Anssi Guide Ebios - Risk - Manager en v1.0
Anssi Guide Ebios - Risk - Manager en v1.0
BIBLIOGRAPHY page 79
TERMS AND DEFINITIONS page 81
E BIOS Risk Manager1 (EBIOS RM) is the method for assessing and treating
digital risks published by National Cybersecurity Agency of France (ANSSI)
with the support of Club EBIOS2. It proposes a toolbox that can be adapted,
of which the use varies according to the objective of the project, and is com-
patible with the reference standards in effect, in terms of risk management3
as well as in terms of cybersecurity4.
EBIOS RM makes it possible to assess digital risks and to identify the security
measures to be taken in order to control them. It also makes it possible to
validate the acceptable level of risk and to carry on in the longer term in a
continuous improvement approach. Finally, this method makes it possible
to bring about resources and arguments that are useful for communication
and decision-making within the organisation and with regards to its partners.
Approach through
"scenarios"
DIGITAL RISK
ASSESSMENT
ELABORATED LEVEL OF CYBER ATTACKS
ELABORATED
REGULATORY AND
STANDARDS FRAMEWORK
Approach through
"conformity"
WIDE SPECTRUM
SIMPLE
WORKSHOP 1 WORKSHOP 2
SCOPE AND RISK ORIGINS
SECURITY BASELINE
STRATEGIC CYCLE
WORKSHOP 3
STRATEGIC
SCENARIOS
WORKSHOP 5
RISK TREATMENT
WORKSHOP 4
OPERATIONAL
SCENARIOS
SYSTEM
RISK ASSESSMENT
OPERATIONAL CYCLE
WORKSHOP 2
Risk origins
In the second workshop, you identify and characterise the risk origins (RO)
and their high-level targets, called target objectives (TO). The RO/TO pairs
deemed the most relevant are selected at the end of this workshop. The
results are formalised in a mapping of the risk origins.
5 The "business assets" correspond to the "essential assets" of the EBIOS 2010 method.
WORKSHOP 4
Operational scenarios
The purpose of workshop 4 is to construct technical scenarios that include
the methods of attack that are likely to be used by the risk origins to carry
out the strategic scenarios. This workshop adopts an approach similar to the
one of the preceding workshop but focuses on critical supporting assets. You
then assess the level of likelihood of the operational scenarios obtained.
Notes
■■ Workshops 3 and 4 are naturally supplied during successive
iterations.
■■ Workshops 2, 3 and 4 make it possible to assess the risks, which
constitutes the last stage of the digital risk management pyramid.
They use the security baseline according to different attack paths,
which are relevant with regards to the threats considered and as
a limited number in order to facilitate the analysis.
Strategic scenario
RISK LEVEL
(proper to each risk scenario,
WORKSHOP 5 assessed on the basis of
Risk scenario (1) Risk scenario (n)
its severity and its likelihood)
The approach calls for two cycles, of which the durations are defined during
the first workshop:
■■ a strategic cycle that revisits the entire study and in particular the
strategic scenarios;
■■ an operational cycle that returns to the operational scenarios in light
of the security incidents that have occurred, the appearance of new
vulnerabilities and changes in the methods of attack.
Existence of an IT charter
Note 1: step a) of the workshop only; this does not require having
conducted workshops 1 and 2 beforehand.
Note 2: in the framework of a preliminary study, the degree of depth of
workshop 1 is to be adapted (example: listing only the business assets,
conducting a summary analysis of the security baseline).
Note 3: step b) of the workshop only.
1
Scope and
security baseline
1/ Objectives of the workshop
The purpose of this first workshop is to define the framework of the study,
its business and technical scope, the associated feared events and the security
baseline. This workshop is a prerequisite for producing a risk assessment. The
period to be considered for this workshop is the same as the strategic cycle.
3/ Outputs
At the end of this workshop, you must have identified:
■■ the framework elements : objectives, roles and responsibilities, time frame;
■■ the business and technical scope : missions, business assets, supporting
assets;
■■ feared events and their level of severity;
■■ the security baseline: list of applicable requirements, implementation
status, gaps identification and justification.
5/ How to proceed?
a Define the framework of the study
To initiate the workshop, start with disclosing the purpose and the expecta-
tions of the meeting to the participants. Agree on the objectives of the study.
The latter can be, for example, the setting up of a cyber risk management
process in the organisation, the accreditation of an information system or
the identification of a level of security to be achieved in order to obtain a
product certification. According to the objective defined, the level of detail of
the study is deduced therefrom, along with the workshops to be conducted.
Then, identify the participants in the various workshops, their roles and
their responsibilities in the framework of the study (workshop facilitator,
contributor, decision-maker, etc.). To do so, you can for example create a
responsibility assignment matrix (RAM).
