Developing A Risk Management Plan: Flourensia Sapty Rahayu S.T., M.Kom
Developing A Risk Management Plan: Flourensia Sapty Rahayu S.T., M.Kom
MANAGEMENT PLAN
Your company, Acme Widgets, hosts a Web site used to sell widgets on
the Internet. The Web site is hosted on a Web server owned and
controlled by your company. The Web site was recently attacked and
went down for two days.
The company lost a large amount of money. Additionally, the
company lost the goodwill of many customers. This was the
second major outage for this Web site in the past two months.
There have been many outages in the past three years.
Case Study: Web Site
The objectives of the plan are to:
• Identify threats—This means any threats that
directly affect the Web site. These may
include:
– Attacks from the Internet
– Hardware or software failures
– Loss of Internet connectivity
Case Study: Web Site
• Identify vulnerabilities—These are
weaknesses and may include:
– Lack of protection from a firewall
– Lack of protection from an intrusion detection
system
– Lack of antivirus software
– Lack of updates for the server
– Lack of updates for the antivirus software
Case Study: Web Site
• Assign responsibilities—Assign responsibility to specific
departments for collecting data. This data will be used to
create recommendations. Later in the plan, you will assign
responsibilities to departments to implement and track
the plan.
• Identify the costs of an outage—Include both direct and
indirect costs. The direct costs are the lost sales during
the outage. The amount of revenue lost if the server is
down for 15 minutes or longer will come from sales data.
Indirect costs include the loss of customer goodwill and
the cost to recover the goodwill.
Case Study: Web Site
• Provide recommendations—Include a list of
recommendations to mitigate the risks. The
recommendations may reduce the weaknesses.
They may also reduce the impact of the threats.
– For example, you could address a hardware failure
threat by recommending hardware redundancy. You
could address a lack of updates by implementing an
update plan.
• Identify the costs of recommendations—Identify
and list the cost of each recommendation.
Case Study: Web Site
• Provide a cost-benefit analysis (CBA)—
Include a CBA for each recommendation. The
CBA compares the cost of the
recommendation against the benefit to the
company of implementing the
recommendation. You can express the benefit
in terms of income gained or the cost of the
outage reduced.
Case Study: Web Site
• Document accepted recommendations—
Management will choose which recommendations to
implement. They can accept, defer, or modify
recommendations. You can then document these
choices in the plan.
• Track implementation—Track the choices and their
implementation.
• Create POAM—Include a POAM. The POAM will
assign responsibilities. Management will use the
POAM to track and follow up on the project.
Scope of A Risk Management Plan
• The scope identifies the boundaries of the
plan.
• The boundaries could include the entire
organization.
• Without defined boundaries, the plan can get
out of control.
• A common problem with many projects is
scope creep.
Scope Example: Web Site
The purpose of the risk management plan is to
secure the Acme Widgets Web site.
The scope of the plan includes:
• Security of the server hosting the Web site
• Security of the Web site itself
• Availability of the Web site
• Integrity of the Web site’s data
Scope Example: Web Site
Stakeholders for this project include:
• Vice president of sales
• IT support department head
Assigning Responsibilities
• The risk management plan specifies
responsibilities.
• This provides accountability.
• You can assign responsibilities to:
– Risk management PM
– Stakeholders
– Departments or department heads
– Executive officers such as CIO or CFO
Assigning Responsibilities
Individual responsibilities could be assigned for the following
activities:
• Risk identification—This includes threats and vulnerabilities.
The resulting lists of potential risks can be extensive.
• Risk assessment—This means identifying the likelihood and
impact of each risk. A threat matrix is a common method used
to assess risks.
• Risk mitigation steps—These are steps that can reduce
weaknesses. This can also include steps to reduce the impact
of the risk.
• Reporting—Report the documentation created by the plan to
management. The PM is often responsible for compiling
reports.
Responsibilities Example: Web Site
• The CFO will provide funding to the IT department to hire a security
consultant. This security consultant will assist the IT department.
• The IT department is responsible for providing:
– list of threats
– A list of vulnerabilities
– A list of recommended solutions
– Costs for each of the recommended solutions
• The sales department is responsible for providing:
– Direct costs of any outage for 15 minutes or longer
– Indirect costs of any outage for 15 minutes or longer
• The CFO will validate the data provided by the IT and sales
departments. The CFO will then complete a cost-benefit analysis.
Describing Procedures and Schedules for
Accomplishment
• You create this part of the risk management plan after the project has
started. You include a recommended solution for any threat or vulnerability,
with a goal of mitigating the associated risk. While you can summarize a
solution in a short phrase, the solution itself will often include multiple steps.
• For example, an existing firewall may expose a server to multiple
vulnerabilities. The solution could be to upgrade the firewall. This upgrade
can be broken down into several steps, such as:
– Determine what traffic should be allowed.
– Create a firewall policy.
– Purchase a firewall.
– Install the firewall.
– Configure the firewall.
– Test the firewall.
– Implement the firewall.
Describing Procedures and Schedules for
Accomplishment
• You can describe each of these steps in further
detail.
• In addition, you can include a timeline for
completion of each of the steps.
• There are a couple of things to remember at
this point:
– Management is responsible for choosing the
controls to implement.
– Management is responsible for residual risk.
Procedures Example: Web Site
The Web site is vulnerable to denial of service (DoS)
attacks from the Internet. This risk cannot be eliminated.
However, several tasks can be completed to mitigate the
risk:
• Recommendation—Upgrade the firewall.
• Justification—The current firewall is a basic router. It
filters packets but does not provide any advanced
firewall capabilities.
• Procedures—The following steps can be used to
upgrade the new firewall:
Procedures Example: Web Site
1. Start firewall logging. This log can be used to determine what ports are currently being
used. Logs should be collected for at least one week.
2. Create a firewall policy. A firewall policy identifies what traffic to allow past the firewall.
This is a written document. It is created based on the content of the fi rewall logs. You
can use the firewall policy to confi gure the firewall.
3. Purchase a firewall appliance. A firewall appliance provides a self-contained firewall
solution. It includes both hardware and software that provides protection for a network.
Firewall appliances range from $200 to more than $10,000. The SS75 model is
recommended at a cost of $4,000. It can be purchased within 30 days of receiving funds.
4. Install the firewall. The firewall could be installed in the server room. Existing space and
power could be available there.
5. Configure the firewall. Configuration would be done using the firewall policy.
6. Test the firewall. Do this before going live. It will ensure normal operations are not
impacted. You can complete testing in one week.
7. Bring the firewall online. This can be done within a week after testing is completed.
Reporting Requirements