SlideShare a Scribd company logo
5
Most read
7
Most read
17
Most read
Raul Calzada
Operationally Critical Threat, Asset
and Vulnerability Evaluation
Raul
Calzada
Digitally signed by Raul
Calzada
DN: cn=Raul Calzada, o, ou,
email=raul@skerett.com, c=US
Date: 2007.07.29 19:21:26
-04'00'
About Octave: Implementation Guide
Base on catalogs of Information
Sponsored by U.S. Department of Defense
as technical information.
Software Engineering Institute
Federally funded by DOD.
Carnegie Mellon University
Risk-based strategic assessment and
planning technique for security.
Self directed. Organization assume
responsibility.
Targeted at organizational risk and strategic
related issues.
Business and IT work together to address the
needs of the organization.
To examine organizational and technology
issues to compile an understandable view of
the information security needs of the
organization.
Implemented by using a three-phase
approach.
Workshop base approach by analysis team.
(Continue)
Phase 1
Build Asset-Base Threat Profiles
Key areas of the organization are examined to identify assets
Identify current protection strategies
Discover vulnerabilities in the organization
Phase 2
Identify Infrastructure Vulnerabilities
Technology
Access method
Phase 3
Develop Security Strategy and Plans
Risk analysis
Evaluation base on organization’s mission
1 2 3
Important Aspects of the OCTAVE Method
Self-Direction
Small team analyze all information. Personnel is
actively involve in the decision-making process.
Analysis Team
Three to five people, depending on size of overall
organization.
Knowledge elicitation workshops of Phase 1
Gather supporting data as necessary
Develop protection strategy for the organization
Address plans to mitigate the risk to critical assets
Workshop-Base Approach
Preparation
Getting Senior Management Sponsorship
Requires Briefings to help understand.
Selecting the Team
Sponsorship involvement. Business and IT.
Right Scope of Implementation
Select operational areas to participate.
Participant Selection
The analysis team will lead participants selection.
Coordinate logistics.
Brief all participants prior to their participation.
EVALUATION PROCESS
Organization Levels
Senior Management
Operational area management
Staff (including IT staff)
•Important assets and their relative value
•Perceived threats to the assets
•Security requirements
•Current protection strategy practices
•Current organizational vulnerabilities
Knowledge
elicitationSurvey
EVALUATION PROCESS (continue)
Each Organizational Levels: SurveySurvey
Identify assets and relative priorities
Identify areas of concern. Construct scenarios.
Identify security requirements for assets.
Capture knowledge of protection strategies and
organizational vulnerabilities.
Analysis Team
(Phase 1)
Creates Threat Profiles
Group results by organizational level.
Select critical assets
Describe security requirements
Identify threats to critical assets
Analysis Team
(Phase 2)
Identify Infrastructure Vulnerabilities
Design vulnerability (provide documentation)
Implementation
Configuration
Technology vulnerability
Reviewing firewall configuration
Checking the security on public Web server (overload)
Perform a comprehensive review on all operating systems
Technology vulnerability
Identifying services running and/or available on host and
systems
Listing all system user accounts
Identifying known vulnerabilities in routers, switches, RAS,
OS and specifics services and applications
Identifying configuration errors
Looking for existing signs of intrusion (Trojan horses,
backdoor programs, spyspy--ware,ware, integrity checks of critical
system files, etc.
Checking file ownership and permissions
Testing password usage strength
(continue)
Analysis Team (Phase 2)
Identify Key Components
The analysis team and IT staff determine which
system is most closely related to each important
asset.
Identify network access paths to critical systems.
Evaluate selected components
Software tools (scanning) (network mapping)
Test from outside, inside and individual systems
Create summary of results
Analysis Team
(Phase 3)
Develop Security Strategy Plans
Conduct Risk Analysis
Identify impact of threats to critical assets
Disclosure
Modification
Lost
Destruction
Interruption
Create a qualitative scale
High, Medium, Low
Analysis Team
(Phase 3)
Develop Protection Strategy
Workshop / Session 1
Consolidate protection strategy
Create protection strategy / Address vulnerabilities
Create mitigation plans “ to reduce risk “
Workshop / Session 2
Presentation to senior management
Review and refine protection strategy
How to support ongoing security improvements
The OCTAVE Method
The OCTAVE Method
1. > 300 employees or
highly complex
2. Requires access to
security expertise – best
if on team
3. Org. and IT knowledge
extracted via workshops
4. IT environment operated
‘in-house’
Comparing OCTAVE and OCTAVE-S
1. < 100 employees
2. Requires minimal
security expertise
3. Analysis team has nearly
complete org. and IT
knowledge.
4. IT environment simple or
outsourced
5. Uses ‘fill in the blank’
forms
OCTAVEOCTAVE--SS OCTAVEOCTAVE
The OCTAVE Method
• OCTAVE Method Implementation Guide
www.cert.org/octave/omig.pdf
Reference:

