incident likelihood: Input: A list of identified relevant incident scenarios, including identification of threats, affected assets, exploited vulnerabilities and consequences to assets and business processes. Furthermore, lists of all existing and planned controls, their effectiveness, implementation and usage status. Action: The likelihood of the incident scenarios should be assessed. Output: Likelihood of incident scenarios (quantitative or qualitative). Overview of the information security risk assessment process Risk estimation - assessment of incident likelihood Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP How often the threats occur and how easily the vulnerabilities may be exploited? Use: experience and applicable statistics for threat likelihood, for deliberate threat sources: the motivation and capabilities, which will change over time, and resources available to possible attackers for accidental threat sources: geographical factors e.g. proximity to chemical or petroleum plants, the possibility of extreme weather conditions, and factors that could influence human errors and equipment malfunction consider vulnerabilities, both individually and in aggregation existing controls and how effectively they reduce vulnerabilities Overview of the information security risk assessment process Risk estimation Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk estimation Risk estimation methodologies Assessment of consequences Assessment of incident likelihood Level of risk estimation Overview of the information security risk assessment process Risk estimation - level of risk estimation Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Level of risk estimation: Input: A list of incident scenarios with their consequences related to assets and business processes and their likelihood. Action: The level of risk should be estimated for all relevant incident scenarios. Output: A list of risks with value levels assigned. Overview of the information security risk assessment process Risk estimation - level of risk estimation Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Examples given on the blackboard. Overview of the information security risk assessment process Risk estimation - level of risk estimation Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Overview of the information security risk assessment process Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk assessment consists of the following activities: Risk analysis, which comprises: Risk identification Risk estimation Risk evaluation Overview of the information security risk assessment process Risk evaluation Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk evaluation: Input: A list of risks with value levels assigned and risk evaluation criteria. Action: Level of risks should be compared against risk evaluation criteria and risk acceptance criteria Output: A list of risks prioritized according to risk evaluation criteria in relation to the incident scenarios that lead to those risks. Overview of the information security risk assessment process Risk evaluation Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk evaluation - implementation guidance: Risk evaluation criteria used to make decisions should be consistent with the defined external and internal information security risk management context and take into account the objectives of the organization and stakeholder views etc. Decisions as taken in the risk evaluation activity are mainly based on the acceptable level of risk. Consequences, likelihood, and the degree of confidence in the risk identification and analysis should be considered as well. Aggregation of multiple low or medium risks may result in much higher overall risks and need to be addressed accordingly. Overview of the information security risk assessment process Risk evaluation Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk evaluation - considerations should include: Information security properties: if one criterion is not relevant for the organization (e.g. loss of confidentiality), then all risks impacting this criterion may not be relevant The importance of the business process or activity supported by a particular asset or set of assets: if the process is determined to be of low importance, risks associated with it should be given a lower consideration than risks that impact more important processes or activities. Contractual, legal and regulatory requirements. Overview of the information security risk assessment process Risk evaluation Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk evaluation uses the understanding of risk obtained by risk analysis to make decisions about future actions. Decisions should include: Whether an activity should be undertaken. Priorities for risk treatment considering estimated levels of risks. Overview of the information security risk assessment process Alternative approach: high-level information security risk assessment Compliance and operational security High-level information security risk assessment: Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP For various reasons, such as budget, it may not be possible to implement all controls simultaneously – only the most critical risks can be addressed. Another reason to start with the high-level assessment is to synchronize with other plans related to change management (or business continuity) – high-level assessment allows definition of the priorities and chronology in the actions. Overview of the information security risk assessment process Alternative approach: high-level information security risk assessment Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP High-level information security risk assessment: The high-level risk assessment may address a more global view of the organization and its information systems. The context analysis concentrates more on the business and operational environment than technological elements (considering the technology aspects as independent from the business issues). The high-level risk assessment may address a more limited list of threats, and vulnerabilities grouped in defined domains. Risks presented in a high-level risk assessment are frequently more general risk domains than specific identified risks. As the scenarios or the threats are grouped in domains, the risk treatment proposes lists of controls in this domain. Overview of the information security risk assessment process Alternative approach: high-level information security risk assessment Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP High-level information security risk assessment advantages: The incorporation of an initial simple approach is likely to gain acceptance of the risk assessment program. It should be possible to build a strategic picture of an organizational information security program, i.e. it will act as a good planning aid. Resources and money can be applied where they are most beneficial, and systems likely to be in the greatest need of protection will be addressed first. Overview of the information security risk assessment process Alternative approach: high-level information security risk assessment Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP High-level information security risk assessment disadvantage: The initial risk analyses are at a high level, and potentially less accurate – some business processes or systems may not be identified as requiring a second, detailed risk assessment. Overview of the information security risk assessment process Alternative approach: high-level information security risk assessment Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP At the first decision point (see the main picture of information security risk management process), several factors helps to determine if the high-level assessment is adequate to treat risks. These factors may include: The business objectives to be achieved by using various information assets. The degree to which the organization’s business depends on each information asset, i.e. whether functions that the organization considers critical to its survival or the effective conduct of business are dependent on each asset, or on the confidentiality, integrity, availability of the information stored and processed on this asset. ... Overview of the information security risk assessment process Alternative approach: high-level information security risk assessment Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP At the first decision point (see the main picture of information security risk management process), several factors helps to determine if the high-level assessment is adequate to treat risks. These factors may include: ... The level of investment in each information asset, in terms of developing, maintaining, or replacing the asset. The information assets, for which the organization directly assigns value. Overview of the information security risk assessment process Alternative approach: high-level information security risk assessment Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP High-level information security risk assessment: If the objectives of an asset are extremely important to an organization’s conduct of business, or if the assets are at high risk, then a second iteration, the detailed risk assessment, should be conducted for the particular information asset (or its part). A general rule to apply is: if the lack of information security can result in significant adverse consequences to an organization, its business processes or its assets, then a second iteration risk assessment, at more detailed level, is necessary to identify potential risks. Information security risk treatment Outline Compliance and operational security Information security risk treatment: Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP General description of risk treatment. Risk reduction. Risk retention (if at acceptable level - do nothing). Risk avoidance (avoid activity or condition that gives raise to a particular risk). Risk transfer (by insurance or by sub-contracting a partner). Information security risk treatment Outline Compliance and operational security Information security risk treatment - general description: Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Input: A list of risks prioritized according to risk evaluation criteria in relation to the incident scenarios that lead to those risks. Action: Controls to reduce, retain, avoid, or transfer the risks should be selected and a risk treatment plan defined. Output: Risk treatment plan and residual risks subject to the acceptance decision of the organization’s managers. Information security risk treatment Outline Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Information security risk treatment - implementation guidance: When large reductions in risks may be obtained with relatively low expenditure, such options should be implemented. The four options for risk treatment are not mutually exclusive. Sometimes the organization can benefit substantially by a combination of options such as reducing the likelihood of risks, reducing their consequences, and transferring or retaining any residual risks. Some risk treatments can effectively address more than one risk (e.g. information security training and awareness). A risk treatment plan should define priorities for the treatments and define timeframes. Information security risk treatment Outline Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Information security risk treatment - implementation guidance: The identification of existing controls may determine that existing controls exceed current needs, in terms of cost comparisons, including maintenance. On the other hand, since controls may influence each other, removing redundant controls might reduce the overall security in place. In addition, it may be cheaper to leave redundant or unnecessary controls in place than to remove them. Information security risk treatment Outline Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk treatment options should be considered taking into account: How risk is perceived by affected parties The most appropriate ways to communicate to those parties. Information security risk treatment Outline Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Once the risk treatment plan has been defined, residual risks need to be determined. This involves an update or re-iteration of the risk assessment, taking into account the expected effects of the proposed risk treatment. Should the residual risk still not meet the organization’s risk acceptance criteria, a further iteration of risk treatment may be necessary before proceeding to risk acceptance Information security risk treatment Risk reduction Compliance and operational security Information security risk treatment: Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP General description of risk treatment. Risk reduction. Risk retention (if at acceptable level - do nothing). Risk avoidance (avoid activity or condition that gives raise to a particular risk). Risk transfer (by insurance or by sub-contracting a partner). Information security risk treatment Risk reduction Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Information security risk treatment - risk reduction: Action: The level of risk should be reduced through the selection of controls so that the residual risk can be reassessed as being acceptable. Information security risk treatment Risk reduction Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk reduction - implementation guidance: In general, controls may provide one or more of the following types of protection: correction, elimination, prevention, impact minimization, deterrence, detection, recovery, monitoring and awareness. During control selection it is important to weigh the cost of acquisition, implementation, administration, operation, monitoring, and maintenance of the controls against the value of the assets being protected. The return on investment in terms of risk reduction and potential to exploit new business opportunities afforded by certain controls should be considered. Consideration should be given to specialized skills that may be needed to define and implement new controls or modify existing ones. Information security risk treatment Risk reduction Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Various constraints should be taken into account when selecting controls and during implementation. Typically, the following are considered: Time constraints Financial constraints Technical constraints Operational constrains Cultural constraints ... Information security risk treatment Risk reduction Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Various constraints should be taken into account when selecting controls and during implementation. Typically, the following are considered: ... Ethical constraints Environmental constraints Legal constraints Ease of use Personnel constraints Constraints for integrating new and existing controls Information security risk treatment Risk reduction Compliance and operational security Risk reduction - time constraints: Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP For example, controls should be implemented within a time period acceptable for the organization’s managers. Another type of time constraint is whether a control can be implemented within the lifetime of the information or system. Time constraint may be the period of time the organization’s managers decides is an acceptable period to be exposed to a particular risk. Information security risk treatment Risk reduction Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk reduction - financial constraints: Controls should not be more expensive to implement or to maintain than the value of risks they are designed to protect, except where compliance is mandatory (e.g., with legislation). Effort should be made not to exceed assigned budgets and achieve financial advantage through the use of controls. In some cases it may not be possible to achieve the desired security and level of risk acceptance due to budget constraints. This becomes an organization’s managers’ decision if increase the budget or not. Information security risk treatment Risk reduction Compliance and operational security Risk reduction - technical constraints: Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Technical problems, like the compatibility of programmes or hardware, should be taken into account during the selection of controls. Retrospective implementation of controls to an existing process or system is often hindered by technical constraints. These difficulties may move the balance of controls towards the procedural and physical aspects of security. Information security risk treatment Risk reduction Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk reduction - operational constraints: Operational constraints such as the need to operate 24x7 yet still perform back-ups can result in complex and costly implementation of controls unless they are built into the design right from the start. Information security risk treatment Risk reduction Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk reduction - cultural constraints: Not all controls can be applied in all countries. For example, it may be possible to implement bag searches in parts of Europe but not in parts of the Middle East. Many controls rely on the active support of the staff. If the staff does not understand the need for the control or do not find it culturally acceptable, the control will become ineffective over time. Information security risk treatment Risk reduction Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk reduction - ethical constraints: Can prevent implementing controls such as email scanning in some countries. Privacy of information can also change dependent on the ethics of the region or government. These constraints may have greater effect in some industry sectors than others, for example, government and healthcare. Information security risk treatment Risk reduction Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk reduction - environmental constraints: Examples: space availability, extreme climate conditions, surrounding natural and urban geography. E.g., some earthquake protection may be required in some countries but unnecessary in others. Information security risk treatment Risk reduction Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk reduction - legal constraints: Legal factors such as personal data protection could affect the selection of controls. Legislative and regulatory compliance can mandate certain types of control including data protection and financial audit; they can also prevent the use of some controls, e.g. encryption. Other laws and regulations such as labour relations legislation, fire department, health and safety, and economic sector regulations, etc., could affect control selection as well. Information security risk treatment Risk reduction Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk reduction - ease of use: A poor human-technology interface will result in human error and may render the control useless. Controls should be selected to provide optimal ease of use while achieving an acceptable level of residual risk to the business. Controls that are difficult to use will impact their effectiveness, as users may try to circumvent or ignore them as much as possible. Complex access controls within an organization could encourage users to find alternate, unauthorized methods of access. Information security risk treatment Risk reduction Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk reduction - personnel constraints: The availability and salary cost of specialized skill, and the ability to move staff between locations in adverse operating conditions, should be considered. Expertise may not be readily available to implement planned controls or the expertise may be costly for the organization. Other aspects such as the tendency of some staff to discriminate other staff members who are not security screened can have major implications for security policies and practices. The need to hire the right people for the work, and finding the right people, may result in hiring before security screening is completed. On the other hand the requirement for security screening to be completed before hiring is the normal, and safest, practice. Information security risk treatment Risk reduction Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk reduction - constraints of integrating new and existing controls: Integration of new controls in the