Risk Management MindMap (3 of 3) | CISSP Domain 1

Destination Certification
23 Oct 202318:18

Summary

TLDRRob Witcher's video offers an in-depth review of risk management for CISSP exam preparation, focusing on Domain 1. It outlines the essential steps of asset valuation, risk analysis, and treatment, emphasizing the importance of identifying, assessing, and prioritizing risks. The video introduces various methodologies like STRIDE, HASTA, and DREAD for threat identification and prioritization. It also covers risk ranking techniques and discusses risk treatment methods, including avoidance, transfer, mitigation, and acceptance. Additionally, it highlights the significance of controls and assurance in risk mitigation and introduces the Risk Management Framework (RMF) by NIST.

Takeaways

  • πŸ“š Risk management is crucial for security professionals to prioritize security efforts and allocate resources effectively within limited budgets and time.
  • πŸ”’ Asset valuation is the first step in risk management, where assets are assigned a value to determine their importance to the organization, using either quantitative or qualitative analysis.
  • πŸ” Risk analysis involves identifying threats, vulnerabilities, impact, and likelihood associated with each asset, using methodologies like STRIDE, HASTA, and DREAD for systematic identification and prioritization.
  • πŸ›‘ Threat modeling helps to systematically identify potential dangers that can harm an organization's assets, operations, or reputation.
  • 🚫 Vulnerabilities are weaknesses in security or control systems that can be exploited by threats, and they can be identified through assessments and penetration testing.
  • ⏱ The likelihood or probability of a risk event occurring is a key component in understanding the potential risks an organization faces.
  • πŸ’₯ Impact refers to the potential harm or damage that could result from a risk, such as downtime, reputational damage, or data integrity issues.
  • πŸ“‰ Techniques like the Annualized Loss (AL) expectancy calculation help in quantitatively ranking risks, but often qualitative analysis is used due to the difficulty in assigning exact values.
  • πŸ›  Risk treatment includes four methods: avoid, transfer, mitigate, and accept, with mitigation being the primary focus involving various controls to reduce risk.
  • πŸ”’ Controls can be categorized as safeguards to prevent risks and countermeasures to detect and respond to risks, including directive, deterrent, preventive, detective, corrective, and recovery controls.
  • πŸ”‘ Residual risk is the remaining risk after implementing mitigating controls, and it's important for organizations to manage this effectively.
  • πŸ“ˆ The Risk Management Framework (RMF), particularly NIST 800-37, provides a structured approach with seven steps for managing risks in information systems and data.

Q & A

  • What is the primary challenge that security professionals face in protecting an organization's assets?

    -The primary challenge is to effectively protect the assets within an organization given the limitations of budgets and time, as they never have unlimited resources to perfectly protect everything.

  • Why is risk management important in a security program?

    -Risk management is important because it enables organizations to prioritize their security efforts and allocate resources effectively, focusing on the identification, assessment, and prioritization of risks, and the economical application of resources to minimize, monitor, and control the probability and impact of those risks.

  • What are the three major steps in risk management?

    -The three major steps in risk management are asset valuation, risk analysis, and risk treatment.

  • How is asset valuation typically conducted in practice?

    -Asset valuation is typically conducted using either quantitative analysis, where monetary values are assigned to each asset, or qualitative analysis, which involves a relative ranking system comparing assets and categorizing them into high, medium, and low value groups.

  • What are the four elements to consider when conducting risk analysis for each asset?

    -The four elements to consider are threats, vulnerabilities, impact, and likelihood.

  • Can you explain the STRIDE model for identifying threats?

    -STRIDE is a quick and easy methodology for identifying threats, where 'S' stands for Spoofing (violation of integrity), 'T' for Tampering (violation of integrity), and so on, covering a range of threat types that need to be considered.

  • What is the purpose of the Annualized Loss (AL) calculation in risk analysis?

    -The Annualized Loss (AL) calculation is used to determine how much a given risk is expected to cost the organization per year, helping to decide what controls are cost-justified to mitigate the risk.

