CRISC AiO
CRISC AiO
CRISC
®
CRISC
®
Peter H. Gregory
Dawn Dunkerley
Bobby E. Rogers
McGraw Hill is an independent entity rom ISACA® and is not aliated with ISACA in any manner. Tis study/training guide and/or material
is not sponsored by, endorsed by, or aliated with ISACA in any manner. Tis publication and accompanying media may be used in assisting
students to prepare or the Certifed in Risk and Inormation Systems Control® (CRISC®) exam. Neither ISACA nor McGraw Hill warrants that
use o this publication and accompanying media will ensure passing any exam. Certifed in Risk and Inormation Systems Control and CRISC
are trademarks o ISACA in the United States and certain other countries. All other trademarks are trademarks o their respective owners.
Copyright © 2022 by McGraw Hill. All rights reserved. Except as permitted under the United States Copyright Act of 1976, no
part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval sys-
tem, without the prior written permission of the publisher, with the exception that the program listings may be entered, stored,
and executed in a computer system, but they may not be reproduced for publication.
ISBN: 978-1-26-047334-6
MHID: 1-26-047334-1
The material in this eBook also appears in the print version of this title: ISBN: 978-1-26-047333-9,
MHID: 1-26-047333-3.
All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a
trademarked name, we use names in an editorial fashion only, and to the benet of the trademark owner, with no intention of
infringement of the trademark. Where such designations appear in this book, they have been printed with initial caps.
McGraw-Hill Education eBooks are available at special quantity discounts to use as premiums and sales promotions or for
use in corporate training programs. To contact a representative, please visit the Contact Us page at www.mhprofessional.com.
Information has been obtained by McGraw Hill from sources believed to be reliable. However, because of the possibility of
human or mechanical error by our sources, McGraw Hill, or others, McGraw Hill does not guarantee the accuracy, adequacy,
or completeness of any information and is not responsible for any errors or omissions or the results obtained from the use of
such information.
TERMS OF USE
This is a copyrighted work and McGraw-Hill Education and its licensors reserve all rights in and to the work. Use of this work
is subject to these terms. Except as permitted under the Copyright Act of 1976 and the right to store and retrieve one copy of the
work, you may not decompile, disassemble, reverse engineer, reproduce, modify, create derivative works based upon, transmit,
distribute, disseminate, sell, publish or sublicense the work or any part of it without McGraw-Hill Education’s prior consent.
You may use the work for your own noncommercial and personal use; any other use of the work is strictly prohibited. Your right
to use the work may be terminated if you fail to comply with these terms.
THE WORK IS PROVIDED “AS IS.” McGRAW-HILL EDUCATION AND ITS LICENSORS MAKE NO GUARANTEES
OR WARRANTIES AS TO THE ACCURACY, ADEQUACY OR COMPLETENESS OF OR RESULTS TO BE OBTAINED
FROM USING THE WORK, INCLUDING ANY INFORMATION THAT CAN BE ACCESSED THROUGH THE WORK
VIA HYPERLINK OR OTHERWISE, AND EXPRESSLY DISCLAIM ANY WARRANTY, EXPRESS OR IMPLIED, IN-
CLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICU-
LAR PURPOSE. McGraw-Hill Education and its licensors do not warrant or guarantee that the functions contained in the work
will meet your requirements or that its operation will be uninterrupted or error free. Neither McGraw-Hill Education nor its
licensors shall be liable to you or anyone else for any inaccuracy, error or omission, regardless of cause, in the work or for any
damages resulting therefrom. McGraw-Hill Education has no responsibility for the content of any information accessed through
the work. Under no circumstances shall McGraw-Hill Education and/or its licensors be liable for any indirect, incidental,
special, punitive, consequential or similar damages that result from the use of or inability to use the work, even if any of them
has been advised of the possibility of such damages. This limitation of liability shall apply to any claim or cause whatsoever
whether such claim or cause arises in contract, tort or otherwise.
o Rebekah, Nathan, and Shay.
—Peter H. Gregory
Peter H. Gregory, CRISC, CISM®, CISA®, CDPSE™, CIPM®, CISSP®, DRCE, CCSK™,
is a 30-year career technologist and a security leader in a regional telecommunications
company. He has been developing and managing inormation security management
programs since 2002 and has been leading the development and testing o secure I
environments since 1990. Peter has also spent many years as a sotware engineer and
architect, systems engineer, network engineer, and security engineer.
Peter is the author o more than 40 books about inormation security and technology,
including Solaris Security, CISM Certified Information Security Manager All-in-One Exam
Guide, and CISA Certified Information Systems Auditor All-in-One Exam Guide. He has
spoken at numerous industry conerences, including RSA, Interop, (ISC)² Congress,
ISACA CACS, SecureWorld Expo, West Coast Security Forum, IP3, Source, Society
or Inormation Management, the Washington echnology Industry Association, and
InraGard.