More Related Content

PPTX
Vulnerability Assessment Presentation
PPTX
Risk Management Approach to Cyber Security
PPTX
Threats Intelligence and analysis . pptx
PPT
The Security Vulnerability Assessment Process & Best Practices
PDF
Security operations center-SOC Presentation-مرکز عملیات امنیت
PPTX
Security architecture frameworks
PDF
NIST Cybersecurity Framework 101
PPT
Asset, Vulnerability, Threat, Risk & Control
Vulnerability Assessment Presentation
Risk Management Approach to Cyber Security
Threats Intelligence and analysis . pptx
The Security Vulnerability Assessment Process & Best Practices
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security architecture frameworks
NIST Cybersecurity Framework 101
Asset, Vulnerability, Threat, Risk & Control

What's hot (20)

PDF
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
PDF
Cybersecurity Roadmap Development for Executives
PDF
Building an Analytics Enables SOC
PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
PPTX
Introduction to FAIR - Factor Analysis of Information Risk
PDF
Building a Cyber Security Operations Center for SCADA/ICS Environments
PPTX
Vulnerability Assesment
PDF
NIST cybersecurity framework
PPTX
information security awareness course
PDF
Cyber Security Governance
PDF
Enterprise Security Architecture for Cyber Security
PPTX
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
PDF
NIST Cybersecurity Framework (CSF) 2.0: What has changed?
PPTX
Cyber Threat Intelligence.pptx
PPTX
Security Operation Center - Design & Build
PPTX
SOC Architecture Workshop - Part 1
PPTX
Security of IOT,OT And IT.pptx
PPTX
Cyber attacks and IT security management in 2025
PPTX
Security Information and Event Management (SIEM)
PPTX
NIST CSF Overview
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
Cybersecurity Roadmap Development for Executives
Building an Analytics Enables SOC
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Introduction to FAIR - Factor Analysis of Information Risk
Building a Cyber Security Operations Center for SCADA/ICS Environments
Vulnerability Assesment
NIST cybersecurity framework
information security awareness course
Cyber Security Governance
Enterprise Security Architecture for Cyber Security
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
NIST Cybersecurity Framework (CSF) 2.0: What has changed?
Cyber Threat Intelligence.pptx
Security Operation Center - Design & Build
SOC Architecture Workshop - Part 1
Security of IOT,OT And IT.pptx
Cyber attacks and IT security management in 2025
Security Information and Event Management (SIEM)
NIST CSF Overview
Ad

Viewers also liked (20)

PPTX
Octave
PDF
Comparative of risk analysis methodologies
PDF
Amth250 octave matlab some solutions (1)
PPTX
Groupware/CSCW
PPTX
PDF
2015 Real Estate Appraiser Exam Result
PDF
Shang hai shengmao2
PPT
Octave - Prototyping Machine Learning Algorithms
PDF
Personality & the Brain: A new perspective on the INFP
PDF
Groupware
PPTX
Ppt audit
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
PDF
為什麼要認識憂鬱症
PPT
Groupware
PDF
To measure the intensity of light using LDR sensor by calibrating voltage wit...
PPT
Groupware
PDF
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...
PPTX
ACC/AHA 2009 Guidelines for STEMI & PCI
DOCX
Tiểu luận quản_trị_cung_ứng_-_nhóm_1
Octave
Comparative of risk analysis methodologies
Amth250 octave matlab some solutions (1)
Groupware/CSCW
2015 Real Estate Appraiser Exam Result
Shang hai shengmao2
Octave - Prototyping Machine Learning Algorithms
Personality & the Brain: A new perspective on the INFP
Groupware
Ppt audit
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
為什麼要認識憂鬱症
Groupware
To measure the intensity of light using LDR sensor by calibrating voltage wit...
Groupware
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...
ACC/AHA 2009 Guidelines for STEMI & PCI
Tiểu luận quản_trị_cung_ứng_-_nhóm_1
Ad

Similar to The OCTAVE Method (20)

