1 information security compliance system owner training module 3 risk analysis and security plan...

63
1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of the CIO – Information Services +1-843-792-8307 [email protected]

Upload: esmond-peters

Post on 11-Jan-2016

219 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

1

Information Security ComplianceSystem Owner Training

Module 3Risk Analysis and Security Plan

Richard Gadsden

Information Security Office

Office of the CIO – Information Services

+1-843-792-8307

[email protected]

Page 2: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

2

Overview

➲ Quick Review● Information Security Fundamentals● MUSC Policies and Compliance Process

➲ Risk Analysis Concepts➲ Risk Analysis Worksheet

● Compliance issues● Other information security risk issues

➲ Security Plan Summary

Page 3: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

3

Information Security Process

➲ Security is a process...● Not a product● Not “set it and forget it”

➲ Goal: protection of information assets from

threats to their...● Availability● Integrity● Confidentiality

Page 4: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

4

Information Security:A Risk Management Process

➲ Risk management process● the process for making security decisions● caveat: zero risk is not attainable

➲ Steps in the process● identify significant risks● evaluate possible controls (safeguards)● implement the most cost-effective set of controls that

will keep risks within acceptable levels● evaluate the results and repeat

Page 5: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

5

Unacceptable Risk vs. Unnecessary Cost

Page 6: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

6

Reasonable and Appropriate?

➲ How to achieve?● The risk management process

● Assessment of risk● Evaluation and selection of controls● Approval, funding, implementation, operation

➲ How to verify?● The compliance process

● Documentation● Audits and other reviews

Page 7: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

7

Risk Management Team

➲ System Owner➲ System Administrator

● other key members of IS support team➲ Risk Assessment Team

● knowledge of the system (functional & technical)● ability to analyze and select controls● communicate findings with management

➲ Management● unacceptable risk vs. unnecessary cost

Page 8: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

8

Information Assurance(Compliance Process)

➲ Document level of assurance● Are all security responsibilities clearly defined

and understood?● Is a sound (risk-based and cost-conscious)

decision-making process being followed?● Are security procedures documented?● Are procedures being followed?● Are controls working as intended?

Page 9: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

9

Compliance Process

➲ Existing Systems: 6-step Process1. Review policies, standards, guidelines

2. Document current system environment

3. Document current procedures & other controls

4. Identify & analyze potential issues

5. Develop security plan

6. Execute security plan➲ Repeat process when conditions warrant➲ New Systems: see Guidelines

Page 10: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

10

Step 1.0: Review MUSC Policies, Standards and

Guidelines

➲ URL: http://www.musc.edu/security➲ Policies

● high-level principles, goals, responsibilities➲ Standards

● performance standards (min. requirements)➲ Guidelines

● “how to”● recommended approaches

Page 11: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

11

Step 2.0: Document Current System Environment

and Personnel

➲ Deliverable: Security Documentation, Section 2 (System Identification)

● System Name● Key System Personnel● Functional Description● Key Components● System Boundaries● Relationships with other systems

● interfaces, dependencies

Page 12: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

12

Step 3.0: Document Current System-Specific

Security Procedures and Other Controls

➲ Deliverable: Security Documentation, Section 3 (Current System Procedures)

➲ Use the MUSC Information Security Policy Compliance Checklist for System Owners as a guide

➲ http://www.musc.edu/security/tools

Page 13: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

13

Step 4.0: Identify and Analyze Potential Issues

➲ Deliverable: Risk Analysis Worksheet➲ http://www.musc.edu/security/tools➲ Priorities

● Address policy compliance gaps ● Identify using the Policy Compliance Checklist

● Address any other security issues (risks)● Identified from first principles (threats, vulnerabilities)

Page 14: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

14

Step 5.0: Develop Security Plan

➲ Deliverable: Security Plan Summary➲ http://www.musc.edu/security/tools➲ Document your plan for addressing all of

your System's security compliance gaps➲ Don't develop your security plan in isolation

● coordinate solutions with OCIO● consult published guidelines● contact ISO if additional guidance needed

Page 15: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

15

Step 6.0: Execute Security Plan

➲ Deliverables● Document changes made to system procedures

and other controls (Section 3, Current System

Procedures)● Maintain a history (log) of all changes● Progress and status reports as required by your

Entity's Information Assurance Compliance

Officer (IACO)

Page 16: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

16

Risk Analysis Concepts

➲ Defining Risk● Threats● Vulnerabilities

➲ Measuring Risk● Likelihood● Impact

➲ Managing Risk● Security Controls (Safeguards)

