SlideShare a Scribd company logo
Lightweight Cybersecurity Risk
Assessment Tools for
Cyberinfrastructure
Jim Basney <jbasney@ncsa.illinois.edu>
URISC@SC17
This material is based upon work supported by the National Science Foundation under grant number 1547272. Any opinions, findings, and conclusions or
recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.
Risk Assessment: Motivation
Implement cybersecurity “best practices”
Create an inventory of your project's assets
Think critically about potential risks
Develop risk mitigations
Understand accepted risks
Risk Assessment Tools
Risk Self-Evaluation Spreadsheet
https://goo.gl/9x1NdQ
Risk Assessment Table
http://trustedci.org/guide/docs/RAtable
Copies also in https://go.ncsa.illinois.edu/URISC
Risk Self-Evaluation: Sections
Policy and Procedure
Host Protection
Network Security
Physical Security
Monitoring and Logging
Risk Self-Evaluation: Layout
Risk Self-Evaluation: Example
Risk Self-Evaluation: Potential Strategies
View project as a whole
Divide project into parts
Conceptual components
Location-based
Existing vs Planned
Have personnel fill out what they know
Risk Self-Evaluation: Discussion
I Did the Risk Self-Evaluation! Now What?
Address any issues
Mitigated = “Partial”, “No”, or “Unknown”
Schedule a re-check in 3 months
Give report to management
Start a more complete Risk Assessment
http://trustedci.org/guide/docs/RAtable
Risk Assessment Process
Risk Assessment Table
http://trustedci.org/guide/docs/RAtable
CTSC Guide to Developing Cybersecurity Programs
https://trustedci.org/guide
NIST 800-30: Risk Management Guide for
Information Technology Systems
http://doi.org/10.6028/NIST.SP.800-30
1. System Characterization
Describe the system resources used by the project
Break down the system by location, function, information flow, etc.
Use an Information Asset Inventory
https://trustedci.org/guide/docs/IAI
2. Threat Identification
Threat is the potential for a particular source to exploit a particular vulnerability
toward a malicious end.
Threats consist of sources (e.g., humans, natural disasters, power outages),
motivations (e.g., monetary gain, espionage), and actions (e.g., hacking, social
engineering).
Identifying threats often involves looking at old attack data and noting which
threats are applicable today.
3. Vulnerability Identification
A vulnerability is a flaw or weakness in a system’s security procedures, design,
implementation, or internal controls that could potentially be exercised by a
threat agent to result in a breach or violation of the system's security policy.
The Risk Assessment Table reflects the vulnerabilities as a combination of the
columns “Asset”, “Attack Surface”, and “Threat Description”.
4. Control Analysis
Security controls are mechanisms put in place to mitigate the risk of threats being
being realized by exploiting vulnerabilities.
Controls can be administrative (e.g., policies, standards, guidelines, training and
other processes), technical/logical (e.g., authentication and authorization
systems, file permissions, firewalls, intrusion detection systems, etc.), or physical
(e.g., locked file cabinets, secured data centers, cameras, fences, etc.).
The “Current Controls” column of the Risk Assessment Table lists any controls in
place for the associated risk. The “Control Effectiveness” column is an estimation
of how effective the current control is, using a scale from 1 (ineffective) to 5
(extremely effective).
Control Effectiveness
5 Extremely effective
4 Very effective
3 Moderately effective
2 Minimally effective
1 Ineffective
5. Likelihood Determination
When ranking likelihood, consider not only the specifics of the vulnerability, but
also motivation and capability of a potential threat source.
Likelihood Estimation
5 Constant or extremely frequent, > 85%
4 Very frequent, 60% - 85%
3 Somewhat frequent, 30% - 60%
2 Infrequent, 10% - 30%
1 Rarely, if ever, < 10%
6. Impact Analysis
The impact of any exploit depends upon (1) the mission of the project, (2) the
criticality of the vulnerable system or data, and (3) the sensitivity of the affected
system or data.
Impact from a security incident could affect the integrity, availability, or
confidentiality of a system or data. Depending on the subsystem affected, we
could be concerned more with one kind of impact than another. However, the
impact on each of these three properties should be considered for any potential
exploit.
On method to make the impact of an exploited vulnerability more concrete is to
estimate a dollar amount for the impact of an incident.
Impact Estimation
5 Catastrophic, > $1M
4 Major, $250K - $1M
3 Moderate, $50K - $250K
2 Minor, up to $50K
1 Insignificant, ~$100s
Sort the Risk Assessment Table by “Residual Risk” to find the vulnerabilities which
have a high risk, taking into account the current controls in place. These are the
risks that should be addressed first.
7. Risk Determination & Recommendations
Inherent Risk = Likelihood * Impact
Risk
20 – 25 Very High
14 – 19 High
9 – 13 Medium
4 – 8 Low
0 – 3 Negligible
Residual Risk = Inherent Risk * (6-Control Effectiveness)/5
Risk Assessment Table: Discussion
19
Cybersecurity Guides and Tools
● Addressing concerns unique to science
● Policy templates:
Acceptable Use, Access Control,
Asset Management, Disaster Recovery,
Incident Response, Inventory, Awareness,
Physical Security, ...
● Risk assessment table
● Securing commodity IT
● Self-assessment Tool
● Identity Management Best Practices
https://trustedci.org/guide
Thanks!
https://go.ncsa.illinois.edu/URISC
https://trustedci.org/webinars
https://trustedci.org/guide
jbasney@ncsa.illinois.edu

