Risk management during development Flashcards
What is the idea behind risk management?
To identify, track, rank and understand security risks as it changes over time
What are the stages of the risk management framework?
- Understand business context
- Identify and link the business and technical risks (artifact analysis, business context)
- Synthesize and rank the risks
- Define the Risk mitigation strategy
- Carry out fixes and validate
2-5: Part of measurement and reporting
What is the flow of the steps in risk management framework?
Risk management is a continuous and iterative process
1 -> 2 -> 3 -> 4 -> 5 ->2
5 goes back to 2, and repeate flow above from step 2.
What happens during step 1. of the risk management framework?
Identify business goals: What are the circumstances we care about.
Define risk scales: What is a bad risk, what is an acceptable risk (impact, likelyhood)
Identify business assets: Something of value, what are we trying to protect
Identify the stakeholders: Who cares about the system (users, regulators, attackers, etc.)
What happens during step 2. of the risk management framework?
Identify business risks and technical risks. Linking each business to a technical risk.
The business risks can be related to:
- Data: sensitive data stolen
- Time: Processing delay
- Money: Can’t make sales, can’t process transactions
- Repudiation and brand: Loss of trust
- Legal: Compliance, contractual regulation
What happens during step 3. of the risk management framework?
Create a matrix with Likelyhood on the x-axis and impact on the y-axis.
The combination of these says something about the severity of the risk.
Rank the technical and business risks.
Use the result from ranking to place business risks in the matrix.
What happens during step 4. of the risk management framework?
Goal is to either reduce impact or likelihood of risk, or reduce both.
One way of doing this is by deriving security requirements for the technical risks:
e.g.:
Attacker locks out user by typing wrong password -> 2FA
What happens during step 5. of the risk management framework?
Carry out fixes and validate the requirements
Implementation of mitigation strategies.
Validation in the form of risk-based testing
How can a likelyhood-scale be defined?
Can use expected frequency of events.
Can use an attacker-centric approach: A highely motivate attacker might cause higher likelyhood.
Low: Once per 10 year or less
Medium: Once per year or less
High: Once per month or less
Extreme: Every week
How can consequences be defined using dimensions and scales?
Define dimensions that are relevant for you system: e.g.:
- Confidentiality
- Availablility
- Financial
- Repudiation
Define what low, medium, high and extreme mean for each dimension.
How is business risks related to goals?
Business risks directly threaten one or more of a customer’s goals
What are technical risks?
Various threats and attacks that may bring negative impacts on business.
How do you find technical risks?
Look through documents, system design, architecture, code.
Talk to users, look at feedback, interviews, discussions.
Test system
Use threat intelligence, look at common threat vectors, what are the most common vulnerabilities these days, etc.
What are some useful tools when identifying technical risks?
Misuse cases, attack trees, data flow diagrams
How is linking done in risk management?
Link business goal to one or more business risks
Link business risk to one or more technical risks