Page 17: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

17

Risk

➲ Information Security Risk ● Can arise from any issue or potential event that

would threaten the availability, integrity or

confidentiality of information

➲ Risks are a function of:● Threats & Vulnerabilities => type of risk ● Likelihood & Impact => magnitude of risk

Page 18: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

18

Threats

➲ Potential for a threat-source to intentionally exploit or accidentally trigger a vulnerability

➲ Threat-sources● People

● Accidental actions● Deliberate actions

● System (technology) problems● Other (environmental) problems

Page 19: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

19

Threat Sources: People

➲ activists➲ consultants➲ crackers/hackers➲ customers➲ deranged people➲ extortionists➲ hoodlums

➲ insiders➲ maintenance people➲ organized crime➲ private investigators➲ professional thieves➲ terrorists➲ vandals

Page 20: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

20

Threat Sources:System (technology) problems

➲ Hardware failures➲ Software failures➲ Failures of related systems➲ Malicious code

Page 21: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

21

Threat Sources:Other (environmental) problems

➲ Power outages➲ Natural disasters➲ Building environment control problems➲ Water damage from man-made sources

Page 22: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

22

Vulnerabilities

➲ Def: A weakness or a flaw➲ Categories

● Technical● Human resource● Physical and environmental● Operational● Business continuity and compliance

Page 23: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

23

Technical Vulnerabilities

➲ Flaws in● Design● Implementation● Configuration

➲ Of:● Hardware● Software

Page 24: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

24

Human Resource Vulnerabilities

➲ Key person dependency➲ Gaps in pre-employment screening➲ Gaps in awareness and training➲ Gaps in discipline➲ Improper termination of access

Page 25: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

25

Physical and Environmental

➲ Insufficient physical access controls➲ Poor siting of equipment➲ Inadequate temp/humidity controls➲ Inadequate power conditioning

Page 26: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

26

Operational Vulnerabilities

➲ Inadequate separation of duties➲ Lack of control over:

● installation of hardware, software (new, changed)● system communication● access control, and supporting procedures

➲ Inadequate recording, review of activity➲ Inadequate handling of incidents➲ Inadequate monitoring of control effectiveness

Page 27: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

27

Business continuity and compliance

➲ Inadequate, inappropriate management of business risks

➲ Inadequate business continuity planning➲ Inadequate monitoring for compliance with

governing policies and regulations

Page 28: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

28

Risk Issue (Security Breach)

➲ Threat-Vulnerability Pairs define Risks● Type of risk := Type of potential security breach

➲ Both threat and vulnerability are required for a breach to occur.

➲ To manage the risk posed by the potential breach, we have to recognize and understand both the threat and the vulnerability.

➲ Security Issue = Threat + Vulnerability

Page 29: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

29

Security Issue: Example 1

➲ Potential breach:● An intruder gains control of the system by

exploiting an operating system vulnerability.● Threat: Intruders.● Vulnerability: Flaw in the design, implementation,

and/or configuration of the operating system software.

This has both a technical aspect (the flaw itself), and

an operational / compliance aspect. (Why wasn't the

flaw corrected or patched?)

Page 30: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

30

Security Issue: Example 3

➲ Potential breach:● A laptop or PDA or thumb drive containing

sensitive system information is stolen from a

faculty member's car, and the sensitive data was

not encrypted.● Threat: Thieves.● Vulnerability: Inadequate access control procedures

(the device should not have been left in a car, and the

data stored on the device should have been

encrypted).

Page 31: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

31

Security Issue: Example 3

➲ Potential breach:● A disgruntled employee who believes he was

wrongly terminated is able to sabotage the

system because his access to his account was

not promptly disabled.● Threat: Insider (saboteur).● Vulnerability: Improper termination of access.

Page 32: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

32

Security Issue: Example 4

➲ Potential breach:● A critical system is down for an extended period

due to equipment damage caused by a natural

disaster such as an earthquake or severe

hurricane.● Threat: Natural disaster.● Vulnerability: Inadequate business continuity /

contingency planning.