Peter serves on advisory boards or cybersecurity education programs at the University
o Washington and the University o South Florida. He was the lead instructor or nine
years in the University o Washington certiicate program in applied cybersecurity, a or-
mer board member o the Washington State chapter o InraGard, and a ounding mem-
ber o the Paciic CISO Forum. Peter is a 2008 graduate o the FBI Citizens Academy and
a member o the FBI National Citizens Academy Alumni Association. Peter is an execu-
tive member o the CyberEdBoard and the Forbes echnology Council.
Peter resides with his amily in Washington state and can be ound online at www
.peterhgregory.com.
Chapter 1 Governance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Chapter 2 IT Risk Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Chapter 3 Risk Response and Reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Chapter 4 Inormation Technology and Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Appendix A Implementing and Managing a Risk Management Program . . . . 183
Appendix B About the Online Content . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
ix
CONTENTS
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
Chapter 1 Governance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Organizational Governance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Organizational Strategy, Goals, and Objectives . . . . . . . . . . . 2
Organizational Structure, Roles, and Responsibilities . . . . . . 3
Organizational Culture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Policies and Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Business Processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Organizational Assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Risk Governance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Enterprise Risk Management
and Risk Management Frameworks . . . . . . . . . . . . . . . . . 10
hree Lines o Deense . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Risk Proile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Risk Appetite and Risk olerance . . . . . . . . . . . . . . . . . . . . . 13
Legal, Regulatory, and Contractual Requirements . . . . . . . . . 14
Proessional Ethics o Risk Management . . . . . . . . . . . . . . . . 15
Chapter Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Quick Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Chapter 2 IT Risk Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
I Risk Identiication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Risk Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
hreat Modeling and hreat Landscape . . . . . . . . . . . . . . . . 28
Vulnerability and Control Deiciency Analysis . . . . . . . . . . . . 30
Risk Scenario Development . . . . . . . . . . . . . . . . . . . . . . . . . . 38
I Risk Analysis and Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Risk Assessment Concepts, Standards, and Frameworks . . . . 40
Risk Assessment Standards and Frameworks . . . . . . . . . . . . . 45
Risk Ranking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Risk Ownership . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Risk Register . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Risk Analysis Methodologies . . . . . . . . . . . . . . . . . . . . . . . . . 56
Business Impact Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
xi
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
xii
Inherent and Residual Risk . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Miscellaneous Risk Considerations . . . . . . . . . . . . . . . . . . . . 72
Chapter Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Quick Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Chapter 3 Risk Response and Reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Risk Response . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Risk and Control Ownership . . . . . . . . . . . . . . . . . . . . . . . . . 82
Risk reatment/Risk Response Options . . . . . . . . . . . . . . . . . 83
hird-Party Risk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Issues, Findings, and Exceptions Management . . . . . . . . . . . . 89
Management o Emerging Risk . . . . . . . . . . . . . . . . . . . . . . . 90
Control Design and Implementation . . . . . . . . . . . . . . . . . . . . . . . 93
Control ypes and Functions . . . . . . . . . . . . . . . . . . . . . . . . . 93
Control Standards and Frameworks . . . . . . . . . . . . . . . . . . . . 96
Control Design, Selection, and Analysis . . . . . . . . . . . . . . . . 101
Control Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Control esting and Eectiveness Evaluation . . . . . . . . . . . . . 106
Risk Monitoring and Reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Risk reatment Plans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Data Collection, Aggregation, Analysis, and Validation . . . . . 108
Risk and Control Monitoring echniques . . . . . . . . . . . . . . . 109
Risk and Control Reporting echniques . . . . . . . . . . . . . . . . 109
Key Perormance Indicators . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Key Risk Indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Key Control Indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Chapter Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Quick Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Chapter 4 Inormation Technology and Security . . . . . . . . . . . . . . . . . . . . . . . . . 127
Enterprise Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Platorms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Sotware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Operating Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Gateways . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Enterprise Architecture Frameworks . . . . . . . . . . . . . . . . . . . 132
Implementing a Security Architecture . . . . . . . . . . . . . . . . . . 135
Contents
xiii
I Operations Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Project Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Business Continuity and Disaster Recovery Management . . . . . . . . 140
Business Impact Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Recovery Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Recovery Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Plan esting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
Resilience and Risk Factors . . . . . . . . . . . . . . . . . . . . . . . . . . 142
