Example Cyber Security Risk Management Framework Template RMF
Example Cyber Security Risk Management Framework Template RMF
The Cybersecurity Risk Management Program (RMP) framework provides definitive information on the prescribed measures used to
manage cybersecurity-related risk at ACME Business Consulting. Inc. (ACME).
ACME is committed to protecting its employees, partners, clients and ACME from damaging acts that are intentional or unintentional.
An effective cybersecurity program is a team effort involving the participation and support of every ACME user who interacts with
data and systems. Therefore, it is the responsibility of every user to conduct their activities accordingly to reduce risk across the
enterprise.
Protecting company data and the systems that collect, process, and maintain this information is of critical importance. Consequently,
the security of systems must include controls and safeguards to offset possible threats, as well as controls to ensure accountability,
availability, integrity, and confidentiality of the data:
Confidentiality – Confidentiality addresses preserving restrictions on information access and disclosure so that access is
restricted to only authorized users and services.
Integrity – Integrity addresses ensuring that sensitive data has not been modified or deleted in an unauthorized and
undetected manner.
Availability – Availability addresses ensuring timely and reliable access to and use of information.
Security measures must be taken to guard against unauthorized access to, alteration, disclosure or destruction of data and systems.
This also includes protecting data and systems from accidental loss or destruction.
WHAT IS RISK?
One important concept to understand is that risk is variable - it is able to be changed and is not static. This is important to keep in
mind, since the “risk rating” is subject to change as the risk environment changes.
What is important to understand is that risk represents exposure to harm or loss. This is commonly quantified as a combination of
potential impact, likelihood and control effectiveness. Appendix A – Types of Information & Technology Risk provides examples of
specific types of risk associated with information and technology.
Essential to corporate governance and compliance are management and staff knowledge of:
Statutory, regulatory and contractual requirements;
ACME’s internal policies, standards and procedures;
Impact of changes; and
Consequences of non-compliance.
It is desirable to develop a mindset of a conscious approach to managing the risks inherent in every decision. Many decisions have to
be made quickly and are often based on intuition, but it is nevertheless important to think about the risks involved. The formal step-
by-step process is to be applied to decision making at all levels throughout ACME. The risk management process involves establishing
the context, identification, analysis, evaluation, treatment, monitoring and review of risks. Effective communication and consultation
with stakeholders is required throughout the risk management process, as well.
Risks can arise from both internal and external sources. While it is not possible to have a totally risk-free environment, it may be
possible to treat risk by avoiding, reducing, transferring, or accepting the risks.
wish to minimize
impose
COUNTERMEASURES
to reduce
RISK
THREAT AGENTS
that increase
give rise to
THREATS
ASSETS
to
It is important to keep in mind that risk management is far more than a “technology issue,” and it requires the direct involvement of
business process owners, IT personnel, and cybersecurity. Each has a role to play in risk management operations:
BUSINESS UNIT
The Business Unit (BU) that requires the technology to be in place and function ultimately “owns” the risk associated with
ongoing operation of systems.
Business Process Owners (BPOs) are individuals within BUs who are the central point of contact for IT and cybersecurity to
work with on risk management decisions.
INFORMATION TECHNOLOGY
IT has a shared responsibility with the BUs to securely operate and maintain systems.
IT executes vulnerability management tasks.
CYBERSECURITY
Cybersecurity operates as a facilitator of vulnerability and patch management decisions.
Cybersecurity focuses on providing expert guidance and support to both IT and the Business Unit.
Based on the degree of exposure, these risk categories help enable ACME’s leadership to have informed decisions at the appropriate
level of management oversight. See the Threat & Risk Assessment (TRA) Methodology section for more details on calculating risk
categories.
LOW RISK
Insignificant damage could occur from a low risk:
Financial impact is negligible (less than $[MODERATE RISK VALUE]).
Impact would not be damaging to ACME's reputation or impede business operations.
There are no violations of contractual, statutory or regulatory requirements.
MEDIUM RISK
Minimal damage could occur from a medium risk:
Financial impact is potentially between $[MODERATE RISK VALUE] and $[MAJOR RISK VALUE].
Impact would not be damaging to ACME's reputation or impede business operations.
Impact could impede Business Core (CL3) or Business Supporting (CL4) systems or business operations.
This may involve a violation of contractual requirements.
There are no violations of statutory or regulatory requirements.
HIGH RISK
Moderate damage could occur from a high risk:
Impact could include damage to ACME's reputation.
Impact could impede Business Essential (CL2) systems or business operations.
