Risk Assessment For Personnel Security
Risk Assessment For Personnel Security
Contents
Introduction 2
Overview 3
Glossary of terms 32
Introduction
Centre for the Protection of National Infrastructure
The Centre for the Protection of National Infrastructure (CPNI) is the government authority that
provides advice on protecting the country’s essential services, facilities and networks from terrorism
and other threats.
Nine different sectors form what is known as the national infrastructure. These provide the services
which support everyday life:
CPNI provides security guidance, training and research from a physical, information and personnel
security perspective. It aims specifically to reduce the vulnerabilities within these sectors, with
particular emphasis on the most critical elements. Loss or disruption to any of these could cause
severe economic or social consequences or even loss of life.
In addition to the nine sectors above, CPNI also provides similar advice to organisations engaged in
planning and running the London 2012 Olympics.
A CPNI survey in late 2006 showed that many CNI organisations do not adopt a structured approach
to personnel security. Very often, clear rationales for the use of particular personnel security measures
are lacking and resources are not targeted in a proportionate way. It is more common for physical and
electronic protective security measures to be applied on the basis of systematic risk assessments that
promote cost effective security.
Personnel security risk assessment focuses on employees, their access to the organisation’s assets, the
risks they could pose to the organisation and the sufficiency of countermeasures. It is the foundation of
the personnel security management process. It is also crucial in helping Security and Human Resource
managers communicate to senior managers the risks to which the organisation is exposed.
This guidance, which is illustrated using a fictional case study, aims to help Security and Human
Resource managers to:
• Conduct personnel security risk assessments in a way that balances pragmatism with
rigour
• Prioritise the insider risks to an organisation
• Identify appropriate countermeasures to mitigate against those risks
• Allocate personnel security resources in a way that is cost effective and commensurate
with the level of risk.
2
Risk assessment for personnel security - a guide
Overview
Personnel security
Personnel security is a system of policies and procedures, which seeks to manage the risk
of staff or contractors exploiting their legitimate access to an organisation’s assets or
premises for unauthorised purposes. Those who seek to exploit their legitimate access are
termed ‘insiders’.
For the purposes of this guidance, individuals who have legitimate access to an organisation’s assets,
but who are not staff or contractors – for example, postal delivery workers with temporary site
access – fall outside this definition of insiders.
There are many different measures that can be used in a programme of personnel security. Most of
them will fall into the following categories:
• Screening
Pre-Employment personnel o Pre-employment checks
security measures o Assessing insider potential
o National Security Vetting1
• Screening
o Pre-employment check updates
o Behavioural assessment
o National Security Vetting and National Security Vetting
Ongoing personnel aftercare
security measures • Access controls
• Promoting effective security culture
• Social Engineering
• Protective monitoring and intrusion detection
• Investigations
These measures are outlined within Personnel Security: Threats, Challenges and Measures.
Further details are also available in A Good Practice Guide on Pre-Employment Screening and
Ongoing Personnel Security: A Good Practice Guide. All of these publications can be found
online at www.cpni.gov.uk.
The use of appropriate personnel security measures can prevent or deter a wide variety of insider
attacks, from staff fraud through to the facilitation or conduct of a terrorist attack. However, these
measures can also be labour intensive and costly, and may result in delays to business processes
such as recruitment or staff transfers, so it is important that they are implemented in a way that
reflects the severity of the risk. Risk management provides a systematic basis for proportionate and
efficient personnel security.
1 National security vetting is significantly different to the other controls in this framework; it is a centrally provided service which applies only
to particular posts, where the need for vetting has been endorsed by the appropriate Government department.
3
Risk assessment for personnel security - a guide
• Risk assessment - risks to the organisation are assessed in terms of the likelihood of an
undesirable event taking place, and the anticipated consequences
• Implementation - security measures are identified and implemented to reduce the likelihood
and impact of the undesirable event to an acceptable level
The cyclical nature of the risk management process ensures that each time a risk assessment is
repeated, the implementation and evaluation phases are also reviewed. Much of the value of the risk
management process is derived from the systematic exploration of threats, opportunities and
countermeasures through engagement with the relevant parties. The discussions involved often
produce a level of insight and shared understanding that would not otherwise be achieved.
This document concentrates on risk assessment, the basis for the rest of the risk management
process. The guidance is not intended to be prescriptive. Security and human resources professionals
will naturally wish to use an approach that best meets the needs of their organisations, bearing in
mind the nature of the threat and the resources available to counter it.
The Risk Assessment process incorporates the Identify threats and Assess vulnerabilities stages
of the Risk Management Cycle.
4
Risk assessment for personnel security - a guide
In this context, risk is usually understood to be the product of two factors: the likelihood of an event
occurring, and the impact that the event would have. When each of these has been evaluated, they
are combined to provide an overall measure of risk.
