What a whirlwind the past few months have been for data security, breaches and hacking events. From the Wyndham v. FTC ruling to yet another breach by a BCBS affiliate, there is increasing pressure across the information security industry to push organizations to perform those pesky security risk assessments touted by the National Institute of Standards and Technology (NIST). No matter what country you are based in, odds are your client’s data touches, passes through, or sources from the United States. Given that, if you have not performed a security risk assessment pursuant to the NIST guidelines, now is the time.
For those of you not familiar with NIST, it draws its funding from the U.S. government and traces its origin back to 1821 (yes, really). The goal of NIST is to research, develop, standardize and push innovation forward across a broad swath of fields for the betterment of everyone, at no cost (other than taxes) to anyone. One of NIST’s best and most useful documents is its Guide for Conducting Security Risk Assessments. The security risk assessment procedures and guidelines outlined in this document now serve as the foundation for many industry standard risk assessment methods across a wide array of fields and industries. Because why reinvent the wheel? If you can have the risk assessment playbook the government paid NIST to create telling you how to assess risk in your organization, why not use it?
Security Risk Assessment for a NIST Framework
At the core of every security risk assessment lives three mantras: documentation, review, and improvement. Security risk assessments are only as valuable as the documentation you create, the honest review of the findings, and ultimately the steps towards improvement you take. The goal of performing a risk assessment (and keeping it updated) is to identify, estimate and prioritize risks to your organization in a relatively easy-to-understand format that empowers decision makers. With that in mind, here is a break down of a NIST Security Risk Assessment framework that would be appropriate for a targeted risk assessment (as opposed to enterprise-wide). For each of the steps listed below, track the results in a multi-page spreadsheet, and this document will serve as the root for further analysis.
- Baseline the System – Create a lifecycle chart of all the data within the targeted technology or program; encompassing birth, use, and destruction.
- Identify Threats – All of the threats you can imagine including intentional, unintentional, technical, non-technical, and structural. After you have made this list, cluster the threats into similar types (i.e. Non-Technical Threat – Fire, Flood, or Blood Events).
- Identify Vulnerabilities – All of the Vulnerabilities your organization has, including: patches, policies, procedures, software, equipment, etc. It often helps to group these Vulnerabilities to more easily analyze them (i.e. Vulnerability – Un-patched Servers/Workstations).
- Current Controls – All of the security and privacy controls you have in place to protect against the Vulnerabilities.
- Likelihood of Impact – Assign a value from low to high (e.g. – .1, .5, or 1) of how likely it is that a Threat hits a Vulnerability. Here, pair each cluster of similar threats and with your major groups of vulnerabilities to create an Impact pairing.
- Effect of Impact – Assign a value from low to high (e.g. – 10, 50, 100) of how bad the Impact would be on your organization if the Threat hit a Vulnerability.
- Risk Determination – Likelihood x Impact = Risk Level (0-33 = Low; 34-66 = Medium; 67-100 = High)
At the end of this process, you should have a spreadsheet that contains sortable columns of Impact pairings and their associated Risk Level. This will allow you to sort and parse the list in a way that gives you an easy view of those items with the greatest Risk Level, thereby creating a targeted list of what threats and vulnerabilities must be addressed first. Here is an example:
Targeted Security Risk Analysis – Hospital Client Phi Database
- Simple Baseline: Client PHI is entered, accessed, and stored within hospital EMR.
- Technical Threat: Malicious hackers attempting to gain access and steal PHI.
- Vulnerability: Un-patched Windows 2012 Server with default administrative password.
- Current Controls: Password protected, behind firewall with factory settings.
- Likelihood: .8 (Un-patched software accounted for the vast majority of breaches in 2014)
- Impact: 100 (Loss or theft of PHI would catastrophic for a hospital)
- Risk Determination: .8 x 100 = 80 (High Risk)
Post Analysis Breakdown
As you can see, the organization that produced the above analysis would need to immediately prioritize a Risk Determination of 80, especially on something so basic as maintaining patch updates. That aside, once you have completed your Security Risk Assessment and prioritized your Risk Determination list, turn to the Current Controls and make decisions of how to improve those controls to eliminate or mitigate the identified vulnerabilities. Once you document those decisions, draft a summary of the Security Risk Assessment highlighting surprises, problems, fixes, and future plans. As you implement any changes, be sure to append the Security Risk Analysis, or if enough wholesale changes are made, perform an updated Security Risk Assessment. This process seems daunting, and it can be. That said, once you have gone through the pain of doing it once, successive assessments will be quicker, more detailed, and serve to build upon what was done before. There are also third party tools that can streamline the process, such as the HHS Security Risk Analysis Tool created in conjunction with NIST. These third party tools vary wildly in quality, so choose wisely. Whatever risk analysis process you choose, create, or purchase, make sure it fits your needs and gives you the documentation you want, the capability to thoroughly review results, and the tools necessary to make improvements. Prepare now, or answer later when the investigators come knocking. You can learn how Tripwire can help your organization keep up with NIST’s ever-changing Framework compliance standards by clicking here.
About the Author: Hudson Harris is the Chief Privacy Officer and Associate General Counsel for a company encompassing clinical services and software design. He focuses on risk management, compliance, and privacy/security practice creation, management, and consulting. He holds a BA in International Affairs, a Masters of International Business, M.B.A., J.D. and is a licensed attorney in California. Hudson’s background offers a diverse array of experience including network administration; director of public relations at a nonprofit; business consulting; and an attorney for nonprofit corporations. He has a proven track record of taking disparate parties and reconciling them into a cohesive force for change. Hudson is an avid writer and past works include Tax Free Trade Zones of the World; regular blog contributions to security websites; and various articles on the intersection of business, technology, and security centric issues at legallevity.com and @legallevity. Editor’s Note: The opinions expressed in this and other guest author articles are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc. Title image courtesy of ShutterStock
Mastering Security Configuration Management
Master Security Configuration Management with Tripwire's guide on best practices. This resource explores SCM's role in modern cybersecurity, reducing the attack surface, and achieving compliance with regulations. Gain practical insights for using SCM effectively in various environments.