This may involve a violation of contractual, statutory and/or regulatory requirements.
Financial impact is potentially between $[MAJOR RISK VALUE] and $[CRITICAL RISK VALUE].
ACME's stock price could be negatively affected (<5% negative deviation).
SEVERE RISK
Significant financial and brand damage could occur from a severe risk.
Impact could include significant damage to ACME's reputation.
Impact could impede Mission Critical (CL1), and below, systems or business operations.
Impact could negatively affect ACME's short-term competitive position.
This may involve a violation of contractual, statutory and/or regulatory requirements.
Financial impact is potentially between $[CRITICAL RISK VALUE] and $[CATASTROPHIC RISK VALUE].
ACME's stock price could be moderately affected (>5% negative deviation).
EXTREME RISK
Extensive financial and long-term brand damage could occur from a critical risk:
Impact could include extensive damage to ACME's reputation.
Impact could impede Mission Critical (CL1) systems or business operations.
Impact could negatively affect ACME's long-term competitive position.
Risk scenarios involving potential physical harm or fatality are included in this category.
Financial impact is potentially over $[CATASTROPHIC RISK VALUE].
ACME's stock price could be significantly affected (>10% negative deviation).
ACME is committed to establishing an organizational culture that ensures risk management is an integral part of all activities. The core
function of risk management is the achievement of ACME’s objectives and supporting ACME’s strategic direction.
Risk management is focused on identifying, evaluating, controlling and managing risks - it is not a negative or constraining concept. It
allows ACME to seek and take advantage of opportunities to achieve improved outcomes and outputs by ensuring that any risk taken
is based on informed decision-making, realistic and measurable objectives, and sound analysis of possible outcomes. The process can
be applied at all levels of ACME.
Sound risk management not only contributes to good governance; it also provides protection for managers in the event of adverse
outcomes. Provided risks have been managed in accordance with ACME’s guidelines, protection occurs on two levels:
Firstly, the adverse outcome may not be as severe as it might otherwise have been.
Secondly, those accountable can, in their defense, demonstrate that they have exercised a proper level of diligence.
The accountability and responsibility for ACME’s risk management practice rests with management at three different levels:
Executive Management;
Senior Management; and
Line management.
It is the responsibility of the executive and senior management who are ultimately accountable for managing the risks that may affect
their operations to review risk management documentation prepared by their line managers.
The RMM maturity levels are organized progressively from “ad hoc” to “leadership” and depict corresponding levels of risk
management competency. The seven drivers for the systematic progression of levels are termed as "Attributes" and include variables
such as Process Management, Risk Appetite Management, Uncovering Risks, and Business Resiliency and Sustainability.
The RMM helps the leadership team define a roadmap to the successful adoption of an ERM. An ERM should be designed to view risks
across all areas of the business to identify strategic opportunities and reduce uncertainty. A unique feature of the RMM is its
applicability regardless of the specialized frameworks and standards that an organization is using, whether it is COSO ERM, COBIT,
Standard & Poor’s ERM or Sarbanes-Oxley.
1
Risk Management Society - https://www.rims.org/resources/ERM/Pages/RiskMaturityModelFAQ.aspx
Since every organization is managed by different people, who have unique skills and experiences that drive their professional
judgments, one organization’s accepted method for internal control will not equally apply to other organizations. As it pertains to
ACME, while the COSO framework provides principles and points of focus that direct ACME towards well-designed control activities,
COSO was not intended to dictate the specific controls that should be implemented. Therefore, ACME must also rely upon additional
frameworks to provide granularity in evaluating risks in order for ACME to be secure, vigilant, and resilient.
ACME will use guidance from the following best practice frameworks to manage risk, according to which framework is most applicable:
2
COSO - http://www.coso.org/
3
ISO 31010 - http://www.iso.org/iso/home/store/catalogue_tc/catalogue_detail.htm?csnumber=51073
4
NIST 800-37 - http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r1.pdf
Ultimately, ACME needs to identify its information systems, determine their value, and protect them against cyber-attacks. This is
accomplished through the deployment of control activities that are commensurate with the value of the information systems. To
achieve these results, business and IT stakeholders must initially arrive at a common understanding of the structure of the business,
including outsourced service providers, and the related business objectives and sub-objectives that are important to ACME. While this
concept is easy to grasp, it is important to formally document this approach. Documenting the business structure will help ensure that
processes and controls can be executed consistently with relevant, quality information, in a manner that allows continuous refinement
as people, process, and technology evolve along with ACME’s objectives.