  • What are the four major risk treatment methods?

    -The four major risk treatment methods are risk avoidance, risk transfer, risk mitigation, and risk acceptance.

  • How are administrative, technical, and physical controls categorized in terms of safeguards and countermeasures?

    -Safeguards include directive, deterrent, and preventive controls, which aim to ensure a risk doesn't occur. Countermeasures include detective, corrective, and recovery controls, which are put in place to detect, respond to, and recover from a risk that has occurred.

  • What is the significance of the Risk Management Framework (RMF) and what are its seven steps?

    -The RMF, particularly NIST 800-37, provides a structured seven-step process for managing risks to information systems and data. The steps include preparing to execute the RMF, categorizing systems, selecting security controls, implementing controls, assessing control effectiveness, authorizing systems for production, and monitoring controls for ongoing effectiveness.

  • Who should be responsible for accepting the risk associated with a particular asset?

    -The asset owner should be responsible for accepting the risk associated with a particular asset, as they are accountable for the security of the asset.

Outlines

00:00

πŸ“š Introduction to Risk Management for CISSP Exam Preparation

Rob Witcher introduces the video series focusing on risk management as part of the CISSP exam's domain 1. He outlines the importance of risk management in security, emphasizing the challenge of protecting assets with limited resources. The video aims to guide viewers through the major topics of risk management, including asset valuation, risk analysis, and treatment. Rob also mentions the three-step process of risk management and introduces the concept of quantitative and qualitative analysis for asset ranking.

05:01

πŸ” In-Depth Analysis of Risk Management Techniques

This paragraph delves deeper into the risk analysis process, discussing the identification of threats, vulnerabilities, impact, and likelihood. It explains the use of threat modeling methodologies such as STRIDE, PASTA, and DREAD. The paragraph also covers the concepts of quantitative and qualitative risk analysis, including the Annualized Loss Expectancy (ALE) calculation and the Single Loss Expectancy (SLE). The importance of ranking risks and understanding their potential costs to an organization is highlighted.

10:04

πŸ›‘οΈ Exploring Risk Treatment Methods and Control Implementation

The third paragraph focuses on risk treatment methods, including risk avoidance, transference, mitigation, and acceptance. It discusses the implementation of controls to mitigate risks, such as administrative, technical, and physical controls. The paragraph also explains the concept of residual risk and introduces safeguards and countermeasures as categories of controls. Additionally, it touches on detective, corrective, and recovery controls, as well as compensating controls, to manage risks when other measures are not feasible.

15:04

πŸ›οΈ Risk Management Frameworks and Best Practices for CISSP Exam

The final paragraph wraps up the discussion on risk management by introducing risk management frameworks, with a focus on the Risk Management Framework (RMF) from NIST 800-37. It outlines the seven steps of the RMF process, from preparation to ongoing monitoring. The paragraph also mentions other frameworks like ISO 31000, COSO, and OCTAVE. Additionally, it provides guidance on common mistakes made during CISSP exam preparation and offers a free guide to avoid them, with a link provided in the description.

Mindmap

Keywords

πŸ’‘Risk Management

Risk management is a systematic approach to identifying, assessing, and prioritizing risks followed by taking cost-effective measures to minimize, monitor, and control the impact or probability of unfortunate events. In the context of the video, it is an essential component of security programs, allowing organizations to prioritize their security efforts and allocate resources effectively. The video script discusses risk management as a three-step process involving asset valuation, risk analysis, and treatment.

πŸ’‘Asset Valuation

Asset valuation is the process of assigning a value to each asset within an organization to determine its worth. This concept is fundamental in risk management as it helps in ranking assets from most to least valuable, which in turn helps in prioritizing security efforts. The script mentions two major ways of ranking risks: quantitative and qualitative analysis, with the latter being more common due to the difficulty of assigning exact monetary values to certain assets like reputation or data sets.