Data Liecycle Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Standards and Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Data Retention Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Hardware Disposal and Data Destruction Policies . . . . . . . . . 147
Systems Development Lie Cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
esting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Implementation and Operation . . . . . . . . . . . . . . . . . . . . . . . 150
Disposal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
SDLC Risks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Emerging echnologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Inormation Security Concepts, Frameworks, and Standards . . . . . . 154
Conidentiality, Integrity, and Availability . . . . . . . . . . . . . . . 154
Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Data Sensitivity and Classiication . . . . . . . . . . . . . . . . . . . . . 156
Identiication and Authentication . . . . . . . . . . . . . . . . . . . . . 157
Authorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Accountability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Non-Repudiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Frameworks, Standards, and Practices . . . . . . . . . . . . . . . . . . 159
NIS Risk Management Framework . . . . . . . . . . . . . . . . . . . 160
ISO 27001/27002/27701/31000 . . . . . . . . . . . . . . . . . . . . . 162
COBI 2019 (ISACA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
he Risk I Framework (ISACA) . . . . . . . . . . . . . . . . . . . . . 164
Security and Risk Awareness raining Programs . . . . . . . . . . . . . . . 165
Awareness ools and echniques . . . . . . . . . . . . . . . . . . . . . . 165
Developing Organizational Security
and Risk Awareness Programs . . . . . . . . . . . . . . . . . . . . . . 166
Data Privacy and Data Protection Principles . . . . . . . . . . . . . . . . . . 167
Security Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Physical Access Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
Network Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
Human Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
xiv
Chapter Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Quick Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Appendix A Implementing and Managing a Risk Management Program ... 183
oday’s Risk Landscape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
What Is a Risk Management Program? . . . . . . . . . . . . . . . . . . . . . . 186
he Purpose o a Risk Management Program . . . . . . . . . . . . 187
he Risk Management Lie Cycle . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Risk Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
ypes o Risk Registers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Reviewing the Risk Register . . . . . . . . . . . . . . . . . . . . . . . . . . 194
Perorming Deeper Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 196
Developing a Risk reatment Recommendation . . . . . . . . . . 199
Publishing and Reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
Appendix B About the Online Content . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
Your otal Seminars raining Hub Account . . . . . . . . . . . . . . . . . . 205
Privacy Notice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
Single User License erms and Conditions . . . . . . . . . . . . . . . . . . . 205
otalester Online . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
echnical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
From Peter:
I am immensely grateul to Wendy Rinaldi or airming the need to have this book
published on a tight timeline. My readers, including current and uture risk managers,
deserve nothing less.
Heartelt thanks to Wendy Rinaldi and Janet Walden or proiciently managing this
project, acilitating rapid turnaround, and equipping us with the inormation and guid-
ance we needed to produce the manuscript.
Many thanks to Janet Walden and Nitesh Sharma or managing the editorial and
production ends o the project and to Bart Reed or copyediting the book and urther
improving readability. I appreciate KnowledgeWorks Global Ltd. or expertly rendering
my sketches into beautiully clear line art and laying out the pages. Like stage perormers,
they make hard work look easy, and I appreciate their skills.
Heartelt thanks to Matt Webster (the author o Do No Harm and ormer CISO at
Galway Holdings) or his invaluable tech review o the entire manuscript. Matt’s experi-
ence in security leadership and risk management resulted in many improvements in the
manuscript. A thanks also to others, including Mark Adams.
Many thanks to my literary agent, Carole Jelen, or her diligent assistance during this
and other projects. Sincere thanks to Rebecca Steele, my business manager and publicist,
or her long-term vision and or keeping me on track.
Bobby and Dawn, thank you or including me and welcoming me to this project.
he irst edition o this book was entirely yours, and I’m honored to have been included
in this edition. I have enjoyed working with you and on this project. But most impor-
tant to me: it has been a pleasure getting to know both o you better. You both have my
deepest respect.
Despite having written more than 40 books, I have diiculty putting into words my
gratitude or my wie, Rebekah, or tolerating my requent absences (in the home oice)
while I developed the manuscript. his project could not have been completed without
her loyal and unailing support and encouragement.
From Dawn:
I continue to be proud to call Bobby Rogers my coauthor and riend. I couldn’t ask
or a better partner in crime.
Many thanks to Peter Gregory or jumping in and improving our work. hank you,
Peter, or the guidance and support!
McGraw Hill continues to provide both excellent editors and excellent people to guide
our projects along the way; we could not have pulled o this project without them and
their consistent support.
A big thank you to our technical editor, Matthew Webster. You did a great job keeping
us on our toes.
xv
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
xvi
Finally, I heartily acknowledge the contribution o my amily and riends who have
supported me throughout my various crazy endeavors. I could not ask or more than the
love and encouragement I receive every day toward pursuing my goals. hank you all.
From Bobby:
First, I’d like to thank all the good olks at McGraw Hill and their associates or
guiding us throughout this book, helping us to ensure a quality product. Wendy Rinaldi,
Caitlin Cromley-Linn, and Janet Walden were awesome to work with, making sure we
stayed on track and doing everything they could to make this a wonderul experience.