Page 33: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

33

Likelihood

➲ Recall:● Threat & Vulnerability => Type of breach● Likelihood & Impact => Magnitude of the risk

➲ Likelihood of a breach● Expected frequency of occurrence

➲ Frequency of security breaches can be:● Hard to measure (accurately, objectively)● Hard to predict (with any confidence)

Page 34: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

34

Estimating Likelihood

➲ Sources of information:● Historical frequency (e.g., natural disasters)● Reported frequency (e.g. attacks, incidents)● Public sources

● industry surveys (e.g. FBI Cybercrime Survey)● news reports (major incidents that are disclosed)

● Problems?● public sources are not statistically useful● complete & accurate incident data is not public

Page 35: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

35

Likelihood, Qualitatively

➲ Assessment approaches● Quantitative● Qualitative

➲ Recommended qualitative scale for assessing likelihood (frequency):

● Low: < 1 time per year● High: 12+ times per year● Moderate: anything in between

Page 36: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

36

Impact: Effects on Confidentiality, Integrity, Availability

➲ A security breach can involve:● Disclosure or unauthorized viewing of

confidential information● Unauthorized modification of sensitive

information● Loss or destruction of important information● Interruption in availability or service

➲ Actual impact of these effects?

Page 37: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

37

Impact on MUSC, Individuals

➲ A security breach can affect:● Life, health, well-being of

● MUSC student(s)● MUSC patient(s)● MUSC customer(s)/stakeholder(s)● MUSC faculty and/or employee(s)

● Damage to MUSC's reputation● Interference with MUSC's ability to function● Criminal/civil penalties, fines, damages,

settlements, and other legal costs

Page 38: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

38

Impact: Quantitative vs. Qualitative

➲ Quantitative● The estimated overall impact of a potential

breach is the total expected cost of all of these

potential effects➲ Qualitative

● The rated impact of a potential breach is the

high-water mark of its potential effects across all

of these areas (individuals, operations, assets)

Page 39: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

39

Impact of a Breach: FIPS 199

➲ FIPS 199● Qualitative approach to assessing impact● Low = “limited” adverse effects● Moderate = “serious” adverse effects● High = “catastrophic” adverse effects● Must consider effects on:

● Individuals● MUSC operations● MUSC assets

Page 40: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

40

Risk Level (Magnitude)

➲ Risk = Likelihood x Impact➲ Quantitative

● Annualized Loss Expectancy (ALE)➲ Qualitative

● Scale: Low, Moderate, High● “Multiply” Likelihood and Impact Ratings

Page 41: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

41

Risk Analysis: Example

➲ Security Issue (potential security breach)● Laptop containing unencrypted sensitive patient

information is stolen.● Threat: Laptop thieves.● Vulnerability: Inadequate access control.

➲ Likelihood● Ask Public Safety if they have any data.● Assume about 10 MUSC laptops / year stolen.● Likelihood Rating = Moderate.

Page 42: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

42

Risk Analysis Example (cont'd)

➲ Impact● On individuals?

● Let's assume not life-threatening, but still “serious”.

● On MUSC assets? ● How much reputation damage? How much civil

liability? How much loss of revenue? Let's assume the

worst of the effects on assets is “serious”.

● On MUSC operations?● Was the data critical? Was it backed up? Let's assume

the overall effect on operations is “limited”.

Page 43: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

43

Risk Analysis Example (cont'd)

➲ High-water mark across effects: “serious”➲ Impact Rating = Moderate.➲ Risk

● Risk = Likelihood x Impact● Moderate x Moderate = Moderate

➲ Risk Rating = Moderate.

Page 44: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

44

Security Controls

➲ Three basic control strategies:● Prevention● Detection● Recovery

Page 45: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

45

Selecting Controls

➲ Selecting controls requires a broad range of

knowledge, skills, experience● Technical● Operational● Management / Organizational

➲ Risk assessment team should discuss options➲ Cost-benefit analysis may be needed to help

the team make rational selections

Page 46: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

46

Evaluating Controls - Principles

➲ Think prevention first.➲ Detection is required for recovery.➲ Timeliness matters.➲ Integration of controls is essential.➲ Defense in depth is highly desirable.

Page 47: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

47

Integration Principle

➲ Your System's internal controls should

complement each other➲ Same applies, across the MUSC enterprise➲ Don't choose your controls in isolation➲ Do:

● coordinate your security plan with MUSC OCIO● consult published MUSC guidelines● leverage known (or planned) enterprise solutions● contact ISO if additional guidance needed

Page 48: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

48

Re-cap: Risk Management Process

➲ Steps in the process● Identify significant risks (issues)● Evaluate possible controls (safeguards)● Select the most cost-effective set of controls that

will keep risks within acceptable levels● Develop a plan to implement the controls● Execute the plan (implement the controls)● Evaluate the results and repeat

Page 49: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

49

Special Case: Compliance Issues

➲ Two distinct types of security issues● Potential security breaches

● From first principles● Due to reasonably anticipated threats, combined with

known or suspected vulnerabilities● Control priority: depends on risk (likelihood x impact)

● Compliance issues● Gaps in current procedures / other controls, with

respect to policy and/or regulatory requirements● Control priority?