In order to manage cyber risks, ACME needs to view its cyber risk profile through the components of internal control. This includes,
but is not limited to:
Control Environment
o Does the board of directors understand ACME’s cyber risk profile, and are they informed of how the organization is
managing the evolving cyber risks management faces?
Risk Assessment
o Has ACME and its critical stakeholders evaluated its operations, reporting, and compliance objectives and gathered
information to understand how cyber risk could impact such objectives?
Control Activities
o Has ACME developed control activities, including general control activities over technology, that enable ACME to
manage cyber risk within the level of tolerance acceptable to the organization?
o Have such control activities been deployed through formalized policies and procedures?
Information and Communication
o Has ACME identified information requirements to manage internal control over cyber risk?
o Has ACME defined internal and external communication channels and protocols that support the functioning of
internal control?
o How will ACME respond to, manage, and communicate a cyber risk event?
Monitoring Activities
o How will ACME select, develop, and perform evaluations to ascertain the design and operating effectiveness of
internal controls that address cyber risks?
o When deficiencies are identified how are these deficiencies communicated and prioritized for corrective action?
o What is ACME doing to monitor their cyber risk profile?
NIST’s Risk Management Framework (RMF) is specified in NIST Special Publication 800-37 - Guide for Applying the Risk Management
Framework to Federal Information Systems. 11 This framework is the TACTICAL approach that ACME will utilize for specific projects.
Figure 9: NIST 800-37 Risk Management Framework (RMF) Security Life Cycle
CATEGORIZE
ACME shall assign a potential security impact value for all information systems, including the information being processed, stored, and
transmitted by the system, based on the potential impact to ACME (see Threat & Risk Assessment (TRA) Methodology section).
SELECT
An appropriate set of security controls are selected for the information system after categorizing and determining the minimum-
security requirements.
ACME will meet the minimum-security requirements by selecting an appropriately tailored set of baseline security controls based on
an assessment of risk and local conditions, including ACME’s specific security requirements, threat information, cost-benefit analyses,
or special circumstances.
IMPLEMENT
Security controls must be properly installed and configured in the information system. Checklists of security settings are useful tools
that have been developed to guide IT administrators and security personnel in selecting effective security settings that will reduce the
risks and protect systems from attacks.
11
NIST 800-37 - http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r1.pdf
INSIGNIFICANT
There is little-to-no impact to business operations:
Financial impact is less than $[MINOR RISK VALUE].
Performance or availability of up to Business Essential (CL2) systems is minimally impacted.
Isolated staff dissatisfaction.
MINOR
There are moderate impacts to business operations:
Financial impact is less than $[MODERATE RISK VALUE].
Performance or availability of up to Business Essential (CL2) systems is moderately impacted.
Local, short-term, negative media coverage.
Department-level staff morale problems.
MODERATE
There are serious impacts to business operations:
Financial impact is less than $[MAJOR RISK VALUE].
Performance or availability of Mission Critical (CL1) systems is minimally impacted.
Performance or availability of up to Business Essential (CL2) systems is significantly impacted.
A contractual, statutory and/or regulatory requirement is violated.
National, short-term, negative media coverage.
Widespread staff morale problems and increase in turnover.
MAJOR
There are major impacts to business operations:
Financial impact is less than $[CRITICAL RISK VALUE].
Performance or availability of Mission Critical (CL1) systems is moderately impacted.
Performance or availability of up to Business Essential (CL2) systems is impacted to the point of being unusable.
A contractual, statutory and/or regulatory requirement would be violated, where no punitive action would be an expected
outcome.
Widespread management morale problems, and multiple senior leaders leave.
International, short-term, negative media coverage.
CRITICAL
There are critical impacts to business operations:
Financial impact could exceed $[CRITICAL RISK VALUE].
The ACME’s reputation and/or competitive position would be damaged.
Performance or availability of Mission Critical (CL1) systems is significantly impacted.
Performance or availability of up to Business Essential (CL2) systems is impacted to the point of being unusable.
A contractual, statutory and/or regulatory requirement would be violated, where some level of punitive action would be an
expected outcome.
International, long-term, negative media coverage with noticeable loss of market share.
CATASTROPHIC
There are catastrophic impacts to business operations:
Financial impact could exceed $[CATASTROPHIC RISK VALUE].
The ACME’s reputation and/or competitive position would be severely damaged.
Performance or availability of up to Mission Critical (CL1) systems is impacted to the point of being unusable.
