ISO/IEC TR 13335-3:1998
(Main)Information technology - Guidelines for the management of IT Security - Part 3: Techniques for the management of IT Security
Information technology - Guidelines for the management of IT Security - Part 3: Techniques for the management of IT Security
Technologies de l'information — Lignes directrices pour la gestion de sécurité IT — Partie 3: Techniques pour la gestion de sécurité IT
General Information
Relations
Frequently Asked Questions
ISO/IEC TR 13335-3:1998 is a technical report published by the International Organization for Standardization (ISO). Its full title is "Information technology - Guidelines for the management of IT Security - Part 3: Techniques for the management of IT Security". This standard covers: Information technology - Guidelines for the management of IT Security - Part 3: Techniques for the management of IT Security
Information technology - Guidelines for the management of IT Security - Part 3: Techniques for the management of IT Security
ISO/IEC TR 13335-3:1998 is classified under the following ICS (International Classification for Standards) categories: 03.100.70 - Management systems; 35.030 - IT Security; 35.040 - Information coding. The ICS classification helps identify the subject area and facilitates finding related standards.
ISO/IEC TR 13335-3:1998 has the following relationships with other standards: It is inter standard links to ISO/IEC 27005:2008. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.
You can purchase ISO/IEC TR 13335-3:1998 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of ISO standards.
Standards Content (Sample)
TECHNICAL ISO/IEC
REPORT TR 13335-3
First edition
1998-06-15
Information technology — Guidelines for
the management of IT Security —
Part 3:
Techniques for the management of IT Security
Technologies de l'information — Lignes directrices pour la gestion de
sécurité IT —
Partie 3: Techniques pour la gestion de sécurité IT
Reference number
B C
Contents
1 Scope 1
2 References 1
3 Definitions 1
4 Structure 1
5 Aim 1
6 Techniques for the Management of IT Security 2
7 IT Security Objectives, Strategy and Policies 3
7.1 IT Security Objectives and Strategy 4
7.2 Corporate IT Security Policy 5
8 Corporate Risk Analysis Strategy Options 7
8.1 Baseline Approach 7
8.2 Informal Approach 8
8.3 Detailed Risk Analysis 8
8.4 Combined Approach 9
9 Combined Approach 10
9.1 High Level Risk Analysis 10
9.2 Baseline Approach 10
9.3 Detailed Risk Analysis 11
9.3.1 Establishment of Review Boundary 12
9.3.2 Identification of Assets 13
9.3.3 Valuation of Assets and Establishment of Dependencies Between Assets 13
9.3.4 Threat Assessment 14
9.3.5 Vulnerability Assessment 15
9.3.6 Identification of Existing/Planned Safeguards 16
9.3.7 Assessment of Risks 17
9.4 Selection of Safeguards 17
9.4.1 Identification of Safeguards 17
9.4.2 IT Security Architecture 19
9.4.3 Identification/Review of Constraints 20
9.5 Risk Acceptance 21
9.6 IT System Security Policy 21
9.7 IT Security Plan 22
10 Implementation of the IT Security Plan 23
10.1 Implementation of Safeguards 23
10.2 Security Awareness 24
10.2.1 Needs Analysis 25
10.2.2 Programme Delivery 25
10.2.3 Monitoring of Security Awareness Programmes 25
10.3 Security Training 26
10.4 Approval of IT Systems 27
11 Follow-up 28
11.1 Maintenance 28
11.2 Security Compliance Checking 28
© ISO/IEC 1998
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means,
electronic or mechanical, including photocopying and microfilm, without permission in writing from the publisher.
ISO/IEC Copyright Office • Case postale 56 • CH-1211 Genève 20 • Switzerland
Printed in Switzerland
ii
© ISO/IEC ISO/IEC TR 13335-3:1998(E)
11.3 Change Management 30
11.4 Monitoring 30
11.5 Incident Handling 32
12 Summary 33
Annex A An Example Contents List for a Corporate IT Security Policy 34
Annex B Valuation of Assets 36
Annex C List of Possible Threat Types 38
Annex D Examples of Common Vulnerabilities 40
Annex E Types of Risk Analysis Method 43
iii
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Committee) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical
activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international
organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the
work.
In the field of information technology, ISO and IEC have established a joint technical committee,
ISO/IEC JTC 1.