We’re very grateul to them or giving us the chance to write this book and believing in
us every step o the way. Nitesh Sharma o KnowledgeWorks Global Ltd. was great to
work with as project manager, and I’m happy to work again with Bart Reed, our copy
editor on this project, who always manages to make me sound ar more intelligent with
his improvements to my writing.
Dawn Dunkerley has been one o my best riends or several years now, and I also
consider her one o the smartest olks in our proession, so I was doubly happy to have
her coauthor this book once again. She has added some antastic insight and knowledge
to this book; we couldn’t have done it without her. hanks much, Dawn!
I would also like to oer a proound thanks to Peter or agreeing to be our coauthor on
this project. hree minds are deinitely better than two, and Peter brought a new insight
into ISACA’s certiications and processes that we did not have or the irst edition. His
work in rewriting, revamping, redesigning, and rearranging the book material to make
it more closely align to ISACA’s exam requirements was a critically needed improvement
or this book to continue to be a great reerence and study guide or the exam.
Matthew Webster deserves some special thanks because, as the technical editor, he
had a diicult job, which was to make sure we stayed reasonable and technically accurate
throughout the book. Matthew deinitely contributed to the clarity, understanding, and
technical accuracy o the text. hanks or all your help, Matthew!
Most importantly, I would like to thank my amily or allowing me to take time away
rom them to write, especially during the diicult times we live in right now. o my
wie, Barb, my children and their amilies, Greg, Sarah and Sara, AJ and Audra, and my
grandchildren, Sam, Ben, Evey, Emmy, and big Caleb, and now, my irst great-grandson,
little Caleb: I love all o you.
Welcome to the All-in-One Exam Guide or ISACA’s Certiied in Risk and Inorma-
tion Systems Control (CRISC) exam! his book will help you study or, and success-
ully pass, one o ISACA’s premier certiication exams, the CRISC exam. his exam is
designed to test your knowledge o a wide variety o topics related to risk management
and inormation systems controls. he exam ocuses on business and I risk manage-
ment in enterprise inrastructure and designing and implementing I security controls
to mitigate risk.
Every day, it seems, data is breached at some o the largest organizations in the world.
Recently we’ve seen breaches in the U.S. government, in the healthcare industry, and
even at tech giants such as Microsot, LinkedIn, and Facebook. Ransomware attacks
alone are a plague on thousands o companies in nearly every country in the world. No
organization, no matter what size, is immune to the threat o data breaches or, or that
matter, data thet or loss. However, eective risk management can reduce the possibility
o data breaches and strengthen business processes and I inrastructures and even
contribute to their eicient use. Inormation system controls reduce the likelihood o
adverse events having a signiicant impact on the organization and should be careully
planned or and considered.
his book covers basic risk concepts, risk assessments, standards and rameworks,
and inormation security control design and implementation. We also cover the essential
concepts, terminology, and deinitions that risk management practitioners and security
proessionals need to be eective in these areas. In the book’s our main chapters, we
cover all our o the top-level domains as well as the task and knowledge statements listed
in the oicial ISACA exam objectives. Appendix A discusses the pragmatic ways in which
a security leader can successully implement a risk management program.
While you don’t have to be an expert already in all the areas we discuss, having
experience in some o these areas, such as risk concepts, helps. A good, broad background
o experience and knowledge in inormation security will give you an advantage in your
studies or this exam. O course, you’ll get a good background in all these subjects
throughout the book.
Passing the CRISC exam not only places you in a class o proessionals recognized or
their experience and expertise in this ield, but it also serves to quantiy and validate your
knowledge o advanced risk management and security topics. Ater passing this exam,
you’ll be able to show that not only are you qualiied, but you are certiied in these areas.
his book is designed to help get you there.
xvii
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
xviii
Purpose of This Book
Let’s get the obvious out o the way: this is a comprehensive study guide or the inor-
mation security and risk management proessional who needs a reliable reerence or
individual or group-led study or the CRISC certiication. his book contains the inor-
mation that CRISC candidates are required to know. While this book is one source o
inormation to help you prepare or the CRISC exam, it should not be thought o as the
ultimate collection o all the knowledge and experience that ISACA expects qualiied
CRISC candidates to possess—no one publication covers all this inormation. he other
thing you’ll need, just as important as suitable study material in our minds, is experience.
here’s no substitute or practical, hands-on experience. You should make every eort to
learn all aspects o the ISACA CRISC exam material we discuss in this book.