7 The duration of the workshop is suggested as an indication. It does not include the preparatory
and formalisation work to be carried out upstream and downstream.
Then define the timeframe of the study (durations of the operational and
strategic cycles). These durations must be adapted to the project constraints
and be consistent with the standards, legal and regulatory frameworks in effect.
Ordinarily, for an information system accreditation, the generic durations
are three years for the strategic cycle and one year for the operational cycle.
In a second step, you will list the missions, business assets and supporting
assets regarding the studied object8. The questions that may be raised are:
■■ What is the object of the study? What are its main missions, its purposes?
■■ What are the major processes and information that enable the studied
object to carry out its missions?
■■ What are the digital services, applications, IT networks, organisational
structures, human resources, premises, etc. which enable to carry out these
processes or process this information?
Start by listing all of the missions of the studied object, i.e. the end purposes
and major goals of the latter (the way it participates in creating value, for
example). According to the level of detail of the study, the missions to be
identified can sometimes be intrinsic to the studied object but are generally
those of the organisation of which the object is part of.
8 In order to carry out this activity, you can use the model suggested in methodological sheet no. 1.
At this stage, the objective is not to be exhaustive but rather to limit the
number of business assets in order to retain only those identified as essential
or sensitive. Proceeding as such makes it possible to keep a certain agility in
the study and to reduce the work to a useful and acceptable level. In order
to reach this end, you can for example:
■■ consider sets of information rather than isolated pieces of information;
■■ rank the business assets according to their security needs (availability,
integrity, confidentiality, etc.)9.
In terms of volume, 5 to 10 business assets generally form a base that is
sufficient for orienting the rest of the study. The business assets that are
not selected can however inherit the measures taken to protect the other
business assets.
9 To rank the business assets, it is possible to judge whether their security needs are "very high",
"notable" or "negligible". It is also possible for the assessment of the security needs of a business
asset to use scales for scoring, for example those with 3 or 4 levels used in the examples of the EBIOS
2010 method. However, the objective is not to seek an absolute value but rather a relative position
of the business assets in relation to one another.
Note : at this stage, you can limit the identification of the supporting
assets to the most important ones, for example one to three supporting
assets for each business asset. They will then be supplemented during
the drawing up of operational scenarios.
10 To construct it, it is possible to refer to guide from the French National Cybersecurity Agency,
ANSSI, Mapping the information system - How-to guide in 5 steps, 2018
NATURE OF THE
BUSINESS ASSET Process
(PROCESS OR INFORMATION)
ENTITY OR PERSON
RESPONSIBLE Pharmacist
(INTERNAL/EXTERNAL)
Set of IT equip-
Desktop appli- Desktop applica-
ment and ma-
cation servers tion servers sto-
Description storing all of the ring a portion of
chines that make
it possible to pro-
R&D data the R&D data
duce antigens
Process Information
Activity consisting in :
Information enabling to ensure the quality
■■ filling syringes (sterilisation, filling;
control and the batch release (examples:
labelling);
antigen, aseptic distribution, conditioning,
■■ conditioning (labelling and packa-
final release…)
ging).
Set of IT equipment and machines that Desktop application servers storing all of the
make it possible to produce vaccines on data regarding traceability and control, for the
a large scale various processes
Identifying and characterising the feared events (FE) enable the stakehol-
ders to objectively compare the importance of the missions and the business
assets while becoming aware of the security issues. In EBIOS Risk Manager,
feared events are associated with business assets and reveal a harmful breach
for the organisation. The degree of harm or impact is assessed according to
a severity scale that makes it possible to rank feared events.
In order to reveal the FEs, you can, for each business asset listed in the
preceding step, conduct research on the harmful effects subsequent, for
example, to a breach:
■■ affecting the availability of the business asset (example: inaccessible
information, total or partial interruption of service, impossibility to
conduct a phase of a process);
■■ its integrity (example: forgery or modification of information, function
creep of a service, alteration of a process);
■■ its confidentiality (example: disclosure of information, unauthorised
access to a service, compromising of a secret);
■■ its traceability (example: loss of traceability of an action or of a modifi-
cation of information, impossibility to track the chaining of a process);
■■ and more globally the quality of service and the performance that the
business asset must satisfy.
Methodological sheet no. 3 is proposed to help you carry out this activity.
Notes
■■ A feared event is described in the form of a short expression or
scenario that allows for an easy understanding of the harm linked
to reaching the business asset concerned. The prior assessment of
the security needs can help in estimating the severity.
