a risk-based approach to delivering a customer …...16 years information security experience...

32
A risk-based approach to delivering a customer-centric, ‘enterprise’ patch and vulnerability management system STREAM Integrated Risk Manager Risk management made simple Richard Mayall [email protected] Partner, Acuity Risk Management Deniz Kucukreisoglu [email protected] Information Security & Risk Management Solutions Advisor, CGI

Upload: others

Post on 17-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: A risk-based approach to delivering a customer …...16 years Information Security experience Previous clients include… Specific experience of custom security solutions and risk

A risk-based approach to delivering a

customer-centric, ‘enterprise’ patch and

vulnerability management system

STREAM Integrated Risk Manager Risk management made simple

Richard Mayall [email protected]

Partner, Acuity Risk Management

Deniz Kucukreisoglu [email protected]

Information Security & Risk Management Solutions Advisor, CGI

Page 2: A risk-based approach to delivering a customer …...16 years Information Security experience Previous clients include… Specific experience of custom security solutions and risk

Some of our Customers

Page 3: A risk-based approach to delivering a customer …...16 years Information Security experience Previous clients include… Specific experience of custom security solutions and risk

Typical Customer requirements

Page 4: A risk-based approach to delivering a customer …...16 years Information Security experience Previous clients include… Specific experience of custom security solutions and risk

GRC Key Components

Page 5: A risk-based approach to delivering a customer …...16 years Information Security experience Previous clients include… Specific experience of custom security solutions and risk

…and supporting processes

Page 6: A risk-based approach to delivering a customer …...16 years Information Security experience Previous clients include… Specific experience of custom security solutions and risk

Overview

Introductions

Business requirement for effective Patch & Vulnerability

management

How we built the system using STREAM

Highlights, lessons learned & next steps…

Summary and questions…

Page 7: A risk-based approach to delivering a customer …...16 years Information Security experience Previous clients include… Specific experience of custom security solutions and risk

Your presenters…

Richard Mayall

30 years experience in software engineering, information security

and risk management

Responsible within Acuity for integrated content development

projects for our STREAM Enterprise customers

Deniz Kucukreisoglu

16 years Information Security experience

Previous clients include…

Specific experience of custom security solutions and risk

management methodologies for clients to enhance the value that a

security function adds to the business

Page 8: A risk-based approach to delivering a customer …...16 years Information Security experience Previous clients include… Specific experience of custom security solutions and risk

Background

A Public Services Entity…

Characteristics

Large Legacy Asset Infrastructure

Distributed & Complex Business Functions…

We have this problem

Hard to determine Patching Priority & Risk Status…

How we solved it

Model environment & Infrastructure accurately

Bring clarity to areas of Business Risk

We’d used STREAM previously…

The requirement was…

How model was developed…

Page 9: A risk-based approach to delivering a customer …...16 years Information Security experience Previous clients include… Specific experience of custom security solutions and risk

Modelling context

Page 10: A risk-based approach to delivering a customer …...16 years Information Security experience Previous clients include… Specific experience of custom security solutions and risk

The business environment

Primary Group:

Production

Pre-Production

Test & Development

Secondary Group:

System Test

BAU Development

DR

Sandpit

Etc.

STREAM Tree structure…

Page 11: A risk-based approach to delivering a customer …...16 years Information Security experience Previous clients include… Specific experience of custom security solutions and risk

Asset Classes

Model: Asset types, groups & classes

HW

FW

MW

VW

SC / SS

OC / OS

AK / AS

Page 12: A risk-based approach to delivering a customer …...16 years Information Security experience Previous clients include… Specific experience of custom security solutions and risk

Notification-Processing-Rollout

NPR stages

NPR assessment scheme

Page 13: A risk-based approach to delivering a customer …...16 years Information Security experience Previous clients include… Specific experience of custom security solutions and risk

User workflow – Process Steps

Page 14: A risk-based approach to delivering a customer …...16 years Information Security experience Previous clients include… Specific experience of custom security solutions and risk

User workflow - Acquire

VULsVULs

VULs

VULsVULs

VULs

Page 15: A risk-based approach to delivering a customer …...16 years Information Security experience Previous clients include… Specific experience of custom security solutions and risk

User workflow - Prepare

1_Env1_EnvPAT

VUL

Page 16: A risk-based approach to delivering a customer …...16 years Information Security experience Previous clients include… Specific experience of custom security solutions and risk

User workflow - Inject

VULs

PATs

THREAT

CONTROL

Page 17: A risk-based approach to delivering a customer …...16 years Information Security experience Previous clients include… Specific experience of custom security solutions and risk