his book also serves as a reerence or aspiring and practicing security and risk proes-
sionals and leaders. he content required to pass the CRISC exam is the same content
that practicing security and risk proessionals need to be amiliar with in their day-to-day
work. his book is a deinitive CRISC exam study guide as well as a desk reerence or
those who have already earned their CRISC certiication.
he pace o change in the inormation security and risk management industry and
proession is high. Rather than contain every detail and nuance o every law, practice,
standard, and technique in inormation security and risk management, this book shows
the reader how to stay current in the proession. Indeed, the pace o change is one o
many reasons that ISACA and other associations require continuous learning to retain
one’s certiications. It is crucial to understand key acts and practices in security and risk
management and learn how to stay current as they continue to change. However, despite
the high rate o change in inormation security, there’s good news: the techniques or risk
management itsel change very slowly. he principles o risk assessments, risk manage-
ment, and risk treatment are solid and time-proven. Much o this book is devoted to
these practices.
his book is also invaluable or security and risk management proessionals who are
not in a leadership position. You will gain considerable insight into today’s security and
risk management challenges. his book is also helpul or I, privacy, and business man-
agement proessionals who work with risk management proessionals and need a better
understanding o what they are doing and why.
Finally, this book is an excellent guide or anyone exploring a career in inormation
security and risk management. he study chapters explain all the relevant technologies,
techniques, and processes used to manage a modern risk management program. his is
useul i you are wondering what the risk management proession is all about.
Pay Earn
Maintenance CPEs Lose CRISC
Fee Certification
Experience Requirements
o qualiy or CRISC certiication, you must have completed the equivalent o three
years o total work experience in at least two o the CRISC domains. Additional details
on the minimum certiication requirements, substitution options, and various examples
are discussed next.
Substitution of Experience
Unlike most other ISACA certiications, there are no available experience waivers or sub-
stitutions. Instead, you are required to have three or more years o experience in I risk
management and IS control, as described in the preceding section.
Exam Questions
Each registrant has our hours to take the multiple-choice question exam. here are
150 questions on the exam, representing the our job practice areas. Each question has
our answer choices, o which you can select only one best answer. You can skip ques-
tions and return to them later, and you can also lag questions that you want to review
later i time permits. While you are taking your exam, the time remaining will appear
on the screen.
When you have completed the exam, you are directed to close it. At that time, the
exam will display your pass or ail status, with a reminder that your score and passing
status are subject to review.
You will be scored or each job practice area and then provided one inal score. All
scores are scaled. Scores range rom 200 to 800; however, a inal score o 450 is required
to pass.
Exam questions are derived rom a job practice analysis study conducted by ISACA.
he areas selected represent those tasks perormed in a CRISC’s day-to-day activities and
represent the background knowledge required to develop and manage an inormation
security program. You can ind more detailed descriptions o the task and knowledge
statements at https://www.isaca.org/credentialing/crisc/crisc-exam-content-outline.
Exam Coverage
he CRISC exam is quite broad in its scope. he exam covers our job practice areas, as
shown in able 1.
Independent committees have been developed to determine the best questions, review
exam results, and statistically analyze the results or continuous improvement. Should
you come across a horriically diicult or strange question, do not panic. his question
may have been written or another purpose. A ew questions on the exam are included
or research and analysis purposes and will not be counted against your score. he exam
contains no indications in this regard.
NOTE You are not permitted to display the CRISC moniker until you have
completed certiication. Passing the exam is not suicient to use the CRISC
anywhere, including e-mail, résumés, CVs, correspondence, or social media.
NOTE You are permitted to use the CRISC moniker only ater receiving your
certiication letter rom ISACA.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
xxx
Retaining Your CRISC Certification
here is more to becoming a CRISC proessional than merely passing an exam, submit-
ting an application, and receiving a paper certiicate. Becoming a CRISC proessional
is an ongoing and continuous liestyle. hose with CRISC certiication agree to abide
by a code o ethics, meet ongoing education requirements, and pay annual certiication
maintenance ees. Let’s take a closer look at the education requirements and explain the
costs involved in retaining certiication.
Continuing Education
he goal o continuing proessional education requirements is to ensure that indi-
viduals maintain CRISC-related knowledge to better develop and manage security
management programs. o maintain CRISC certiication, individuals must obtain
120 continuing education hours within three years, with a minimum requirement o
20 hours per year. Each CPE hour is to account or 50 minutes o active participation
in educational activities.
Activity CPE
Activity Title/Sponsor Description Date Hours Support Docs Included?