PDF
Octav ethreat profiles
PPTX
Cyber Threat Hunting with Phirelight
PPTX
Database development and security certification and accreditation plan pitwg
PDF
Defense In Depth Using NIST 800-30
PPT
Reorganizing Federal IT to Address Today's Threats
PDF
Lightweight Cybersecurity Risk Assessment Tools for Cyberinfrastructure
DOC
Current Topics paper A4 submission 4.30.2015 Master Copy
PDF
NSA and PT
PPT
Gs Ch1
PDF
Application Threat Modeling In Risk Management
PPTX
Security assessment isaca sv presentation jan 2016
PDF
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
PPTX
NIST CSF review - Essential Protections (a K12 perspective)
PPT
Ch09 Performing Vulnerability Assessments
PDF
𝐓𝐨𝐩 𝐓𝐡𝐫𝐞𝐚𝐭 𝐇𝐮𝐧𝐭𝐢𝐧𝐠 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰 𝐐𝐮𝐞𝐬𝐭𝐢𝐨𝐧𝐬: 𝐃𝐨𝐰𝐧𝐥𝐨𝐚𝐝 𝐎𝐮𝐫 𝐖𝐡𝐢𝐭𝐞 𝐏𝐚𝐩𝐞𝐫!
PDF
Top Threat Hunting Interview Questions.pdf
PDF
Top Threat Hunting Interview Questions.pdf
PDF
Top Threat Hunting Interview Questions download white paper!
DOCX
Black Box Pentest Uncovering Vulnerabilities in Internal Pen Tests.docx
PPT
is_1_Introduction to Information Security
Octav ethreat profiles
Cyber Threat Hunting with Phirelight
Database development and security certification and accreditation plan pitwg
Defense In Depth Using NIST 800-30
Reorganizing Federal IT to Address Today's Threats
Lightweight Cybersecurity Risk Assessment Tools for Cyberinfrastructure
Current Topics paper A4 submission 4.30.2015 Master Copy
NSA and PT
Gs Ch1
Application Threat Modeling In Risk Management
Security assessment isaca sv presentation jan 2016
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
NIST CSF review - Essential Protections (a K12 perspective)
Ch09 Performing Vulnerability Assessments
𝐓𝐨𝐩 𝐓𝐡𝐫𝐞𝐚𝐭 𝐇𝐮𝐧𝐭𝐢𝐧𝐠 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰 𝐐𝐮𝐞𝐬𝐭𝐢𝐨𝐧𝐬: 𝐃𝐨𝐰𝐧𝐥𝐨𝐚𝐝 𝐎𝐮𝐫 𝐖𝐡𝐢𝐭𝐞 𝐏𝐚𝐩𝐞𝐫!
Top Threat Hunting Interview Questions.pdf
Top Threat Hunting Interview Questions.pdf
Top Threat Hunting Interview Questions download white paper!
Black Box Pentest Uncovering Vulnerabilities in Internal Pen Tests.docx
is_1_Introduction to Information Security

Recently uploaded (20)

PDF
CISSP Domain 6: Security Assessment and Testing
PPTX
TCoE_IT_Concrete industry.why is it required
PPTX
Concluding Session_Wrapup-NA May 5 2024-Oct 10 2025 ZS.pptx
PPTX
Hutt_Speh_Chapter2_Organizational_Buying.pptx
PPTX
Human Resources management _HR structure
PPTX
Consulting on marketing-The needs wants and demands are a very important comp...
PDF
CHAPTER 15- Manageement of Nursing Educational Institutions- Staffing and st...
PPT
Claims and Adjustment Business_Communication.pptx.ppt
PDF
ORGANIZATIONAL communication -concepts and importance._20250806_112132_0000.pdf
PPTX
Supervisory Styles and When to Use Them!
PDF
The Cyber SwarmShield by Stéphane Nappo
PDF
CHAPTER 14 Manageement of Nursing Educational Institutions- planing and orga...
PDF
1_Corporate Goverance presentation topic
PPTX
Chapter Three for international political
PPTX
Leadership for Industry 4.0 And Industry 5.0
PPTX
Course Overview of the Course Titled.pptx
PPTX
Strategic Plan 2023-2024 Presentation.pptx
PDF
Features of Effective decision making in Management
PPTX
Effective_communication._(strategy).pptx
PDF
Organisational Behaviour And it's concepts
CISSP Domain 6: Security Assessment and Testing
TCoE_IT_Concrete industry.why is it required
Concluding Session_Wrapup-NA May 5 2024-Oct 10 2025 ZS.pptx
Hutt_Speh_Chapter2_Organizational_Buying.pptx
Human Resources management _HR structure
Consulting on marketing-The needs wants and demands are a very important comp...
CHAPTER 15- Manageement of Nursing Educational Institutions- Staffing and st...
Claims and Adjustment Business_Communication.pptx.ppt
ORGANIZATIONAL communication -concepts and importance._20250806_112132_0000.pdf
Supervisory Styles and When to Use Them!
The Cyber SwarmShield by Stéphane Nappo
CHAPTER 14 Manageement of Nursing Educational Institutions- planing and orga...
1_Corporate Goverance presentation topic
Chapter Three for international political
Leadership for Industry 4.0 And Industry 5.0
Course Overview of the Course Titled.pptx
Strategic Plan 2023-2024 Presentation.pptx
Features of Effective decision making in Management
Effective_communication._(strategy).pptx
Organisational Behaviour And it's concepts