The main task of technical committees is to prepare International Standards, but in exceptional
circumstances a technical committee may propose the publication of a Technical Report of one of
the following types:
−
type 1, when the required support cannot be obtained for the publication of an International
Standard, despite repeated efforts;
− type 2, when the subject is still under technical development or where for any other reason
there is the future but not immediate possibility of an agreement on an International Standard;
−
type 3, when a technical committee has collected data of a different kind from that which is
normally published as an International Standard (“state of the art”, for example).
Technical Reports of types 1 and 2 are subject to review within three years of publication, to decide
whether they can be transformed into International Standards. Technical Reports of type 3 do not
necessarily have to be reviewed until the data they provide are considered to be no longer valid or
useful.
ISO/IEC TR 13335-3, which is a Technical Report of type 3, was prepared by Joint Technical
Committee ISO/IEC JTC 1, Information technology, Subcommittee SC 27, IT Security techniques.
Information technology —
ISO/IEC TR 13335 consists of the following parts, under the general title
Guidelines for the manangement of IT Security:
− Part 1: Concepts and models for IT Security
− Part 2: Managing and planning IT Security
− Part 3: Techniques for the management of IT Security
− Part 4: Selection of safeguards
− Part 5: Safeguards for external connections
iv
© ISO/IEC ISO/IEC TR 13335-3:1998(E)
Introduction
The purpose of ISO/IEC TR 13335 is to provide guidance, not solutions, on management aspects of
IT security. Those individuals within an organization that are responsible for IT security should be
able to adapt the material in ISO/IEC TR 13335 to meet their specific needs. The specific objectives
of ISO/IEC TR 13335 are:
− to define and describe the concepts associated with the management of IT security,
−
to identify the relationships between the management of IT security and management of IT in
general,
−
to present several models which can be used to explain IT security, and
− to provide general guidance on the management of IT security.
ISO/IEC TR 13335 is organized into five parts. ISO/IEC TR 13335-1 provides an overview of the
fundamental concepts and models used to describe the management of IT security. This material is
suitable for managers responsible for IT security and for those who are responsible for the
organization's overall security programme.
ISO/IEC TR 13335-2 describes management and planning aspects. It is relevant to managers with
responsibilities relating to an organization's IT systems. They may be:
− IT managers who are responsible for overseeing the design, implementation, testing,
procurement, or operation of IT systems, or
− managers who are responsible for activities that make substantial use of IT systems.
This part of ISO/IEC TR 13335 describes security techniques relevant to those involved with
management activities during a project life-cycle, such as planning, designing, implementing, testing,
acquisition, or operations.
ISO/IEC TR 13335-4 provides guidance on the selection of safeguards, and how this can be
supported by the use of baseline models and controls. It also describes how this complements the
security techniques described in ISO/IEC TR 13335-3, and how additional assessment methods can
be used for the selection of safeguards.
ISO/IEC TR 13335-5 provides guidance to an organization connecting its IT systems to external
networks. This guidance includes the selection and use of safeguards to provide security for the
external connections and the services supported by those connections, and additional safeguards
required for the IT systems because of the connections.
v
TECHNICAL REPORT © ISO/IEC ISO/IEC TR 13335-3:1998(E)
Information technology — Guidelines for the management of
IT Security —
Part 3: Techniques for the management of IT Security
1 Scope
This part of ISO/IEC TR 13335 provides techniques for the management of IT security. The
techniques are based on the general guidelines laid out in ISO/IEC TR 13335-1 and
ISO/IEC TR 13335-2. These guidelines are designed to assist the implementation of IT
security. Familiarity with the concepts and models introduced in ISO/IEC TR 13335-1 and the
material concerning the management and planning of IT security in ISO/IEC TR 13335-2 is
important for a complete understanding of this part of ISO/IEC TR 13335.
2 References
Guidelines for the management of IT Security — Part 1: Concepts
ISO/IEC TR 13335-1:1996,
and models for IT Security.
Guidelines for the management of IT Security — Part 2: Managing
ISO/IEC TR 13335-2:1997,
and planning IT Security.
3 Definitions
For the purposes of this part of ISO/IEC TR 13335, the following definitions given in
ISO/IEC TR 13335-1 apply: accountability, asset, authenticity, availability, baseline controls,
confidentiality, data integrity, impact, integrity, IT security, IT security policy, reliability, residual
risk, risk, risk analysis, risk management, safeguard, system integrity, threat, and vulnerability.