■■ For feared events (FE) that affect availability, we recommend that
you specify beyond which loss of service the severity mentioned
is reached (example: unavailability of the service for a duration
exceeding 2 hours, impossibility to distribute data flows greater
than 1 Mbps). This approach will in particular enable you to anchor
in your risk assessment the notion of degraded operating mode.
■■ In order to estimate the severity, consider all of the possible types
of impacts – internal, external, direct, indirect – in order to push
the stakeholders into considering impacts of which they may have
never initially thought of.
■■ At this stage, the FEs are identified from the organisation's view
point, outside any attack scenario. They will then be useful in
developing strategic scenarios (workshop 3), from the attacker's
view point, and can be updated in this framework.
The scoring of the severity of the impacts is carried out based on the fol-
lowing matrix:
SCALE CONSEQUENCES
BUSINESS
FEARED EVENT IMPACTS SEVERITY
ASSET
Determining the security baseline and the gaps assumes adopting a compliance
approach, corresponding to the first two stages of the risk management py-
ramid. For this, you must identify all of the security reference standards
that apply to the studied object.
These reference standards can be:
■■ healthy information system rules and security best practices : ANSSI's
recommendation guides11, the organisation's internal security rules, etc.;
■■ standards: ISO 27000 family, etc.;
■■ current regulations: you can refer to ANSSI's website12 that lists a spec-
trum of regulatory texts in terms of digital security.
If the studied object is a system or a product that already exists, then assess
the implementation status of the various reference standards listed, for
example thanks to a colour indicator (green for "applied without restriction",
orange for "applied with restrictions", red for "not applied", etc.) and clearly
identify the gaps, as well as the causes of the latter.
11 www.ssi.gouv.fr/en/best-practices
12 www.ssi.gouv.fr/en/regulation
Existence of a
Rule 8: identify non-nominative
each individual admin account for
accessing the the administration
system by of the ERP (pro-
name and dis- prietary solution
healthy tinguish the that does not allow
informa- guideline user/adminis- for administra-
tion system for a trator roles tion via another
Applied with
rules and healthy account)
restrictions
security informa-
best tion system
practices Rule 37: define
and apply a Backup policy cur-
backup policy rently being written
for critical by a working group
components
The gaps observed with respect to the security baseline will be included
in the risk assessment conducted in the following workshops in order
to identify the risks that they pose on the organisation. Security mea-
sures can then be defined during workshop 5 in order to limit them.
Note: the results of the risk studies conducted previously will be inte-
grated in this step. Indeed, these studies permited you to identify and
to implement security measures. The latter are now part of the security
baseline of your organisation and can be tested in the following risk
assessment workshops.
2
Risk origins
1 / Objectives of the workshop
The purpose of workshop 2 is to identify the risk origins (RO) and their target
objectives (TO), linked with the particular context of the study. The workshop
aims to answer the following question: who or what can infringe upon the
missions and business assets identified in workshop 1, and for what purposes?
The risk origins and the target objectives are then characterised and assessed
in order to retain the most relevant ones. They will be useful for constructing
scenarios for workshops 3 and 4.
3 / Outputs
At the end of the workshop, you must have established the following elements:
■■ the list of priority RO/TO pairs selected for the rest of the study;
13 The team can be supplemented with any person deemed useful.
5 / How to proceed?
To conduct this workshop, you need to know the missions and the business
assets of the studied object, coming from workshop 1.
The fine characterisation of the risk origins and of their target objectives re-
quires having precise information on the state of the threat and must ideally
turn to the sector involved: attackers or groups of attackers, assumed resources
and motivation, methods of attack, the most exposed activities, etc. The daily
cyber attack watch bulletins and the news regarding cybersecurity are also
precious sources of information that make it possible to supplement and
14 The duration of the workshop is suggested as an indication. It does not include the preparatory
and formalisation work to be carried out upstream and downstream.
To conduct the workshop, you must ask yourself the following questions:
■■ what are the risk origins that can harm the organisation's missions or
high-level interests (sector-related, state-related, etc.)?
■■ what can the target objectives be for each risk origin in terms of the
effects sought?
One way of doing this is to review the categories of risk origins and target
objectives suggested in methodological sheet no. 4: for each category of
risk origin, determine what the attacker's profile is and what types of objec-
tives the attacker wants to reach. The same risk origin can generate, where
applicable, several RO/TO pairs, with target objectives of different natures.
Notes
One of the keys to success consists in searching varied categories
■■
of RO/TO pairs in order to have a differentiated panel of attacker
profiles and target objectives from which the strategic scenarios
of workshop 3 will be established. It is also important not to leave
any blind spots: ensure that you cover the organisation's business
assets as widely as possible.