Key technologies will not be available and there are no alternatives.
A contractual, statutory and/or regulatory requirement would be violated, where significant punitive action would be an
expected outcome.
For the most part, assessing the potential impact of an event involves making an “educated guess” based on the available facts of the
situation. With or without clear facts to justify potential impact, assessors need to document the justification for the value that was
determined, including the facts and assumptions used in the decision-making process.
REMOTE POSSIBILITY
The likelihood of a “remote possibility” event occurring can be quantified as less than a 1% chance of occurrence.
HIGHLY UNLIKELY
The likelihood of a “highly unlikely” event occurring can be quantified as between a 1%-10% chance of occurrence.
UNLIKELY
The likelihood of an “unlikely” event occurring can be quantified as between a 10%-25% chance of occurrence.
POSSIBLE
The likelihood of a “possible” event occurring can be quantified as between a 25%-70% chance of occurrence.
LIKELY
The likelihood of a “likely” event occurring can be quantified as between a 70%-99% chance of occurrence.
ALMOST CERTAIN
The likelihood of an “almost certain” event occurring can be quantified as greater than a 99% chance of occurrence.
PROBABILITY FORECASTS
Probability forecasts use predictive techniques such as fault tree analysis and event tree analysis. When historical data are unavailable
or inadequate, it is necessary to derive probability by analysis of the system, activity, equipment or organization and its associated
failure or success states. Numerical data for equipment, personnel, organizations and systems from operational experience, or
published data sources are then combined to produce an estimate of the probability of the top event.
When using predictive techniques, it is important to ensure that due allowance has been made in the analysis for the
possibility of common mode failures involving the coincidental failure of multiple different parts or components within the
system arising from the same cause.
Simulation techniques may be required to generate probability of equipment and structural failures due to ageing and other
degradation processes.
EXPERT OPINION
Expert opinion can be used in a systematic and structured process to estimate probability.
Expert judgements should draw upon all relevant available information including historical, system-specific, organizational-
specific, experimental, design, etc.
There are several formal methods for eliciting expert judgement which provide an aid to the formulation of appropriate
questions.
The methods available include the Delphi approach, paired comparisons, category rating, and absolute probability judgments.
The impact of a CL4 system, or its data, being unavailable includes, but is not limited to:
Localized employee productivity degradation;
Localized delays or degradation of services or routine activities;
No revenue impact; and
No impact on customer satisfaction.
See the How Do We Categorize Risk? Section for more information on ACME’s risk levels.
It is the responsibility of the executive and senior management who are ultimately accountable for managing the risks that may affect
their operations to review risk management documentation prepared by their line managers.
Executive and Senior Management responsibilities include, but are not limited to:
Considering and documenting new and existing risks and their impact on proposed plans as part of the annual planning cycle.
o Risk records must be maintained up-to-date on an on-going basis to reflect any changes which may occur;
Providing direction and guidance within their areas of accountability so that staff best utilize their abilities in the preservation
of ACME’s resources;
Successfully promoting, sponsoring and coordinating the development of a risk management culture throughout ACME;
Guiding the inclusion of risk management in all strategic and operational decision making;
Possessing a clear profile of major risks within their area of control incorporating both opportunity and negative risks;
Maintaining a framework to manage, monitor and report risk;
Managing risks to meet ACME objectives, goals and vision; and
Improving corporate governance.
LINE MANAGEMENT
Line managers at all levels are responsible for the adoption of risk management practices and are directly responsible for the results
of risk management activities relevant to their area of responsibility.
The techniques listed below have unique attributes, which make selecting the correct technique for a specific risk assessment very important. While a simple matrix can work for
most simple risk assessments, other methods are needed for more complex assessments.
LOOK UP METHODS
EVALUATING RISK
IDENTIFICATION?
USEFUL FOR RISK
QUANTITATIVE
STRENGTH IN
SOLUTION?
CONSEQUENCE
UNCERTAINTY
LEVEL OF RISK
PROBABILITY
COMPLEXITY
DEGREE OF
DEGREE OF
REQUIRED
TECHNIQUE TECHNIQUE DESCRIPTION
SKILLS
The consequence/probability matrix is a means
of combining qualitative or semi-quantitative
ratings of consequence and probability to
Consequence
produce a level of risk or risk rating. The format Great Great Great Great
& Probability No Low Low Low OK
of the matrix and the definitions applied to it Choice Choice Choice Choice
Matrix
depend on the context in which it is used, and it
is important that an appropriate design is used
for the circumstances.