4 Structure
This part of ISO/IEC TR 13335 is divided into 12 clauses. Clause 5 provides information on the
aim of this part of ISO/IEC TR 13335. Clause 6 gives an overview of the IT security
management process. Clause 7 discusses the importance of a corporate IT security policy and
what it should include. Clause 8 provides an overview of four different approaches an
organization may use to identify security needs. Clause 9 describes the recommended
approach in detail and is followed by a description of safeguard implementation in Clause 10.
This clause also includes a detailed discussion of security awareness programmes and the
approval process. Clause 11 contains a description on several follow-up activities that are
necessary in order to ensure that safeguards are working effectively. Finally, Clause 12
provides a brief summary of this part of ISO/IEC TR 13335.
5 Aim
The aim of this part of ISO/IEC TR 13335 is to describe and recommend techniques for the
successful management of IT security. These techniques can be used to assess security
requirements and risks, and help to establish and maintain the appropriate security safeguards,
i.e. the correct IT security level. The results achieved in this way may need to be enhanced by
additional safeguards dictated by the actual organization and environment. This part of
ISO/IEC TR 13335 is relevant to everybody within an organization who is responsible for the
management and/or the implementation of IT security.
6 Techniques for the Management of IT Security
The process of the management of IT security is based on the principles set out in ISO/IEC
TR 13335-1 and ISO/IEC TR 13335-2 . It can be applied to the whole organization as well as to
selected parts of it. Figure 1 shows the major stages in this process, and how the results of this
process feed back into the various parts of it. Feedback loops should be established whenever
required, be it within a stage, or after one or more of the stages are completed. Figure 1
(below) is a revision of Figure 1 in ISO/IEC TR 13335-2 emphasizing the topics this part of
ISO/IEC TR 13335 is concentrating on.
IT Security Objectives, Strategy and Policy
IT Security Objectives and Strategy
Corporate IT Security Policy
Corporate Risk Analysis Strategy Options
Detailed
Baseline Informal Combined
Risk
Approach Approach Approach
Analysis
Combined Approach
High Level Risk Analysis
Detailed
Baseline
Risk
Approach
Analysis
Selection of Safeguards
Risk Acceptance
IT System Security Policy
IT Security Plan
Implementation of the IT Security Plan
Implementation Security Security
of Safeguards Awareness Training
Approval of IT-Systems
Follow-Up
SeSeccuurriityty
CCoompmplialiannccee MMooninittoorriingng
ChChececkingking
Maintenance
Maintenance
ChChangangee IInncidencidentt
MMaanagnagememeenntt HandHandllinging
Figure 1: Management of IT Security
© ISO/IEC ISO/IEC TR 13335-3:1998(E)
The management of IT security includes the analysis of the requirements for security, the
establishment of a plan for satisfying these requirements, the implementation of this plan, as
well as maintenance and administration of the implemented security. This process starts with
establishing the organization’s IT security objectives and strategy, and the development of a
corporate IT security policy.
An important part of the IT security management process is the assessment of risks, and how
they can be reduced to an acceptable level. It is necessary to take into account the business
objectives, as well as organizational and environmental aspects, and each IT system's specific
needs and risks.
After assessing the security requirements of the IT systems and services, it is advisable to
select a corporate risk analysis strategy. The major strategy options are discussed in detail in
Clause 8 below. The recommended option involves conducting a high level risk analysis for all
IT systems to identify those systems at high risk. These systems are then examined through
detailed risk analysis, while a baseline approach is applied for the remaining systems. For the
high risk systems, the detailed consideration of assets, threats and vulnerabilities will lead to a
detailed risk analysis which facilitates the selection of effective safeguards commensurate with
the assessed risks. By using this option, the risk management process can be focused on
where the significant risks or greatest needs are, and the overall programme can be made
more cost and time effective.
Following the risk assessment, appropriate safeguards are identified for each IT system to
reduce the risks to an acceptable level. These safeguards are implemented as outlined in the
IT security plan. The implementation should be supported by an awareness and training
programme, which is important for the effectiveness of the safeguards.
Furthermore, the management of IT security includes the ongoing task of dealing with various
follow up activities, which can lead to changes to earlier results and decisions. Follow-up
activities include: maintenance, security compliance checking, change management,
monitoring, and incident handling.
7 IT Security Objectives, Strategy and Policies
After establishing the organization's IT security objectives, an IT security strategy should be
developed to form a basis for the development of a corporate IT security policy. The
development of a corporate IT security policy is essential to ensure that the results of the risk
management process are appropriate and effective. Management support across the
organization is required for the development and effective implementation of the policy. It is
essential that a corporate IT security policy takes into account the corporate objectives and
particular aspects of the organization. It must be in alignment with the corporate security policy
and the corporate business policy. With this alignment, the corporate IT security policy will help
to achieve the most effective use of resources, and will ensure a consistent approach to
security across a range of different system environments.