Likelihood can be further broken down into three factors: intent, capability and opportunity. Intent is a
measure of the insider’s determination to carry out the attack, while capability is the degree to which
the insider possesses the skills, knowledge and resources to be successful in the attempt.
Opportunity is a combination of the access that an insider has to an organisation’s assets (by virtue of
their role or position), together with the vulnerability of the environment (for example, an environment
that is constantly supervised or monitored by CCTV cameras is less vulnerable to some insider threats
than an environment which is not subject to these controls).
Impact should be considered in terms of the value of the assets affected and any wider
consequences. For example, insider fraud can have both financial and reputational impacts.
Some risk assessments involve quantitative measures that are absolute, while others use relative
judgements. An absolute risk assessment process evaluates an event’s likelihood in terms of
probability and its impact in terms of numerical measures such as financial cost, or a delay in service
delivery. By contrast, in relative risk assessments the likelihood and impact of the risks are simply
compared, so that the risks can be listed in rank order.
It is often impossible to produce absolute risk assessments because of the difficulties involved in
quantifying likelihood and impact. It is common to adopt semi-quantitative approaches that use scales
for likelihood and impact such as ‘Very low’ to ’Very high’. In these approaches, there is an
assumption that everyone involved with the assessment shares an understanding of terms like ’Very
high’. The assessors themselves must be able to place the events on the scales in a way that reflects
this understanding.
5
Risk assessment for personnel security - a guide
At the other end of the spectrum is an approach that makes no claims to assess the actual likelihood
or impact of an event. Relative risk assessments aspire simply to a meaningful ordering of the
likelihood, impact and hence risk of different events. This type of assessment will tell you which are the
highest risks to the organisation, which are the lowest, and the spread between. This is sufficient for
most personnel security risk assessment purposes.
There are three levels at which personnel security risk assessments can be conducted:
1. Organisation
2. Group
3. Individual.
The first examines and prioritises the types of insider threats that are of concern to the organisation as
a whole, the second focuses on groups of employees with differing levels of opportunity to commit
the threats, while the third deals with each employee on an individual basis.
Most practitioners will find it helpful to start with the simplest and highest level approach, the
organisation level risk assessment, which provides a useful overview of the threats facing the
organisation and an opportunity to review countermeasures in general. The group level assessment
will require a greater commitment of time and effort, but can yield significant insight into the groups of
employees that give most cause for concern and the proportionate application of countermeasures
within the organisation. The individual level assessment is the most labour intensive of all, looking at
every employee in turn to determine their combined opportunity and insider potential (i.e. threat and
susceptibility).
The levels of risk assessment that you use will depend on the threats faced by your organisation and
the nature of the workforce. It is important that you understand the way in which the three approaches
support different types of decision. For example, if the organisational risk assessment reveals that
there is a negligible threat to the organisation from an insider bringing a bomb into the building, this
may rule out the need for baggage checks on entry to the site. Alternatively, the group level
assessment could reveal that certain employees, due to their role in the organisation, have regular
access to highly confidential or sensitive information, and they may therefore require higher levels of
supervision in the office. If, at the individual level, a particular employee is considered to have high
insider potential and a high level of opportunity, then an individually tailored risk management plan
might be required.
Personnel security risk assessments are most effective when they are an integral part of a risk
management process. This helps to ensure that the assessment actually translates into action.
6
Risk assessment for personnel security - a guide
Some organisations have found that employees enjoy participating in discussions about the levels of
access associated with different posts and the specific actions that post-holders could carry out.
These organisations report that their assessments have benefited from this engagement in the
organisation and group level assessments.
The risk assessment process should be highly interactive, with significant use of structured group
discussions, or workshops. The value of these discussions can be enhanced significantly by a skilled
chair or facilitator and by the use of visual aids. Enlarged reproductions of the charts and tables at
Annex C, together with sticky notes or marker pens will help you to increase participation, obtain
information from participants and to capture that information effectively.
7
Risk assessment for personnel security - a guide
The results of the organisation level risk assessment should be recorded in a table with the following
column headings:
Insider threat Likelihood Assumptions Impact (1-5) Assumptions Risk priority Countermeasures
(1-5) (likelihood) (impact) (1-4)
Existing Sufficient? New
The table will be populated as the risk assessment progresses, step by step. At the end of the
process, the table will provide a record of the insider threats faced by your organisation.
The first step is to identify the insider threats that face your organisation, and to record them in the first
column of the table. You may find the list of insider threats at annex A helpful. Each threat should take
the form of an employee doing something that exploits their access to the organisation for
unauthorised purposes.
8
Risk assessment for personnel security - a guide
It is essential that the threats are very carefully defined if the risk assessment is to produce useful
results. Consider the following points:
• Range
The threats that you define should include the full range of unauthorised insider activity facing the
organisation, including (but not limited to) physical attacks, abuse of intellectual property, and
unauthorised disclosure of sensitive information.
• Definition of an insider
Remember that an insider is somebody who exploits, or has the intention to exploit, their legitimate
access to an organisation’s assets for unauthorised purposes. It is easy to be distracted by thoughts
of accidental damage, or of what could be done by strangers passing your building. These issues
might warrant a separate risk assessment, but both fall outside the scope of this exercise.
• Level of detail
The threats should be defined at a level of detail that allows you to consider countermeasures for each
one. Very broad threat definitions such as ’bombs’ or ’leaks’ are insufficient, because they do not
contain enough information to make the responses meaningful. On the other hand, very narrow
definitions can result in a large, unmanageable number of insider threats from which the added
insight gained from each threat then becomes smaller.
Once the list of threats is complete and the definitions are clear, the next step is to consider how likely
it is that each threat will occur, and to record this under the ‘Likelihood’ heading in the table.
It is important to focus on likelihood alone - if you are familiar with risk assessment, you may be
tempted to consider other factors such as impact. In the CPNI’s experience, assessments of impact
and likelihood are most effective when they are done independently.
Rather than trying to predict probabilities with great precision, the aim of this part of the assessment is
to establish the relative likelihoods of the threats, ranging from 1 (least likely to occur) to 5 (most likely).
9
Risk assessment for personnel security - a guide
It may be helpful to take a look at the list of insider threats, make a rough assessment of which is
most likely to occur, and assign it a likelihood of 5; then identify the one that is least likely to occur,
and assign it a likelihood of 1. This will provide reference points and help with consistency when
evaluating the remaining threats on the same scale.
As you decide on a likelihood value for each new threat, the threats you have already assessed may
need to be shuffled up or down the scale, depending on whether they are more or less likely than the
new one. This reshuffling will continue until the relative likelihood of all the threats has been agreed.
In deciding the likelihood of each threat, it will be necessary to make some assumptions. For example,
if you use recruiting agencies, your assumptions about the agency’s compliance with its contractual
recruiting agencies will affect your judgments on the likelihood of an insider attack. This assumption,
and all others that influence the decision about likelihood, should be recorded in the ‘Assumptions
(likelihood)’ column of the table. This will be useful when considering countermeasures later, and it
increases the transparency of the risk assessment process.
Timescales are also important when thinking about likelihood. A threat may not occur within one year,
but could occur within three years. If any assumptions are being made with regard to timescales, they
should be applied consistently to all threats.
10
Risk assessment for personnel security - a guide
• How realistic is it that your organisation will be a target for this type of attack?
• Has your organisation been subject to this kind of attack before? This confirms the
relevance and feasibility of the threat but not necessarily the future likelihood. Equally, the
absence of a threat in the past does not mean that it will not happen in the future.
• What is the current security situation in your industry?
• Do your employees have the kind of expertise required to conduct the attack?
• How effective are your contingency plans and existing countermeasures?
Impact is assessed in a similar manner to likelihood, using a relative scale of 1 (lowest impact) to 5
(greatest impact).
Again, make a rough assessment of the insider threat with the lowest impact
(1) then assign 5 to the threat with the highest impact.
The assumptions that you make about these – and other – factors affecting the impact value should
be recorded in the ‘Assumptions (impact)’ column of the table.
As with likelihood, determining the impact value is an iterative process. The existing threats will need
to be reviewed and reshuffled each time a new threat is considered, until those involved agree on the
values assigned. At that point, the relative impact of each threat should be recorded under ‘Impact (1-
5)’ in the table.
11
Risk assessment for personnel security - a guide
The likelihood and impact values can now be used to determine the risk priority of each threat.
It may be tempting to do this by multiplying the likelihood and impact values for each threat, giving a
value that – if low – can be taken to indicate that the threat is of little concern, and – if high – as an
area where countermeasures should most urgently be directed. Unfortunately, this will produce a
similar numerical result for a threat with a low likelihood and high impact, as a threat with high
likelihood and low impact. Most organisations agree that this is not a sensible result.
The risk matrix gives a picture of the risk assigned to each threat
as a result of the likelihood and impact assessments. This is an
important opportunity to look again at each threat and its
associated assumptions, to ensure that it appears in the right
place on the matrix, relative to the other threats.
Note that, as the threats are repositioned in the matrix, you should record any new assumptions being
made about likelihood or impact, or alter the existing assumptions.
Once the positioning of the threats on the matrix is complete, they can be prioritised. The threats in
the top right corner of the chart, with the highest likelihood and the greatest impact, will need to be
urgently addressed (i.e. they are priority 1), while those in the bottom left corner, which have the
lowest likelihood and least impact, can be addressed as a lower priority (e.g. priority 4, on a 4 point
scale).
12
Risk assessment for personnel security - a guide
Alternatively, dividing the matrix into five or more priority areas will
provide greater precision, but may take longer to achieve and
result in too much detail for the number of threats involved. You
should always bear in mind that the assessment cannot be highly
precise; it is important that you do not seek to differentiate risks in
a way that assumes greater precision than is actually achievable.
The prioritisation of threats Once agreed, the risk priority relating to each threat should be
is a flexible process inserted into the appropriate column in the risk assessment table.
13
Risk assessment for personnel security - a guide
Note: This step is conducted in more detail during a group level risk assessment. If you intend to do a
group level assessment then you may not want to complete these steps of the organisation level
approach. However, a relatively quick consideration of countermeasures may be worth doing, even if
you subsequently increase the level of detail in a group assessment.
Step 5
Countermeasures
Existing Sufficient? New
• System can be suspended by individual
• Introduce a two person rule for
employees
Anti-virus protection suspending anti-virus protection
• Personal USB disks can be connected to
• Bar USB ports on computers
the organisation’s computers
• They are not conducted at night • Introduce random bag searches out of
Random bag searches conducted during
• Compliance with the random bag search hours
the day
system is not audited • Introduce a bag search audit process
Starting with the most urgent threat in risk priority 1, list in the ‘Existing’ column all countermeasures
currently in place that help to mitigate that threat.
As a primary check, look at each countermeasure in turn and decide whether or not it is working
sufficiently. For example, if one of your threats is that a bomb could be brought into your building, then
one of your countermeasures might be a system for X-ray screening bags at the front door. Questions
you might want to ask about this countermeasure include the following:
• Have your security staff had appropriate training to tell suspicious objects from innocent
items?
• What is the likely detection failure rate, based on your audits and tests?
• Is there a backup X-ray machine in case the main machine fails?
Use the ‘Sufficient?’ column to record any doubts and the ‘New’ column to list the steps required to
resolve them.
Finally, review all the countermeasures that you have listed in relation to the threat. Decide whether
they work well enough together to contain the risk at an acceptable level, by limiting either the
likelihood of the threat or its impact. Once again, record any doubts or gaps in the ‘Sufficient?’
column, and then use the knowledge of those involved, and the advice of experts, if necessary, to
determine what new countermeasures should be implemented. List the new countermeasures in the
‘New’ column. It is important to ensure that ownership of any new countermeasures is clarified at this
stage.
When you have reviewed the countermeasures for all threats in risk priority 1, repeat the process for
each of the lower priority threats until all of the threats and countermeasures have been evaluated and
the risk assessment is complete.
14
Risk assessment for personnel security - a guide
For most organisations, this is an optional step, but it is useful if you need further justification or
quantification of the cost benefit of personnel security countermeasures.
Using the information recorded in the table, you will be able to review the impact values and
assumptions associated with each threat, and by reviewing the factors that have resulted in one threat
being assigned a higher or lower impact than another, extract the rules that drove the assessment of
impact.
In each case, ask what has caused the threat to be assigned an impact value of 1, 2, 3, 4 or 5? If it is
financial loss, then what exactly is the assumed loss? If it is human impact, then what loss of life or
how many casualties are involved? If the guiding factor is the damage to your organisation’s facilities,
find a way to quantify it.
If, for example, you have assigned an impact value of 5 to a threat which you assumed would incur a
loss of £500,000, and an impact value of 1 to a threat with an assumed loss of £10,000, you will be
able to use this information to derive an absolute scale for threats involving financial losses. Similarly, if
you have assumed that one threat will result in no casualties, while in assigning the impact for another
you have assumed ten fatalities, then you will have an absolute scale for threats where human life is at
risk. Note that the scales need not be linear; they can be exponential, or their values may vary
irregularly.
15
Risk assessment for personnel security - a guide
This is a difficult task, particularly if your impact assessments involve many assumptions. It may help
to start by reviewing all the threats that have a primarily financial loss, using these to create one
absolute impact scale, and then repeating the exercise for threats involving casualties or loss of life to
generate a second absolute impact scale. You can repeat this exercise as often as necessary,
generating a number of absolute scales for different types of impact, before finally placing them
alongside each other to obtain a combined scale of absolute impact. The benefit of this approach is
that it removes any requirement to attempt making judgements which equate injury and loss of life
with financial loss.
This step has an added benefit of checking the consistency of the judgments contained in your risk
assessment. As you review the reasoning behind your impact assessments, you may well decide that,
on reflection, some of them should be changed.
Next steps
Risk assessment includes the identify threats and assess vulnerabilities stages of the Risk
Management Cycle. The remaining two stages are implementation, which involves putting the new
countermeasures identified by the risk assessment into operation, and evaluation, during which the
effectiveness of the countermeasures is reviewed. The lists of assumptions made during the risk
assessment will prove particularly useful during this evaluation.
Depending on how much time has passed since the risk assessment, the evaluation stage should
also show that the threats identified have moved either further to the left of the risk matrix, indicating a
reduced likelihood, or further down the matrix, showing that the impact has been reduced as a result
of the countermeasures you have introduced. It is worth bearing in mind, however, that factors outside
your control, such as the current threat level, or economic, political and social issues, may also have
an influence. The same factors are likely to introduce new threats to be addressed in future risk
assessments.
If you are working with relative likelihood and impact scales (i.e. you do not complete Step 6), then
your ability to report reductions in risk is more limited. For instance, imagine that you introduce a new
control that reduces the likelihood of every threat in your assessment by the same amount. In this
case, none of them will move because their relative likelihoods would stay the same. This situation is
very unlikely and you will usually be able to record some movement in the relative likelihood or impact
of a risk due to your intervention. But, the use of independent scales for assessing opportunity and
impact does increase your ability to assess and communicate risk reduction in terms that are
meaningful to decision makers (for example, a reduction in anticipated absolute costs).
16
Risk assessment for personnel security - a guide
9 12
8 11
6 13, 7 5
10
17
Risk assessment for personnel security - a guide
Risk table
18
Risk assessment for personnel security - a guide
19
Risk assessment for personnel security - a guide
The assessment takes as its starting point the threats identified during the organisation’s level
assessment. Consideration is then given to the groups of employees that have the greatest
opportunity to carry them out, concentrating mainly on levels of access to the organisation’s assets,
including information, materials, systems, buildings and people.
As with the organisation’s risk assessment level, the group level should be carried out by a team
comprising primarily human resources and security managers, with contributions as appropriate from
other experts.
The results of the group level risk assessment should be recorded in a table with the following column
headings:
As with the organisation’s level risk assessment, the table will be populated as each step of the risk
assessment is completed, providing a record of the groups of employees in your organisation best
placed to carry out the threats, the factors that provide them with that level of opportunity, and the
countermeasures required.
20
Risk assessment for personnel security - a guide
Step 1
Insider threats
in priority order
The assessment should begin by identifying and prioritising the insider threats facing the organisation,
as described in the organisation level risk assessment, and listing them in the first column of the group
level risk assessment table in risk priority order.
Step two: Perform initial identification of groups with the most opportunity
Step 1 Step 2
Insider threats
Group with high opportunity
in priority order
Senior managers
Employee reveals commercially
sensitive information
IT administrators
The purpose of this step is to identify the subset of employees on which the risk assessment should
concentrate. The assessment should be relatively quick; a more detailed assessment will follow in
subsequent stages.
The approach is to look at each threat in turn, and determine which groups of employees in your
organisation have the greatest opportunity to carry it out. You should base these judgements on:
1. The extent to which the employees, routinely or potentially, have access to the assets
under threat.
2. The vulnerability of the environment to an attack by an employee.
When deciding which groups have opportunity to carry out threats, it is likely that the groupings will to
some extent reflect job roles within the organisation. For example, if the threat under consideration
concerns the compromise of IT systems, then one group of employees with high opportunity is likely
to be the IT Systems Administrators, due to their unsupervised systems access and high level
passwords. However, some groupings will not correlate quite so directly to organisational job titles, so
it is important to think about all employees carefully, and not be constrained by job titles. Depending
on the degree of detail that you wish to pursue, you may find that this stage of the assessment
becomes a significant research and analysis exercise, involving the collation of information about the
organisation’s employees and the roles that they perform. A series of interviews with managers or
supervisors may be helpful.
21
Risk assessment for personnel security - a guide
Once you have established which groups have the greatest opportunity, you should record these in
the risk assessment table.
It is useful to make a note of the approximate size of the group – again, this may require some
research to establish and the involvement of Human Resources (HR) will be essential. It is reasonable
for some groups to be quite small, but if a group is very large, it may mean that there is room to be
more precise in how the opportunity of that group is defined.
A very large group may affect the likelihood (decided during the organisation level risk assessment) of
the threat under consideration. For example, the likelihood that an insider will corrupt a central
database might increase if you now find that a very large group of employees has the opportunity to
do so. If this is the case, it is worth amending the risk matrix.
A very large group may also affect the impact of a threat. For example, the theft by an employee of a
laptop computer may have a low impact on the organisation, but the cumulative effect of a large
group of employees doing the same thing may have a significantly greater impact. Once again, it is
worth reviewing the organisation level risk assessment to see if this should be reflected in the risk
matrix. Generally, it is more likely that your countermeasures will change as a result of increased
impact than as a result of increased likelihood.
Insider threats
Group with high opportunity Reasons
in priority order
• Senior managers see the
greatest volumes of
Senior managers
commercially sensitive
information
Employee reveals commercially
sensitive information • IT administrators could gain
unauthorised access using
IT administrators their IT skills, although it
would be hard to achieve
undetected
In the ‘Reasons’ column, record the factors that give the groups a high level of opportunity to carry
out the threat under consideration. These reasons will have been discussed in Step 2 but it is
important to record them.
The points listed here will help drive the countermeasures that need to be considered to mitigate the
threat, so it is important to include enough detail. It would be possible for the reasons in every case to
22
Risk assessment for personnel security - a guide
be ‘knowledge and access’, but this will not provide enough information for meaningful
countermeasures to be implemented.
In this step, access and vulnerability are assessed more systematically, and scored using standardised
scales for easy comparison. The scores are then used to provide an overall measure of opportunity to
carry out a threat.
When considering the access of your employees, you will need to decide the extent to which,
routinely or potentially, employees in the organisation have access to specific assets. We suggest that
you use the simple scale that follows.
For the vulnerability assessment, we recommend that you use the vulnerability assessment table at
Annex B. Please note that this table is designed to support assessments of overall vulnerability for an
organisation; not all of the vulnerability dimensions that it presents will be relevant for assessing the
vulnerability of the workplace. Consequently, you will need to decide which dimensions to consider,
before using the scales to make your assessments. We recommend that you judge the vulnerability of
the workplace on a High, Medium, Low scale.
At this stage your employee groups will have been assessed for their access and the vulnerability of
their working environments. You now need to combine these scores to produce overall measures of
opportunity. We suggest that opportunity is scored on a 1-5 scale.
23
Risk assessment for personnel security - a guide
You will need to decide how you want to translate the access and vulnerability scores into opportunity
scores. We suggest that you draw a matrix like the one below and then decide where to place the
numbers 1, 2, 3, 4, and 5 based on the combinations of access and vulnerability. The matrix below
presents one possible scoring scheme.
The scores provide a useful summary of the assessment and help you to rank employee roles in terms
of opportunity to carry out specific threats. These scores can also be plotted on a graph against the
impact of the threats - see below. The threat-group combinations appearing in the top right hand
corner of the chart will be those posing the greatest overall risk to your organisation.
24
Risk assessment for personnel security - a guide
As with the organisation level risk assessment, start by listing in the ‘Existing’ column all
countermeasures currently in place that help to prevent the groups from carrying out the threat under
consideration.
Then, look at each countermeasure in turn and decide whether or not it is working sufficiently. If your
threat is defined as “Insider introduces virus into primary computer system” and the group with the
most opportunity is your IT agency staff, then your existing countermeasures may include the pre-
employment screening processes you have specified in the contract between your company and the
IT recruitment agency. But without an additional process – auditing the implementation of that
screening – it is unlikely that the contract alone will be a sufficient countermeasure.
Use the ‘Sufficient?’ column to record doubts about any gaps in the countermeasures and the ‘New’
column to list the steps required to resolve them.
Finally, review all the countermeasures that you have listed in relation to the group having greatest
opportunity, and decide whether they work sufficiently well together to limit opportunity and so
maintain the risk at an acceptable level. Once again, record any doubts in the ‘Sufficient?’ column,
and then use the knowledge of the group, and the advice of relevant experts if necessary, to
determine what new countermeasures should be implemented. List these in the ‘New’ column.
When you have decided which groups have high opportunity to carry out the threats in risk priority 1,
and addressed the issue of countermeasures in each case, repeat the exercise for all remaining risk
priorities.
If the time available for the group level risk assessment is limited, you may choose to tackle only the
threats in the higher risk priorities, but it is important to remember that there may be some factors that
only becomes evident during the group level risk assessment – such as very large group size – which
affects the prioritisation of threats, and may be missed if the assessment is not completed.
25
Risk assessment for personnel security - a guide
At the group level address the threats in your highest priority areas first. The table below looks at a
selection of threat examples from a range of priority areas.
26
Risk assessment for personnel security - a guide
Assessment of countermeasures
27
Risk assessment for personnel security - a guide
28
Risk assessment for personnel security - a guide
3. A member of the senior management reveals the end of year results ahead of schedule
4. A printing department employee reveals the end of year results ahead of schedule
5. A member of the IT staff carries out a Denial of Service (DoS) attack on the IT system
29
Risk assessment for personnel security - a guide
The group level approach starts with the insider threats to the organisation and then assesses the
opportunity that employees have to commit those acts. The relationships between job roles and
threats are therefore considered in detail. One major benefit of this is that countermeasures can be
applied to job roles in a way that takes into account the types of threat that different employees might
pose. However, the approach is very qualitative and makes no attempt to quantify the level of risk
presented by particular job roles.
It is possible to conduct a more quantitative approach, instead of, or alongside the approach
described above. This entails scoring the opportunity provided by a given job role and also the impact
that could be achieved by an employee in that role. By combining these scores you can arrive at an
overall assessment of the level of risk associated with a job role. The benefit of this approach is that
job roles can be prioritised on the basis of these scores and countermeasures can be linked to
thresholds in the scoring system. For instance, you might decide that any role scoring in the top ten
warrants a criminal record check.
Many practitioners will find the results of this approach presentationally appealing and it can provide a
relatively simple framework for decision making. However, there are two drawbacks:
1. It does not encourage detailed consideration of insider threats and the way in which the
opportunity for these threats varies between roles. The impact that could be achieved in a
given job role is usually based on an assumption as to the reasonable worst-case threat.
For instance, it might be assumed that the reasonable worst-case threat posed by a
financial controller is fraud, in which case the opportunity for the controller to facilitate, say
a physical attack, would not be considered. The allocation of countermeasures is less
precise and comprehensive using this approach.
2. In order to score opportunity and impact it is necessary to devise numerical scales that
apply to the full range of job roles and threats under consideration. This is a significant
challenge.
30
Risk assessment for personnel security - a guide
The process of carrying out an individual level risk assessment is considerably more complex than at
the organisational or group level, most notably because it is technically much more difficult to assess
intent and susceptibility and as yet there is no agreed or tried and tested method of doing this. In
addition, seeking to conduct individual risk assessments across an organisation will be substantially
more resource intensive. For these reasons, it is likely that relatively few organisations will employ this
approach, although some may use individual level assessment for the small proportion of employees
that fall in the highest risk group(s) or as a means of assessing the risk posed by an employee of
concern.
CPNI is currently working on research into the behaviours and vulnerabilities associated with insider
activity. The ultimate aim of this research is to assist with decision making with regards the insider risk
at an individual level.
31
Risk assessment for personnel security - a guide
Glossary of terms
Asset Any element, service, function or event that supports the Critical National
Infrastructure. Assets can be physical entities such as people or equipment
and non-physical entities such as networks and systems.
Critical National Those key assets of the national infrastructure, the failure or loss of which
Infrastructure (CNI) could cause severe economic or social damage and/or large scale loss of
life. The national infrastructure is the underlying framework of facilities,
systems, sites and networks necessary for the functioning of the United
Kingdom and the delivery of the essential services upon which the UK
relies.
Impact The level of negative effect upon the UK’s public health and safety, its
economy, the essential services upon which it relies, public and
commercial confidence, and the functioning of government, that can be
expected to arise directly or indirectly if an asset is damaged, destroyed or
disrupted by a terrorist attack or other malicious incident. The degree to
which there are alternatives to the asset (i.e. the resilience of the CNI) will
affect the level of impact.
Insider An employee or contractor who seeks to exploit their legitimate access to
an organisation for unauthorised purposes.
Insider opportunity The feasibility of an employee conducting an insider attack on the basis of
the access afforded by their organisational role and the vulnerability of the
working environment.
Motivation A combination of proven intent to attack and the attractiveness of the
target in meeting the aspirations and aims of the adversary.
Personnel security A system of policies and procedures, which seeks to manage the risk of
staff or contractors exploiting their legitimate access to an organisation’s
assets or premises for unauthorised purposes.
Risk The potential for loss, damage, disruption, death or injury, following an
assessment of:
• the likelihood (the combination of threat and vulnerability) that a
malicious attack will occur affecting an asset; and
• the impact of the malicious attack
Threat The assessment of a terrorist or other malicious attacker’s motivation and
capability to attack an asset. The manifestation of the threat could take the
form of one or more attacks or attempted attacks, either concurrent or
simultaneous.
Vulnerability Vulnerability is a characteristic of, or flaw in, an asset’s design, location,
protective security measures, process, or operation that renders it
susceptible to, or offers the opportunity for, disruption or destruction,
incapacitation, or exploitation by terrorists or other malicious actors. These
characteristics may be found in infrastructure on which the asset is
dependent.
32
Risk assessment for personnel security - a guide
This list is not intended to be exhaustive, but may be useful in generating discussion of threats
relevant to the organisation.
ACCESS TO INFORMATION
Theft of information / intelligence
Disclose sensitive information
Disclose sensitive information to specific parties
Disclose sensitive information to the public
Existing data
Sabotage organisation data - falsify
Sabotage organisation data - destroy / remove
Misuse of information
Distribution to unauthorised eyes inside / outside the organisation
ACCESS TO IT SYSTEMS
Disclose IT system details
Disclose IT systems used and their capabilities to specific parties
Disclose source
Disclose the organisation’s confidential sources to specific parties
Hack IT systems
Hack in to IT systems to copy information stored for further use
Hack in to IT systems to monitor use
Sabotage existing systems / data
Sabotage of existing systems - affect systems e.g. with viruses
Sabotage of existing systems - destroy systems
Sabotage of existing data - falsify
Sabotage of existing data - destroy / remove (e.g. with USB stick)
Bug telephone systems
Bug telephone systems to monitor use
Bug telephone systems to eavesdrop
Misuse of systems
Facilitating access of a third party to an IT system [record assumed impact in impact assumptions
column]
33
Risk assessment for personnel security - a guide
34
Risk assessment for personnel security - a guide
ACCESS TO PERSONNEL
Disclose sensitive information
Disclose info gathered verbally through informal discussion - to the public
Disclose info gathered verbally through informal discussion - to specific parties
Disclose information from potentially sensitive meetings - to the public
Disclose information from potentially sensitive meetings - to specific parties
Persuade others to gather / pass information (short term)
Build specific relationships with an aim to acquire specific knowledge (long term)
Force individuals to gather / pass information
Force individuals to gather / pass information under duress
Force individuals to gather / pass information through bribery
Recruitment of others – commercial espionage
Attack / threaten individuals / groups of personnel
Physically attack individuals
Physically attack groups of personnel
Conduct a mass casualty attack on employees
Violate the liberty of individuals / groups (e.g. hostage taking)
Threaten personnel
35
Risk assessment for personnel security - a guide
36
Risk assessment for personnel security - a guide
Physical vulnerability
A B C D E F
Type of physical Nature of site & Construction of CBR – Perimeter Extent of Security &
vulnerability perimeter building (mainly vulnerability to security control over screening of
(mainly related related to ingress & systems (e.g. building – visitors, mail,
Fields A-F to vehicle vehicle threats) spread of CBR access control, public access & deliveries etc
threats) materials intruder shared
detection and occupancy
CCTV systems)
Potential • Single layer • Building • Accessible air • Systems • Multiple • Visitor
indicators of perimeter (e.g. design Intakes installed and/ entrances - reception
HIGH external skin of susceptible to • Exterior shell or operated in people and/or within body of
vulnerability building) progressive of building an ad hoc vehicles building
• Proximity to collapse or relatively manner, • Building for • Poor staff
(Indicators likely public roads lack of permeable: without clear which public awareness re
to be supported • High structural windows often concept of use access is postal threats
by little evidence vulnerability to redundancy open or poorly • Inconsistent essential • Post-room in
of strong security vehicle borne • Heritage fitting; poor application, • Multiple heart of
governance, threats (e.g. buildings – design of obvious gaps occupancy building
policy and traversable planning entrances in coverage • Many and • Mail opened at
procedures) adjoining land), restrictions • Single layer frequent desks without
uncontrolled may limit and weak visitors screening
access and possible perimeter • Un-zoned, i.e. • Ad hoc visitors
insufficient or enhancements • Proximity to unrestricted and deliveries
permeable • Significant use public ways movement accepted
physical of glass • Critical within building without
standoff • Exposed key components question
measures structural located near
• Critical elements perimeter
components
located near
perimeter (i.e.
minimal stand-
off protection)
Medium
Potential • Multi-layer • Building • Inaccessible • Robust • Building • Clear concept
indicators of perimeter design not air intakes systems controlled by of operation;
LOW • Significant susceptible to • Good HV AC providing occupying all screening
Vulnerability stand-off progressive (Heating, capability that organisation systems meet
between collapse ventilation & reflects • Unrestricted clear
(Indicators likely exterior of • Glazing and air-conditioning concept of use access limited requirements
to be supported perimeter and cladding system) • Security staff to staff and • Staff involved
by clear evidence critical systems system design, seen as key trusted in screening
of strong security components of specifically e.g. zoned, element of contractors trained and
governance, site/building designed to with overall • Visitors by well motivated
policy and • Additional withstand blast advantageous perimeter appointment • All visitors
procedures) crash-proof and minimise pressure security only; screened at
measures (e.g. fragmentation gradients, system sponsored and site perimeter;
bollards, traffic limiting spread • Multi-layered escorted by mail and
restrictions) of perimeter and staff; photo id deliveries
keeping contaminants entrance checked screened off-
unscreened • Building arrangements • Building zoned site.
vehicles at a relatively Full height to restrict • Visitors &
distance; such impermeable: robust entry movement deliveries
continuous e.g. windows barrier always
measures sealed shut expected
designed with • Good staff
a clear control awareness re
strategy postal threats
37
Risk assessment for personnel security - a guide
Personnel vulnerability
A B C D E F
38
Risk assessment for personnel security - a guide
Electronic vulnerability
A B C D E F
39
Risk assessment for personnel security - a guide
40
Disclaimer
Reference to any specific commercial product, process or service by trade name, trademark manufacturer, or otherwise,
does not constitute or imply its endorsement, recommendation, or favouring by CPNI. The views and opinions of authors
expressed within this document shall not be used for advertising or product endorsement purposes.
To the fullest extent permitted by law, CPNI accepts no liability for any loss or damage (whether direct, indirect or
consequential and including, but not limited to, loss of profits or anticipated profits, loss of data, business or goodwill)
incurred by any person and howsoever caused arising from or connected with any error or omission in this document or
from any person acting, omitting to act or refraining form acting upon, or otherwise using, the information contained in this
document or its references. You should make your own judgement as regards use of this document and seek independent
professional advice on your particular circumstances.
March 2009