linux operating commands and unix operating commands

Assessing Operational Risk

 
Thread Tools Search this Thread
# 1  
Old 04-07-2010
Assessing Operational Risk

As a continuation of the series focusing on “Demystifying the Risk Management Framework” (http://blog.isc2.org/isc2_blog/2010/...framework.html), this posting will cover Risk Assessments, and how they play a role in the RMF (both as a tool for managing risk within individual information system and organization-wide). 

In the absence of a mature Risk Assessment methodology, Federal Agencies are struggling with balancing the implementation of the baseline controls outlined within NIST SP 800-53 Security Controls.  As a routine function of the traditional Certification and Accreditation (C&A) activity, there is a heavy reliance on the Assessor as part of the Security Testing (e.g., ST&E) to perform the due diligence to establish security requirements.  Since most Assessors are independent of the information system (and more likely independent agents such as contractors) hired to provide assessment services, there is little attention to the supplementation (based on an organizational assessment of risk) in the controls selection process.

As highlighted in a previous posting, to reduce the focus on compliance, and instead develop capabilities for risk management and continuous monitoring to achieve an effective security- and risk-posture, organizations will need to have a skilled workforce that has a clear understanding of how to assess and communicate risk as an on-going function of the RMF.  Risk Assessments, as an integrated function of the Risk Management Strategy, helps support the organization in the:
  • Categorization of information systems;
  • Selection of controls (including establishing a baseline that meeting the risk-based protective strategy);
  • Implementation solutions to address the necessary protective measure within the information system and individual system components;
  • Assessment effective of controls to ensure they are implemented effective, operating as intended, and produce the desired outcome;
  • Authorization of information systems based on a clear understanding of the organizational acceptance of risk (including a determination of impact associated with the mission/business process that support the organization's strategic goals); and
  • Monitoring of changes to determine if on-going operations are impacted and the visibility of security impacts are properly allocated to the appropriate organizational official to manage risk at an acceptable level.
However, without a mature Risk Assessment capability built into the organization that enables the effective and accurate reflection of risks to information systems, the organization will not fully understand the risk exposure and the required security posture necessary to eliminate or reduce the risks.

Risk Assessments are not a new practice or concept, and under normal circumstance most of us know how to evaluate risks in our everyday lives.  But when it comes to protecting information systems and information, federal agencies (although not alone) lack the functions to effectively identify, evaluate, and mitigate risks that lead to attacks.  As technologies advance and federal agencies' reliance on external services to generate, store, or exchange information become more commonplace, they need to become more skilled at managing risk.

The second presentation in the series focuses on providing an overview of Risk Management and the assessment of operational risk
URL: http://www.slideshare.net/1ecg/1ecg-...erational-risk


Image
Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

4 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Reading a file passed as an argurement and assessing the files syntax

I am trying to write a shell script which takes an input file as an arguement in the terminal e.g. bash shellscriptname.sh input.txt. I would like for the file to be read line by line each time checking if the .txt file contains certain words or letters(validating the syntax). If the line being... (8 Replies)
Discussion started by: Gurdza32
8 Replies

2. Shell Programming and Scripting

URGENT Reading a file and assessing the syntax shell script URGENT

I am trying to write a shell script which takes an input file as an arguement in the terminal e.g. bash shellscriptname.sh input.txt. I would like for the file to be read line by line each time checking if the .txt file contains certain words or letters(validating the syntax). If the line being... (1 Reply)
Discussion started by: Gurdza32
1 Replies

3. Red Hat

KusuDB: Operational Error occurred when connecting to the DB

I have RHEL5.3 that is with the Platform Cluster Manger PCM installation. on master node. Unfortunately some files were deleted from the /var directory and then the postgresql service couldn't start. I have deleted, rm -rf /var/lib/pgsql/data and started the service again now the service is running... (1 Reply)
Discussion started by: ahsanpmd
1 Replies

4. UNIX for Dummies Questions & Answers

Ftp, telnet etc. not operational?

Well I have the programs and everything and the program itself seems to work, but they don't seem to be operateble. I ALWAYS get connection refused on everything. ftp, telnet, rlogin, ssh etc. So it must have something to do with some setting that doesn't allow connections to external hosts or... (6 Replies)
Discussion started by: riwa
6 Replies
Login or Register to Ask a Question