πŸ’‘Risk Analysis

Risk analysis involves identifying the risks associated with each asset, which includes looking at threats, vulnerabilities, impact, and likelihood. It is a critical step in the risk management process that helps organizations understand the potential dangers they face. The video script describes various methodologies such as STRIDE, HASTA, and DREAD for identifying and prioritizing threats, and the importance of considering vulnerabilities, likelihood, and impact in this process.

πŸ’‘Threat Modeling

Threat modeling is a systematic process used to identify potential threats to an organization's assets. It is a part of risk analysis mentioned in the script, where methodologies like STRIDE, HASTA, and DREAD are used to identify and prioritize threats. Threat modeling helps organizations to understand the different types of attacks they may face and to develop strategies to mitigate these risks.

πŸ’‘Vulnerability

A vulnerability refers to a weakness or gap in an organization's security or control systems that can be exploited by a threat. In the script, it is mentioned that vulnerability assessments and penetration testing are techniques used to identify vulnerabilities systematically. Understanding and addressing vulnerabilities is crucial for effective risk management.

πŸ’‘Impact

Impact in the context of risk management refers to the potential harm or damage that could result from a particular risk occurring. It is one of the four elements considered during risk analysis, along with threats, vulnerabilities, and likelihood. The script uses examples like downtime, reputational damage, and data integrity issues to illustrate the concept of impact.

πŸ’‘Risk Treatment

Risk treatment is the phase of risk management where actions are taken to address the identified risks. The video script outlines four major treatment methods: avoid, transfer, mitigate, and accept. Each method represents a different strategy for dealing with risk, from preventing it from occurring to accepting it as a cost of doing business.

πŸ’‘Residual Risk

Residual risk is the remaining risk after mitigating controls have been implemented. The script mentions this concept in the context of risk treatment, emphasizing that even after controls are put in place, some level of risk often remains. Understanding residual risk is important for organizations to make informed decisions about the sufficiency of their risk mitigation efforts.

πŸ’‘Controls

Controls in risk management are measures put in place to manage or mitigate risk. The script discusses different types of controls, including administrative, technical, and physical controls, and categorizes them into safeguards and countermeasures. Controls are essential for reducing risk and ensuring the security of an organization's assets.

πŸ’‘Risk Acceptance

Risk acceptance is the deliberate decision to live with a certain level of risk and its potential consequences. It is mentioned in the script as the final treatment method in risk management. The asset owner, who is accountable for the security of an asset, is best positioned to make decisions about risk acceptance.

πŸ’‘Risk Management Framework (RMF)

The Risk Management Framework (RMF) is a structured approach defined by the National Institute of Standards and Technology (NIST) in NIST 800-37. The script highlights the RMF as a seven-step process that guides organizations in managing risks to their information systems and data. The steps include preparing, categorizing, selecting controls, implementing, assessing, authorizing, and monitoring.

Highlights

Rob Witcher introduces the importance of risk management for CISSP exam preparation.

Risk management is essential for prioritizing security efforts within limited budgets and time.

The three major steps of risk management: asset valuation, risk analysis, and treatment.

Asset valuation involves assigning a value to each asset to rank them by importance.

Quantitative and qualitative analysis are methods for ranking risks and assets.

Threat modeling methodologies like STRIDE help identify potential threats systematically.

PASTA and DREAD are methodologies for in-depth threat analysis and prioritization.

Vulnerabilities are weaknesses that can be exploited by threats.

Risk analysis involves identifying threats, vulnerabilities, impact, and likelihood.

The Annualized Loss (AL) formula is used for quantitative risk analysis.

Qualitative analysis is often necessary when exact values are hard to determine.

Risk treatment methods include avoidance, transfer, mitigation, and acceptance.

Residual risk is the remaining risk after implementing mitigating controls.

Administrative, technical, and physical controls are used to manage risks.

Safeguards and countermeasures are categories of controls to prevent and respond to risks.