More Related Content

PPT
Information Serurity Risk Assessment Basics
PDF
NIST SP 800 30 Flow Chart
PPT
Reorganizing Federal IT to Address Today's Threats
PPTX
Information systems risk assessment frame workisraf 130215042410-phpapp01
PDF
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
PPTX
DEVELOPING AN ICT RISK REGISTER
PDF
The OCTAVE Method
PDF
Threat Based Risk Assessment
Information Serurity Risk Assessment Basics
NIST SP 800 30 Flow Chart
Reorganizing Federal IT to Address Today's Threats
Information systems risk assessment frame workisraf 130215042410-phpapp01
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
DEVELOPING AN ICT RISK REGISTER
The OCTAVE Method
Threat Based Risk Assessment

What's hot (19)

PPTX
NIST 800 30 revision Sep 2012
PDF
Comparative of risk analysis methodologies
PPTX
Information Secuirty Vulnerability Management
PDF
Vulnerability scanners a proactive approach to assess web application security
PDF
Cyber Incident Response Team - NIMS - Public Comment
PDF
A Practical Approach to Managing Information System Risk
PPTX
The Economics of Cyber Security
PDF
Information Security Risk Management
PDF
Implementing Vulnerability Management
PDF
Best vulnerability assessment training
PPTX
Top Level Cyber Security Strategy
PDF
Designing NextGen Threat Identification Solutions
PPTX
Elements of security risk assessment and risk management
PDF
Risk Assessments
PPTX
Step by-step for risk analysis and management-yaser aljohani
PPTX
Vulnerability Management Nirvana - Seattle Agora - 18Mar16
PPTX
Octave
PPTX
Risk Assessment and Threat Modeling
NIST 800 30 revision Sep 2012
Comparative of risk analysis methodologies
Information Secuirty Vulnerability Management
Vulnerability scanners a proactive approach to assess web application security
Cyber Incident Response Team - NIMS - Public Comment
A Practical Approach to Managing Information System Risk
The Economics of Cyber Security
Information Security Risk Management
Implementing Vulnerability Management
Best vulnerability assessment training
Top Level Cyber Security Strategy
Designing NextGen Threat Identification Solutions
Elements of security risk assessment and risk management
Risk Assessments
Step by-step for risk analysis and management-yaser aljohani
Vulnerability Management Nirvana - Seattle Agora - 18Mar16
Octave
Risk Assessment and Threat Modeling
Ad

Similar to Lightweight Cybersecurity Risk Assessment Tools for Cyberinfrastructure (20)

PDF
Cybersecurity risk assessments help organizations identify.pdf
DOCX
List of Current and Planned ControlsStep 4. Contr.docx
PPTX
PPTX
How to assess and manage cyber risk
PDF
Vulnerability Management: A Comprehensive Overview
PDF
Risk Assessment: Approach to enhance Network Security
PPTX
Physical Security Assessment
PPTX
Cyber Security # Lec 3
PPT
Risk Assessment Process NIST 800-30
PDF
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
PPT
Introduction_to_Security_Assessments.ppt
PDF
Outsourcing
PDF
Simplifying IT Security for GDPR Compliance: Sharique M Rizvi
PPT
Risk Assessment And Management
PDF
Information Security 20- Risk Assessment.pdf
PPTX
Information Security and Risk Management.pptx
PDF
"information risk management in cybersecurity" Lecture 2
PDF
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
PDF
How To Handle Cybersecurity Risk Powerpoint Presentation Slides
PDF
200606_NWC_Strategic Security
Cybersecurity risk assessments help organizations identify.pdf
List of Current and Planned ControlsStep 4. Contr.docx
How to assess and manage cyber risk
Vulnerability Management: A Comprehensive Overview
Risk Assessment: Approach to enhance Network Security
Physical Security Assessment
Cyber Security # Lec 3
Risk Assessment Process NIST 800-30
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
Introduction_to_Security_Assessments.ppt
Outsourcing
Simplifying IT Security for GDPR Compliance: Sharique M Rizvi
Risk Assessment And Management
Information Security 20- Risk Assessment.pdf
Information Security and Risk Management.pptx
"information risk management in cybersecurity" Lecture 2
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk Powerpoint Presentation Slides
200606_NWC_Strategic Security
Ad