It may be necessary to develop a separate and specific security policy for each or some of the
IT systems. This policy should be based on risk analysis or baseline results and be consistent
with the corporate IT security policy, thus taking into account the security recommendations for
the system to which it relates.
7.1 IT Security Objectives and Strategy
As a first step in the process of managing IT security, one should consider the question 'what
broad level of risk is acceptable to the organization?'. The correct level of acceptable risks, and
thence the appropriate level of security, is the key to successful security management. The
necessary broad level of security is determined by the IT security objectives an organization
needs to meet. In order to assess these security objectives, the assets and how valuable they
are for the organization should be considered. This is mainly determined by the importance
that IT has for supporting the conduct of the organization's business; the costs of IT itself is
only a small part of its value. Possible questions for assessing how much an organization's
business depends on IT are:
•
What are the important/very important parts of the business which cannot be carried out
without IT support?
•
What are the tasks which can only be done with the help of IT?
• What essential decisions depend on the accuracy, integrity, or availability of information
processed by IT, or on how up-to-date this information is?
• What confidential information processed needs to be protected?
•
What are the implications of an unwanted security incident for the organization?
Answering these questions can help to assess the security objectives of an organization. If, for
example, some important or very important parts of the business are dependent on accurate or
up to date information, then one of the security objectives of this organization may be to ensure
the integrity and timeliness of the information as it is processed in the IT systems. Also,
important business objectives and their relation to security should be considered when
assessing security objectives.
Dependent on the security objectives, a strategy for achieving these objectives should be
agreed upon. The strategy chosen should be appropriate to the value of the assets to be
protected. If, for example, the answers to one or more of the questions above is 'Yes', then it is
likely that the organization has high security requirements, and it is advisable to choose a
strategy which includes sufficient effort to fulfil these requirements.
An IT security strategy outlines in general terms how an organisation will achieve its IT security
objectives. The topics such a strategy should address will depend on the number, type and
importance of those objectives, and normally be those which the organisation considers
important to be uniformly addressed throughout the organisation. The topics could be quite
specific, or very broad, in nature.
As an example of the former, an organisation could have a primary IT security objective that,
because of the nature of its business, all of its systems should maintain a high level of
availability. In this case, one strategy topic could be directed at minimising virus infestation
through organisation-wide installation of anti-virus software (or nominating selected sites for
virus checking through which all software received must be passed).
To illustrate the latter, at a broad level, an organisation could have an IT security objective,
because its business is selling its IT services, that the security of its systems have to be proven
to its potential customers. In this case, a strategy topic could be that all systems have to be
validated as being secure by a recognised third party.
Other possible topics for an IT security strategy, because of specific objectives or combinations
thereof, could include:
• the risk analysis strategy and methods to be adopted organisation-wide,
•
the need for an IT system security policy for each system,
• the need for security operating procedures for each system,
•
an organisation-wide information sensitivity categorisation scheme,
© ISO/IEC ISO/IEC TR 13335-3:1998(E)
•
the need for security conditions of connections to be met, and checked, before other
organizations are connected, and
•
the incident handling scheme to be universally used.
Once determined, the security strategy and its constituent topics should be encompassed in
the corporate IT security policy.
7.2 Corporate IT Security Policy
A corporate IT security policy should be produced based on the agreed corporate IT security
objectives and strategy. It is necessary to establish and maintain a corporate IT security policy,
consistent with the corporate business, security, and IT policies, and security related legislation
and regulation.
As reflected in 7.1, an important fact influencing the corporate IT security policy is how
dependent an organization is on the IT it is using. The more important the use of IT is, and the
more an organization has to rely on its IT, the more security is needed to guarantee that the
business objectives are met. When writing the corporate IT security policy, the cultural,
environmental and organizational characteristics should be borne in mind, since they can
influence the approach towards security, e.g. some safeguards, which might be easily
accepted in one environment, may be totally unacceptable in another.
The security relevant activities described in the corporate IT security policy can be based on
the organizational objectives and strategy, the results of previous security risk analysis and
management reviews, the results of follow-up actions such as security compliance checking of
implemented safeguards, of monitoring and reviewing IT security in day-to-day use, and of
reports of security relevant incidents. Any serious threat or vulnerability detected during these
activities needs to be addressed, with the corporate IT security policy describing the
organization's overall approach to deal with these security problems. The detailed actions are
described in the various IT system security policies, or in other supporting documents, for
example, security operating procedures.