User workflow – Set-up

Page 18: A risk-based approach to delivering a customer …...16 years Information Security experience Previous clients include… Specific experience of custom security solutions and risk

User workflow – Use (NPR)

Page 19: A risk-based approach to delivering a customer …...16 years Information Security experience Previous clients include… Specific experience of custom security solutions and risk

User workflow - Exploit

Page 20: A risk-based approach to delivering a customer …...16 years Information Security experience Previous clients include… Specific experience of custom security solutions and risk

Tools Integration

Page 21: A risk-based approach to delivering a customer …...16 years Information Security experience Previous clients include… Specific experience of custom security solutions and risk

Risk-Based Approach

Primary Assets vs Secondary Assets

Example Primary Assets

SAP

Siebel

SMS

S. P.

Gov.

Audit

General Ledger

Cost Centre/

Internal Order

Accounting

Cash Journal

Accounting

Project Accounting

Financial

Statements

Reporting

Expenses

Invoicing

Bank Accounting

Planning &

Budgeting

Applications Bespoke Prodcut

Assignment

Payment Request

AssignmentRefurbishment/

Maintenance

Returns

Contact Mgt

Activities Case Mgt

Reporting

HR Admin

Staff Mgt

Time & PACE Project Planning

Project Execution

Time & Expense

Recording

Sourcing

Requisition

Purchasing

Goods Receipt

Invoice

Verification

Generation

VENUS Finance

Product Sale

Case & Client Mgt

HR Special Projects

Procurement

SERIAL

Product

RegistrationSRV Registration

Fixed Assets

Accounts Payable

Cost Allocation

Resource

Planning

Accounts

Receivable

Product Mgt

Product

performance

Monitoring

Trading & Transfer

Groups

Users 3P Agents Credit CardSpecial

CustomersBank EFT Vendors

External

compliance

External Audit

VAT Returns

PayrollBenefits PensionsStaff MemberConglomerates

Locals

Client VVIP

Client VIP

Clients N

Consumers

Stakeholders

Business Topology

Siebel

SMS

SAP

S.P.

Internal Governance & Audit

Risk Mgt Governance

Compliance & AuditIG&A

Page 22: A risk-based approach to delivering a customer …...16 years Information Security experience Previous clients include… Specific experience of custom security solutions and risk

Drillable Dashboard Interface

Page 23: A risk-based approach to delivering a customer …...16 years Information Security experience Previous clients include… Specific experience of custom security solutions and risk

Initial / Inherent Risk View

Page 24: A risk-based approach to delivering a customer …...16 years Information Security experience Previous clients include… Specific experience of custom security solutions and risk

Identify / Assess Primary Assets

Page 25: A risk-based approach to delivering a customer …...16 years Information Security experience Previous clients include… Specific experience of custom security solutions and risk

Impact & Likelihood Assessment

Page 26: A risk-based approach to delivering a customer …...16 years Information Security experience Previous clients include… Specific experience of custom security solutions and risk

Risks Assessed

Page 27: A risk-based approach to delivering a customer …...16 years Information Security experience Previous clients include… Specific experience of custom security solutions and risk

Residual Risk View

Page 28: A risk-based approach to delivering a customer …...16 years Information Security experience Previous clients include… Specific experience of custom security solutions and risk

Optional Risk Appetite View

Page 29: A risk-based approach to delivering a customer …...16 years Information Security experience Previous clients include… Specific experience of custom security solutions and risk

Top Ten Risks

Page 30: A risk-based approach to delivering a customer …...16 years Information Security experience Previous clients include… Specific experience of custom security solutions and risk

Lessons Learned

Brings clarity of understanding of the Information

Systems environment

Solution based approach encourages consistent

naming, accurate modelling, etc.

Asset based approach enhances understanding of

potential business impacts

Assessing C, I and A impacts separately helps to align

with key Standards such as ISO 27001

Provides Actionable Intelligence for senior managers

Page 31: A risk-based approach to delivering a customer …...16 years Information Security experience Previous clients include… Specific experience of custom security solutions and risk

Summary of Benefits

Page 32: A risk-based approach to delivering a customer …...16 years Information Security experience Previous clients include… Specific experience of custom security solutions and risk

Acuity Risk Management LLP

Liberty House

222 Regent Street +44 20 7297 2086

London

W1B 5TR www.acuityrm.com

STREAM Integrated Risk Manager Risk management made simple

CGI UK Ltd.

Chaucer House, Springfield Drive

Leatherhead, Surrey, KT22 7LP

www.cgi-group.co.uk +44 (0) 1372 369579