Page 50: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

50

Risk Analysis Worksheet

➲ Use to document both types of issues● Potential breaches (threat-vulnerability pairs)● Compliance issues

➲ Goal is the same for both types● Evaluate corrective / protective controls● Select and prioritize controls

➲ Compliance issues are logical starting point● Risk Level := High

Page 51: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

51

Risk Analysis Worksheet:Recommended Approach

➲ First:● Document all compliance issues

● Taken straight from your Policy Compliance Checklist

● Evaluate controls (preliminary)

➲ Next:● Document other risk issues (T-V Pairs)● Assess Likelihood, Impact, Risk Level for each

➲ Finally:● Evaluate and select recommended controls

Page 52: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

52

Risk Analysis Worksheet: Columns

➲ Security Issue● T-V Pair, or Compliance Issue

➲ Likelihood*➲ Impact*➲ Risk Level➲ Recommended Security Control(s)➲ Control Priorit(ies)

* Compliance Issues: leave these two columns blank, and assign a “High” risk level to these issues.

Page 53: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

53

Compliance Checklist Issues

➲ Assume you have a score < 3 for one or more compliance checklist requirements.

➲ These are compliance issue

● The first type of Security Issue you should

analyze, using your Risk Analysis Worksheet➲ See supplementary material: Analysis of

Policy Compliance Checklist Issues

Page 54: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

54

Other Security Issues?

➲ Will the security controls recommended by your risk assessment team, just to address the “obvious” compliance issues, be sufficient to protect against all reasonably anticipated threats?

➲ If you haven't tried to anticipate threats, and you haven't assessed vulnerabilities, how can you answer that question?

Page 55: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

55

Identifying Other Security Issues

➲ Review system diagrams● Entry points are where the action is

➲ Walk through operational procedures➲ Review management practices➲ Review physical security, environment➲ Assess technical vulnerabilities

● Automated tools a starting point

➲ ISO can help with vulnerability assessments

Page 56: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

56

Risk Analysis Worksheet: Wrap-Up

➲ Has your Risk Assessment Team...● Documented all compliance issues and the

recommended controls?● Documented any other known risk issues and

the recommended controls?● Involved the right people in evaluating and

selecting the recommended controls?● Reviewed the recommendations with the

appropriate management?

Page 57: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

57

Security Plan Summary

➲ Use this spreadsheet to help document and communicate your plan.

➲ Document who will implement each of the security controls recommended in your risk analysis worksheet, and when, and what the on-going requirements will be.

➲ Depending on the size and scope of your security plan, you may need to develop and maintain a more detailed project plan.

Page 58: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

58

Security Plan Summary: Columns

➲ Security Control (from the Risk Analysis Worksheet)

➲ Implementation Priority (also from the Risk Analysis Worksheet)

➲ Responsible Party➲ Start Date➲ End Date➲ Operational or Maintenance Requirements

Page 59: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

59

Security Plan Summary

➲ Review your System's security plan with appropriate level(s) of management, at appropriate stage(s) in its development.

➲ Ensure appropriate involvement:● OCIO● anyone affected by the plan● anyone expected to be involved in its

implementation

Page 60: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

60

Executing the Plan

➲ Security Plan Summary● Use it as a living document● Revise it when (not if!) security plan changes● As the plan's implementation proceeds, update

your System's security documentation● Maintain history of all changes

Page 61: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

61

More Information

➲ MUSC Information Security Guidelines: Risk

Management

● http://www.musc.edu/security/guidelines

➲ NIST Computer Security Resource Center

● http://csrc.nist.gov

Page 62: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

62

Compliance Documentation

➲ System Identification● Document System & its management team

➲ Current Procedures & Other Controls● Document System's current safeguards

➲ Security Plan Summary● Document System's planned safeguards

➲ Risk Analysis Worksheet● Document why your System's specific

safeguards have been selected

Page 63: 1 Information Security Compliance System Owner Training Module 3 Risk Analysis and Security Plan Richard Gadsden Information Security Office Office of

63

Are We Done Yet?

➲ Security is never finished➲ Repeat the risk management cycle as

warranted by conditions● respond to environmental, operational, policy,

and/or regulatory changes➲ Evaluate the effectiveness of your System's

security measures● until your System is retired

➲ Set it and forget it? Not an option!