More from jbasney (20)

PDF
Guidance and Survey Results from the Trustworthy Data Working Group
PDF
Federated Identity Needs for the Large Synoptic Survey Telescope (LSST)
PDF
CILogon & SciTokens: OIDC/OAuth Federation
PDF
CILogon 2.0 - IAM Online Webinar Series
PDF
CILogon 2.0 at Oct 2017 CICI PI meeting
PDF
11th FIM4R Workshop: US Projects Update
PDF
CILogon PEARC17
PDF
CILogon 2.0 at 2017 Internet2 Global Summit
PDF
CTSC+SWAMP: cybersecurity resources for your campus
PDF
CILogon: An Integrated Identity and Access Management Platform for Science
PDF
CILogon 2.0 MAGIC SC16
PDF
CILogon 2.0 Update at TechEx 2016
PDF
Trusting External Identity Providers for Global Research Collaborations
PDF
Cybersecurity for Conservation
PDF
CTSC at TNC16
PDF
CILogon 2.0 at 2016 Internet2 Global Summit
PDF
SAML Security Contacts
PDF
FeduShare TechEx15
PDF
CILogon 2.0 at REFEDS 30
PDF
CILogon and InCommon: Technical Update
Guidance and Survey Results from the Trustworthy Data Working Group
Federated Identity Needs for the Large Synoptic Survey Telescope (LSST)
CILogon & SciTokens: OIDC/OAuth Federation
CILogon 2.0 - IAM Online Webinar Series
CILogon 2.0 at Oct 2017 CICI PI meeting
11th FIM4R Workshop: US Projects Update
CILogon PEARC17
CILogon 2.0 at 2017 Internet2 Global Summit
CTSC+SWAMP: cybersecurity resources for your campus
CILogon: An Integrated Identity and Access Management Platform for Science
CILogon 2.0 MAGIC SC16
CILogon 2.0 Update at TechEx 2016
Trusting External Identity Providers for Global Research Collaborations
Cybersecurity for Conservation
CTSC at TNC16
CILogon 2.0 at 2016 Internet2 Global Summit
SAML Security Contacts
FeduShare TechEx15
CILogon 2.0 at REFEDS 30
CILogon and InCommon: Technical Update

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Cloud computing and distributed systems.
PDF
Encapsulation theory and applications.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
cuic standard and advanced reporting.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Empathic Computing: Creating Shared Understanding
PDF
Modernizing your data center with Dell and AMD
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Network Security Unit 5.pdf for BCA BBA.
Advanced methodologies resolving dimensionality complications for autism neur...
Encapsulation_ Review paper, used for researhc scholars
Cloud computing and distributed systems.
Encapsulation theory and applications.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Agricultural_Statistics_at_a_Glance_2022_0.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
NewMind AI Weekly Chronicles - August'25 Week I
Diabetes mellitus diagnosis method based random forest with bat algorithm
cuic standard and advanced reporting.pdf
A Presentation on Artificial Intelligence
Dropbox Q2 2025 Financial Results & Investor Presentation
Empathic Computing: Creating Shared Understanding
Modernizing your data center with Dell and AMD
Unlocking AI with Model Context Protocol (MCP)
Big Data Technologies - Introduction.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Network Security Unit 5.pdf for BCA BBA.