existing infrastructure and the interdependencies between controls are often overlooked. For example, a plan to use biometric tokens for physical access control may cause conflict with an existing PIN-pad based system for access control. The cost of changing controls from existing controls to the planned controls should include elements to be added to the overall costs of risk treatment. Information security risk treatment Risk retention Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk retention: If the level of risk meets the risk acceptance criteria, there is no need for implementing additional controls and the risk can be retained. Information security risk treatment Risk avoidance Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk avoidance: When the identified risks are considered too high, or the costs of implementing other risk treatment options exceed the benefits, a decision may be made to avoid the risk completely, by withdrawing from a planned or existing activity or set of activities, or changing the conditions under which the activity is operated. Information security risk treatment Risk transfer Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk transfer: Risk transfer involves a decision to share certain risks with external parties. Risk transfer can create new risks or modify existing, identified risks. Therefore, additional risk treatment may be necessary. Transfer can be done by insurance that will support the consequences, or by sub-contracting a partner whose role will be to monitor the information system and take immediate actions to stop an attack. Information security risk treatment Risk transfer Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP It should be noted that it may be possible to transfer the responsibility to manage risk but it is not normally possible to transfer the liability of an impact. Customers will usually attribute an adverse impact as being the fault of the organization. Information security risk acceptance Outline Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Input: Risk treatment plan and residual risk assessment subject to the acceptance decision of the organization’s managers. Action: The decision to accept the risks and responsibilities for the decision should be made and formally recorded. Output: A list of accepted risks with justification for those that do not meet the organization’s normal risk acceptance criteria. Information security risk acceptance Outline Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Implementation guidance (see Fig.1): In some cases the level of residual risk may not meet risk acceptance criteria because the criteria being applied do not take into account prevailing circumstances. For example, it might be argued that it is necessary to accept risks because the benefits accompanying the risks are very attractive, or because the cost of risk reduction is too high. Such circumstances indicate that risk acceptance criteria are inadequate and should be revised if possible. However, it is not always possible to revise the risk acceptance criteria in a timely manner. In such cases, decision makers may have to accept some risks and make a written justification for the decision to override normal risk acceptance criteria. Information security risk communication Outline Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Input: All risk information obtained from the risk management activities. Action: Information about risk should be exchanged and/or shared between the decision-maker and other stakeholders. Output: Continual understanding of the organization’s information security risk management process and results. Information security risk communication Implementation guidance Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk communication is an activity to achieve agreement on how to manage risks by exchanging and/or sharing information about risk between the decision-makers and other stakeholders. The information includes, but is not limited to the existence, nature, form, likelihood, severity, treatment, and acceptability of risks. Effective communication among stakeholders may have a significant impact on decisions that must be made. Those who are responsible for implementing risk management should understand the basis on which decisions are made and why particular actions are required. Perceptions of risk can vary due to differences in assumptions, concepts and the needs. Stakeholders are likely to make judgments on the acceptability of risk based on their perception of risk. Information security risk communication Implementation guidance Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk communication should be carried out in order to achieve the following: To provide assurance of the outcome of the organization’s risk management To collect risk information To share the results from the risk assessment and present the risk treatment plan To avoid or reduce both occurrence and consequence of information security breaches due to the lack of mutual understanding among decision makers and stakeholders ... Information security risk communication Implementation guidance Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk communication should be carried out in order to achieve the following: ... To support decision-making To obtain new information security knowledge To co-ordinate with other parties and plan responses to reduce consequences of any incident To give decision makers and stakeholders a sense of responsibility about risks To improve awareness Information security risk communication Implementation guidance Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk communication activity should be performed continually. An organization should develop risk communication plans for normal operations as well as for emergency situations. It is important to cooperate with the appropriate public relations unit within the organization to coordinate all tasks related to risk communication (crucial in the event of crisis in communication). Information security risk monitoring and review Outline Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Monitoring and review of risk factors. Risk management monitoring, reviewing and improving. Information security risk monitoring and review Outline Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Monitoring and review of risk factors. Risk management monitoring, reviewing and improving. Information security risk monitoring and review Monitoring and review of risk factors – outline: Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Input: All risk information obtained from the risk management activities Action: Risks and their factors (i.e., value of assets, impacts, threats, vulnerabilities, likelihood of occurrence) should be monitored and reviewed to identify any changes in the context of the organization at an early stage, and to maintain an overview of the complete risk picture. Output: Continual alignment of the management of risks with the organization’s business objectives, and with risk acceptance criteria. Information security risk monitoring and review Monitoring and review of risk factors – implementation guidance: ... Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risks are not static. Threats, vulnerabilities, likelihood or consequences may change without any indication. Constant monitoring is necessary to detect these changes. Organizations should ensure that the following are continually monitored: New assets that have been included in the risk management scope Necessary modification of asset values, e.g., due to changed business requirements New threats that could be active both outside and inside the organization and that have not been assessed ... Information security risk monitoring and review ... Monitoring and review of risk factors – implementation guidance: Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ... Organizations should ensure that the following are continually monitored: ... Possibility that new or increased vulnerabilities could allow threats to exploit these new or changed vulnerabilities Identified vulnerabilities to determine those becoming exposed to new or re-emerging threats Increased impact or consequences of assessed threats, vulnerabilities and risks in aggregation resulting in an unacceptable level of risk Information security incidents Information security risk monitoring and review Risk management monitoring, reviewing and improving – outline: Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Input: All risk information obtained from the risk management activities. Action: The information security risk management process should be continually monitored, reviewed and improved as necessary and appropriate. Output: Continual relevance of the information security risk management process to the organization’s business objectives or updating the process. Information security risk monitoring and review Risk management monitoring, reviewing and improving - implementation guidance: Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The organization should regularly verify that the criteria used to measure the risk and its elements are still valid and consistent with business objectives, strategies and policies, and that changes to the business context are taken into account during the information security risk management process. This monitoring should address at least: Legal and environmental context Competition context ... Information security risk monitoring and review Risk management monitoring, reviewing and improving - implementation guidance: Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The organization should regularly verify that . . . This monitoring should address at least: ... Risk assessment approach Asset value and categories Impact criteria Risk evaluation criteria Risk acceptance criteria Total cost of ownership Necessary resources Information security risk monitoring and review Risk management monitoring, reviewing and improving - implementation guidance: Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The organization should ensure that risk assessment and risk treatment resources are continually available to review risk, to address new or changed threats or vulnerabilities, and to advise management accordingly. Information security risk monitoring and review Risk management monitoring, reviewing and improving - implementation guidance: Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Risk management monitoring can result in modifying or adding the approach, methodology or tools used depending on: Changes identified Risk assessment iteration Aim of the information security risk management process (e.g., business continuity, resilience to incidents, compliance) Object of the information security risk management process (e.g., organization, business unit, information process, its technical implementation, application, connection to the internet) Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Contingency Planning Guide for Federal Information Systems (according to NIST SP 800-34) Contingency Planning Guide (NIST SP 800-34) Introduction: Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Contingency planning refers to interim measures to recover information system services after a disruption. Interim measures may include relocation of information systems and operations to an alternate site, recovery of information system functions or performance using alternate equipment, of information system functions using manual methods. Contingency Planning Guide (NIST SP 800-34) Introduction: Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP NIST SP 800-34 addresses specific contingency planning recommendations for three platform types and provides strategies and techniques common to all systems: Client/server systems, Telecommunications systems, Mainframe systems. Contingency Planning Guide (NIST SP 800-34) Mainframe Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP (According to Wikipedia) Modern mainframe design is generally less defined by single-task computational speed and more by: Redundant internal engineering and resulting high reliability and security Extensive input-output facilities Strict backward compatibility with older software High hardware and computational utilization rates to support massive throughput Their high stability and reliability enables these machines to run uninterrupted for long periods of time. Contingency Planning Guide (NIST SP 800-34) .. Introduction...: Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP An organization must be able to sustain its mission through environmental changes. Changes can be gradual, such as economic or mission changes, or sudden, as in a disaster event. Rather than just working to identify and mitigate threats, vulnerabilities, and risks, organizations can work toward building a resilient infrastructure, minimizing the impact of any disruption on mission essential functions. Resilience is the ability to quickly adapt and recover from any known or unknown changes to the environment (resiliency is not a process, but rather an end-state for organizations). Contingency Planning Guide (NIST SP 800-34) .. Introduction...: Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Effective contingency planning begins with the development of an organization contingency planning policy and subjection of each information system to a business impact analysis (BIA). This facilitates prioritizing the systems and processes based on the FIPS 199 impact level and develops priority recovery strategies for minimizing loss. FIPS 199 provides guidelines on determining information and information system impact to organizational operations and assets, individuals, other organizations and the nation through a formula that examines three security objectives: confidentiality, integrity, availability. Contingency Planning Guide (NIST SP 800-34) .. Introduction...: Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Potential impact - see page 6 of FIPS 199 Security categorization - see page 3 (information types), 4 (information systems) of FIPS 199 Contingency Planning Guide (NIST SP 800-34) Types of Plans: Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Information system contingency planning fits into broader set of activities that include: organizational and business process continuity, disaster recovery planning, incident management. Contingency Planning Guide (NIST SP 800-34) Types of Plans: Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Continuity Planning: normally applies to the mission/business itself; it concerns the ability to continue critical functions and processes during and after an emergency event. Contingency Planning: normally applies to information systems, and provides the steps needed to recover the operation of all or part of designated information systems at an existing or new location in an emergency. Cyber Incident Response Planning: is a type of plan that normally focuses on detection, response, and recovery to a computer security incident or event. Contingency Planning Guide (NIST SP 800-34) Types of Plans – Business Continuity Plan (BCP): Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Business Continuity Plan (BCP): The BCP focuses on sustaining an organization’s mission/business processes during and after a disruption. Example of a mission/business process: organization’s payroll process or customer service process. A BCP may be used for long-term recovery in conjunction with the COOP plan, allowing for additional functions to come online as resources or time allow. A BCP may be written for mission/business processes within a single business unit or may address the entire organization’s processes. Contingency Planning Guide (NIST SP 800-34) Types of Plans – Continuity of Operations (COOP) Plan: Compliance and operational security Continuity of Operations (COOP) Plan: Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP COOP focuses on restoring an organization’s mission essential functions (MEF) at an alternate site and performing those functions for up to 30 days before returning to normal operations. Additional functions, or those at a field office level, may be addressed by a BCP. Minor threats or disruptions that do not require relocation to an alternate site are typically not addressed in a COOP plan. Contingency Planning Guide (NIST SP 800-34) Types of Plans – Continuity of Operations (COOP) Plan: Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Standard elements of a COOP plan include: Program plans and procedures. Risk management. Budgeting and acquisition of resources. Essential functions. Order of succession. Delegation of authority. Continuity facilities. Continuity communications. Vital records management. Human capital. Test, training, and exercise. Devolution (see http://www.bhs.idaho.gov/Pages/Plans/ COOP%20T%20and%20T/TT%20Devolution.pdf). Contingency Planning Guide (NIST SP 800-34) Types of Plans – Continuity of Operations (COOP) Plan: Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Continuity of Operations (COOP) Plan: Nongovernment organizations typically use BCPs rather than COOP plans to address mission/business processes. COOP plans are mandated in USA for organizations by HSPD-20/NSPD-51, National Continuity Policy and FCD 1, Federal Executive Branch National Continuity Program and Requirements (see http://www.fema. gov/pdf/about/offices/fcd1.pdf). COOP vs. ISCP (Information System Contingency Plan) – The Basic Facts: COOP plans address national, primary, or mission essential functions; ISCPs address federal information systems. COOP functions have specific criteria; not all government mission/business processes meet COOP criteria. Contingency Planning Guide (NIST SP 800-34) Types of Plans – Continuity of Operations (COOP) Plan: Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Continuity of Operations (COOP) Plan: ... ... COOP planning applies to mission essential functions of federal government departments and agencies. ISCPs apply to all information systems in federal organizations. COOP is mandated for federal organizations by HSPD-20/NSPD-51, FCDs 1 and 2, and the National Continuity Policy Implementation Plan (NCPIP); ISCPs are mandated for federal organizations by FISMA. Contingency Planning Guide (NIST SP 800-34) Types of Plans – Crisis Communications Plan: Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Organizations should document standard procedures for internal and external communications in the event of a disruption using a crisis communications plan. A crisis communications plan is often developed by the organization responsible for public outreach. The crisis communications plan typically designates specific individuals as the only authority for answering questions from or providing information to the public regarding emergency response. It may also include procedures for disseminating reports to personnel on the status of the incident and templates for public press releases. The crisis communication plan procedures should be communicated to COOP and BCP planners to ensure that the plans ensure that only approved statements are released to the public by authorized officials. Contingency Planning Guide (NIST SP 800-34) Types of Plans – Critical Infrastructure Protection (CIP) Plan: Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Critical Infrastructure Protection (CIP) Plan: Critical infrastructure and key resources (CIKR) are those components of the national infrastructure that is so vital that their loss would have a debilitating effect of the safety, security, economy, and/or health of the state. A CIP plan is a set of policies and procedures that serve to protect and recover these national assets and mitigate risks and vulnerabilities. CIP plans define the roles and responsibilities for protection, develop partnerships and information sharing relationships, implement the risk management framework defined in appropriate documents. Contingency Planning Guide (NIST SP 800-34) Types of Plans – Cyber Incident Response Plan: Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Cyber Incident Response Plan: The cyber incident response plan establishes procedures to address cyber attacks against an organization’s information system(s). These procedures are designed to enable security personnel to identify, mitigate, and recover from malicious computer incidents, such as unauthorized access to a system or data, denial of service, or unauthorized changes to system