ISACA presentation/lunch PCI 2/11/2022 1 CPE Yes (receipt)
compliance
ISACA presentation/lunch Security in 3/11/2022 1 CPE Yes (receipt)
SDLC
Regional Conerence, RIMS Compliance, 1/12–14/2022 6 CPEs Yes (CPE receipt)
risk
BrightFly webinar Governance, 2/16/2022 3 CPEs Yes (conirmation e-mail)
risk, &
compliance
ISACA board meeting Chapter board 4/8/2022 2 CPEs Yes (meeting minutes)
meeting
Presented at ISSA meeting Risk 6/21/2022 1 CPE Yes (meeting notice)
management
presentation
Revocation of Certification
A CRISC-certiied individual may have their certiication revoked or the ollowing
reasons:
• Failure to complete the minimum number o CPEs during the period.
• Failure to document and provide evidence o CPEs in an audit.
Introduction
xxxiii
• Failure to submit payment or maintenance ees.
• Failure to comply with the Code o Proessional Ethics can result in investigation
and ultimately can lead to revocation o certiication.
I you have received a revocation notice, you will need to contact the ISACA
Certiication Department at certi[email protected] or more inormation.
Volunteer
As a nonproit organization, ISACA relies on volunteers to enrich its programs and
events. here are many ways to help, and one or more o these volunteer opportunities
might be suitable or you:
• Speaking at an ISACA event Whether you do a keynote address or a session
on a speciic topic, speaking at an ISACA event is a mountaintop experience. You
can share your knowledge and expertise on a particular topic with attendees, but
you’ll learn some things, too.
• Serving as a chapter board member Local chapters don’t run by themselves—
they rely on volunteers who are working proessionals who want to improve the
lot o other proessionals in the local community. Board members can serve in
various ways, rom inancial management to membership to events.
• Starting or helping a CRISC study group Whether as a part o a local chapter
or at large, consider starting or helping a group o proessionals who want to
learn the details o the CRISC job practice. We are proponents o study groups
because study group participants make the best students: they take the initiative
to take on a big challenge to advance their careers.
• Writing an article ISACA has online and paper-based publications with
articles on a wide variety o subjects, including current developments in security,
privacy, risk, and I management rom many perspectives. I you have specialized
knowledge on some topic, other ISACA members can beneit rom this
knowledge i you write an article.
• Participating in a credential working group ISACA works hard to ensure
that its many certiications remain relevant and up to date. Experts around the
world in many industries give their time to ensure that ISACA certiications
remain the best in the world. ISACA conducts online and in-person working
groups to update certiication job practices, write certiication exam questions,
and publish updated study guides and practice exams. Peter contributed to
the irst working group in 2013 when ISACA initially developed the CRISC
certiication exam; he met many like-minded proessionals, some o whom he is
still in regular and meaningul contact with.
• Participating in ISACA CommunITy Day ISACA organizes a global eort
o local volunteering to make the world a better, saer place or everyone. Learn
about the next CommunIy Day at https://engage.isaca.org/communityday/.
Introduction
xxxv
• Writing certification exam questions ISACA needs experienced subject
matter experts who are willing to take the time to write new certiication exam
questions. ISACA has a rigorous, high-quality process or exam questions that
includes training. Who knows—you could even be invited to an in-person
workshop on writing exam items. You can ind out more about how this works
at https://www.isaca.org/credentialing/write-an-exam-question.
You can learn about these and many other volunteer opportunities at https://www.isaca
.org/why-isaca/participate-and-volunteer.
Please take a minute to relect on the quality and richness o the ISACA organization
and its many world-class certiications, publications, and events. hese are all ueled by
volunteers who made ISACA into what it is today. Only through your contribution o
time and expertise will ISACA continue in its excellence or uture security, risk, privacy,
and I proessionals. And one last thing you can only experience on your own: volun-
teering not only helps others but enriches you as well. Will you consider leaving your
mark and making ISACA better than you ound it?
Summary
Becoming and being a CRISC proessional is a liestyle, not just a one-time event. It takes
motivation, skill, good judgment, persistence, and proiciency to be a strong and eec-
tive leader in the world o inormation security management. he CRISC was designed
to help you navigate the security management world with greater ease and conidence.
Each CRISC job practice area will be discussed in detail in the ollowing chapters,
and additional reerence material will be presented. Not only is this inormation helpul
in studying prior to the exam, but it is also meant to serve as a resource throughout your
career as an inormation security management proessional.
Governance
CHAPTER
1
In this chapter, you will:
• Understand the concepts o organizational governance and how goals and
objectives support it
• Learn about structure, roles, and responsibilities
• Analyze how organizational risk culture is acilitated through the deinition o risk
appetite and risk tolerance
• Understand the concepts o enterprise risk management, associated rameworks,
and the ethics o risk management
This chapter covers Certiied in Risk and Inormation Systems Control Domain 1,
“Governance.” The domain represents 26 percent o the CRISC examination.