Controls must provide functionality and assurance for effective risk management.

Risk acceptance is a decision to live with a certain level of risk.

The Risk Management Framework (RMF) is a structured approach defined by NIST.

The seven steps of the RMF guide organizations in managing information system risks.

Other risk management frameworks include ISO 31000 and COBIT.

A free guide is available to help avoid common mistakes in CISSP exam preparation.

Transcripts

play00:00

hey I'm Rob Witcher from destination

play00:01

certification and I'm here to help you

play00:03

pass the cissp exam we're going to go

play00:05

through a review of the major topics

play00:07

related to risk management in domain 1

play00:09

to understand how they interrelate and

play00:11

to guide your studies this is the third

play00:13

of three videos for domain 1 I've

play00:15

included links to the other mind map

play00:17

videos in the description below these

play00:19

mind maps are one part of our complete

play00:21

cisp Master

play00:23

[Music]

play00:28

Class

play00:33

risk management this is a super

play00:36

important topic in security we as

play00:39

Security Professionals have a colossal

play00:41

challenge how do we best protect the

play00:43

assets across an entire organization we

play00:47

never have unlimited budgets or an

play00:49

unlimited amount of time available to

play00:51

perfectly protect everything so how do

play00:54

we best protect the assets within the

play00:56

organization given our limited budgets

play00:58

and time once super useful method to

play01:01

help us figure this out is risk

play01:03

management risk management is an

play01:05

essential component of any comprehensive

play01:08

security program as it enables

play01:10

organizations to prioritize their

play01:12

security efforts and allocate resources

play01:14

effectively risk management is

play01:16

fundamentally focused on the

play01:18

identification assessment and

play01:20

prioritization of risks and the

play01:22

economical application of resources to

play01:24

minimize Monitor and

play01:27

control the probability Andor impact of

play01:29

those risks at the 10,000 ft level it's

play01:33

helpful to think about risk management

play01:34

comprising three major steps asset

play01:37

valuation risk analysis and treatment

play01:41

let's go through those three steps

play01:44

starting with asset valuation asset

play01:46

valuation is conceptually incredibly

play01:49

simple assign a value to each asset in

play01:52

other words figure out how valuable each

play01:54

asset is to the organization so that we

play01:56

can then rank the assets from the most

play01:59

on down to the the least valuable simple

play02:02

idea super hard to do in practice there

play02:05

are two major ways that we can rank

play02:07

risks quantitative and qualitative

play02:10

analysis quantitative analysis is where

play02:13

we assign monetary values to each asset

play02:16

we say this asset is worth a dollar and

play02:19

this asset is worth $2.7

play02:21

million quantitative analysis is

play02:24

absolutely the preferred method we would

play02:26

ideally love to assign a nice dollar

play02:28

value to every asset

play02:31

unfortunately for the vast majority of

play02:33

assets this just isn't possible with any

play02:35

sort of reasonable accuracy can you

play02:38

confidently say your organization's

play02:39

reputation is worth $736 million or this

play02:43

data set is worth exactly

play02:46

$3,849 pesos or this critical

play02:49

application is worth exactly 13.8

play02:52

million EUR no for most assets we

play02:56

absolutely cannot assign a monetary

play02:59

value to them we may know something is

play03:01

valuable but assigning an exact dollar

play03:03

value to it is nigh

play03:05

impossible and that is why the vast

play03:07

majority of the time we use qualitative

play03:10

analysis to rank assets qualitative

play03:12

analysis is a simply a relative ranking

play03:15

system where you compare assets and say

play03:17

well this asset is more valuable than

play03:20

that one which is less valuable than

play03:22

that one you rank assets relative to

play03:24

each other and you often create

play03:27

categories like high medium and low

play03:29

value and and sort assets into these

play03:31

categories once you have completed asset

play03:33

valuation you'll have a nicely ranked

play03:36

list of assets and it is now time to

play03:38

move on to step two of risk management

play03:41