hardware, software, or data. This plan may be included as an appendix of the BCP. Contingency Planning Guide (NIST SP 800-34) Types of Plans – Disaster Recovery Plan (DRP):) Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Disaster Recovery Plan: The DRP applies to major, usually physical disruptions to service that deny access to the primary facility infrastructure for an extended period. A DRP is an information system-focused plan designed to restore operability of the target system, application, or computer facility infrastructure at an alternate site after an emergency. The DRP may be supported by multiple information system contingency plans to address recovery of impacted individual systems once the alternate facility has been established. ... Contingency Planning Guide (NIST SP 800-34) Types of Plans – Disaster Recovery Plan (DRP):) Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Disaster Recovery Plan: ... A DRP may support a BCP or COOP plan by recovering supporting systems for mission/business processes or mission essential functions at an alternate location. The DRP only addresses information system disruptions that require relocation. Contingency Planning Guide (NIST SP 800-34) Types of Plans – Information System Contingency Plan (ISCP): Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Information System Contingency Plan (ISCP) An ISCP provides established procedures for the assessment and recovery of a system following a system disruption. The ISCP provides key information needed for system recovery, including roles and responsibilities, inventory information, assessment procedures, detailed recovery procedures, and testing of a system. The ISCP differs from a DRP primarily in that the information system contingency plan procedures are developed for recovery of the system regardless of site or location. ... Contingency Planning Guide (NIST SP 800-34) Types of Plans – Information System Contingency Plan (ISCP): Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Information System Contingency Plan (ISCP) ... In contrast, a DRP is primarily a site-specific plan developed with procedures to move operations of one or more information systems from a damaged or uninhabitable location to a temporary alternate location. Once the DRP has successfully transferred an information system site to an alternate site, each affected system would then use its respective ISCP to restore, recover, and test systems, and put them into operation. Contingency Planning Guide (NIST SP 800-34) Types of Plans – Occupant Emergency Plan (OEP): Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The OEP outlines first-response procedures for occupants of a facility in the event of a threat or incident to the health and safety of personnel, the environment, or property. Such events include a fire, bomb threat, chemical release, domestic violence in the workplace, or a medical emergency. Shelter-in-place procedures for events requiring personnel to stay inside the building rather than evacuate are also addressed in an OEP. OEPs are developed at the facility level, specific to the geographic location and structural design of the building. The facility OEP may be appended to the COOP or BCP, but is executed separately and as a first response to the incident. Contingency Planning Guide (NIST SP 800-34) Types of Plans: Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Summary – see page 11 of NIST SP 800-34. Contingency Planning Guide (NIST SP 800-34) Information System Contingency Planning Process Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The process is common to all information systems. The seven steps in the process are: Develop the contingency planning policy; Conduct the business impact analysis (BIA); Identify preventive controls; Create contingency strategies; Develop an information system contingency plan; Ensure plan testing, training, and exercises; Ensure plan maintenance. Contingency Planning Guide (NIST SP 800-34) Information System Contingency Planning Process Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The process is common to all information systems. The seven steps in the process are: Develop the contingency planning policy; Conduct the business impact analysis (BIA); Identify preventive controls; Create contingency strategies; Develop an information system contingency plan; Ensure plan testing, training, and exercises; Ensure plan maintenance. Contingency Planning Guide (NIST SP 800-34) Develop the contingency planning policy Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP To be effective and to ensure that personnel fully understand the organization’s contingency planning requirements, the contingency plan must be based on a clearly defined policy. The contingency planning policy statement should define the organization’s overall contingency objectives and establish the organizational framework and responsibilities for system contingency planning. Key policy elements are as follows: Roles and responsibilities; Scope as applies to common platform types and organization functions (i.e., telecommunications, legal, media relations) subject to contingency planning; ... Contingency Planning Guide (NIST SP 800-34) Develop the contingency planning policy Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ... Key policy elements are as follows: Roles and responsibilities; Scope as applies to common platform types and organization functions (i.e., telecommunications, legal, media relations) subject to contingency planning; Resource requirements; Training requirements; Exercise and testing schedules; Plan maintenance schedule; Minimum frequency of backups and storage of backup media. Contingency Planning Guide (NIST SP 800-34) Develop the contingency planning policy Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The ISCPs must be written in coordination with other plans associated with each target system as part of organization-wide resilience strategy. Such plans include the following: Information system security plans, Facility-level plans, such as the OEP and DRP MEF support such as the COOP plan Organization-level plans, such as CIP plans Contingency Planning Guide (NIST SP 800-34) Conduct the Business Impact Analysis Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The BIA is a key step in implementing the CP controls. The BIA enables the ISCP Coordinator to characterize the system components, supported mission/business processes, and interdependencies. The BIA purpose is to correlate the system with the critical mission/business processes and services provided, and based on that information, characterize the consequences of a disruption. The ISCP Coordinator can use the BIA results to determine contingency planning requirements and priorities. Contingency Planning Guide (NIST SP 800-34) Conduct the Business Impact Analysis Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Three steps are typically involved in accomplishing the BIA: Determine mission/business processes and recovery criticality. Identify resource requirements. Identify recovery priorities for system resources. Contingency Planning Guide (NIST SP 800-34) Conduct the Business Impact Analysis Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Three steps are typically involved in accomplishing the BIA: Determine mission/business processes and recovery criticality. Identify resource requirements. Identify recovery priorities for system resources. Contingency Planning Guide (NIST SP 800-34) BIA - Determine business processes and recovery criticality Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP An information system can be very complex and often supports multiple mission/business processes, resulting in different perspectives on the importance of system services or capabilities. ISCP Coordinator should work with management and internal and external points of contact (POC) to identify and validate mission/business processes and processes that depend on or support the information system. (When identifying POCs, it is important to include organizations that provide or receive data from the system as well as POCs of any interconnected systems) ... Contingency Planning Guide (NIST SP 800-34) BIA - Determine business processes and recovery criticality Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ... The identified processes’ impacts are then further analyzed in terms of availability, integrity, confidentiality, and the established FIPS 199 impact level for the information system. Further identification of additional mission/business processes and impacts captures the unique purpose of the system. Organizational and system uniqueness are important considerations for contingency planning and business impact. Adding information types to address this uniqueness will enhance the prioritization of system component impacts. Unique processes and impacts can be expressed in values or units of measurement that are meaningful to the organization. ... Contingency Planning Guide (NIST SP 800-34) BIA - Determine business processes and recovery criticality Compliance and operational security ... Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The ISCP Coordinator should next analyze the supported mission/business processes and with the process owners, leadership and business managers determine the acceptable downtime if a given process or specific system data were disrupted or otherwise unavailable. Downtime can be identified in several ways: Maximum Tolerable Downtime (MTD). Recovery Time Objective (RTO). Recovery Point Objective (RPO). Contingency Planning Guide (NIST SP 800-34) BIA - Determine business processes and recovery criticality Compliance and operational security Maximum Tolerable Downtime (MTD): Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The MTD represents the total amount of time the system owner/authorizing official is willing to accept for a mission/business process outage or disruption and includes all impact considerations. Determining MTD is important because it could leave contingency planners with imprecise direction on: selection of an appropriate recovery method the depth of detail which will be required when developing recovery procedures, including their scope and content. Contingency Planning Guide (NIST SP 800-34) BIA - Determine business processes and recovery criticality Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Recovery Time Objective (RTO): RTO defines the maximum amount of time that a system resource can remain unavailable before there is an unacceptable impact on other system resources, supported mission/business processes, and the MTD. Determining the information system resource RTO is important for selecting appropriate technologies that are best suited for meeting the MTD. When it is not feasible to immediately meet the RTO and the MTD is inflexible, a Plan of Action and Milestone should be initiated to document the situation and plan for its mitigation. Contingency Planning Guide (NIST SP 800-34) BIA - Determine business processes and recovery criticality Compliance and operational security Recovery Point Objective (RPO) Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The RPO represents the point in time, prior to a disruption or system outage, to which mission/business process data can be recovered (given the most recent backup copy of the data) after an outage. Unlike RTO, RPO is not considered as part of MTD. Rather, it is a factor of how much data loss the mission/business process can tolerate during the recovery process. Contingency Planning Guide (NIST SP 800-34) BIA - Determine business processes and recovery criticality Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Because the RTO must ensure that the MTD is not exceeded, the RTO must normally be shorter than the MTD. For example, a system outage may prevent a particular process from being completed, and because it takes time to reprocess the data, that additional processing time must be added to the RTO to stay within the time limit established by the MTD. The ISCP Coordinator, working with management, should determine the optimum point to recover the information system while balancing the cost of system inoperability against the cost of resources required for restoring the system and its overall support for critical business processes: The longer a disruption is allowed to continue, the more costly it can become. The shorter the RTO, the more expensive the recovery solutions cost to implement. Contingency Planning Guide (NIST SP 800-34) BIA - Determine business processes and recovery criticality Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP See Fig. 3-3. Contingency Planning Guide (NIST SP 800-34) Conduct the Business Impact Analysis Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Three steps are typically involved in accomplishing the BIA: Determine mission/business processes and recovery criticality. Identify resource requirements. Identify recovery priorities for system resources. Contingency Planning Guide (NIST SP 800-34) BIA - Identify resource requirements Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Realistic recovery efforts require a thorough evaluation of the resources required to resume mission/business processes as quickly as possible. Working with management and internal and external POCs associated with the system, the ISCP Coordinator should ensure that the complete information system resources are identified. A simple table such as the one shown in Table 3-1 can be used to capture relevant information system resources. Contingency Planning Guide (NIST SP 800-34) Conduct the Business Impact Analysis Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Three steps are typically involved in accomplishing the BIA: Determine mission/business processes and recovery criticality. Identify resource requirements. Identify recovery priorities for system resources. Contingency Planning Guide (NIST SP 800-34) BIA - Identify recovery priorities for system resources Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Recovery priorities can be effectively established taking into consideration mission/business process criticality, outage impacts, tolerable downtime, and system resources. The result is an information system recovery priority hierarchy. The ISCP Coordinator should consider system recovery measures and technologies to meet the recovery priorities. Contingency Planning Guide (NIST SP 800-34) Information System Contingency Planning Process Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The process is common to all information systems. The seven steps in the process are: Develop the contingency planning policy; Conduct the business impact analysis (BIA); Identify preventive controls; Create contingency strategies; Develop an information system contingency plan; Ensure plan testing, training, and exercises; Ensure plan maintenance. Contingency Planning Guide (NIST SP 800-34) Identify preventive controls Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP In some cases, the outage impacts identified in the BIA may be mitigated or eliminated through preventive measures that deter, detect, and/or reduce impacts to the system. Where feasible and cost-effective, preventive methods are preferable. Some common measures include (see NIST SP 800-53 for more details): Appropriately sized uninterruptible power supplies (UPS) to provide short-term backup power to all system components (including environmental and safety controls). Gasoline- or diesel-powered generators to provide long-term backup power. ... Contingency Planning Guide (NIST SP 800-34) Identify preventive controls Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ... Some common measures include (see NIST SP 800-53 for more details): Appropriately sized uninterruptible power supplies (UPS) to provide short-term backup power to all system components (including environmental and safety controls). Gasoline- or diesel-powered generators to provide long-term backup power. Air-conditioning systems with adequate excess capacity to prevent failure of certain components, such as a compressor Fire suppression systems Fire and smoke detectors Water sensors in the computer room ceiling and floor ... Contingency Planning Guide (NIST SP 800-34) Identify preventive controls Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ... Some common measures include (see NIST SP 800-53 for more details): ... Fire and smoke detectors Water sensors in the computer room ceiling and floor Heat-resistant and waterproof containers for backup media and vital non electronic records Emergency master system shutdown switch Offsite storage of backup media, non electronic records, and system documentation Technical security controls, such as cryptographic key management Frequent scheduled backups including where the backups are stored (onsite or offsite) and how often they are recirculated and moved to storage Contingency Planning Guide (NIST SP 800-34) Information System Contingency Planning Process Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The process is common to all information systems. The seven steps in the process are: Develop the contingency planning policy; Conduct the business impact analysis (BIA); Identify preventive controls; Create contingency strategies; Develop an information system contingency plan; Ensure plan testing, training, and exercises; Ensure plan maintenance. Contingency Planning Guide (NIST SP 800-34) Create contingency strategies Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Contingency strategies are created to cover the full range of backup, recovery, contingency planning, testing, and ongoing maintenance: Backup and recovery Backup methods and offside storage. Alternate sites. Equipment replacement. Cost considerations. Roles and responsibilities Contingency Planning Guide (NIST SP 800-34) Create contingency strategies Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Backup and recovery. Backup methods and offside storage. Alternate sites. Equipment replacement. Cost considerations. Roles and responsibilities Contingency Planning Guide (NIST SP 800-34) Contingency strategies - backup and recovery Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP A variety of recovery approaches may be considered, with the appropriate choice being highly dependent upon the incident, type of system, BIA/FIPS 199 impact level, and the system’s operational requirements. (Chapter 5 of NIST SP 800-34 provides detailed discussion of recovery methods applicable to specific types of information systems.) Several alternative approaches should be considered when developing and comparing strategies, including cost, maximum downtimes, security, recovery priorities, and integration with larger, organization-level contingency plans. Table 3-2 is an example that can assist in identifying the linkage of FIPS 199 impact level for the availability security objective, recovery priority, backup, and recovery strategy. Contingency Planning Guide (NIST SP 800-34) Create contingency strategies Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Backup and recovery. Backup methods and offside storage. Alternate sites. Equipment replacement. Cost considerations. Roles and responsibilities Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Backup Methods and Offsite Storage Compliance and operational security System data should be backed up regularly. Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Policies should specify the minimum frequency and scope of backups (e.g., daily or weekly, incremental or full) based on data criticality and the frequency that new information is introduced. Data backup policies should designate the location of stored data, file-naming conventions, media rotation frequency, and method for transporting data offsite Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Backup Methods and Offsite Storage Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Data may be backed up on: magnetic disk, tape, or optical disks, such as compact disks (CDs). The specific method chosen for conducting backups should be based on system and data availability and integrity requirements. Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Backup Methods and Offsite Storage Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP It is good business practice to store backed-up data offsite. If using offsite storage, data is backed up at the organization’s facility and then labeled, packed, and transported to the storage facility. If the data is required for recovery or testing purposes, the organization contacts the storage facility requesting specific data to be transported to the organization or to an alternate facility. Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Backup Methods and Offsite Storage Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Backup tapes should be tested regularly to ensure that data are being stored correctly and that the files may be retrieved without errors or lost data. Also, the ISCP Coordinator should test the backup tapes at the alternate site, if applicable, to ensure that the site supports the same backup configuration that the organization has implemented. Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Backup Methods and Offsite Storage Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP When selecting an offsite storage facility and vendor, the following criteria should be considered: Geographic area: distance from the organization and the probability of the storage site being affected by the same disaster as the organization’s primary site. Accessibility: length of time necessary to retrieve the data from storage and the storage facility’s operating hours. Security: security capabilities of the shipping method, storage facility, and personnel; all must meet the data’s security requirements. Environment: structural and environmental conditions of the storage facility (i.e., temperature, humidity, fire prevention, and power management controls). Cost: cost of shipping, operational fees, and disaster response/recovery services. Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Alternate Sites Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Table 2-1 summarizes NIST SP 800-53 Contingency Planning controls for information systems. The FIPS 199 security categorization for the availability security objective determines which controls apply to a particular system. Eg., an information system with a moderate-availability security objective requires the system backup and testing the backup. For all FIPS 199 moderate- or high-impact systems, the plan should include a strategy to recover and perform system operations at an alternate facility for an extended period. Contingency Planning Guide (NIST SP 800-34) Create contingency strategies Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Backup and recovery. Backup methods and offside storage. Alternate sites. Equipment replacement. Cost considerations. Roles and responsibilities Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Alternate Sites Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The most common types of alternate sites: Cold Sites are typically facilities with adequate space and infrastructure (electric power, telecommunications connections, and environmental controls) to support information system recovery activities, Warm Sites are partially equipped office spaces that contain some or all of the system hardware, software, telecommunications, and power sources, Hot Sites are facilities appropriately sized to support system requirements and configured with the necessary system hardware, supporting infrastructure, and support personnel. Summary – see Table 3-34. Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Alternate Sites Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Variations or hybrid mixtures of the above are possible. Examples: Mobile Sites are self-contained, transportable shells custom-fitted with specific telecommunications and system equipment necessary to meet system requirements Mirrored Sites are fully redundant facilities with automated real-time information mirroring. Mirrored sites are identical to the primary site in all technical respects. Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Alternate Sites Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Alternate sites may be owned and operated by the organization (internal recovery), or commercial sites may be available under contract. If contracting for the site with a commercial vendor, adequate testing time, work space, security requirements, hardware requirements, telecommunications requirements, support services, and recovery days (how long the organization can occupy the space during the recovery period) must be negotiated and clearly stated in the contract. Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Alternate Sites Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Customers should be aware that multiple organizations may contract with a vendor for the same alternate site; as a result, the site may be unable to accommodate all of the customers if a disaster affects enough of those customers simultaneously. The vendor’s policy on how this situation should be addressed and how priority status is determined should be negotiated. Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Alternate Sites Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Two or more organizations with similar or identical system configurations and backup technologies may enter into a formal agreement to serve as alternate sites for each other or enter into a joint contract for an alternate site. This type of site is set up via a reciprocal agreement or memorandum of understanding (MOU). A reciprocal agreement should be entered into carefully because each site must be able to support the other, in addition to its own workload, in the event of a disaster. Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Alternate Sites Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP This type of agreement requires the recovery sequence for the systems from both organizations to be prioritized from a joint perspective, favorable to both parties. Testing should be conducted at the partnering sites to evaluate the extra processing thresholds, compatible system and backup configurations, sufficient telecommunications connections, compatible security measures, and the sensitivity of data that might be accessible by other privileged users, in addition to functionality of the recovery strategy. Consideration should also be given to system interconnections and possible interconnection security agreements (ISAs). Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Alternate Sites Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP An MOU or an SLA for an alternate site should be developed specific to the organization’s needs and the partner organization’s capabilities. In general, the agreement should address at a minimum, each of the following elements: Contract/agreement duration; Cost/fee structure for disaster declaration and occupancy (daily usage), administration, maintenance, testing, annual cost/fee increases, transportation support cost (receipt and return of offsite data/supplies, as applicable), cost/expense allocation (as applicable), and billing and payment schedules; ... Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Alternate Sites Compliance and operational security ... ... Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Disaster declaration (i.e., circumstances constituting a disaster, notification procedures); Site/facility priority access and/or use; Site availability; Site guarantee; Other clients subscribing to same resources and site, and the total number of site subscribers, as applicable; Contract/agreement change or modification process; ... Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Alternate Sites Compliance and operational security ... ... Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Contract/agreement termination conditions; Process to negotiate extension of service; Guarantee of compatibility; Information system requirements (including data and telecommunication requirements) for hardware, software, and any special system needs (hardware and software); Change management and notification requirements, including hardware, software, and infrastructure; ... Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Alternate Sites Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ... ... Security requirements, including special security needs; Staff support provided/not provided; Facility services provided/not provided (use of onsite office equipment, cafeteria, etc.); Testing, including scheduling, availability, test time duration, and additional testing, if required; Records management (onsite and offsite), including electronic media and hardcopy; Service-level management (performance measures and management of quality of information system services provided); ... Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Alternate Sites Compliance and operational security ... Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ... Work space requirements (e.g., chairs, desks, telephones, personal computers); Supplies provided/not provided (e.g., office supplies); Additional costs not covered elsewhere; Other contractual issues, as applicable; and Other technical requirements, as applicable. Contingency Planning Guide (NIST SP 800-34) Create contingency strategies Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Backup and recovery. Backup methods and offside storage. Alternate sites. Equipment replacement. Cost considerations. Roles and responsibilities Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Equipment replacement Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP If the information system is damaged or destroyed or the primary site is unavailable, necessary hardware and software will need to be activated or procured quickly and delivered to the alternate location. Three basic strategies exist to prepare for equipment replacement. Vendor Agreements; Equipment Inventory; Existing Compatible Equipment. Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Equipment replacement Compliance and operational security Vendor Agreements: Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP As the contingency plan is being developed, SLAs with hardware, software, and support vendors may be made for emergency maintenance service. The SLA should specify how quickly the vendor must respond after being notified. The agreement should also give the organization priority status for the shipment of replacement equipment over equipment being purchased for normal operations. Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Equipment replacement Compliance and operational security Vendor Agreements: Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP SLAs should further discuss what priority status the organization will receive in the event of a catastrophic disaster involving multiple vendor clients. In such cases, organizations with health- and safety-dependent processes will often receive the highest priority for shipment. The details of these negotiations should be documented in the SLA, which should be maintained with the contingency plan. Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Equipment replacement Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Equipment Inventory: Required equipment may be purchased in advance and stored at a secure offsite location, such as an alternate site where recovery operations will take place (warm or mobile site) or at another location where they will be stored and then shipped to the alternate site. This solution has certain drawbacks. An organization must commit financial resources to purchase this equipment in advance, and the equipment could become obsolete or unsuitable for use over time because system technologies and requirements change. Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Equipment replacement Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Existing Compatible Equipment: Equipment currently housed and used by the contracted hot site or by another organization within the organization may be used. Agreements made with hot sites and reciprocal internal sites stipulate that similar and compatible equipment will be available for contingency use by the organization. Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Equipment replacement Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP When evaluating the choices: the ISCP Coordinator should consider that purchasing equipment when needed is cost-effective but can add significant overhead time to recovery while waiting for shipment and setup; conversely, storing unused equipment is costly, but allows recovery operations to begin more quickly. When selecting the most appropriate strategy, note that the availability of transportation may be limited or temporarily halted in the event of a catastrophic disaster. ... Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Equipment replacement Compliance and operational security When evaluating the choices: Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ... Based on impacts discovered through the BIA, consideration should be given to the possibility of a widespread disaster entailing mass equipment replacement and transportation delays that would extend the recovery period. Regardless of the strategy selected, detailed lists of equipment needs and specifications should be maintained within the contingency plan. Contingency Planning Guide (NIST SP 800-34) Create contingency strategies Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Backup and recovery. Backup methods and offside storage. Alternate sites. Equipment replacement. Cost considerations. Roles and responsibilities Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Cost considerations Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The ISCP Coordinator should ensure that the strategy chosen can be implemented effectively with available personnel and financial resources. The cost of each type of alternate site, equipment replacement, and storage option under consideration should be weighed against budget limitations. The coordinator should determine known contingency planning expenses, such as alternate site contract fees, the cost of implementing an agency-wide contingency awareness program and contractor support. ... Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Cost considerations Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ... The budget must be sufficient to encompass software, hardware, travel and shipping, testing, plan training programs, awareness programs, labor hours, other contracted services, and any other applicable resources (e.g., desks, telephones, fax machines, pens, and paper). The organization should perform a cost-benefit analysis to identify the optimum contingency strategy. Table 3-5 provides a template for evaluating cost considerations. Contingency Planning Guide (NIST SP 800-34) Create contingency strategies Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Backup and recovery. Backup methods and offside storage. Alternate sites. Equipment replacement. Cost considerations. Roles and responsibilities Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Roles and responsibilities Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Having selected and implemented the backup and system recovery strategies, the ISCP Coordinator must designate appropriate teams to implement the strategy. Each team should be trained and ready to respond in the event of a disruptive situation requiring plan activation. Recovery personnel should be assigned to one of several specific teams that will respond to the event, recover capabilities, and return the system to normal operations. To do so, recovery team members need to clearly understand the team’s recovery effort goal, individual procedures the team will execute, and how interdependencies between recovery teams may affect overall strategies. Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Roles and responsibilities Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The types of teams required are based on the information system affected and could be tailored according to FIPS 199 impact levels to reflect specific differences in requirements and backup procedures. The size of each team, team titles, and hierarchy designs depend on the organization. ... Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Roles and responsibilities Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ... In addition to a single authoritative role for overall decision-making responsibility, including plan activation, a capable strategy will require some or all of the following groups: Management team (including the ISCP Coordinator); Outage assessment team; Operating system administration team; Server recovery team (e.g., client server, Web server); ... Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Roles and responsibilities Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP In addition to a single authoritative role for overall decision-making responsibility, including plan activation, a capable strategy will require some or all of the following groups: ... Local Area Network/Wide Area Network (LAN/WAN) recovery team; Database recovery team; Network operations recovery team; Application recovery team(s); ... Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Roles and responsibilities Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP In addition to a single authoritative role for overall decision-making responsibility, including plan activation, a capable strategy will require some or all of the following groups: ... Telecommunications team; Test team; Transportation and relocation team; Media relations team; Legal affairs team; Physical/personnel security team; and Procurement team (equipment and supplies). Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Roles and responsibilities Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Personnel should be chosen to staff these teams based on their skills and knowledge. Ideally, teams are staffed with personnel responsible for the same or similar functions under normal conditions. For example, server recovery team members should include the server administrators. Team members must understand not only the contingency plan purpose, but also the procedures necessary for executing the recovery strategy. ... Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Roles and responsibilities Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ... Teams should be sufficient in size to remain viable if some members are unavailable to respond or alternate team members may be designated. Similarly, team members should be familiar with the goals and procedures of other teams to facilitate cross-team coordination. The ISCP Coordinator should also consider that a disruption could render some personnel unavailable to respond. In this situation, executing the plan may be possible only by using personnel from another geographic area of the organization or by hiring contractors or vendors. Such personnel may be coordinated and trained as an alternate team Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Roles and responsibilities Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Each team is led by a team leader who directs overall team operations, acts as the team’s representative to management, and liaises with other team leaders. The team leader disseminates information to team members and approves any decisions that must be made within the team. Team leaders should have a designated alternate to act as the leader if the primary leader is unavailable. Contingency Planning Guide (NIST SP 800-34) Contingency strategies - Roles and responsibilities Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP For most systems, a management team is necessary for providing overall guidance following a major system disruption or emergency. The team is responsible for activating the contingency plan and supervising the execution of contingency operations. The management team also facilitates communications among other teams and supervises information system contingency plan tests and exercises. Some or all of the management team may lead specialized recovery teams. A senior management official, such as the CIO, has the ultimate authority to activate the plan and to make decisions regarding spending levels, acceptable risk, and interagency coordination. The senior management official typically leads the management team. Contingency Planning Guide (NIST SP 800-34) Information System Contingency Planning Process Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The process is common to all information systems. The seven steps in the process are: Develop the contingency planning policy; Conduct the business impact analysis (BIA); Identify preventive controls; Create contingency strategies; Develop an information system contingency plan; Ensure plan testing, training, and exercises; Ensure plan maintenance. Contingency Planning Guide (NIST SP 800-34) Information System Contingency Planning Process Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The process is common to all information systems. The seven steps in the process are: Develop the contingency planning policy; Conduct the business impact analysis (BIA); Identify preventive controls; Create contingency strategies; Develop an information system contingency plan; Ensure plan testing, training, and exercises; Ensure plan maintenance. Contingency Planning Guide (NIST SP 800-34) Ensure plan testing, training, and exercises Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP An ISCP should be maintained in a state of readiness. That includes: having personnel trained to fulfill their roles and responsibilities within the plan, having plans exercised to validate their content, having systems and system components tested to ensure their operability in the environment specified in the ISCP In addition, as indicated in Step 4 (Assess Security Controls) of the Risk Management Framework (RMF is described in draft NIST SP 800-39, Managing Risk from Information Systems: An Organizational Perspective) the effectiveness of the information system controls should be assessed by using the procedures documented in NIST SP 800-53A (Guide for Assessing the Security Controls in Federal Information Systems). ... Contingency Planning Guide (NIST SP 800-34) Ensure plan testing, training, and exercises Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ... IST SP 800-84, Guide to Test, Training and Exercise Programs for Information Technology Plans and Capabilities, provides guidelines on designing, developing, conducting, and evaluating test, training, and exercise (TT&E) events so that organizations can improve their ability to prepare for, respond to, manage, and recover from adverse events. While the majority of TT&E activities occur during the Operations/Maintenance phase, initial TT&E events should be conducted during the Implementation/Assessment phase of the SDLC (system development life cycle) to validate ISCP recovery procedures. ... Contingency Planning Guide (NIST SP 800-34) Ensure plan testing, training, and exercises Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ... Organizations should conduct TT&E events periodically, following organizational or system changes, or the issuance of new TT&E guidance, or as otherwise needed. Execution of TT&E events assists organizations in determining the plan’s effectiveness, and that all personnel know what their roles are in the conduct of each information system plan. TT&E event schedules are often dictated in part by organizational requirements. For example, NIST SP 800-53 includes a control (CP-4) for federal organizations to conduct exercises or tests for their systems’ contingency plans around an organization-defined frequency. Contingency Planning Guide (NIST SP 800-34) Ensure plan testing, training, and exercises Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ... For each TT&E activity conducted, results are documented in an after-action report, and Lessons Learned corrective actions are captured for updating information in the ISCP. While NIST SP 800-84 provides detailed information on how to plan and conduct TT&E activities for information systems, the following sections provide summarized details: Testing Training Exercises TT&E Program Summary Contingency Planning Guide (NIST SP 800-34) Ensure plan testing, training, and exercises Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP TT&E: Testing Training Exercises TT&E Program Summary Contingency Planning Guide (NIST SP 800-34) Ensure TT&E - Testing Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ISCP testing is a critical element of a viable contingency capability. Testing enables plan deficiencies to be identified and addressed by validating one or more of the system components and the operability of the plan. Testing can take on several forms and accomplish several objectives but should be conducted in as close to an operating environment as possible. Each information system component should be tested to confirm the accuracy of individual recovery procedures. Contingency Planning Guide (NIST SP 800-34) Ensure TT&E - Testing Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The following areas should be addressed in a contingency plan test, as applicable: Notification procedures; System recovery on an alternate platform from backup media; Internal and external connectivity; System performance using alternate equipment; Restoration of normal operations Other plan testing (where coordination is identified, i.e., COOP, BCP). Contingency Planning Guide (NIST SP 800-34) Ensure TT&E - Testing Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The following areas should be addressed in a contingency plan test, as applicable: Notification procedures; System recovery on an alternate platform from backup media; Internal and external connectivity; System performance using alternate equipment; Restoration of normal operations Other plan testing (where coordination is identified, i.e., COOP, BCP). Contingency Planning Guide (NIST SP 800-34) Ensure TT&E - Testing Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP To derive the most value from the test, the ISCP Coordinator should develop a test plan designed to examine the selected element(s) against explicit test objectives and success criteria. The use of test objectives and success criteria enable the effectiveness of each system element and the overall plan to be assessed. The test plan should include a schedule detailing the time frames for each test and test participants. The test plan should also clearly delineate scope, scenario, and logistics. The scenario chosen may be a worst-case incident or an incident most likely to occur. It should mimic reality as closely as possible. Contingency Planning Guide (NIST SP 800-34) Ensure TT&E - Testing Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Tests are evaluation tools that use quantifiable metrics to validate the operability of an information system or system component in an operational environment. For example, an organization could test call tree lists to determine if calling can be executed within prescribed time limits; another test may be removing power from a system or system component. A test is conducted in as close to an operational environment as possible; if feasible, an actual test of the components or systems used to conduct daily operations for the organization should be used (Consideration should be given to Industrial Control Systems, where systems have a need for real-time response and extremely high availability, predictability, and reliability. Thorough testing of these systems may not be possible during a single testing event.). Contingency Planning Guide (NIST SP 800-34) Ensure TT&E - Testing Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The scope of testing can range from individual system components or systems to comprehensive tests of all systems and components that support an ISCP. Tests often focus on recovery and backup operations; however, testing varies depending on the FIPS 199 impact level, the goal of the test, and its relation to a specific ISCP. Contingency Planning Guide (NIST SP 800-34) Ensure plan testing, training, and exercises Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP TT&E: Testing Training Exercises TT&E Program Summary Contingency Planning Guide (NIST SP 800-34) Ensure TT&E - Training Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Training for personnel with contingency plan responsibilities should focus on familiarizing them with ISCP roles and teaching skills necessary to accomplish those roles. This approach helps ensure that staff is prepared to participate in tests and exercises as well as actual outage events. Training should be provided at least annually. Personnel newly appointed to ISCP roles should receive training shortly thereafter. Ultimately, ISCP personnel should be trained to the extent that that they are able to execute their respective recovery roles and responsibilities without aid of the actual ISCP document (important!: in the event that paper or electronic versions of the plan are unavailable for the first few hours, as a result of the disruption). Contingency Planning Guide (NIST SP 800-34) Ensure TT&E - Training Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Recovery personnel should be trained on the following plan elements: Purpose of the plan; Cross-team coordination and communication; Reporting procedures; Security requirements; Team-specific processes (Activation and Notification, Recovery, and Reconstitution Phases); and Individual responsibilities (Activation and Notification, Recovery, and Reconstitution Phases). Contingency Planning Guide (NIST SP 800-34) Ensure TT&E - Training Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP For the purposes of NIST SP 800-34 publication and as documented in NIST SP 800-84, training refers only to informing personnel of their roles and responsibilities within a particular information system plan and teaching them skills related to those roles and responsibilities, thereby preparing them for participation in exercises, tests, and actual emergency situations related to the ISCP. Training personnel on their roles and responsibilities before an exercise or test event is typically split between a presentation on their roles and responsibilities and activities that allow personnel to demonstrate their understanding of the subject matter. Contingency Planning Guide (NIST SP 800-34) Ensure plan testing, training, and exercises Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP TT&E: Testing Training Exercises TT&E Program Summary Contingency Planning Guide (NIST SP 800-34) Ensure TT&E - Exercises Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP NIST SP 800-84 identifies the following types of exercises widely used in information system TT&E programs by single organizations: Tabletop Exercises Functional Exercises Contingency Planning Guide (NIST SP 800-34) Ensure TT&E - Exercises/Tabletop Exercises Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Tabletop exercises are discussion-based exercises where personnel meet in a classroom setting or in breakout groups to discuss their roles during an emergency and their responses to a particular emergency situation. A facilitator presents a scenario and asks the exercise participants questions related to the scenario, which initiates a discussion among the participants of roles, responsibilities, coordination, and decision making. A tabletop exercise is discussion-based only and does not involve deploying equipment or other resources. Contingency Planning Guide (NIST SP 800-34) Ensure TT&E - Exercises/Functional Exercises Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Functional exercises allow personnel to validate their operational readiness for emergencies by performing their duties in a simulated operational environment. Information security risk communication Functional exercises are designed to exercise the roles and responsibilities of specific team members, procedures, and assets involved in one or more functional aspects of a plan (e.g., communications, emergency notifications, system equipment setup). Information security risk monitoring and review ... Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Contingency Planning Guide for Federal Information Systems (NIST SP Contingency Planning Guide (NIST SP 800-34) Ensure TT&E - Exercises/Functional Exercises Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ... Functional exercises vary in complexity and scope, from validating specific aspects of a plan to full-scale exercises that address all plan elements (Planned and unplanned maintenance activities may also present opportunities to execute and document a Functional Exercise. This is often applicable to operational systems (such as ICS) where it may be otherwise disruptive to test certain aspects of the system or contingency plan). Functional exercises allow staff to execute their roles and responsibilities as they would in an actual emergency situation, but in a simulated manner. Contingency Planning Guide (NIST SP 800-34) Ensure TT&E - Exercises Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP An exercise is a simulation of an emergency designed to validate the viability of one or more aspects of an ISCP. In an exercise, personnel with roles and responsibilities in a particular ISCP meet to validate the content of a plan through discussion of their roles and their responses to emergency situations, execution of responses in a simulated operational environment, or other means of validating responses that do not involve using the actual operational environment. Exercises are scenario-driven, such as a power failure in one of the organization’s data centers or a fire causing certain systems to be damaged, with additional situations often being presented during the course of an exercise. Contingency Planning Guide (NIST SP 800-34) Ensure plan testing, training, and exercises Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP TT&E: Testing Training Exercises TT&E Program Summary Contingency Planning Guide (NIST SP 800-34) Ensure TT&E - TT&E Program Summary Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP A TT&E program provides an overall framework for determining, scheduling, and setting objectives for TT&E activities. Guidance on establishing an effective ISCP TT&E program and the various methods and approaches for conducting TT&E activities is provided in NIST SP 800-84. The depth and rigor of ISCP TT&E activities increases with the FIPS 199 availability security objective. All tests and exercises should include some kind of determination of the effects on the organization’s operations and provide for a mechanism to update and improve the plan as a result. Contingency Planning Guide (NIST SP 800-34) Ensure TT&E - TT&E Program Summary Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Each of the three ISCP Templates (FIPS 199 low, moderate, and high) included as appendices to NIST SP 800-34 contain details for conducting TT&E activities appropriate to their respective impact level – see page 30 of NIST SP 800-34. Contingency Planning Guide (NIST SP 800-34) Information System Contingency Planning Process Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The process is common to all information systems. The seven steps in the process are: Develop the contingency planning policy; Conduct the business impact analysis (BIA); Identify preventive controls; Create contingency strategies; Develop an information system contingency plan; Ensure plan testing, training, and exercises; Ensure plan maintenance. Contingency Planning Guide (NIST SP 800-34) Ensure plan maintenance Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP To be effective, the plan must be maintained in a ready state that accurately reflects system requirements, procedures, organizational structure, and policies. uring the Operation/Maintenance phase of the SDLC (System Development Life Cycle), information systems undergo frequent changes because of shifting business needs, technology upgrades, or new internal or external policies. Therefore, it is essential that the ISCP be reviewed and updated regularly as part of the organization’s change management process. Contingency Planning Guide (NIST SP 800-34) Ensure plan maintenance Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP As identified as part of RMF (Risk Management Framework) Step 6 (Continuous Monitoring), a continuous monitoring process can provide organizations with an effective tool for plan maintenance, producing ongoing updates to security plans, security assessment reports, and plans of action and milestone documents. As a general rule, the plan should be reviewed for accuracy and completeness at an organization-defined frequency or whenever significant changes occur to any element of the plan. Certain elements, such as contact lists, will require more frequent reviews. The plans for moderate- or high-impact systems should be reviewed more often. Contingency Planning Guide (NIST SP 800-34) Ensure plan maintenance Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP At a minimum, plan reviews should focus on the following elements: Operational requirements; Security requirements; Technical procedures; Hardware, software, and other equipment (types, specifications, and amount); Names and contact information of team members; Names and contact information of vendors, including alternate and offsite vendor POCs; Alternate and offsite facility requirements; and Vital records (electronic and hardcopy). Contingency Planning Guide (NIST SP 800-34) Ensure plan maintenance Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Because the ISCP contains potentially sensitive operational and personnel information, its distribution should be marked accordingly and controlled. Typically, copies of the plan are provided to recovery personnel for storage. A copy should also be stored at the alternate site and with the backup media. Storing a copy of the plan at the alternate site ensures its availability and good condition in the event local plan copies cannot be accessed because of disaster. The ISCP Coordinator should maintain a record of copies of the plan and to whom they were distributed. Other information that should be stored with the plan includes contracts with vendors (SLAs and other contracts), software licenses, system user manuals, security manuals, and operating procedures. Contingency Planning Guide (NIST SP 800-34) Ensure plan maintenance Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Changes made to the plan, strategies, and policies should be coordinated through the ISCP Coordinator, who should communicate changes to the representatives of associated plans or programs, as necessary. The ISCP Coordinator should record plan modifications using a record of changes, which lists the page number, change comment, and date of change. The record of changes, depicted in Table 3-7, should be integrated into the plan as discussed in Section 4.1 of NIST SP 800-34. Contingency Planning Guide (NIST SP 800-34) Ensure plan maintenance Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The ISCP Coordinator should coordinate frequently with associated internal and external organizations and system POCs to ensure that impacts caused by changes within any organization will be reflected in the contingency plan. Strict version control must be maintained by requesting old plans or plan pages to be returned to the ISCP Coordinator in exchange for the new plan or plan pages. The ISCP Coordinator also should evaluate supporting information to ensure that the information is current and continues to meet system requirements adequately. Contingency Planning Guide (NIST SP 800-34) Ensure plan maintenance Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP This information includes the following: Alternate site contract, including testing times; Offsite storage contract; Software licenses; MOUs or vendor SLAs; Hardware and software requirements; ... Contingency Planning Guide (NIST SP 800-34) Ensure plan maintenance Compliance and operational security This information includes the following: Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ... System interconnection agreements; Security requirements; Recovery strategy; Contingency policies; Training and awareness materials; Testing scope; and Other plans, e.g., COOP, BCP. Contingency Planning Guide (NIST SP 800-34) Ensure plan maintenance Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Although some changes may be quite visible, others will require additional analysis. When a significant change occurs, the BIA should be updated with the new information to identify new contingency requirements or priorities. As new technologies become available, preventive controls may be enhanced and recovery strategies may be modified. Finally, plan maintenance should be continued as the information system passes through the Disposal phase of its life cycle to ensure that the plan accurately reflects recovery priorities and concurrent processing changes. Contingency Planning Guide (NIST SP 800-34) Information System Contingency Planning Process Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The