Lightweight Cybersecurity Risk Assessment Tools for Cyberinfrastructure

  • 1. Lightweight Cybersecurity Risk Assessment Tools for Cyberinfrastructure Jim Basney <jbasney@ncsa.illinois.edu> URISC@SC17 This material is based upon work supported by the National Science Foundation under grant number 1547272. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.
  • 2. Risk Assessment: Motivation Implement cybersecurity “best practices” Create an inventory of your project's assets Think critically about potential risks Develop risk mitigations Understand accepted risks
  • 3. Risk Assessment Tools Risk Self-Evaluation Spreadsheet https://goo.gl/9x1NdQ Risk Assessment Table http://trustedci.org/guide/docs/RAtable Copies also in https://go.ncsa.illinois.edu/URISC
  • 4. Risk Self-Evaluation: Sections Policy and Procedure Host Protection Network Security Physical Security Monitoring and Logging
  • 7. Risk Self-Evaluation: Potential Strategies View project as a whole Divide project into parts Conceptual components Location-based Existing vs Planned Have personnel fill out what they know
  • 9. I Did the Risk Self-Evaluation! Now What? Address any issues Mitigated = “Partial”, “No”, or “Unknown” Schedule a re-check in 3 months Give report to management Start a more complete Risk Assessment http://trustedci.org/guide/docs/RAtable
  • 10. Risk Assessment Process Risk Assessment Table http://trustedci.org/guide/docs/RAtable CTSC Guide to Developing Cybersecurity Programs https://trustedci.org/guide NIST 800-30: Risk Management Guide for Information Technology Systems http://doi.org/10.6028/NIST.SP.800-30
  • 11. 1. System Characterization Describe the system resources used by the project Break down the system by location, function, information flow, etc. Use an Information Asset Inventory https://trustedci.org/guide/docs/IAI
  • 12. 2. Threat Identification Threat is the potential for a particular source to exploit a particular vulnerability toward a malicious end. Threats consist of sources (e.g., humans, natural disasters, power outages), motivations (e.g., monetary gain, espionage), and actions (e.g., hacking, social engineering). Identifying threats often involves looking at old attack data and noting which threats are applicable today.
  • 13. 3. Vulnerability Identification A vulnerability is a flaw or weakness in a system’s security procedures, design, implementation, or internal controls that could potentially be exercised by a threat agent to result in a breach or violation of the system's security policy. The Risk Assessment Table reflects the vulnerabilities as a combination of the columns “Asset”, “Attack Surface”, and “Threat Description”.
  • 14. 4. Control Analysis Security controls are mechanisms put in place to mitigate the risk of threats being being realized by exploiting vulnerabilities. Controls can be administrative (e.g., policies, standards, guidelines, training and other processes), technical/logical (e.g., authentication and authorization systems, file permissions, firewalls, intrusion detection systems, etc.), or physical (e.g., locked file cabinets, secured data centers, cameras, fences, etc.). The “Current Controls” column of the Risk Assessment Table lists any controls in place for the associated risk. The “Control Effectiveness” column is an estimation of how effective the current control is, using a scale from 1 (ineffective) to 5 (extremely effective). Control Effectiveness 5 Extremely effective 4 Very effective 3 Moderately effective 2 Minimally effective 1 Ineffective
  • 15. 5. Likelihood Determination When ranking likelihood, consider not only the specifics of the vulnerability, but also motivation and capability of a potential threat source. Likelihood Estimation 5 Constant or extremely frequent, > 85% 4 Very frequent, 60% - 85% 3 Somewhat frequent, 30% - 60% 2 Infrequent, 10% - 30% 1 Rarely, if ever, < 10%
  • 16. 6. Impact Analysis The impact of any exploit depends upon (1) the mission of the project, (2) the criticality of the vulnerable system or data, and (3) the sensitivity of the affected system or data. Impact from a security incident could affect the integrity, availability, or confidentiality of a system or data. Depending on the subsystem affected, we could be concerned more with one kind of impact than another. However, the impact on each of these three properties should be considered for any potential exploit. On method to make the impact of an exploited vulnerability more concrete is to estimate a dollar amount for the impact of an incident. Impact Estimation 5 Catastrophic, > $1M 4 Major, $250K - $1M 3 Moderate, $50K - $250K 2 Minor, up to $50K 1 Insignificant, ~$100s
  • 17. Sort the Risk Assessment Table by “Residual Risk” to find the vulnerabilities which have a high risk, taking into account the current controls in place. These are the risks that should be addressed first. 7. Risk Determination & Recommendations Inherent Risk = Likelihood * Impact Risk 20 – 25 Very High 14 – 19 High 9 – 13 Medium 4 – 8 Low 0 – 3 Negligible Residual Risk = Inherent Risk * (6-Control Effectiveness)/5
  • 19. 19 Cybersecurity Guides and Tools ● Addressing concerns unique to science ● Policy templates: Acceptable Use, Access Control, Asset Management, Disaster Recovery, Incident Response, Inventory, Awareness, Physical Security, ... ● Risk assessment table ● Securing commodity IT ● Self-assessment Tool ● Identity Management Best Practices https://trustedci.org/guide