risk analysis risk analysis is where you

play03:44

identify the risks associated with each

play03:46

asset to identify and understand the

play03:48

risks associated with each asset you

play03:50

need to look at four things threats

play03:53

vulnerabilities impact and likelihood

play03:56

threats are any potential danger threats

play04:01

are events situations or actions that

play04:03

have the potential to cause harm or

play04:05

damage to an organization's assets

play04:07

operations or reputation threats can

play04:09

come from a wide range of sources such

play04:12

as natural disasters cyber attacks fraud

play04:14

theft or human error amongst many others

play04:17

a useful tool we can use to help us

play04:18

systematically identify the threats

play04:20

related to an asset is threat modeling

play04:22

methodologies there have been many

play04:24

different threat modeling methodologies

play04:25

created over the years and there are

play04:27

three that you should know about in

play04:29

particular stride is essentially the

play04:31

quick and easy but not super thorough

play04:33

methodology you can use to identify

play04:35

threats for the exam make sure you know

play04:38

that the s in stride stands for spoofing

play04:40

and that spoofing is a violation of

play04:42

integrity and the T in stri in stride

play04:45

stands for tampering which is a

play04:46

violation of integrity and so forth so

play04:49

make sure you know what each of letters

play04:50

are and what they're a violation of

play04:52

hasta the process for attack simulation

play04:55

and threat analysis is the super timec

play04:58

consuming super in-depth methodology for

play05:01

threat modeling pasta is a seven-step

play05:03

risk Centric methodology pasta provides

play05:07

way more useful results and it takes

play05:09

into account the business value of an

play05:10

asset compliance issues and provides a

play05:13

strategic threat analysis so stride is

play05:15

the quick and easy way of systematically

play05:17

identifying threats and pasta is the

play05:20

super timec consuming method that

play05:21

produces way more useful and nuanced

play05:24

results the third methodology you should

play05:26

know about is dread dread is different

play05:29

from stride and pasta DED is not is not

play05:32

used to identify threats rather it's

play05:35

used to prioritize a list of threats

play05:38

that have already been identified stride

play05:40

and Dread are often used together stride

play05:44

is used to identify the threats and

play05:46

Dread is used to prioritize the

play05:49

identified threats the next major piece

play05:51

that we need to look at as part of risk

play05:53

analysis is vulnerabilities a

play05:56

vulnerability is a weakness that exists

play05:59

vulnerabilities are weaknesses or gaps

play06:01

in an organization's security or control

play06:04

systems that can be exploited by a

play06:06

threat to cause harm or damage to the

play06:08

organization's assets operations or

play06:11

reputation two techniques that can be

play06:13

used to systematically identify

play06:14

vulnerabilities are vulnerability

play06:16

assessments and penetration testing

play06:19

which I'll talk about in more detail in

play06:21

the second mindmap video of domain 6

play06:24

Link in the description below likelihood

play06:26

or probability is simply the chance that

play06:28

a particular risk event will occur it is

play06:30

a measure of the likelihood or of a

play06:33

potential risk turning into an actual

play06:35

event and the final piece that we have

play06:37

to look at to fully understand a risk is

play06:39

the impact impact refers to the

play06:41

potential harm or damage that could

play06:43

result from particular risk occurring

play06:45

impact is essentially whatever bad thing

play06:47

is going to happen to the organization

play06:49

as a result of a risk occurring downtime

play06:52

reputational damage data Integrity

play06:54

issues a breach ransomware the list

play06:58

unfortunately goes on and on all right

play07:01

so as part of risk analysis we are going

play07:04

to come up with a giant list of risks we

play07:07

need to rank those risks to figure out

play07:09

which risk are of greater or lesser

play07:11

concern there are two techniques that we

play07:13

can use to rank the risks quantitative

play07:15

and qualitative analysis the same exact

play07:18

techniques we talked about for ranking

play07:20

assets quantitative risk analysis is

play07:22

where we try to calculate exactly how

play07:23

much a given risk is going to cost the

play07:25

organization per year it's super helpful

play07:28

if we can calculate this as it makes it

play07:30

much easier to determine what controls

play07:32

are cost Justified to put in place to

play07:34

mitigate a risk there is a super simple

play07:37

formula you can use to calculate how

play07:38

much a risk is going to cost the

play07:39

organization per year it's known as the

play07:42

AL calculation the annualized loss

play07:45

expectancy calculation and you

play07:48

definitely need to know this formula for

play07:49

the exam to calculate the AL you need to

play07:53

First calculate the SLE the single loss

play07:56

expectancy which is simply how much is a

play07:59

risk going to cost the organization if

play08:00

the risk occurs

play08:02

once to calculate the slle you multiply

play08:05

the asset value times the exposure

play08:08

Factor the asset value is simply what

play08:10

the asset is worth and the exposure

play08:13

factor is a percentage that represents

play08:15

what percent of the asset you expect to

play08:17

lose if the risk occurs and exposure

play08:20

factor of 10% would mean you would

play08:23

expect to lose 10% of the asset if the

play08:25

risk occurs or an exposure factor of

play08:28

100% would mean you expect to lose all

play08:31

100% of the asset if the risk occurs so

play08:34

to calculate the SLE multiply the asset

play08:38

value with the exposure factor and that

play08:40

will tell you how much it's going to

play08:41

cost the organization if the risk occurs

play08:44

once but of course the whole point of

play08:46

this Al formula is to calculate how much

play08:48

a risk is going to cost the organization

play08:50

annually per

play08:52

year so we need to multiply the SLE

play08:55

times the Aro the Aro is the annualized

play08:58

rate of occurrence the Aro represents

play09:01

how many times per year you expect a

play09:03

risk to occur if you expect the risk to

play09:05

occur once per year the ARL will be one

play09:09

five times per year the ARL would be

play09:11

five and so on so super simple formula

play09:15

that we would love to use all the time

play09:17

but we can't because the three simple

play09:19

numbers we need asset value exposure

play09:22

factor and AO are often totally

play09:26

impossible to determine without with any

play09:28

sort of reasonable action accuracy and

play09:30

that is why we are forced to use

play09:33

qualitative analysis most of the time

play09:36

and like I said before qualitative

play09:37

analysis is a relative ranking system

play09:40

not great but a whole lot better than

play09:42

nothing which brings us to the third

play09:44

major step in Risk Management treatment

play09:47

treatment is where we figure out how to

play09:49

treat the risks we've identified to do

play09:51

something about the risks there are four

play09:54

major treatment methods avoid transfer

play09:57

mitigate and accept let's go through

play10:00

them starting with risk avoidance risk

play10:03

avoidance means implementing measures to

play10:05

prevent the risk from occurring or

play10:07

choosing not to engage in activities

play10:09

that would cause the risk to occur don't

play10:11

want to face the risk of near certain

play10:13

death of jumping out of an airplane with

play10:14

no parachute don't joke boto airplane

play10:17

with no parachute that's risk avoidance

play10:20

risk transference means buying an

play10:23

insurance policy an organization can

play10:25

purchase an insurance policy to transfer

play10:27

the financial burden of a particular

play10:29

risk to their insurer super critical to

play10:32

remember from a security perspective

play10:33

though you can never transfer or

play10:36

delegate accountability so if an

play10:38

organization has purchased an insurance

play10:40

policy they are not transferring the

play10:43

accountability for a risk to their

play10:44

insurer risk mitigation is where we

play10:47

spend most of our time as Security

play10:48

Professionals risk mitigation is

play10:51

implementing various controls to reduce

play10:53

the risk we'll talk through a bunch of

play10:55

different types of controls in just a

play10:57

moment preventative controls deductive

play10:59

controls corrective controls Etc so risk

play11:02

mitigation is about reducing the risk by

play11:04

implementing various controls which

play11:06

brings up another important term

play11:07