When developing the corporate IT security policy, representatives from the following functions
should participate:
• audit,
•
finance,
• information systems (technicians and users),
• utilities/infrastructure (i.e. persons responsible for building structure and accommodation,
power, air-conditioning),
• personnel,
• security, and
• senior business management.
According to the security objectives, and the strategy an organization has adopted to achieve
these objectives, the appropriate level of detail of the corporate IT security policy is selected.
As a minimum, the corporate IT security policy should describe:
•
its scope and purpose,
• the security objectives with respect to legal and regulatory obligations, and business
objectives,
• IT security requirements, in terms of confidentiality, integrity, availability, accountability,
authenticity, and reliability of information,
• the administration of information security, covering organization and individual
responsibilities and authorities,
• the risk management approach which is adopted by the organization,
•
the means by which priorities for the implementation of safeguards can be determined,
• the broad level of security and residual risk sought by management,
•
any general rules for access control (logical access control as well as the control of physical
access to buildings, rooms, systems, and information),
•
the approach to security awareness and training within the organization,
• broad procedures to check and maintain security,
• general personnel security issues,
• the means by which the policy will be communicated to all persons involved,
• the circumstances under which the policy should be reviewed, and
•
the method of controlling changes to the policy.
Where a more detailed corporate IT security policy is needed, the following issues should also
be considered:
• organization-wide security models and procedures,
•
the use of standards,
• the procedures for the implementation of safeguards,
• the approach towards follow-up activities like
• security compliance checking,
• monitoring of safeguards,
•
handling of security related incidents,
• monitoring of IT system usage, and
•
the circumstances under which external security consultants will be engaged.
An example contents list for a corporate IT security policy is given in Annex A.
As discussed earlier in this clause, the results of previous risk analysis and management
reviews, security compliance checking and security incidents may have an effect on the
corporate IT security policy. This, in turn, may require that a previously defined strategy or
policy is reviewed or refined.
To ensure adequate support for all security related measures, the corporate IT security policy
should be approved by top management.
Based on the corporate IT security policy, a directive should be written, which is binding for all
managers and employees. This may require the signature of each employee on a document
which acknowledges his/her responsibility for security within the organization. Furthermore, a
programme for security awareness and training should be developed and implemented to
communicate these aspects.
An individual should be designated to be responsible for the corporate IT security policy, and
for ensuring that this policy reflects the requirements and the actual status of the organization.
This person would typically be the corporate IT security officer, who among other things should
be responsible for the follow-up activities. This includes security compliance check reviews, the
handling of incidents and security weaknesses, and any changes to the corporate IT security
policy which might be necessary according to the results of those actions.
© ISO/IEC ISO/IEC TR 13335-3:1998(E)
8 Corporate Risk Analysis Strategy Options
NOTE — To ensure that this part of ISO/IEC TR 13335 is complete, consistent, and can be read independently of
ISO/IEC TR 13335-2, Clause 8 deals with the same topics as Clause 10 of ISO/IEC TR 13335-2.
Before starting any risk analysis activity, an organization should have a strategy in place for
this analysis, and its constituent parts (methods, techniques, etc.) should be documented in the
corporate IT security policy. The means and criteria for the selection of the risk analysis
method should be agreed for the organization. The risk analysis strategy should ensure that
the approach chosen is suitable for the environment and that it focuses the security efforts
where they are really needed. The options presented below describe four different risk analysis
approaches. The basic difference between each of these options is the depth of the risk
analysis. Since it is generally too costly to conduct a detailed risk analysis for all IT systems,
and it is also not effective to give only peripheral attention to serious risks, a balance between
these options is needed.
Apart from the possibility of doing nothing, and accepting that there will be exposure to a
number of risks of unknown magnitude and severity, there are four basic options for a
corporate risk analysis strategy:
• use the same baseline approach for all IT systems, irrespective of risks facing the systems,
and accept that the level of security may not always be appropriate,
• use an informal approach to perform risk analysis and concentrate on IT systems which are
perceived as being exposed to high risks,
•
conduct detailed risk analysis using a formal approach for all IT systems, or
• carry out an initial 'high level' risk analysis to identify IT systems exposed to high risks and
those which are critical for the business, followed by a detailed risk analysis for these
systems, and applying baseline security to all other systems.