The target aimed by a risk origin can be beyond the sole perimeter
■■
of the studied object. In this case, the latter may be used as an
intermediary to reach the TO or be subjected to collateral impacts
due to its exposure to the risk.
When the team has stopped producing new RO/TO pairs, you can assess
the pertinence of each pair. The objective is to identify, in the pool of risk
origins and target objectives listed, those that you feel are the most relevant.
Although the feedback from participants can form a first basis for assessment,
we also recommend that you use criteria and metrics for characterisation
that will provide a certain degree of objectivity. The assessment criteria that
are generally used are:
■■ the motivation of the risk origin to reach its target;
■■ its resources (financial, skills, attack infrastructures);
■■ its activity (is it active within the perimeter of the studied object, in the
ecosystem, in the industry concerned, in a similar industry, etc.).
c SELECT THE RO/TO PAIRS Selected FOR THE REST OF THE ANALYSIS
Based on the preceding work, you can then finalise the workshop by se-
lecting the RO/TO pairs for the rest of the study. One of the choice criteria
is obviously the level of relevance assessed in the preceding step. Favour
RO/TO pairs that are sufficiently distinct from one another and that will
likely affect different business assets and supporting assets. In terms of vo-
lume, 3 to 6 RO/TO pairs generally form a base that is sufficient to develop
strategic scenarios.
Sabotage the
Hacktivist national vaccina- ++ + ++ Moderate
tion campaign
Information
Competitor +++ +++ +++ High
theft
Disclosing
Hacktivist information on ++ + + Low
animal tests
Altering the
composition
Cyber-terrorist of vaccines + ++ + Low
for bioterrorist
purposes
The working group will retain as a priority the pairs with high and moderate
pertinence, and will initially set aside the cyber-terrorist threat and that lin-
ked to hacktivists who want to disclose information on animal tests, which
are deemed to be less significant.
3
Strategic
scenarios
1 / Objectives of the workshop
The ecosystem includes all of the stakeholders that orbit the studied object
and participate in carrying out its missions (partners, subcontractors, subsi-
diaries, etc.). More and more cyberattack modus operandi leverages the most
vulnerable links in this ecosystem in order to reach their target (example:
affecting the availability of a service by attacking the Cloud service supplier,
booby-trapping the logistics supply chain of servers that facilitate sensitive
data exfiltration).
15 The team can be supplemented with any person deemed helpful.
3 / Outputs
At the end of the workshop, you must have established and identified the
following elements:
■■ the ecosystem digital threat mapping and the critical stakeholders;
■■ the strategic scenarios;
■■ the security measures chosen for the ecosystem.
16 The duration of the workshop is suggested as an indication. It does not include the preparatory
and formalisation work to be carried out upstream and downstream.
Note : the ecosystem view presents the various stakeholders with which
the studied object interacts directly or indirectly in order to perform
its missions and services. For the sake of efficency, it can be limited to
the interactions associated with the business assets. When possible,
it is in your interest to use an existing mapping and to supplement it
if needed. For more information, you can refer to the mapping guide
proposed by ANSSI.
You will then establish the ecosystem digital threat mapping17 on which all
of the stakeholders of interest have to appear in terms of their threat level
with regards to the studied object.
Finally, you will be able to select the critical stakeholders. Using risk accep-
tance thresholds will facilitate this selection work. A simple approach for
creating the digital threat mapping and for selecting the critical stakehol-
ders is suggested in methodological sheet no. 5. Stakeholders are assessed
here based on the exposure criteria (dependency, penetration) and cyber
reliability (maturity, trust).
17 This tool will facilitate on the one hand selecting the critical stakeholders and on the other hand
identifying the security measures to be implemented and to be written into contracts. The digital
threat mapping is a variant, from a digital risk management standpoint, of the mapping of the infor-
mation system. It is useful in conducting many projects and reflects your governance in terms of the
digital risk management of the ecosystem.
The team has decided to focus initially on the stakeholders external to the
company. It has identified the following stakeholders:
CATEGORY STAKEHOLDER
C1 – Healthcare institutions
Clients C2 – Pharmacies
P1 – Universities
Partners P2 – Regulators
P3 – Laboratories
Service
F2 – Production equipment suppliers
providers
F3 – IT service provider
Clients Partners
C1 – HEALTHCARE
INSTITUTIONS P1 – UNIVERSITIES
C2 – PHARMACIES
P2 – REGULATORS
C3 – DEPOSITORIES
AND WHOLESALE P3 – LABORATORIES
DISTRIBUTORS
Studied object
5
F3 – IT SERVICE
PROVIDER 4
3
F2 – EQUIPMENT 2
SUPPLIERS
1
F1 – INDUSTRIAL 0
CHEMICAL SUPPLIERS
Service providers
18 As indicated in the preamble, it shows that the analysis and the assessment carried out provide
assistance in making decisions, but the latter reverts to project governance which can decide to set
aside such and such threat element for contextual or policy reasons.