residual risk residual risk is the risk

play11:10

that is left over after we've

play11:12

implemented mitigating

play11:14

controls there are three major methods

play11:17

we can use to implement mitigating

play11:20

controls administrative means policies

play11:22

procedures and other organizational

play11:24

practices that we put in place to manage

play11:26

risks administrative controls are things

play11:28

like security policies employee training

play11:31

and awareness

play11:32

Etc technical or logical controls are

play11:35

the technologies that we put in place to

play11:36

manage risk things like firewalls

play11:38

intrusion detection systems encryption

play11:40

automated backups Etc and physical

play11:44

controls are the physical security such

play11:46

as fences cameras locks fire suppression

play11:49

systems Etc so we can Implement controls

play11:52

using any of the three major methods

play11:55

administrative technal technical

play11:57

sociological and physical

play11:59

and one more layer here to Define before

play12:01

we get into the actual controls we can

play12:03

categorize the controls into two major

play12:05

groups safeguards and counter measures

play12:09

safeguards are the things that we put in

play12:11

place the controls that we put in place

play12:13

to try and ensure a risk doesn't occur

play12:16

So within this category of safeguards we

play12:19

have the following three controls

play12:21

directive controls are measures that

play12:23

provide guidance and instructions to

play12:25

Personnel on how to handle risks

play12:27

directive controls Direct Behavior how

play12:30

do we tell someone to do something

play12:31

within an organization policies policies

play12:34

are a perfect example of directive

play12:36

controls Thou shalt do this deterrent

play12:38

controls discourage individuals from

play12:41

engaging risky behaviors key word here

play12:43

is discourage deterrent controls don't

play12:46

prevent someone from doing something

play12:48

they discourage them a perfect example

play12:50

of a deterrent control is a sign that

play12:52

says private property all trespassers

play12:54

will be shot that sign wouldn't prevent

play12:56

me from walking onto a property but if

play12:59

this sign was in the US where everyone

play13:00

has at least 37 guns and the healthcare

play13:02

sucks uh it would definitely discourage

play13:04

me sorry for picking on the US here but

play13:06

I'm Canadian I'm allowed to all right

play13:08

we're like the annoying younger siblings

play13:10

of the us all right now preventive

play13:12

controls are measures that aim to

play13:14

prevent stop a risk from occurring

play13:16

examples of preventive controls include

play13:18

razor wire top defenses login mechanisms

play13:21

and firewalls they prevent someone from

play13:24

doing something as I said we can

play13:26

categorize the controls into two major

play13:27

categories into major groupings

play13:29

safeguards and counter measures counter

play13:32

measures are the controls we put in

play13:33

place to detect and respond to a risk

play13:36

that has occurred So within this

play13:38

category of counter measures we have the

play13:40

following three controls detective

play13:42

controls are measures that help identify

play13:45

that risks have occurred or are

play13:47

currently ongoing examples of detective

play13:50

controls include Sim systems security

play13:52

information event management systems

play13:54

intrusion detection systems smoke

play13:56

detectors Etc correct controls are

play13:59

measures that aim to reduce the negative

play14:01

impact of risks that have occurred a

play14:04

perfect example of a corrective control

play14:05

would be a fire suppression system that

play14:07

activates the put out of fire recovery

play14:09

controls are measures that help

play14:11

organizations recover from the negative

play14:13

impacts of a risk occurring getting back

play14:15

to business as usual a good example of a

play14:17

recovery control is a disaster recovery

play14:19

plan a DRP and finally compensating

play14:23

controls are the measures we put in

play14:25

place to mitigate the negative impacts

play14:26

of risks when other control are not

play14:29

effective or feasible so essentially

play14:31

compensating controls make up for the

play14:32

lack of a better control somewhere else

play14:35

okay now the final piece to cover

play14:36

related to controls functional and

play14:39