The OCTAVE Method

  • 1. Raul Calzada Operationally Critical Threat, Asset and Vulnerability Evaluation Raul Calzada Digitally signed by Raul Calzada DN: cn=Raul Calzada, o, ou, email=raul@skerett.com, c=US Date: 2007.07.29 19:21:26 -04'00'
  • 2. About Octave: Implementation Guide Base on catalogs of Information Sponsored by U.S. Department of Defense as technical information. Software Engineering Institute Federally funded by DOD. Carnegie Mellon University
  • 3. Risk-based strategic assessment and planning technique for security. Self directed. Organization assume responsibility. Targeted at organizational risk and strategic related issues. Business and IT work together to address the needs of the organization.
  • 4. To examine organizational and technology issues to compile an understandable view of the information security needs of the organization. Implemented by using a three-phase approach. Workshop base approach by analysis team. (Continue)
  • 5. Phase 1 Build Asset-Base Threat Profiles Key areas of the organization are examined to identify assets Identify current protection strategies Discover vulnerabilities in the organization Phase 2 Identify Infrastructure Vulnerabilities Technology Access method
  • 6. Phase 3 Develop Security Strategy and Plans Risk analysis Evaluation base on organization’s mission 1 2 3
  • 7. Important Aspects of the OCTAVE Method Self-Direction Small team analyze all information. Personnel is actively involve in the decision-making process. Analysis Team Three to five people, depending on size of overall organization. Knowledge elicitation workshops of Phase 1 Gather supporting data as necessary Develop protection strategy for the organization Address plans to mitigate the risk to critical assets Workshop-Base Approach
  • 8. Preparation Getting Senior Management Sponsorship Requires Briefings to help understand. Selecting the Team Sponsorship involvement. Business and IT. Right Scope of Implementation Select operational areas to participate. Participant Selection The analysis team will lead participants selection. Coordinate logistics. Brief all participants prior to their participation.
  • 9. EVALUATION PROCESS Organization Levels Senior Management Operational area management Staff (including IT staff) •Important assets and their relative value •Perceived threats to the assets •Security requirements •Current protection strategy practices •Current organizational vulnerabilities Knowledge elicitationSurvey
  • 10. EVALUATION PROCESS (continue) Each Organizational Levels: SurveySurvey Identify assets and relative priorities Identify areas of concern. Construct scenarios. Identify security requirements for assets. Capture knowledge of protection strategies and organizational vulnerabilities.
  • 11. Analysis Team (Phase 1) Creates Threat Profiles Group results by organizational level. Select critical assets Describe security requirements Identify threats to critical assets
  • 12. Analysis Team (Phase 2) Identify Infrastructure Vulnerabilities Design vulnerability (provide documentation) Implementation Configuration Technology vulnerability Reviewing firewall configuration Checking the security on public Web server (overload) Perform a comprehensive review on all operating systems
  • 13. Technology vulnerability Identifying services running and/or available on host and systems Listing all system user accounts Identifying known vulnerabilities in routers, switches, RAS, OS and specifics services and applications Identifying configuration errors Looking for existing signs of intrusion (Trojan horses, backdoor programs, spyspy--ware,ware, integrity checks of critical system files, etc. Checking file ownership and permissions Testing password usage strength (continue)
  • 14. Analysis Team (Phase 2) Identify Key Components The analysis team and IT staff determine which system is most closely related to each important asset. Identify network access paths to critical systems. Evaluate selected components Software tools (scanning) (network mapping) Test from outside, inside and individual systems Create summary of results
  • 15. Analysis Team (Phase 3) Develop Security Strategy Plans Conduct Risk Analysis Identify impact of threats to critical assets Disclosure Modification Lost Destruction Interruption Create a qualitative scale High, Medium, Low
  • 16. Analysis Team (Phase 3) Develop Protection Strategy Workshop / Session 1 Consolidate protection strategy Create protection strategy / Address vulnerabilities Create mitigation plans “ to reduce risk “ Workshop / Session 2 Presentation to senior management Review and refine protection strategy How to support ongoing security improvements
  • 19. 1. > 300 employees or highly complex 2. Requires access to security expertise – best if on team 3. Org. and IT knowledge extracted via workshops 4. IT environment operated ‘in-house’ Comparing OCTAVE and OCTAVE-S 1. < 100 employees 2. Requires minimal security expertise 3. Analysis team has nearly complete org. and IT knowledge. 4. IT environment simple or outsourced 5. Uses ‘fill in the blank’ forms OCTAVEOCTAVE--SS OCTAVEOCTAVE
  • 21. • OCTAVE Method Implementation Guide www.cert.org/octave/omig.pdf Reference: