SlideShare a Scribd company logo
7
Most read
9
Most read
13
Most read
OCTAVE
About Me
▶ AMAR MYANA
Senior Software Developer
Security Brigade Infosec Pvt. Ltd.
3 ½ years
Summary
▶ Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE)
▶ an approach for managing information security risks
▶ Key Differences Between OCTAVE and Other Approaches
▶ Key Characteristics of the OCTAVE Approach
▶ OCTAVE Phases
▶ Two OCTAVE-consistent methods developed at the Software Engineering
Institute (SEI)
▶ the OCTAVE Method for large organizations
▶ The OCTAVE-S for small organizations
▶ Choosing Between the Methods
What Is OCTAVE?
▶ OCTAVE is a risk based strategic assessment and planning technique for security.
▶ OCTAVE is self-directed
▶ OCTAVE is targeted at organizational risk and focused on strategic, practice-related
issues.
▶ When applying OCTAVE, a small team of people from the operational (or business) units
and the information technology (IT) department work together to address the security
needs of the organization, balancing the three key aspects
▶ Operational Risk
▶ Security Practices,
▶ and Technology
What Is OCTAVE?
▶ OCTAVE approach is driven by two aspects:
▶ Operational Risk
▶ Security Practices
▶ By using the OCTAVE approach, an organization makes information-protection
decisions based on risks to the confidentiality, integrity, and availability of critical
information-related assets.
Key Differences Between OCTAVE
and Other Approaches
OCTAVE Other Evaluations
Organization evaluation System evaluation
Focus on security practices Focus on technology
Strategic issues Tactical issues
Self direction Expert led
Key Characteristics of the OCTAVE
Approach
▶ OCTAVE is an asset-driven evaluation approach. Analysis teams
▶ identify information-related assets (e.g., information and systems) that are important to the
organization
▶ focus risk analysis activities on those assets judged to be most critical to the organization
▶ consider the relationships among critical assets, the threats to those assets, and
vulnerabilities (both organizational and technological) that can expose assets to threats
▶ evaluate risks in an operational context - how they are used to conduct an organization’s
business and how those assets are at risk due to security threats
▶ create a practice-based protection strategy for organizational improvement as well as risk
mitigation plans to reduce the risk to the organization’s critical assets
OCTAVE Phases
▶ Phase 1: Build Asset-Based Threat Profiles
▶ This is an organizational evaluation.
▶ It identifies threats to each critical asset, creating a threat profile for that asset
▶ Phase 2: Identify Infrastructure Vulnerabilities
▶ This is an evaluation of the information infrastructure.
▶ Examines network access paths, identifying classes of information technology components
related to each critical asset.
▶ Phase 3: Develop Security Strategy and Plans
▶ Identifies risks to the organization’s critical assets and decides what to do about them
OCTAVE Phases
OCTAVE Method
▶ The OCTAVE Method was developed with large organizations in mind (e.g., 300
employees or more).
▶ OCTAVE Method Processes
▶ Phase 1: Build Asset-Based Threat Profiles
▶ Process 1: Identify Senior Management Knowledge
▶ Process 2: Identify Operational Area Knowledge
▶ Process 3: Identify Staff Knowledge
▶ Process 4: Create Threat Profiles
▶ Phase 2: Identify Infrastructure Vulnerabilities
▶ Process 5: Identify Key Components
▶ Process 6: Evaluate Selected Components
▶ Phase 3: Develop Security Strategy and Plans
▶ Process 7: Conduct Risk Analysis
▶ Process 8: Develop Protection Strategy
OCTAVE-S
▶ OCTAVE-S was developed and tested for small organizations, ranging from 20 to 80 people.
▶ OCTAVE-S relates to the Phase 2 evaluation of the computing infrastructure.
▶ OCTAVE-S also includes an optional, qualitative version of probability.
▶ OCTAVE-S Processes
▶ OCTAVE-S has the same three phases described in the OCTAVE approach and in the OCTAVE
Method.
▶ Phase 1: Build Asset-Based Threat Profiles
▶ Process S1: Identify Organizational Information
▶ Process S2: Create Threat Profiles
▶ Phase 2: Identify Infrastructure Vulnerabilities
▶ Process S3: Examine the Computing Infrastructure in Relation to Critical Assets
▶ Phase 3: Develop Security Strategy and Plans
▶ Process S4: Identify and Analyze Risks
▶ Process S5: Develop Protection Strategy and Mitigation Plans
Choosing Between the Methods
▶ The OCTAVE Method is structured for an analysis team with some understanding of IT
and security issues, employing an open, brainstorming approach for gathering and
analyzing information.
▶ OCTAVE-S is more structured. Security concepts are embedded in OCTAVE-S
worksheets, allowing for their use by less experienced practitioners.
▶ The following set of questions should be used to help you decide which method is best
suited for your organization.
Question OCTAVE Method OCTAVE-S
Size and complexity of the organization
Is your organization small? Does your organization have
a flat or simple hierarchical structure? •
Are you a large company (300 or more employees)? Do
you have a complex structure or geographically-
dispersed divisions?
•
Choosing Between the Methods
Question OCTAVE
Method
OCTAVE-S
Structured or Open-Ended Method
Do you prefer a more structured method using fill-in-the-blanks,
checklists, and redlines, but not as easy to tailor? •
Do you prefer a more open-ended methodology that is easy to tailor
and adapt to your own preferences? •
Analysis team composition
Can you find a group of three to five people for the analysis team
who have a broad and deep understanding of the company and
also possess most of the following skills?
•
Can you find a group of 3-5 people for the analysis team who have
some understanding of at least part of the company and also
possess most of the following skills?
•
Choosing Between the Methods
Question OCTAVE
Method
OCTAVE-S
IT resources
Do you outsource all or most of your information technology
functions? •
Do you have a relatively simple information technology
infrastructure that is well understood by at least one individual in
your organization?
•
Do you manage your own computing infrastructure and are familiar
with running vulnerability evaluation tools? •
Do you have a complex computing infrastructure that is well
understood by one or more individuals in your organization? •
Are you able to run, comprehend, and interpret the results of
vulnerability evaluation tools within the context of information-
related assets?
•
Choosing Between the Methods
Question OCTAVE
Method
OCTAVE-S
Using a Beta-version method
Are you willing to use a beta-version of a method (that is, use a
method that may not have all the guidance you might need)? •
Octave

More Related Content

PPTX
PPT
Secure Socket Layer
PDF
IoT and m2m
PDF
IP Security
PPTX
Security Policies and Standards
PPTX
Information Security Blueprint
PPTX
Introduction to IoT Security
 
PPTX
Secure Socket Layer
IoT and m2m
IP Security
Security Policies and Standards
Information Security Blueprint
Introduction to IoT Security
 

What's hot (20)

PPTX
OSI Security Architecture
PPT
IDS and IPS
PPT
Security policy
PPT
Information Security
PPT
Temporal data mining
PPTX
Network security (vulnerabilities, threats, and attacks)
PPTX
Intrusion detection
 
PPT
Cloud and dynamic infrastructure
PPTX
Cloud Management Mechanisms
PPTX
Data Acquisition
PDF
PPTX
Introduction to Storage technologies
PPT
data hiding techniques.ppt
PPTX
IBM Security QRadar
PDF
Network security - OSI Security Architecture
PPTX
Law and Ethics in Information Security.pptx
PDF
Communication middleware
PPTX
The CIA triad.pptx
PPTX
Mobile Forensics
OSI Security Architecture
IDS and IPS
Security policy
Information Security
Temporal data mining
Network security (vulnerabilities, threats, and attacks)
Intrusion detection
 
Cloud and dynamic infrastructure
Cloud Management Mechanisms
Data Acquisition
Introduction to Storage technologies
data hiding techniques.ppt
IBM Security QRadar
Network security - OSI Security Architecture
Law and Ethics in Information Security.pptx
Communication middleware
The CIA triad.pptx
Mobile Forensics
Ad

Viewers also liked (20)

PDF
The OCTAVE Method
PDF
Comparative of risk analysis methodologies
PDF
Amth250 octave matlab some solutions (1)
PPTX
Constructing relevant quality assurance approaches
PPTX
Mobile interaction models, beyond the app
PPTX
Groupware/CSCW
PDF
Retail_Fixtures_Displays_1_
PDF
Jenna Paul Potrfolio
PDF
Darryl Schultz_Resume
PPTX
Mi querida santa cruz
DOCX
Soal latihan tik materi excel
PPT
Models of Interaction
PPTX
PPTX
Graph Mining, Graph Patterns, Social Network, Set & List Valued Attribute, Sp...
PDF
Sni 2836-2008-tata cara perhitungan harga satuan pekerjaan pondasi untuk kons...
PPT
Object Relational Database Management System
PPT
Octave - Prototyping Machine Learning Algorithms
PDF
Sni 7395-2008-tata cara perhitungan harga satuan pekerjaan penutup lantai dan...
PDF
Groupware
The OCTAVE Method
Comparative of risk analysis methodologies
Amth250 octave matlab some solutions (1)
Constructing relevant quality assurance approaches
Mobile interaction models, beyond the app
Groupware/CSCW
Retail_Fixtures_Displays_1_
Jenna Paul Potrfolio
Darryl Schultz_Resume
Mi querida santa cruz
Soal latihan tik materi excel
Models of Interaction
Graph Mining, Graph Patterns, Social Network, Set & List Valued Attribute, Sp...
Sni 2836-2008-tata cara perhitungan harga satuan pekerjaan pondasi untuk kons...
Object Relational Database Management System
Octave - Prototyping Machine Learning Algorithms
Sni 7395-2008-tata cara perhitungan harga satuan pekerjaan penutup lantai dan...
Groupware
Ad

Similar to Octave (20)

PDF
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
DOCX
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
PPTX
Software development o & c
DOC
Xevgenis_Michail_CI7130 Network and Information Security
PPTX
Build an Information Security Strategy
PPTX
Build and Information Security Strategy
DOCX
Running Header 1SYSTEM ARCHITECTURE24Gr.docx
PDF
Sentiment Analysis on Twitter Data
PPTX
Threat modelling(system + enterprise)
DOCX
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
PPTX
How to develop an AppSec culture in your project
PPTX
Building an AppSec Culture
PPTX
crisc Domain1 Governance PPT Slide shows
PPTX
Threat intelligence life cycle steps by steps
PDF
Cybersecurity_Security_architecture_2023.pdf
PPTX
7 Steps to Build a SOC with Limited Resources
PPTX
Information Security Metrics - Practical Security Metrics
PPTX
Jack Nichelson - Information Security Metrics - Practical Security Metrics
PPTX
Cyber Week 8.pptx.......................
PDF
Ctia course outline
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
Software development o & c
Xevgenis_Michail_CI7130 Network and Information Security
Build an Information Security Strategy
Build and Information Security Strategy
Running Header 1SYSTEM ARCHITECTURE24Gr.docx
Sentiment Analysis on Twitter Data
Threat modelling(system + enterprise)
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
How to develop an AppSec culture in your project
Building an AppSec Culture
crisc Domain1 Governance PPT Slide shows
Threat intelligence life cycle steps by steps
Cybersecurity_Security_architecture_2023.pdf
7 Steps to Build a SOC with Limited Resources
Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Cyber Week 8.pptx.......................
Ctia course outline

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
KodekX | Application Modernization Development
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Electronic commerce courselecture one. Pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
A Presentation on Artificial Intelligence
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPT
Teaching material agriculture food technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Modernizing your data center with Dell and AMD
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Reach Out and Touch Someone: Haptics and Empathic Computing
KodekX | Application Modernization Development
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Electronic commerce courselecture one. Pdf
Machine learning based COVID-19 study performance prediction
NewMind AI Weekly Chronicles - August'25 Week I
Mobile App Security Testing_ A Comprehensive Guide.pdf
A Presentation on Artificial Intelligence
“AI and Expert System Decision Support & Business Intelligence Systems”
20250228 LYD VKU AI Blended-Learning.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Teaching material agriculture food technology
Encapsulation_ Review paper, used for researhc scholars
Modernizing your data center with Dell and AMD
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Spectral efficient network and resource selection model in 5G networks
Review of recent advances in non-invasive hemoglobin estimation
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025

Octave

  • 2. About Me ▶ AMAR MYANA Senior Software Developer Security Brigade Infosec Pvt. Ltd. 3 ½ years
  • 3. Summary ▶ Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) ▶ an approach for managing information security risks ▶ Key Differences Between OCTAVE and Other Approaches ▶ Key Characteristics of the OCTAVE Approach ▶ OCTAVE Phases ▶ Two OCTAVE-consistent methods developed at the Software Engineering Institute (SEI) ▶ the OCTAVE Method for large organizations ▶ The OCTAVE-S for small organizations ▶ Choosing Between the Methods
  • 4. What Is OCTAVE? ▶ OCTAVE is a risk based strategic assessment and planning technique for security. ▶ OCTAVE is self-directed ▶ OCTAVE is targeted at organizational risk and focused on strategic, practice-related issues. ▶ When applying OCTAVE, a small team of people from the operational (or business) units and the information technology (IT) department work together to address the security needs of the organization, balancing the three key aspects ▶ Operational Risk ▶ Security Practices, ▶ and Technology
  • 5. What Is OCTAVE? ▶ OCTAVE approach is driven by two aspects: ▶ Operational Risk ▶ Security Practices ▶ By using the OCTAVE approach, an organization makes information-protection decisions based on risks to the confidentiality, integrity, and availability of critical information-related assets.
  • 6. Key Differences Between OCTAVE and Other Approaches OCTAVE Other Evaluations Organization evaluation System evaluation Focus on security practices Focus on technology Strategic issues Tactical issues Self direction Expert led
  • 7. Key Characteristics of the OCTAVE Approach ▶ OCTAVE is an asset-driven evaluation approach. Analysis teams ▶ identify information-related assets (e.g., information and systems) that are important to the organization ▶ focus risk analysis activities on those assets judged to be most critical to the organization ▶ consider the relationships among critical assets, the threats to those assets, and vulnerabilities (both organizational and technological) that can expose assets to threats ▶ evaluate risks in an operational context - how they are used to conduct an organization’s business and how those assets are at risk due to security threats ▶ create a practice-based protection strategy for organizational improvement as well as risk mitigation plans to reduce the risk to the organization’s critical assets
  • 8. OCTAVE Phases ▶ Phase 1: Build Asset-Based Threat Profiles ▶ This is an organizational evaluation. ▶ It identifies threats to each critical asset, creating a threat profile for that asset ▶ Phase 2: Identify Infrastructure Vulnerabilities ▶ This is an evaluation of the information infrastructure. ▶ Examines network access paths, identifying classes of information technology components related to each critical asset. ▶ Phase 3: Develop Security Strategy and Plans ▶ Identifies risks to the organization’s critical assets and decides what to do about them
  • 10. OCTAVE Method ▶ The OCTAVE Method was developed with large organizations in mind (e.g., 300 employees or more). ▶ OCTAVE Method Processes ▶ Phase 1: Build Asset-Based Threat Profiles ▶ Process 1: Identify Senior Management Knowledge ▶ Process 2: Identify Operational Area Knowledge ▶ Process 3: Identify Staff Knowledge ▶ Process 4: Create Threat Profiles ▶ Phase 2: Identify Infrastructure Vulnerabilities ▶ Process 5: Identify Key Components ▶ Process 6: Evaluate Selected Components ▶ Phase 3: Develop Security Strategy and Plans ▶ Process 7: Conduct Risk Analysis ▶ Process 8: Develop Protection Strategy
  • 11. OCTAVE-S ▶ OCTAVE-S was developed and tested for small organizations, ranging from 20 to 80 people. ▶ OCTAVE-S relates to the Phase 2 evaluation of the computing infrastructure. ▶ OCTAVE-S also includes an optional, qualitative version of probability. ▶ OCTAVE-S Processes ▶ OCTAVE-S has the same three phases described in the OCTAVE approach and in the OCTAVE Method. ▶ Phase 1: Build Asset-Based Threat Profiles ▶ Process S1: Identify Organizational Information ▶ Process S2: Create Threat Profiles ▶ Phase 2: Identify Infrastructure Vulnerabilities ▶ Process S3: Examine the Computing Infrastructure in Relation to Critical Assets ▶ Phase 3: Develop Security Strategy and Plans ▶ Process S4: Identify and Analyze Risks ▶ Process S5: Develop Protection Strategy and Mitigation Plans
  • 12. Choosing Between the Methods ▶ The OCTAVE Method is structured for an analysis team with some understanding of IT and security issues, employing an open, brainstorming approach for gathering and analyzing information. ▶ OCTAVE-S is more structured. Security concepts are embedded in OCTAVE-S worksheets, allowing for their use by less experienced practitioners. ▶ The following set of questions should be used to help you decide which method is best suited for your organization. Question OCTAVE Method OCTAVE-S Size and complexity of the organization Is your organization small? Does your organization have a flat or simple hierarchical structure? • Are you a large company (300 or more employees)? Do you have a complex structure or geographically- dispersed divisions? •
  • 13. Choosing Between the Methods Question OCTAVE Method OCTAVE-S Structured or Open-Ended Method Do you prefer a more structured method using fill-in-the-blanks, checklists, and redlines, but not as easy to tailor? • Do you prefer a more open-ended methodology that is easy to tailor and adapt to your own preferences? • Analysis team composition Can you find a group of three to five people for the analysis team who have a broad and deep understanding of the company and also possess most of the following skills? • Can you find a group of 3-5 people for the analysis team who have some understanding of at least part of the company and also possess most of the following skills? •
  • 14. Choosing Between the Methods Question OCTAVE Method OCTAVE-S IT resources Do you outsource all or most of your information technology functions? • Do you have a relatively simple information technology infrastructure that is well understood by at least one individual in your organization? • Do you manage your own computing infrastructure and are familiar with running vulnerability evaluation tools? • Do you have a complex computing infrastructure that is well understood by one or more individuals in your organization? • Are you able to run, comprehend, and interpret the results of vulnerability evaluation tools within the context of information- related assets? •
  • 15. Choosing Between the Methods Question OCTAVE Method OCTAVE-S Using a Beta-version method Are you willing to use a beta-version of a method (that is, use a method that may not have all the guidance you might need)? •