Assurance every good control is

play14:42

supported by these two aspects

play14:44

functional and Assurance the functional

play14:47

aspect refers to the function that a

play14:49

control is meant to perform for example

play14:52

what is the function of a firewall

play14:54

firewalls control the flow of traffic

play14:55

between two Network segments so a good

play14:57

firewall control is going to provide

play14:59

this functionality the ability to

play15:01

control the flow of traffic any good

play15:04

control is going to perform some sort of

play15:05

useful function the second aspect that

play15:08

any good control needs to provide is

play15:09

Assurance we need to be able to get

play15:11

assurance that a control is working

play15:12

correctly on an ongoing basis so going

play15:15

back to a firewall how would we

play15:17

typically get assurance that a firewall

play15:18

is working correctly on an ongoing basis

play15:20

by logging and monitoring the firewall

play15:23

so any good control is going to provide

play15:24

this assurance aspect and that finally

play15:28

wraps up discussion of risk mitigation

play15:31

so let's Zoom back up to the final risk

play15:32

treatment method risk acceptance risk

play15:36

acceptance is a deliberate decision to

play15:38

accept a certain level of risk and its

play15:40

potential consequences who within an

play15:43

organization should be accepting the

play15:45

risk associated with a particular asset

play15:47

the asset owner owners are accountable

play15:50

for the security of an asset so owners

play15:52

our best position to deliberately accept

play15:54

a risk or not risk management Frameworks

play15:58

provided a structured and systematic

play16:00

approach for managing risks within an

play16:01

organization there are a few risk

play16:04

management Frameworks that you should

play16:05

recognize the names of and there is one

play16:08

framework in particular that you really

play16:09

need to focus on let's start with the

play16:11

framework that you really need to focus

play16:13

on the RMF the risk management framework

play16:16

this is a National Institute of

play16:17

Standards and Technology nist

play16:19

publication specifically nist

play16:22

800-37 the RMF defines a structured

play16:25

seven-step process that helps

play16:27

organizations to manage r to their

play16:29

information systems and data you need to

play16:31

remember the seven steps at a high level

play16:34

the order of the steps and what is

play16:36

happening at each step the seven steps

play16:38

of the RMF are number one prepare to

play16:42

execute the RMF number two categorize

play16:46

systems this step is essentially focused

play16:48

on identifying the risks step three

play16:51

select security controls select the

play16:53

appropriate mtiga controls for risks you

play16:55

identified step four implement the

play16:58

controls step five assess the

play17:01

effectiveness of the implemented

play17:03

controls step six authorized based on

play17:06

the results of the assessment ideally

play17:09

the owner of the system should make the

play17:11

decision as to whether or not the system

play17:13

can be put into production is authorized

play17:14

to go into production and then step

play17:16

seven monitor perform ongoing monitoring

play17:18

of the controls to ensure they continue

play17:20

to operate effectively in production the

play17:23

other three Frameworks that you should

play17:25

be able to recognize as being risk

play17:26

management Frameworks are ISO 31,000 the

play17:30

Koso risk management framework and a

play17:33

saaka risk it and that is an overview of

play17:36

risk management within domain one

play17:37

covering the most critical Concepts you

play17:39

need to know for the exam in our 20 plus

play17:43

years of teaching cisp classes we've

play17:45

noticed that folks tend to make a few

play17:48

critical mistakes in their cisp press

play17:50

preparation accordingly we've created

play17:53

this super useful free guide that will

play17:55

explain three of the most common

play17:57

mistakes and most importantly how to

play18:00

avoid them you can access the free guide

play18:02

here at desert.com slre mistakes toavoid

play18:05

link is in the description below as

play18:10

[Music]

play18:16

well

Rate This
β˜…
β˜…
β˜…
β˜…
β˜…

5.0 / 5 (0 votes)

Related Tags
CISSP ExamRisk ManagementSecurity StrategiesAsset ValuationThreat ModelingVulnerability AssessmentRisk AnalysisMitigation ControlsResidual RiskRisk Acceptance