In the previous step, you constructed the ecosystem digital threat mapping
and selected the critical stakeholders. The objective now is to imagine rea-
listic high-level scenarios, indicating in what way an attacker could proceed
to reach its target. It could for example go through the ecosystem or divert
some business processes.
Once the most exposed elements have been identified, you can draw up the
strategic scenario stemming from the RO/TO pair by describing the sequencing
of the events generated by the risk origin in order to reach its target. Infrin-
gement on the business assets corresponds to feared events for the studied
object while the events regarding the ecosystem are intermediate events.
You can represent your scenarios in the form of attack graphs or directly on
the ecosystem view of the mapping of the information system by superposing
thereon the attack path(s).
You will then assess the level of severity of each scenario, with regards to the
potential impacts associated with the feared events on the business assets.
Notes
■■ Keep in mind that the end purpose is to identify the most rele-
vant entry points, dissemination relays and attack vectors, in a
logic of least effort, and to describe them in the form of events
that correspond to intermediate goals for the attacker in order to
reach their target. Avoid however developing strategic scenarios
that are excessively detailed.
■■ In general, one to three attack paths for each RO/TO pair are
enough to explore the relevant risk field. Take care to favour a
variety of scenarios in which different critical stakeholders inter-
vene and with various categories of business assets.
The working group addressed first the RO/TO pair "A competitor wants to
steal information by spying on the R&D work in order to obtain a competi-
tive advantage" (see workshop 2). The three attack paths hereinafter were
deemed relevant.
A portion R&D
of the R&D information
information
EXFILTRATION CHANNEL
LABORATORY (P3)
COMPETITOR
EXFILTRATION CHANNEL
Production
of vaccines
HACKTIVIST
The work carried out previously may have brought to light structural vulne-
rabilities linked to the internal and external stakeholders, that attackers will
try to exploit in order to achieve their purposes. You may have also identified
a scenario in which your organisation would be affected collaterally from
an cyberattack targeting one of your partners. The aim of the last step of
workshop 3 is looking for ways to reduce these risks and translating them
into security measures.
The purpose of the security measures is to reduce the intrinsic threat level
induced by the critical stakeholders (example: reduce the dependency on a
subcontractor)19. They can also act on the unfolding of strategic scenarios.
Note: the security measures will likely have an impact on the governance
of your organisation, and even on the one of your external stakehol-
ders. Consequently, decision from the management is to be foreseen.
Security measures have been defined in priority for the service providers
F2, F3 and P3. The latter are indeed involved in strategic scenarios that are
particularly problematic.
(P3)
Studied object
5
(F3) 4
(F2) 2
Service providers
RESIDUAL
Clients Partners
(P3)
Studied object
5
(F3) 4
(F2) 2
Service providers
4
Operational
scenarios
1 / Objectives of the workshop
The objective of workshop 4 is to build operational scenarios. They diagram
the methods of attack that the risk origins could use to carry out the strate-
gic scenarios. This workshop adopts an approach similar to the one of the
preceding workshop but focuses on the supporting assets. The operational
scenarios obtained are assessed in terms of likelihood. At the end of this
workshop, you will create a summary of all of the risks of the study.
The period to be considered for this workshop is the one of the operational
cycle.
3 / Outputs
At the end of the workshop, you must have established:
■■ the list of operational scenarios and their likelihood.
20 The team can be supplemented with any person deemed useful.
5 / How to proceed?
To conduct this workshop, you need to know:
■■ the missions, business assets and supporting assets related to the studied
object (workshop 1);
■■ the security baseline (workshop 1);
■■ the risk origins and target objectives selected (workshop 2);
■■ the strategic scenarios selected (workshop 3);
■■ the application and logical infrastructure views of the mapping of the
IT system.
21 The duration of the workshop is suggested as an indication. It does not include the preparatory
and formalisation work to be carried out upstream and downstream.
The diagram hereinafter shows the typical method of attack for a so-called
"waterhole" attack of which the objective is to allow a risk origin to establish
a data exfiltration channel.
1 VICTIM OR THIRD-PARTY
INTERNET SITE
4
WORK STATIONS
OF THE VICTIM
5 Propagation
of the infection
EXFILTRATION
SERVER
VICTIM
Data
exfiltration
The project team has decided to represent the operational scenarios in the
form of attack graphs. It decided to focus on carrying out a first operational
scenario corresponding to a strategic attack path identified in workshop 3.
Operational scenario relative to the attack path "A competitor steals research
work by creating a data exfiltration channel that directly concerns the infor-
mation system of R&D (of the biotechnology company)":
Intrusion via
a pre-existing
access channel
1
Internal
Intrusion via
Open source reconnaissance of Exploiting malware
a phishing email
external office environment for collection
on the HR
reconnaissance and IT networks, and exfiltration
department
Paris site
Creation
Intrusion via and maintaining
the Work Council of an exfiltration
site (waterhole) channel via an
Internet station
2 Corruption Lateralisation
of the personnel to the R&D LAN
of the R&D team network
Corruption
Booby-trapped Theft and
Advanced external of a premises
USB key in exploitation
reconnaissance maintenance
a R&D station of R&D data
service provider
3
1. The attacker gets into the information system via a targeted attack on the
message system of the human resources department by booby-trapping
the website of the works council or by exploiting a pre-existing hidden
channel. The attacker then accesses the strategic R&D data due in par-
ticular to the absence of partitioning between the internal networks
then exfilters by using the hidden channel or even a legitimate channel.
2. The attacker corrupts an employee of the R&D team who then easily
recovers the information from his work station, since no supervision
measure or action is carried out.
During the workshop, it was noted many times that the current lack of
rigour in applying security patches substantially facilitated the exploitation
of vulnerabilities.
For each operational scenario, you will assess its overall likelihood, which
reflects its probability of success or its feasibility.
Note: you may recall that the severity of the operational scenario cor-
responds to the severity of the associated strategic scenario, assessed
during workshop 3.
Then assess the overall likelihood of the scenario using elementary likeli-
hoods. The assessment can, for example, focus on the method of attack of
least effort for the risk origin. You can refer to methodological sheet no. 8
in order to carry out this assessment.
Note: you can also conduct a direct assessment of the overall likelihood
of the scenario, without going through a detailed scoring of the ele-
mentary actions. Consider for example the likelihood of the various
methods of attack as a whole. This express method however loses
precision compared to assessing elementary likelihoods.
The five operational scenarios were developed during the preceding step by
the project team (they will not be shown again here). They were assessed
according to their level of likelihood, based on the following scoring grid:
SCALE Description
The risk origin will certainly reach its target objective by one of
V4
the considered methods of attack.
Nearly certain
The likelihood of the scenario is very high.
The risk origin will probably reach its target objective by one of
V3
the considered methods of attack.
Very likely
The likelihood of the scenario is high.
The risk origin could reach its target objective by one of the consi-
V2
dered methods of attack.
Likely
The likelihood of the scenario is significant.
The risk origin has little chance of reaching its objective by one
V1
of the considered methods of attack.
Rather unlikely
The likelihood of the scenario is low.
The theft of R&D research data by the intermediary of the IT service provider
is considered to be nearly certain. On the one hand, the service provider in
question has high access rights to the biotechnology company's IT system
and on the other hand the security of its IT system is weak. The combination
of these aggravating factors makes an operation of intrusion and exfiltration
very easy for an attacker with minimum engagement of resources.
5
Risk treatment
1 / Objectives of the workshop
The purpose of this workshop is to create a summary of the risk scenarios
identified and to define a risk treatment strategy. This strategy results in the
defining of security measures, listed in a security continuous improvement
plan (SCIP). The residual risks are then identified as well as the framework
for following these risks.
3 / Outputs
At the end of the workshop, you must have defined the following elements:
■■ the risk treatment strategy;
■■ the summary of residual risks;
■■ the security continuous improvement plan;
■■ the framework for monitoring risks.
23 The team can be supplemented with any person deemed useful.
5 / How to proceed?
To conduct this workshop, you need to know:
■■ the security baseline (workshop 1);
■■ the strategic scenarios (workshop 3);
■■ the security measures regarding the ecosystem (coming from workshop 3);
■■ the operational scenarios (workshop 4).
24 The duration of the workshop is suggested as an indication. It does not include the preparatory
and formalisation work to be carried out upstream and downstream.
25 Kiviat diagram.
SEVERITY
4 R5 R4
3 R2 R1 R3
1 2 3 4 LIKELIHOOD
Risk scenarios:
R1: A competitor steals R&D information through a direct exfiltration
channel
R2: A competitor steals R&D information by exfiltering information
held by the laboratory
R3: A competitor steals R&D information through an exfiltration
channel via the IT service provider
R4: A hacktivist provokes the stoppage of the production of vaccines by
compromising the maintenance equipment of the equipment supplier
R5: A hacktivist disturbs the distribution of vaccines by modifying
their labelling
For each risk scenario, agree on acceptance thresholds of the risk and level of
security to be achieved in case of non-acceptance. This decision is formalised
in the risk treatment strategy. We recommend the following acceptance
classes, commonly used in risk management.
ACCEPTABILITY
RISK LEVEL DESCRIPTION OF THE DECISIONS AND ACTIONS
OF THE RISK
SEVERITY
4 R5 R4
3 R2 R1 R3
1 2 3 4 LIKELIHOOD
Risk scenarios:
R1: A competitor steals R&D information through a direct exfiltration
channel
R2: A competitor steals R&D information by exfiltering information
held by the laboratory
R3: A competitor steals R&D information through an exfiltration
channel via the IT service provider
R4: A hacktivist provokes a stoppage of the production of vaccines by
compromising the maintenance equipment of the equipment supplier
R5: A hacktivist disturbs the distribution of vaccines by modifying
their labelling
The identification of the risk treatment measures must result from the
strategic and operational scenarios. Run through each scenario and ask
yourself the following question: what are the elementary phases or actions
for which it would be relevant to reinforce the security, in order to make the
task more difficult for an attacker and reduce their probability of success? In
the framework of an approach to analysing the asset, give priority to securing
the elementary actions of which the likelihood is the highest as well as the
strategic or operational nodes through which the risk origin could pass. This
then entails giving priority to securing the critical supporting assets involved.
26 Methodological sheet no. 9 proposes a typical structure for security measures.
ASSOCIATED
PERSON BRAKES AND DIFFICULTIES COST /
SECURITY MEASURE RISK TIMEFRAME STATUS
RESPONSIBLE FOR IMPLEMENTATION COMPLEXITY
SCENARIOS
GOVERNANCE
Validation from the
Reinforced awareness of phishing by Industrial Health and In
R1 CISO + 6 months
a specialised service provider Safety Committee is progress
indispensable
Technical and organisational security
audit of the entire office environment To be
R1, R5 CISO ++ 3 months
IS by an audit service provider for launched
information system security
Identifying the
To be
Encryption of the data exchanges with IT depart- encryption product
R2 ++ 9 months launched
the laboratories ment and getting it accep-
ted by the laboratories
DEFENCE
RESILIENCE
The assessment of the residual risks (RR) takes place after applying the
treatment measures defined in the preceding step. You can for example
document the residual risks according to the following model:
We recommend that you represent the residual risks in the same way as the
initial risk mapping. The residual risk mapping thus obtained can then be
used as a reference when the formal review of the risks has to be conducted
(during an accreditation commission meeting for example). It forms a deci-
sion-support tool for accepting residual risks.
SEVERITY
4 R5 R4
3 R2 R1 R3
1 2 3 4 LIKELIHOOD
SEVERITY
R4
4
R5
3 R2 R1 R3
1 2 3 4 LIKELIHOOD
On the other hand, the top management wants to place under surveillance
the bioterrorist threat which is currently deemed to be not very relevant (see
workshop 2), but the top management sees it as a major concern.
The management of the risks, in particular the monitoring of the risks, must
be based on steering indicators in order to ensure for example the main-
taining in security conditions. These indicators make it possible to verify
the effectiveness of the measures taken and their suitability in terms of the
state of the threat.
Once these indicators are listed, define or refine the continuous improve-
ment process for security and the related governance (organisation, roles
and responsibilities, associated committees). It is recommended to form a
steering committee that meets every six months to address this ramping
up or every twelve months at cruising speed in order to ensure follow-up of
the indicators, progress with the SCIP and the change in risks.
Updating the risk study is done in compliance with the scheduled strategic
and operational cycles. In case of major events questionning the relevance of
the scenarios (emergence of a new threat, significant change in the ecosystem
or in the studied object, etc.), the latter will be the subject of an update at
the right level.
ATTACK SURFACE
All of the supporting assets on which the studied object is based or
which interact with the latter, that could be used to carry out an attack.
The higher the number of supporting assets or the more the latter
have vulnerabilities that can be exploited by an attacker, the larger
the attack surface.
BUSINESS ASSET
In the framework of the study, an important component for the or-
ganisation accomplishing its mission. This can be a service, a support
function, a step in a project and any related information or know-how.
EXAMPLES : on-line back-up or reservation cancellation service, client informa-
tion, supervision service, results of R&D work, personal data, deployment
phase of a project, know-how in designing aeronautical parts.
Notes :
■■ business assets represent the information assets that a risk origin
would be interested in attacking in order to harm the studied object;
■■ in EBIOS 2010, this corresponds to the essential assets.