These different possibilities for addressing security risks are discussed below, and then a
recommendation is made as to the preferred approach.
If an organization decides to do nothing about security, or to postpone the implementation of
safeguards, management should be aware of the possible implications of this decision. Whilst
this requires no time, money, personnel or other resources, it has a number of disadvantages.
Unless an organization is confident about the non-critical nature of its IT systems, it may be
leaving itself open to serious consequences. An organization may not be in compliance with
legislation and regulation, and its reputation may suffer if it is subject to breaches in security,
and it is shown that no preventive action has been taken. If an organization has very few
concerns about IT security, or does not have any business-critical systems, then this may be a
viable strategy. However, the organization is left in a position of not knowing how good or bad
the situation really is, and for most organizations this is unlikely to be a good solution.
8.1 Baseline Approach
For the first option, an organization could apply baseline security to all IT systems by selecting
standard safeguards. A variety of standard safeguards are suggested in baseline documents
and codes of practice; a more detailed explanation of this approach can also be found in 9.2.
There are a number of advantages with this approach such as:
• only a minimum amount of resources is needed for risk analysis and management for each
safeguard implementation, and thus less time and effort is spent on selecting security
safeguards,
• baseline safeguards may offer a cost-effective solution, as the same or similar baseline
safeguards can be adopted for many systems without great effort if a large number of the
organization's systems operate in a common environment and if the security needs are
comparable.
The disadvantages of this option are:
• if the baseline level is set too high, there might be an excessive level of security on some IT
systems,
• if the level is set too low there may be a lack of security on some IT systems, resulting in a
higher level of exposure, and
• there might be difficulties in managing security relevant changes. For instance, if a system
is upgraded, it might be difficult to assess whether the original baseline safeguards are still
sufficient.
If all of an organization's IT systems have only a low level of security requirements then this
might be the most cost-effective strategy. In this case, the baseline has to be chosen such that
it reflects the degree of protection required by the majority of IT systems. Most organizations
will always need to meet some minimum standards to protect sensitive data and to comply with
legislation and regulation, e.g. data protection legislation. However, where an organization's
systems vary in business sensitivity, size, and complexity, it would neither be logical nor cost-
effective to apply a common standard to all systems.
8.2 Informal Approach
This option is to conduct informal pragmatic risk analyses. An informal approach is not based
on structured methods, but exploits the knowledge and experience of individuals.
The advantage of this option is:
• it usually does not require a lot of resources or time. No additional skills need to be learnt to
do this informal analysis, and it is performed quicker than a detailed risk analysis.
However, there are a number of disadvantages:
•
without some sort of formal approach or comprehensive checklists, the likelihood of missing
some important details increases,
•
justifying the implementation of safeguards against risks assessed in this way will be
difficult,
•
individuals who have minimum previous experience in analysing risks may have little
guidance to assist them in this task,
•
some approaches in the past have been vulnerability driven, i.e. security safeguards were
implemented based on identified vulnerabilities, without considering whether there were any
threats likely to exploit these vulnerabilities, i.e. whether there was a real need for the
safeguards,
• a degree of subjectivity may be introduced; the particular prejudices of the reviewer may
influence the results, and
• problems may arise if the person who carried out the informal risk analysis leaves the
organization.
Based upon the above disadvantages, this option is not an effective approach to risk analysis
for many organizations.
8.3 Detailed Risk Analysis
The third option is to conduct detailed risk analysis reviews for all IT systems in the
organization. Detailed risk analysis involves in-depth identification and valuation of assets, the
assessment of threats to those assets, and assessment of vulnerabilities. The results from
these activities are then used to assess the risks and thence identify justified security
safeguards. This approach is described in detail in 9.3.
The advantages with this approach are:
•
it is likely that appropriate safeguards are identified for all systems, and
• the results of the detailed analysis can be used in the management of security changes.
© ISO/IEC ISO/IEC TR 13335-3:1998(E)
The disadvantages of this option are:
it requires a considerable amount of time and effort, and expertise, to obtain results.
there is the possibility that the security needs of a critical system are addressed too late,
since all IT systems would be considered in the same detail and a considerable amount of
time is required to complete the analyses.
Therefore, it is not advisable to use detailed risk analysis for all IT systems. If this approach is
chosen, there are a number of possible implementations:
• use of a standard approach, that meets the criteria reflected in this TR (for example, the
approach described in 9.3),
• use a standard approach in different ways appropriate to the organization; the use of 'risk
modelling techniques' (described in 9.3) could be of advantage to some organizations.
8.4 Combined Approach
The fourth option is to first conduct an initial high level risk analysis for all IT systems, in each
case concentrating on the business values of the IT system and the serious risks to which it is
exposed. For the IT systems identified as being important for the organization's business
and/or exposed to high risks, a detailed risk analysis should be conducted in a priority order.
For all other IT systems, a baseline approach should be chosen. This option, which is in a
sense the combination of the best points of the options described in 8.1 and 8.3, provides a
good balance between minimizing the time and effort spent in identifying safeguards, while still
ensuring that the high risk systems are appropriately protected.
Additional advantages of this option are:
• the incorporation of an initial quick and simple approach is likely to gain acceptance of the
risk analysis programme,
• it should be possible to quickly build a strategic picture of an organizational security
programme, i.e. it will act as a good planning aid,
• resources and money can be applied where they are most beneficial, and systems likely to
be in the greatest need of protection will be addressed first, and
the follow up actions will be more successful.
The only potential disadvantage is:
• as the initial risk analyses are at a high level, and potentially less accurate, some systems
may not be identified as requiring detailed risk analysis. However, these systems would still
be covered by baseline security. Also, these systems can be re-visited whenever necessary
to check whether more than a baseline approach is needed.
The adoption of a high level risk analysis approach, combined with the baseline approach, and
detailed risk analysis where appropriate, offers the majority of organizations the most effective
way forward. This approach is recommended and will be examined in more detail in Clause 9.
9 Combined Approach
This section provides guidance for implementing the combined risk analysis strategy
recommended above.
9.1 High Level Risk Analysis
First it is necessary to conduct an initial high level risk analysis to identify which approach
(baseline or detailed risk analysis) is appropriate for each IT system. This high level risk
analysis considers the business values of the IT systems and the information handled, and the
risks from the organization's business point of view. Input for the decision as to which approach
is suitable for which IT system can be obtained from consideration of the following:
•
the business objectives to be achieved by using the IT system,
• the degree to which the organization's business depends on the IT system, i.e. whether
functions that the organization considers critical to its survival or the effective conduct of
business are dependent on this system, or on the confidentiality, integrity, availability,
accountability, authenticity, and reliability of the information processed on this system,
• the level of investment in this IT system, in terms of developing, maintaining, or replacing
the system, and
•
the assets of the IT system, for which the organization directly assigns value.
When these items are assessed, the decision is generally easy. If the objectives of a system
are important to an organization's conduct of business, if system replacement costs are high,
or if the values of the assets are at high risk, then a detailed risk analysis is necessary for the
system. Any one of these conditions may be enough to justify conducting a detailed risk
analysis.
A general rule to apply is: if the lack of IT system security can result in significant harm or
damage to an organization, its business processes or its assets, then a detailed risk analysis
(9.3) is necessary to identify potential risks. In all other cases, the application of a baseline
approach (9.2) provides appropriate protection.
9.2 Baseline Approach
The objective of baseline protection is to establish a minimum set of safeguards to protect all
or some IT systems of an organization. Using this approach, it is possible to apply baseline
protection organization-wide, and, as reflected above, additionally use detailed risk analysis
reviews to protect IT systems at high risk or systems critical to the business. The use of the
baseline approach reduces the investment that the organization has to make in the
performance of risk analysis reviews (8.1).
The appropriate baseline protection can be achieved through the use of safeguard catalogues
which suggest a set of safeguards to protect an IT system against the most common threats.
The level of baseline security can be adjusted to the needs of the organization. A detailed
assessment of threats, vulnerabilities and risks is not necessary. All that has to be done to
apply baseline protection is to select those parts of the safeguard catalogue which are relevant
for the IT system considered. After identifying the safeguards already in place, a comparison is
made with those safeguards listed in the baseline catalogue. Those that are not already in
place, and are applicable, should be implemented.
Baseline catalogues may specify safeguards to be used in detail, or they may suggest a set of
security requirements to be addressed with whatever safeguards appropriate to the system
under consideration. Both approaches have advantages. Catalogues of both types can be
found in the Annexes of ISO/IEC TR 13335-4. One of the objectives of the baseline approach
is consistency of security safeguards throughout the organization, which can be achieved by
both approaches.