The CRISC Task Statements relevant to this domain focus on governance and how
it applies in this context to the organization, particularly executive management. The
governance aspects of risk for an organization, as well as the relationships between
enterprise risk and IT risk, are also explored. The chapter also examines risk manage-
ment governance and how it is implemented in the organizational structure and cul-
ture. Governance also applies to overall laws, regulations, and even risk frameworks, so
we will discuss those at length. In those governance discussions we will explain both
external governance and internal governance, including policies and standards. Inter-
nal governance also includes management oversight, such as business process reviews,
risk appetite and tolerance, as well as contractual obligations regarding risk manage-
ment. Other topics related to the Task Statements we will touch on here and look at in
depth in other chapters include elements of risk such as assets and their value, threats,
vulnerabilities, likelihood, and impact.
Although many organizations will “do the right thing” in terms of due diligence and
care, upholding their legal and ethical responsibilities and such, many other organizations
either do not or don’t do it to the same standards. This is why governance is so vitally
important to an organization. Governance ties all these elements together. Governance
sets standards, whether they are legal, ethical, or otherwise, and attempts to “standardize”
what organizations do in terms of their obligations to stakeholders and society in general.
As you’ll see in this chapter, governance comes from different sources, both outside the
organization and within it. It is a synthesis of enforced requirements and organizational
1
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
2
leadership culture. Also, governance is necessary to ensure that organizations treat sys-
tems and data with care and, again, perform their due diligence and due care duties when
dealing with data protection and risk.
In this chapter, we will focus on organizational governance and how it applies to all
the different elements of an information security management system: mission, strategy,
goals and objectives, roles and responsibilities, culture, risk, and even ethics.
Organizational Governance
Governance is the glue that holds all the different framing elements of an organization
together: its mission, strategy, goals, and objectives. Governance establishes the require-
ments an organization must meet and consists of both internal and external governance.
External governance comes in the form of laws, regulations, professional and industry
standards, and other sources of requirements imposed on the organization from the out-
side. Internal governance typically supports external governance through policies, pro-
cedures, and processes. For example, if a law imposes requirements to protect certain
sensitive data using specific controls or to a certain standard, then policies and proce-
dures further support those requirements by formalizing and codifying them within the
organization. Policies and procedures can also be independent of external governance
and simply reflect the organization’s culture, needs, and values, usually established by
its executive management. In any event, governance is the controlling factor for the
organization; governance keeps the organization on the right focus and ensures that it is
meeting its compulsory requirements, such as obedience to laws, as well as performing
its due diligence and due care responsibilities.
In addition to imposing requirements on the organization, governance also refers to
the structure by which the organization is led and regulated. Again, this could come from
external or internal sources. External sources for governance could consist of an external
board of directors or regulatory agencies. These entities ensure that the organization is
led from the perspective of responsibility and accountability. Internal governance comes
from internal business leaders and reflect business drivers not related to externalities. In
reality, good governance typically reflects a balance between both internal and external
business drivers.
The infrastructure framework of the organization—in the form of strategy, goals,
objectives, mission statements, and so on—supports governance, as we will discuss fur-
ther in this chapter.
EXAM TIP Remember that risk appetite and tolerance are directly related to
the business mission, although dierent business pursuits may have varying
levels o each. Senior management sets those levels based on the potential
rewards rom risky opportunities and the amount o loss the organization
could endure i those rewards don’t materialize.
Organizational Culture
Organizational culture is the term that describes how people treat each other and how
people get things done. Many organizations establish a set of values that define the norms
of behavior. Terms like respect, collaboration, and teamwork are often seen in these values.
Some organizations will publish formal value statements and print them for display in
lobbies, offices, and conference rooms.
The way that an organization’s leaders treat each other and the rest of the organization
sets an example for behavioral norms. Often, these norms reflect those formal values, but
sometimes they may differ. One could say that an organization’s stated culture and its
actual culture may vary a little, or a lot. The degree of alignment itself is a reflection of
an organization’s culture.
An organization also has a risk culture, which is essentially how the organization as
an entity feels about and deals with risk. This culture is developed from several sources.
First, it can come from the organization’s leadership, based on their business and manage-
ment philosophies, attitudes, education, and experience. It can also come from the orga-
nization’s governance. Remember that governance is essentially the rules and regulations
imposed on the organization by either external entities (in the form of laws, for example)
or internally by the organization itself. In any case, the culture of the organization really
defines how the organization feels about risk and how it treats risk over time. We will talk
later about how two concepts, risk tolerance and risk appetite, support the organizational
risk culture.
Chapter 1: Governance
5
Policies and Standards
Different types of controls work together to protect an organization, many of which have
a technical focus. However, while the more technical approaches are quite often the stars
of the cybersecurity show, the importance of the good old policy cannot be understated.