process is common to all information systems. The seven steps in the process are: Develop the contingency planning policy; Conduct the business impact analysis (BIA); Identify preventive controls; Create contingency strategies; Develop an information system contingency plan; Ensure plan testing, training, and exercises; Ensure plan maintenance. Contingency Planning Guide (NIST SP 800-34) Develop an information system contingency plan Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ISCP development is a critical step in the process of implementing a comprehensive contingency planning program. The plan contains detailed roles, responsibilities, teams, and procedures associated with restoring an information system following a disruption. The ISCP should document technical capabilities designed to support contingency operations and should be tailored to the organization and its requirements. Plans need to balance detail with flexibility; usually, the more detailed the plan, the less scalable and versatile the approach. Contingency Planning Guide (NIST SP 800-34) Develop an information system contingency plan Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Appendix A of NIST SP 800-34 provides templates that organizations may use to develop ISCPs for their information systems at the appropriate FIPS 199 impact level. The information and templates provided are guides and may be modified, customized, and/or adapted as necessary to best meet the specific system, operational, and organizational requirements for contingency planning. Appendix D discusses planning considerations regarding personnel which should be coordinated with the ISCP development. Contingency Planning Guide (NIST SP 800-34) Develop an information system contingency plan Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Figure 4-1 of NIST SP 800-34 identifies five main components of the contingency plan. The supporting information and plan appendices provide essential information to ensure a comprehensive plan. The Activation and Notification, Recovery, and Reconstitution Phases address specific actions that the organization should take following a system disruption or emergency. Each plan component is discussed on the subsequent slides. Contingency Planning Guide (NIST SP 800-34) Develop an information system contingency plan Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Plans should be formatted to provide quick and clear directions in the event that personnel unfamiliar with the plan or the systems are called on to perform recovery operations. Plans should be clear, concise, and easy to implement in an emergency. Where possible, checklists and step-by-step procedures should be used. A concise and well-formatted plan reduces the likelihood of creating an overly complex or confusing plan. Contingency Planning Guide (NIST SP 800-34) Develop an information system contingency plan Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Plan components Supporting Information. Activation and Notification Phase. Recovery Phase. Reconstitution Phase. Appendices. Contingency Planning Guide (NIST SP 800-34) Develop an information system contingency plan Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Plan components Supporting Information. Activation and Notification Phase. Recovery Phase. Reconstitution Phase. Appendices. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Supporting Information Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The supporting information component includes an introduction and concept of operations section providing essential background or contextual information that makes the contingency plan easier to understand, implement, and maintain. These details aid in understanding the applicability of the guidance, in making decisions on how to use the plan, and in providing information on where associated plans and information outside the scope of the plan may be found. The introduction section orients the reader to the type and location of information contained in the plan. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Supporting Information Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Introduction section: Generally, the section includes the background scope assumptions Such plan format is meant to guide the contingency plan developer. Individuals may choose to add, delete, or modify this format as required, to best fit the system and organization’s contingency planning requirements. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Supporting Information Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Introduction section: Background: This subsection establishes the reason for developing the ISCP and defines the plan objectives. Scope: The scope identifies the FIPS 199 impact level and associated RTOs as well as the alternate site and data storage capabilities (as applicable). Assumptions: This section includes the list of assumptions that were used in developing the ISCP as well as a list of situations that are not applicable. See Appendix A Sample Information System Contingency Plan Templates, for a sample of assumptions and situations. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Supporting Information Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Concept of operations section: The section provides additional details about the information system: the three phases of the contingency plan (Activation and Notification, Recovery, and Reconstitution), a description of the information system contingency plan roles and responsibilities. This section may include the following subsections: system description, overview of three phases, roles and responsibilities. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Supporting Information Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Concept of operations section - system description subsection: It is necessary to include a general description of the information system addressed by the contingency plan. The description should include the information system architecture, location(s), and any other important technical considerations. An input/output (I/O) diagram and system architecture diagram, including security devices (e.g., firewalls, internal and external connections) are useful. The content for the system description can usually be taken from the System Security Plan (NIST SP 800-18, Rev. 1, Guide for Developing Security Plans for Federal Information Systems, contains details concerning information system documentation). Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Supporting Information Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Concept of operations section - overview of three phases subsection: The ISCP recovery is implemented in three phases: Activation and Notification Recovery Reconstitution Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Supporting Information Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Concept of operations section - roles and responsibilities subsection: This section presents the overall structure of contingency teams, including the hierarchy and coordination mechanisms and requirements among the teams. The section also provides an overview of team member roles and responsibilities in a contingency situation. Teams and team members should be designated for specific response and recovery roles during contingency plan activation. Contingency Planning Guide (NIST SP 800-34) Develop an information system contingency plan Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Plan components Supporting Information. Activation and Notification Phase. Recovery Phase. Reconstitution Phase. Appendices. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Activation and Notification Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The phase defines initial actions taken once a system disruption or outage has been detected or appears to be imminent. This phase includes activities to notify recovery personnel, conduct an outage assessment, and activate the plan. At the completion of the Activation and Notification Phase, ISCP staff will be prepared to perform recovery measures to restore system functions. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Activation and Notification Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Activation and Notification: Activation Criteria and Procedure Notification Procedures Outage Assessment Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Activation and Notification Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Activation and Notification: Activation Criteria and Procedure Notification Procedures Outage Assessment Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Activation and Notification Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Activation Criteria and Procedure The ISCP should be activated if one or more of the activation criteria for that system are met. If an activation criterion is met, the designated authority should activate the plan. The designated authority (typically a senior manager or CIO) has the authority to activate the contingency plan. That authority may vary based on the organization or system, but the individual with this authority should be designated clearly in the plan. Only one individual should have this authority, and a successor should be clearly identified to assume that responsibility if necessary. Activation criteria for system outages or disruptions are unique for each organization and should be stated in the contingency planning policy. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Activation and Notification Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Activation Criteria and Procedure. Criteria may be based on: Extent of any damage to the system (e.g., physical, operational, or cost) Criticality of the system to the organization’s mission (e.g., critical infrastructure protection asset) Expected duration of the outage lasting longer than the RTO The appropriate recovery teams may be notified once the system outage or disruption has been identified and the ISCP Coordinator has determined that activation criteria have been met. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Activation and Notification Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Activation and Notification: Activation Criteria and Procedure Notification Procedures Outage Assessment Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Activation and Notification Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Notification Procedures: An outage or disruption may occur with or without prior notice. For example, advance notice is often given that a hurricane is predicted to affect an area or that a computer virus is expected on a certain date. However, there may be no notice of equipment failure or a criminal act. Notification procedures should be documented in the plan for both types of situation. The procedures should describe the methods used to notify recovery personnel during business and non business hours. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Activation and Notification Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Notification Procedures: Prompt notification is important for reducing the effects of a disruption on the system. In some cases, it may provide enough time to allow system personnel to shut down the system gracefully to avoid a hard crash. ... Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Activation and Notification Phase Compliance and operational security Notification Procedures: ... Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Following the outage or disruption, notification should be sent to the Outage Assessment Team (The Outage Assessment Team is a representative title. Depending on how the organization establishes their roles and responsibilities, other names and titles may be used) so that it may determine the status of the situation and appropriate next steps. Outage assessment procedures are described further. When outage assessment is complete, the appropriate recovery and system support personnel should be notified. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Activation and Notification Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Notification Procedures: Notifications can be accomplished through a variety of methods, either automated or manual and include telephone, pager, electronic mail (email), cell phone, and messaging. Automated notification systems follow established protocols and criteria and can include rapid authentication and acceptance and secure messaging. Automated notification systems require up-front investment and learning curve, but may be an effective way for some organizations to ensure prompt and accurate delivery. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Activation and Notification Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Notification Procedures: Notifications sent via email should be done with caution because there is no way to ensure receipt and acknowledgement. Although email has potential as an effective method of disseminating notifications to work or personal accounts, there is no way to guarantee that the message will be read. If using an email notification method, recovery personnel should be informed of the necessity to frequently and regularly check their accounts. Notifications sent during business hours should be sent to the work address, whereas personal email messaging may be useful in the event that the local area network (LAN) is down. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Activation and Notification Phase Compliance and operational security Notification Procedures: Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment The notification strategy should define procedures to be followed in the event that specific personnel cannot be contacted. Notification procedures should be documented clearly in the contingency plan. Information security risk communication Copies of the procedures can be made and located securely at alternate locations. Information security risk monitoring and review A common manual notification method is a call tree. Information security risk acceptance Contingency Planning Guide for Federal Information Systems (NIST SP Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Activation and Notification Phase Compliance and operational security Notification Procedures: Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The call tree technique involves assigning notification duties to specific individuals, who in turn are responsible for notifying other recovery personnel. The call tree should account for primary and alternate contact methods and should discuss procedures to be followed if an individual cannot be contacted. Figure 4-2 (NIST SP 800-34) presents a sample call tree. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Activation and Notification Phase Compliance and operational security Notification Procedures: Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Personnel to be notified should be clearly identified in the contact lists appended to the plan. This list should identify personnel by their team position, name, and contact information (e.g., home, work, cell phone, email addresses, and home addresses). An entry may resemble the format depicted on page 38 of NIST SP 800-34. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Activation and Notification Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Notification Procedures: Notifications also should be sent to POCs of external organizations or interconnected system partners that may be adversely affected if they are unaware of the situation. Depending on the type of outage or disruption, the POC may have recovery responsibilities. For each system interconnection with an external organization, a POC should be identified. These POCs should be listed in an appendix to the plan. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Activation and Notification Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Notification Procedures: The type of information to be relayed to those being notified should be documented in the plan. The amount and detail of information relayed may depend on the specific team being notified. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Activation and Notification Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Notification Procedures. As necessary, notification information may include the following: Nature of the outage or disruption that has occurred or is impending; Any known outage estimates; Response and recovery details; Where and when to convene for briefing or further response instructions; Instructions to prepare for relocation for estimated time period (if applicable) Instructions to complete notifications using the call tree (if applicable). Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Activation and Notification Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Activation and Notification: Activation Criteria and Procedure Notification Procedures Outage Assessment Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Activation and Notification Phase Compliance and operational security Outage Assessment: Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP To determine how the ISCP will be implemented following a system disruption or outage, it is essential to assess the nature and extent of the disruption. The outage assessment should be completed as quickly as the given conditions permit, with personnel safety remaining the highest priority. When possible, the Outage Assessment Team is the first team notified of the disruption. Contingency Planning Guide (NIST SP 800-34) ISCP - Activation and Notification Phase - Outage Assessment Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Outage assessment procedures may be unique for the particular system, but the following minimum areas should be addressed: Cause of the outage or disruption; Potential for additional disruptions or damage; Status of physical infrastructure (e.g., structural integrity of computer room, condition of electric power, telecommunications, and heating, ventilation and air-conditioning [HVAC]); Inventory and functional status of system equipment (e.g., fully functional, partially functional, nonfunctional); ... Contingency Planning Guide (NIST SP 800-34) ISCP - Activation and Notification Phase - Outage Assessment Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Outage assessment procedures may be unique for the particular system, but the following minimum areas should be addressed: ... Type of damage to system equipment or data (e.g., water, fire and heat, physical impact, electrical surge); Information security risk communication Items to be replaced (e.g., hardware, software, firmware, supporting materials); Information security risk monitoring and review Estimated time to restore normal services. Information security risk acceptance Contingency Planning Guide for Federal Information Systems (NIST SP Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Activation and Notification Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Outage Assessment: Personnel with outage assessment responsibilities should understand and be able to perform these procedures in the event the plan is inaccessible during the situation. Once impact to the system has been determined, the appropriate teams should be notified of updated information and the planned response to the situation. Based upon the results of the outage assessment, ISCP notifications may be revisited and expanded using the procedures described in “Notification Procedures” section. Contingency Planning Guide (NIST SP 800-34) Develop an information system contingency plan Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Plan components Supporting Information. Activation and Notification Phase. Recovery Phase. Reconstitution Phase. Appendices. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Recovery Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Formal recovery operations begin after the ISCP has been activated, outage assessments have been completed (if possible), personnel have been notified, and appropriate teams have been mobilized. Recovery Phase activities focus on implementing recovery strategies to restore system capabilities, repair damage, and resume operational capabilities at the original or new alternate location. At the completion of the Recovery Phase, the information system will be functional and capable of performing the functions identified in the plan. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Recovery Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Depending on the recovery strategies defined in the plan, these functions (i.e., the functions identified in the plan) could include temporary manual processing, recovery and operation at an alternate system, or relocation and recovery at an alternate site. It is feasible that only system resources identified as high priority in the BIA will be recovered at this stage. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Recovery Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The following aspects shall be discussed: Sequence of Recovery Activities Recovery Procedures Recovery Escalation and Notification Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Recovery Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Sequence of Recovery Activities Recovery Procedures Recovery Escalation and Notification Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Recovery Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Sequence of Recovery Activities: When recovering a complex system, such as a wide area network (WAN) or virtual local area network (VLAN) involving multiple independent components, recovery procedures should reflect system priorities identified in the BIA. The sequence of activities should reflect the system’s Maximum Tolerable Downtime (MTD) to avoid significant impacts to related systems. Procedures should be written in a stepwise, sequential format so system components may be restored in a logical manner. For example, if a LAN is being recovered after a disruption, then the most critical servers should be recovered before other, less critical devices, such as printers. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Recovery Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Sequence of Recovery Activities: Similarly, to recover an application server, procedures first should address operating system restoration and verification before the application and its data are recovered. The procedures should also include escalation steps and instructions to coordinate with other teams where relevant when certain situations occur, such as: An action is not completed within the expected time frame; A key step has been completed; Item(s) must be procured; Other system-specific concerns exist. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Recovery Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Sequence of Recovery Activities: If conditions require the system to be recovered at an alternate site, certain materials will need to be transferred or procured. These items may include shipment of data backup media from offsite storage, hardware, copies of the recovery plan, and software programs. Procedures should designate the appropriate team or team members to coordinate shipment of equipment, data, and vital records. References to applicable appendices, such as equipment lists or vendor contact information, should be made in the plan where necessary. Procedures should clearly describe requirements to package, transport, and purchase materials required to recover the system. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Recovery Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Sequence of Recovery Activities Recovery Procedures Recovery Escalation and Notification Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Recovery Phase Compliance and operational security Recovery Procedures: Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP To facilitate Recovery Phase operations, the ISCP should provide detailed procedures to restore the information system or components to a known state. Given the extensive variety of system types, configurations, and applications, this planning guide does not provide specific recovery procedures. Recovery considerations are detailed for each of the platform types in Chapter 5 of NIST SP 800-34. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Recovery Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Procedures should be assigned to the appropriate recovery team and typically address the following actions: Obtaining authorization to access damaged facilities and/or geographic area; Notifying internal and external business partners associated with the system; Obtaining necessary office supplies and work space; Obtaining and installing necessary hardware components; ... Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Recovery Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Procedures should be assigned to the appropriate recovery team and typically address the following actions: ... Obtaining and loading backup media; Restoring critical operating system and application software; Restoring system data to a known state; Testing system functionality including security controls; Connecting system to network or other external systems; and Operating alternate equipment successfully. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Recovery Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Recovery Procedures: Recovery procedures should be written in a straightforward, step-by-step style. To prevent difficulty or confusion in an emergency, no procedural steps should be assumed or omitted. A checklist format is useful for documenting the sequential recovery procedures and for troubleshooting problems if the system cannot be recovered properly. Figure 4-3 in NIST SP 800-34 provides a partial example of a procedural checklist for a LAN Recovery Team. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Recovery Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Sequence of Recovery Activities Recovery Procedures Recovery Escalation and Notification Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Recovery Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Recovery Escalation and Notification: As identified as part of the BIA, system components, infrastructure, and associated facilities are critical components supporting daily mission/business processes. The systems, applications, and infrastructure that connect users to these are subject to events causing service interruptions and outages. Including an escalation and notification component within the Recovery Phase helps to ensure that overall, a repeatable, structured, consistent, and measurable recovery process is followed. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Recovery Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Recovery Escalation and Notification: Effective escalation and notification procedures should define and describe the events, thresholds, or other types of triggers that are necessary for additional action. Actions would include additional notifications for more recovery staff, messages and status updates to leadership, and notices for additional resources. Procedures should be included to establish a clear set of events, actions and results, and should be documented for teams or individuals as appropriate. Contingency Planning Guide (NIST SP 800-34) Develop an information system contingency plan Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Plan components Supporting Information. Activation and Notification Phase. Recovery Phase. Reconstitution Phase. Appendices. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Reconstitution Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The Reconstitution Phase is the third and final phase of ISCP implementation and defines the actions taken to test and validate system capability and functionality. During Reconstitution, recovery activities are completed and normal system operations are resumed. If the original facility is unrecoverable, the activities in this phase can also be applied to preparing a new permanent location to support system processing requirements. This phase consists of two major activities: validating successful recovery and deactivation of the plan. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Reconstitution Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Validation of recovery typically includes these steps: Concurrent Processing. Validation Data Testing. Validation Functionality Testing. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Reconstitution Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Concurrent processing is the process of running a system at two separate locations concurrently until there is a level of assurance that the recovered system is operating correctly and securely. According to NIST SP 800-53 Contingency Plan security controls, information systems are not required to have concurrent processing capabilities. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Reconstitution Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Validation Data Testing. Data testing is the process of testing and validating recovered data to ensure that data files or databases have been recovered completely and are current to the last available backup. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Reconstitution Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Validation Functionality Testing. Functionality testing is a process for verifying that all system functionality has been tested, and the system is ready to return to normal operations. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Reconstitution Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP At the successful completion of the validation testing, ISCP personnel will be prepared to declare that reconstitution efforts are complete and that the system is operating normally. This declaration may be made in a recovery/reconstitution log or other documentation of reconstitution activities. The ISCP Coordinator, in coordination with the Information System Owner, ISSO (Information System Security Officers), SAISO (Senior Agency Information Security Officers) and with the concurrence of the Authorizing Official, must determine if the system has undergone significant change and will require reassessment and reauthorization. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Reconstitution Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Examples of significant changes that would possibly apply in a contingency situation and will require reassessment and reauthorization are: new or upgraded hardware platform moving to a new facility Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Reconstitution Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The utilization of a continuous monitoring strategy/program can guide the scope of the reauthorization to focus on those environment/facility controls and any other controls which would be impacted by the reconstitution efforts. Assessment and authorization guidance is available in NIST SP 800-37, Rev. 1 Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach. Deactivation of the plan is the process of returning the system to normal operations and finalizing reconstitution activities to prepare the system against another outage or disruption. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Reconstitution Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP These activities include: Notifications. Cleanup. Offsite Data Storage. Data Backup. Event Documentation. Notifications: Upon return to normal operations, users should be notified by the ISCP Coordinator (or designee) using predefined notification procedures. Cleanup: Cleanup is the process of cleaning up work space or dismantling any temporary recovery locations, restocking supplies, returning manuals or other documentation to their original locations, and readying the system for another contingency event. Offsite Data Storage: If offsite data storage is used, procedures should be documented for returning retrieved backup or installation media to its offsite data storage location. According to NIST SP 800-53 Contingency Plan security controls, a low-impact system is not required to have offsite data storage capabilities. Data Backup: As soon as reasonable following reconstitution, the system should be fully backed up and a new copy of the current operational system stored for future recovery efforts. This full backup should be stored with other system backups and comply with applicable security controls. Event Documentation: All recovery and reconstitution events should be well documented, including actions taken and problems encountered during the recovery and reconstitution efforts. An after-action report with lessons learned should be documented and included for updating the ISCP. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Reconstitution Phase Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Once all activities and steps have been completed and documentation has been updated, the ISCP can be formally deactivated. An announcement with the declaration should be sent to all business and technical contacts. Contingency Planning Guide (NIST SP 800-34) Develop an information system contingency plan Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Plan components Supporting Information. Activation and Notification Phase. Recovery Phase. Reconstitution Phase. Appendices. Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Plan Appendices Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Contingency plan appendices provide key details not contained in the main body of the plan. Common contingency plan appendices include the following: Contact information for contingency planning team personnel; Vendor contact information, including offsite storage and alternate site POCs; BIA; Detailed recovery procedures and checklists; Detailed validation testing procedures and checklists; ... Contingency Planning Guide (NIST SP 800-34) Develop an ISCP - Plan Appendices Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ... Equipment and system requirements lists of the hardware, software, firmware, and other resources required to support system operations. Details should be provided for each entry, including model or version number, specifications, and quantity; Alternate mission/business processing procedures that may occur while recovery efforts are being done to the system; ISCP testing and maintenance procedures; System interconnections (systems that directly interconnect or exchange information); and Vendor SLAs, reciprocal agreements with other organizations, and other vital records. Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Computer Security Incident Handling Guide (according to NIST SP 800-61) Computer Security Incident Handling Guide (NIST SP 800-61) Executive Summary Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Computer security incident response has become an important component of information technology (IT) programs. Security-related threats have become not only more numerous and diverse but also more damaging and disruptive. New types of security-related incidents emerge frequently. Preventative activities based on the results of risk assessments can lower the number of incidents, but not all incidents can be prevented. Computer Security Incident Handling Guide (NIST SP 800-61) Executive Summary Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP An incident response capability is therefore necessary for rapidly detecting incidents, minimizing loss and destruction, mitigating the weaknesses that were exploited, and restoring computing services. To that end, the NIST SP 800-61 provides guidelines for incident handling, particularly for analyzing incident-related data and determining the appropriate response to each incident. The guidelines can be followed independently of particular hardware platforms, operating systems, protocols, or applications. Because performing incident response effectively is a complex undertaking, establishing a successful incident response capability requires substantial planning and resources. Computer Security Incident Handling Guide (NIST SP 800-61) Executive Summary Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Continually monitoring threats through intrusion detection systems (IDSs) and other mechanisms is essential. Establishing clear procedures for assessing the current and potential business impact of incidents is critical, as is implementing effective methods of collecting, analyzing, and reporting data. Building relationships and establishing suitable means of communication with other internal groups (e.g., human resources, legal) and with external groups (e.g., other incident response teams, law enforcement) are also vital. Computer Security Incident Handling Guide (NIST SP 800-61) Executive Summary Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP NIST SP 800-61 discusses the following items: Organizing a computer security incident response capability Handling incidents from initial preparation through the post-incident lessons learned phase Handling specific types of incidents. Organizing a computer security incident response capability: Creating an incident response policy Developing procedures for performing incident handling and reporting, based on the incident response policy Setting guidelines for communicating with outside parties regarding incidents Selecting a team structure and staffing model Establishing relationships between the incident response team and other groups, both internal (e.g., legal department) and external (e.g., law enforcement agencies) Determining what services the incident response team should provide Staffing and training the incident response team. Computer Security Incident Handling Guide (NIST SP 800-61) Executive Summary Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Handling specific types of incidents: Denial of Service (DoS) Malicious Code Unauthorized Access Inappropriate Usage Multiple Component Computer Security Incident Handling Guide (NIST SP 800-61) Executive Summary Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Organizations should reduce the frequency of incidents by effectively securing networks, systems, and applications: Preventing problems is normally less costly and more effective than reacting to them after they occur. Incident handling can be performed more effectively if organizations complement their incident response capability with adequate resources to actively maintain the security of networks, systems, and applications, freeing the incident response team to focus on handling serious incidents. Organizations should document their guidelines for interactions with other organizations regarding incidents: During incident handling, the organization may need to communicate with outside parties, including other incident response teams, law enforcement, the media, vendors, and external victims. Because such communications often need to occur quickly, organizations should predetermine communication guidelines so that only the appropriate information is shared with the right parties. If sensitive information is released inappropriately, it can lead to greater disruption and financial loss than the incident itself. Creating and maintaining a list of internal and external POCs, along with backups for each contact, should assist in making communications among parties easier and faster. Organizations should emphasize the importance of incident detection and analysis throughout the organization: In an organization, thousands or millions of possible signs of incidents may occur each day, recorded mainly by logging and computer security software. Automation is needed to perform an initial analysis of the data and select events of interest for human review. Event correlation software and centralized logging can be of great value in automating the analysis process. However, the effectiveness of the process depends on the quality of the data that goes into it. Organizations should establish logging standards and procedures to ensure that adequate information is collected by logs and security software and that the data is reviewed regularly. Organizations should create written guidelines for prioritizing incidents: Prioritizing the handling of individual incidents is a critical decision point in the incident response process. Incidents should be prioritized based on the following: Criticality of the affected resources (e.g., public Web server, user workstation) Current and potential technical effect of the incident (e.g., root compromise, data destruction). Combining the criticality of the affected resources and the current and potential technical effect of the incident determines the business impact of the incident—for example, data destruction on a user