CRITICAL STAKEHOLDER
Stakeholder of the ecosystem that is likely to form a privileged vector
for attack, due for example to its privileged digital access to the studied
object, its vulnerability or its exposure to the risk. The critical stakehol-
ders are identified in the ecosystem digital threat mapping.
DENIAL OF SERVICE
A denial of service attack aims to render one or several services una-
vailable via the exploitation, for example, of a software or hardware
vulnerability. The term distributed denial of service (or DDoS) is used
when the attack makes use of a network of machines – most of the time
compromised – in order to interrupt the targeted service or services.
ECOSYSTEM
All of the stakeholders with interactions with the studied object. Inte-
raction means any relationship that takes place in the normal operation
of the studied object. The risk origins are not considered a priori as
stakeholders, unless they can affect the operation of the studied object.
ELEMENTARY ACTION
Unitary action executed by a risk origin on a supporting asset in the
framework of an operational scenario.
EXAMPLES : exploiting a vulnerability, sending a booby-trapped email, erasing
trails, increasing privileges.
FEARED EVENT
A feared event is associated with a business asset and harms a security
need or criterion of the business asset (examples: unavailability of a
service, illegitimate modification of a high temperature threshold of
an industrial process, disclosure of classified data, modification of a
database). The feared events to be exploited are those of the strategic
scenarios and relate to the impact of an attack on a business asset.
Each feared event is assessed according to the level of severity of the
consequences, using metrics.
INITIAL RISK
Risk scenario assessed before application of the risk treatment strategy.
This assessment is based on the severity and the likelihood of the risk.
INTERMEDIATE EVENT
In the sequence of a strategic scenario, an intermediate event can be
generated by the risk origin with regards to a stakeholder of the eco-
system for the purpose of facilitating reaching its objective.
EXAMPLES : creating an exfiltration channel from the service provider's in-
frastructure, denial of service attack of the cloud IT supplier of the target.
MISSION
Function, end purpose, reason of existence of the studied object.
OPERATIONAL SCENARIO
Chain of elementary actions regarding the supporting assets of the
studied object or of its ecosystem. Planned by the risk origin for the
purpose of achieving a determined objective, operational scenarios are
assessed in terms of likelihood
OPERATING MODE
Series of elementary events that the risk origin will probably have
to carry out in order to reach its target. This terminology relates to
operational scenarios.
RISK
Possibility of a feared event occurring and that its effects affect the
missions of the studied object. In the cyber context in which EBIOS
Risk Manager fits, a risk is described in the form of a risk scenario.
RISK ASSESSMENT
Set of processes for identifying, analysing and assessing risks (ISO
31000:2018). In the EBIOS RM approach, this corresponds to workshops
2 (risk origins), 3 (strategic scenarios) and 4 (operational scenarios).
RISK LEVEL
Measurement of the extent of the risk, expressed by combining the
severity and the likelihood.
RISK MAPPING
Visual representation (example: radar, Farmer diagram) of the risks
stemming from the risk assessment activities.
SECURITY ACCREDITATION
Validation by an accreditation authority that the level of security
achieved by the organisation is compliant with the expectations and
that the residual risks are acceptable in the framework of the study.
SECURITY NEED
Security property to be guaranteed for a business asset. It reveals a
security stake for the business asset.
EXAMPLES : availability, integrity, confidentiality, traceability.
SECURITY PATCH
Section of code added to a piece of software in order to correct an
identified vulnerability.
SEVERITY
Estimation of the extent and of the intensity of the effects of a risk. The
severity provides a measurement of the detrimental impacts perceived,
whether direct or indirect.
EXAMPLES : negligible, minor, major, critical, maximum.
SUPPORTING ASSET
Component of the information system on which one or several bu-
siness assets are based. A supporting asset can be of a digital, physical
or organisational nature.
EXAMPLES : server, telephone network, interconnection gateway, technical
room, video protection system, team in charge of the project, adminis-
trators, R&D department.
STAKEHOLDER
Element (person, information system, organisation, or risk origin) with
direct or indirect interaction with the studied object. Interaction means
any relationship that takes place in the normal operation of the studied
object. A stakeholder can be internal or external to the organisation to
which the studied object belongs.
EXAMPLES : partner, service provider, client, supplier, subsidiary, related
support service.
STUDIED OBJECT
Organisation, information system or product that is the object of the
risk assessment.
THREAT
Generic terms used to designate any hostile intent to do harm in cy-
berspace. A threat can be targeted or not on the studied object.
WATERHOLE
Booby-trap set up on a server of an Internet site that is visited on a
regular basis by the targeted users. The attacker waits for their victim
to connect to the server in order to compromise the latter. The boo-
by-trapped Internet site can be a legitimate or a fake site.