© ISO/IEC ISO/IEC TR 13335-3:1998(E)
Several documents are already available which provide sets of baseline safeguards. Also,
sometimes a similarity of environments can be observed among companies within the same
industrial sector. After the examination of the basic needs, it may be possible for baseline
safeguard catalogues to be used by a number of different organizations. For example,
catalogues of baseline safeguards could be obtained from:
• international and national standards organizations,
• industry sector standards or recommendations, or
• some other company, preferably with similar business objectives, and of comparable size.
An organization may, of course, also generate its own baseline, established commensurate
with its typical environment, and with its business objectives.
9.3 Detailed Risk Analysis
As indicated in 8.3, a detailed risk analysis for an IT system involves the identification of the
related risks, and an assessment of their magnitude. The need for a detailed risk analysis can
be determined without unnecessary investment in time and money when high level reviews are
conducted for all systems, followed by detailed risk analysis reviews only on high risk or critical
systems as recommended in 8.4.
The risk analysis is done by an identification of potential adverse business impacts of
unwanted events and the likelihood of their occurrence. Unwanted events can adversely impact
the business, persons or any other valuable entity of the organization. The adverse impact of
an unwanted event is a composite of possible damages related to the value of the assets at
risk. The likelihood of occurrence is dependent on how attractive the asset is for a potential
attacker, the likelihood of threats occurring, and the ease with which the vulnerabilities can be
exploited. The results of the risk analysis lead to the identification and selection of safeguards
which can be used to reduce the identified risks to an acceptable level.
Detailed risk analysis involves in-depth reviews at each of the steps shown in Figure 2. It leads
to the selection of justified safeguards as part of the risk management process. The
requirements for these safeguards are documented in the IT system security policy and the
related IT security plan. A number of incidents and external influences which may affect the
security requirements of the system can make it necessary to reconsider parts of or the whole
risk analysis. Those influences could be: recent significant changes to the system, planned
changes, or the consequences of incidents which need to be dealt with.
A variety of methods exist for the performance of a risk analysis ranging from check list based
approaches to structured analysis based techniques. Automated (computer assisted) or
manual based products can be used. Whatever method or product is used by the organization,
it should at least address the topics identified in the following clauses. It is also important that
the methods used fit with the organization's culture.
Once a detailed risk analysis review for a system has been completed for the first time, the
results of the review - asset and their values, threat, vulnerability and risk levels, and
safeguards identified - should be saved, for example, in a database. Obviously, methods with
software support tools make this activity much easier. This representation, sometimes referred
to as a model, can be utilised to significant effect as changes occur over time, be they to
configuration, information types processed, threat scenarios etc. Only the changes are needed
as input in order to ascertain the effect on the necessary safeguards. Further, such models can
be quickly used to examine different options, say during the development of a new system, as
well as being used for other systems which are similar in nature.
Establishment of Review
Boundary (Clause 9.3.1)
Risk Analysis
Identification
of Assets (Clause 9.3.2)
Valuation of
Identification
Assets and
Threat Vulnerability
of Existing/
Establishment of
Assessment Assessment
Planned
Dependencies
Safeguards
Between Assets
(Clauses 9.3.3 - 9.3.6)
Assessment of Risks
(Clause 9.3.7)
Identification/
Review of
Constraints
(Clause 9.4.3)
Selection of
(Clause 9.4)
Safeguards
Risk Acceptance
(Clause 9.5)
No
Yes
IT System Security
Policy (Clause 9.6)
IT Security Plan
(Clause 9.7)
Figure 2: Risk Management Involving Detailed Risk Analysis
9.3.1 Establishment of Review Boundary
As shown in Figure 2, prior to gathering input for the asset identification and valuation, the
boundaries of the review should be defined. A careful definition of boundaries at this stage
avoids unnecessary work and improves the quality of the risk analysis. The boundary
description should clearly define which of the following have to be considered when carrying
out the risk analysis review for the considered IT system:
• IT assets (e.g. hardware, software, information),
• people (e.g. staff, subcontractors, other external personnel),
•
environments (e.g. buildings, facilities), and
• activities (operations).
© ISO/IEC ISO/IEC TR 13335-3:1998(E)
9.3.2 Identification of Assets
An asset is a component or part of a total system to which an organization directly assigns
value and hence for which the organization requires protection. For the identification of assets
it should be borne in mind that an IT system consists of more than hardware and software. For
example, asset types can be any of the following:
• information/data (e.g. files containing payment details, product information),
• hardware (e.g. computer, printer),
• software, including applications (e.g. text processing programs, programs develope
...








Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...