workstation might result in a minor loss of productivity, whereas root compromise of a public Web server might result in a major loss of revenue, productivity, access to services, and reputation, as well as the release of confidential data (e.g., credit card numbers, Social Security numbers). Computer Security Incident Handling Guide (NIST SP 800-61) Executive Summary Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Incident handlers may be under great stress during incidents, so it is important to make the prioritization process clear. Organizations should decide how the incident response team should react under various circumstances, and then create a Service Level Agreement (SLA) that documents the appropriate actions and maximum response times. This documentation is particularly valuable for organizations that outsource components of their incident response programs. Documenting the guidelines should facilitate faster and more consistent decision-making. Organizations should use the lessons learned process to gain value from incidents After a major incident has been handled, the organization should hold a lessons learned meeting to review how effective the incident handling process was and identify necessary improvements to existing security controls and practices. Lessons learned meetings should also be held periodically for lesser incidents. The information accumulated from all lessons learned meetings should be used to identify systemic security weaknesses and deficiencies in policies and procedures. Follow-up reports generated for each resolved incident can be important not only for evidentiary purposes but also for reference in handling future incidents and in training new incident response team members. An incident database, with detailed information on each incident that occurs, can be another valuable source of information for incident handlers. Computer Security Incident Handling Guide (NIST SP 800-61) Executive Summary Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Organizations should strive to maintain situational awareness during large-scale incidents Organizations typically find it very challenging to maintain situational awareness for the handling of large-scale incidents because of their complexity. Many people within the organization may play a role in the incident response, and the organization may need to communicate rapidly and efficiently with various external groups. Collecting, organizing, and analyzing all the pieces of information, so that the right decisions can be made and executed, are not easy tasks. Computer Security Incident Handling Guide (NIST SP 800-61) Executive Summary Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The key to maintaining situational awareness is preparing to handle large-scale incidents, which should include the following: Establishing, documenting, maintaining, and exercising on-hours and off-hours contact and notification mechanisms for various individuals and groups within the organization (e.g., chief information officer [CIO], head of information security, IT support, business continuity planning) and outside the organization (e.g., incident response organizations, counterparts at other organizations). Planning and documenting guidelines for the prioritization of incident response actions based on business impact. ... Computer Security Incident Handling Guide (NIST SP 800-61) Executive Summary Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The key to maintaining situational awareness is preparing to handle large-scale incidents, which should include the following: ... Preparing one or more individuals to act as incident leads who are responsible for gathering information from the incident handlers and other parties, and distributing relevant information to the parties that need it. Practicing the handling of large-scale incidents through exercises and simulations on a regular basis; such incidents happen rarely, so incident response teams often lack experience in handling them effectively. Computer Security Incident Handling Guide (NIST SP 800-61) Organizing A Computer Security Incident Response Capability Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP One of the first considerations should be to create an organization-specific definition of the term ”incident´so that the scope of the term is clear. The organization should decide what services the incident response team should provide, consider which team structures and models can provide those services, and select and implement one or more incident response teams. Incident response policy and procedure creation is an important part of establishing a team, so that incident response is performed effectively, efficiently, and consistently. Computer Security Incident Handling Guide (NIST SP 800-61) Organizing A Computer Security Incident Response Capability Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Events and Incidents: An event is any observable occurrence in a system or network. Events include a user connecting to a file share, a server receiving a request for a Web page, a user sending electronic mail (e-mail), and a firewall blocking a connection attempt. Adverse events are events with a negative consequence, such as system crashes, network packet floods, unauthorized use of system privileges, defacement of a Web page, and execution of malicious code that destroys data. The NIST SP 800-61 addresses only adverse events that are computer security-related and excludes adverse events caused by sources such as natural disasters and power failures. Computer Security Incident Handling Guide (NIST SP 800-61) Organizing A Computer Security Incident Response Capability Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The definition of a computer security incident has evolved. In the past, a computer security incident was thought of as a security-related adverse event in which there was a loss of data confidentiality, disruption of data or system integrity, or disruption or denial of availability. New types of computer security incidents have emerged since then, necessitating an expanded definition of an incident. Computer Security Incident Handling Guide (NIST SP 800-61) Organizing A Computer Security Incident Response Capability Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP An incident can be thought of as a violation or imminent threat of violation (an “imminent threat of violation” refers to a situation in which the organization has a factual basis for believing that a specific incident is about to occur. For example, the antivirus software maintainers may receive a bulletin from the software vendor, warning them of a new worm that is rapidly spreading across the Internet.) of computer security policies, acceptable use policies, or standard security practices. Computer Security Incident Handling Guide (NIST SP 800-61) Organizing A Computer Security Incident Response Capability Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Examples of today’s incidents are as follows: Denial of Service An attacker sends specially crafted packets to a Web server, causing it to crash. An attacker directs hundreds of external compromised workstations to send as many Internet Control Message Protocol (ICMP) requests as possible to the organization’s network. Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ... Computer Security Incident Handling Guide (NIST SP 800-61) Organizing A Computer Security Incident Response Capability Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Examples of today’s incidents are as follows: ... Malicious Code A worm uses open file shares to quickly infect several hundred workstations within an organization. An organization receives a warning from an antivirus vendor that a new virus is spreading rapidly via e-mail throughout the Internet. The virus takes advantage of a vulnerability that is present in many of the organization’s hosts. Based on previous antivirus incidents, the organization expects that the new virus will infect some of its hosts within the next three hours. Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ... Computer Security Incident Handling Guide (NIST SP 800-61) Organizing A Computer Security Incident Response Capability Compliance and operational security Examples of today’s incidents are as follows: Information security risk management process (ISO/IEC 27005:2008) ... Unauthorized Access An attacker runs an exploit tool to gain access to a server’s password file. A perpetrator obtains unauthorized administrator-level access to a system and then threatens the victim that the details of the break-in will be released to the press if the organization does not pay a designated sum of money. Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ... Computer Security Incident Handling Guide (NIST SP 800-61) Organizing A Computer Security Incident Response Capability Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Examples of today’s incidents are as follows: ... Inappropriate Usage A user provides illegal copies of software to others through peer-to-peer file sharing services. A person threatens another person through e-mail. Incident response has become necessary because attacks frequently cause the compromise of personal and business data. The following are benefits of having an incident response capability: Responding to incidents systematically so that the appropriate steps are taken Helping personnel to recover quickly and efficiently from security incidents, minimizing loss or theft of information, and disruption of services. Using information gained during incident handling to better prepare for handling future incidents and to provide stronger protection for systems and data Dealing properly with legal issues that may arise during incidents. Computer Security Incident Handling Guide (NIST SP 800-61) Incident Response Policy and Procedure Creation Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Policy governing incident response is highly individualized to the organization. However, most policies include the same key elements, regardless of whether the organization’s incident response capability is indigenous or outsourced: Statement of management commitment. Purpose and objectives of the policy. Scope of the policy (to whom and what it applies and under what circumstances). Definition of computer security incidents and their consequences within the context of the organization. ... Computer Security Incident Handling Guide (NIST SP 800-61) Incident Response Policy and Procedure Creation Compliance and operational security Most policies include the same key elements: ... Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Organizational structure and delineation of roles, responsibilities, and levels of authority; should include the authority of the incident response team to confiscate or disconnect equipment and to monitor suspicious activity, and the requirements for reporting certain types of incidents Information security risk communication Prioritization or severity ratings of incidents Information security risk monitoring and review Performance measures Contingency Planning Guide for Federal Information Systems (NIST SP Reporting and contact forms. Computer Security Incident Handling Guide (NIST SP 800-61) Incident Response Policy and Procedure Creation Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Procedures should be based on the incident response policy. Standard operating procedures (SOPs) are a delineation of the specific technical processes, techniques, checklists, and forms used by the incident response team. SOPs should be comprehensive and detailed to ensure that the priorities of the organization are reflected in response operations. In addition, following standardized responses should minimize errors, particularly those that might be caused by incident handling tempo and stress. SOPs should be tested to validate their accuracy and usefulness, then distributed to all team members. Training should be provided for SOP users; the SOP documents can be used as an instructional tool. Computer Security Incident Handling Guide (NIST SP 800-61) Sharing Information With Outside Parties Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The organization may need to communicate with outside parties regarding an incident. This includes reporting incidents to organizations such as the CERT Coordination Center (CERT/CC), contacting law enforcement, and fielding inquiries from the media. Incident handlers may also need to discuss the incident with other involved parties, such as the organization’s Internet service provider (ISP), the ISP that the attacker is using, the vendor of vulnerable software, or other incident response teams that may be familiar with unusual activity that the handler is trying to understand. An organization may want to–or be required to–communicate incident details with an outside organization for numerous reasons. ... ... The incident response team should discuss this at length with the organization’s public affairs office, legal department, and management before an incident occurs to establish policies and procedures regarding information sharing. Otherwise, sensitive information regarding incidents may be provided to unauthorized parties; this action could lead to greater disruption and financial loss than the incident itself. The team should document all contacts and communications with outside parties for liability and evidentiary purposes. Figure 2-1 shows several outside parties with which the organization may need to communicate. The arrows indicate the direction of the communication - for example, the organization may initiate communications with software vendors. Double-headed arrows indicate that either party may initiate communications. Computer Security Incident Handling Guide (NIST SP 800-61) Sharing Information With Outside Parties Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The Media: Dealing with the media is an important part of incident response. The incident handling team should establish media communications procedures that are in compliance with the organization’s policies on appropriate interaction with the media and information disclosure (For example, an organization may want members of its public affairs office and legal department to participate in all incident discussions with the media). Organizations often find it beneficial to designate a single media point of contact (POC) and at least one backup contact for discussing incidents with the media. Ideally, all members of the incident response team should be prepared to interact with the media. Computer Security Incident Handling Guide (NIST SP 800-61) Sharing Information With Outside Parties Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) The following actions should be considered for preparing those who may be communicating with the media: Conduct training sessions on interacting with the media regarding incidents, which should include: The importance of not revealing sensitive information, such as technical details of countermeasures (e.g., which protocols the firewall permits), which could assist other would-be attackers The positive aspects of communicating important information to the public fully and effectively. Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Establish procedures to brief media contacts on the issues and sensitivities regarding a particular incident before discussing it with the media. ... Computer Security Incident Handling Guide (NIST SP 800-61) Sharing Information With Outside Parties Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The following actions should be considered for preparing those who may be communicating with the media: ... Hold mock interviews and press conferences during incident handling exercises. The following are examples of questions to ask the media contact: Who attacked you? When did it happen? How did they do the attack? How widespread is this incident? Did this happen because you have poor security practices? ... Computer Security Incident Handling Guide (NIST SP 800-61) Sharing Information With Outside Parties Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP The following actions should be considered for preparing those who may be communicating with the media: ... Hold mock interviews and press conferences during incident handling exercises. The following are examples of questions to ask the media contact: ... What steps are you taking to determine what happened? What is the impact of this incident? What is the estimated monetary cost of this incident? Law Enforcement One reason that many security-related incidents do not result in convictions is that organizations do not properly contact law enforcement. The incident response team should become familiar with its various law enforcement representatives before an incident occurs to discuss conditions under which incidents should be reported to them, how the reporting should be performed, what evidence should be collected, and how it should be collected. Law enforcement should be contacted through designated individuals in a manner consistent with the requirements of the law and the organization’s procedures. Many organizations prefer to appoint one incident response team member as the primary POC with law enforcement. ... Computer Security Incident Handling Guide (NIST SP 800-61) Sharing Information With Outside Parties Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Law Enforcement ... Law enforcement should be contacted through designated individuals in a manner consistent with the requirements of the law and the organization’s procedures. Many organizations prefer to appoint one incident response team member as the primary POC with law enforcement. This person should be familiar with the reporting procedures for all relevant law enforcement agencies and well prepared to recommend which agency, if any, should be contacted. ... Computer Security Incident Handling Guide (NIST SP 800-61) Sharing Information With Outside Parties Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP Law Enforcement ... Note that the organization typically should not contact multiple agencies because doing so might result in jurisdictional conflicts. The incident response team should understand what the potential jurisdictional issues are (e.g., physical location—an organization based in one state has a server located in a second state attacked from a system in a third state, being used remotely by an attacker in a fourth state). Computer Security Incident Handling Guide (NIST SP 800-61) Sharing Information With Outside Parties Compliance and operational security Information security risk management process (ISO/IEC 27005:2008) Other Outside Parties: The Organization’s ISP: During a network-based DoS attack, an organization may need assistance from its ISP in blocking the attack or tracing its origin. Owners of Attacking Addresses: incident handlers may want to talk to the designated security contacts for the organization (owner of the attacking addresses) to alert them to the activity or to ask them to collect evidence Handlers should be cautious if they are unfamiliar with the external organization because the owner of the address space could be the attacker or an associate of the attacker Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ... Computer Security Incident Handling Guide (NIST SP 800-61) Sharing Information With Outside Parties Compliance and operational security Other Outside Parties: ... Software Vendors Under some circumstances, incident handlers may want to speak to a software vendor about suspicious activity. This contact could include questions regarding the significance of certain log entries or known false positives for certain intrusion detection signatures, where minimal information regarding the incident may need to be revealed. More information may need to be provided in some cases—for example, if a server appears to have been compromised through an unknown software vulnerability. Incident handlers may have other questions for vendors, such as the availability of patches or fixes for new vulnerabilities. Information security risk management process (ISO/IEC 27005:2008) Context establishment Information security risk assessment Information security risk treatment Information security risk acceptance Information security risk communication Information security risk monitoring and review Contingency Planning Guide for Federal Information Systems (NIST SP ...
© Copyright 2024