Section 5: Risk Frameworks Flashcards
NIST SP 800-37 RMF
Risk Management Framework for Information Systems and Organizations
Provides a flexible 7 step process for managing security and privacy risk
NIST RMF 7 steps
PREPARE- identify different roles, strategies, control providers
CATEGORIZE- identify all of the organizational assets and categorize them in terms of risk, value, and document them
SELECT- the initial security controls necessary to protect the information system and organization
IMPLEMENT- Deploy security controls and document how they are used
ASSESS- Test the effectiveness of the controls and comply with governance
AUTHORIZE- require a senior management official to take accountability for the residual risk
MONITOR- ongoing evaluation of security effectiveness against organizational and system related changes
ISO 31000
Risk management framework that provides a common approach to managing any type of risk within any industry
8 principles
ISO 31000 Principles
Integrated
Structured and Comprehensive
Customized
Inclusive
Dynamic
Best Available Information
Human and Cultural Factors
Continual Improvement
COSO
Committee of Sponsoring Organizations
Enterprise risk management framework focused on corporate governance
Often used to comply with SOX 404 requirements
COSO Components
Governance & Culture
Strategy & Objective Setting
Performance
Review & Revision
Information, Communication & Reporting
NIST CSF
NIST Cybersecurity Framework
Risk management and reduction framework based on existing standards, guidelines, and industry best practices
Voluntary and not required by any organization, authorizing, or accrediting body
NIST CSF Core
Activities, implementations, and functions designed to achieve the desired cybersecurity outcomes
NIST CSF Tiers
Characterize how the core activities align with the desired cybersecurity outcomes
Tier 1 - Partial
Tier 2 - Risk Informed
Tier 3 - Repeatable
Tier 4 - Adaptive
NIST CSF Profiles
Alignment of requirements, objectives, implementations, and risk tolerance to the desired cybersecurity outcomes
NIST CSF Framework Steps
Identify
Protect
Detect
Respond
Recover