In fact, without a policy, quite often, the security program will fall flat due to a lack of
governance, management involvement, and accountability. This objective covers differ-
ent types of policies and how they work together to form the underlying foundation of
human and process control, ensuring a balanced and effective security program.
To provide effective security, security policy and procedure creation must begin at the
top of an organization with senior management that understands, supports, and holds
personnel accountable to the written policies. Remember that organizational policies
must articulate with external governance, such as requirements found in laws and regula-
tions, or the management philosophies and tolerances of the organization’s leadership.
These policies and procedures must then flow throughout the organization to ensure
that security is useful and functional at every level of the organization. Understanding
organizational security must begin with an understanding of the basic laws, regulations,
and legal jurisdiction that policies must be informed by in order to protect not only the
organization and its assets but also its employees and customers.
Management creates policies based on its leadership philosophies, culture, indus-
try standards and requirements, and, most importantly, external governance. Policies
articulate with all these items and represent management’s directives in upholding these
requirements. Policies specific to risk governance include a body of documents that
may start with the Risk Management Strategy, which details the organization’s overall
strategy, methodology, and long-term desires for managing risk. Policies support the
strategy, as well as governance requirements, such as those that may be found in laws or
regulations that dictate that certain risk management activities must take place within
the organization. An example of a risk-related policy would be a risk management or
risk assessment policy, which dictates the organization’s requirements for risk manage-
ment, assessment and analysis, risk treatment, and risk monitoring. This policy may be
brief or detailed but will usually state roles and responsibilities, the risk management
methodology adopted by the organization, and the requirement to implement detailed
risk management procedures.
Business Processes
The organization’s mission is the reason that it exists, whether this is producing goods,
offering services, and so on. A shoe manufacturer is in the business of making shoes;
therefore, its mission is to make good quality shoes. Most businesses have a mission state-
ment that describes their mission. While the mission is the overall reason for existence,
business processes are the activities that carry out that mission. A shoe manufacturer’s
business processes could be as high level as manufacturing, sales, and marketing, but
even those higher-level processes are broken down into activities, such as sewing cloth
and leather, developing types and styles of shoes, and selling them to retailers. These
are all processes that support the business. Each of these business processes also incurs
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
6
some level of business risk. There could be risks in the manufacturing process due to the
types of materials or specific manner of attaching the shoe soles to the rest of the shoe.
A faulty process could mean that the shoes are of lesser quality than other competitors
or that the styles don’t meet the demands of consumers. This, in turn, will lead to fewer
sales or more consumer returns. Regardless of whether they are higher-level processes or
more detailed activities and tasks, each of these is supported by one or more systems or
sets of data. These systems also incur risk, but of a different nature. The risk incurred by
the systems includes the ability to effectively use those systems and data to support the
different business processes. Therefore, IT (or even cybersecurity) risk directly informs
business process risk since it could affect the ability of the organization to carry out its
business processes and, in turn, its overall mission.
Business processes are “owned” by different managers within the organization. This
means that the business process owners are responsible for both the day-to-day and long-
term operations and success of the process. This also means, ordinarily, that they are the
primary owners of the business risk associated with the process. Of course, higher-level
management bears ownership and responsibility for both the process and risk also, but
these are typically the people in charge of the business process.
Better organizations will take a formal approach with regard to the development and
management of business processes. Documents that describe processes, roles and respon-
sibilities, and key assets may be formally managed with business process change manage-
ment and periodic review and be kept in official repositories to ensure that no unauthor-
ized changes occur.
Organizations with higher maturity will develop metrics and even key performance
indicators (KPIs) associated with each business process. This allows management to
understand the quantity and quality of business process output, which can be used to
determine tactical and strategic improvements that can make processes more effective
and efficient. Risk practitioners must work hand-in-hand with business process owners
to develop these KPIs, as well as associated key risk indicators (KRIs) and key control
indicators (KCIs).
NOTE KPIs, as well as KRIs and KCIs, are covered in more detail in Chapter 3,
where we discuss risk response and reporting as part o Domain 3.
Organizational Assets
Company assets can include physical items, such as computer and networking equip-
ment, office machines (for example, scanners and copiers), work facilities, and informa-
tion processing centers, as well as nonphysical items, such as valuable data. Asset iden-
tification involves identifying both types of assets and determining their value. Asset
values must be established beyond the mere capital costs; a true asset valuation should
consider several factors. For example, a consideration should be the cost to repair or
recover the asset versus simply replacing the asset outright. Often, repairing the asset
may be less expensive in the short run, but the cost of the different components required
Chapter 1: Governance
7
to conduct a repair should be considered. Also, it’s important to remember that this
might only be a temporary solution—one that could come back to haunt you (and your
pockets) in the long run.
Asset management is the collection of activities used to oversee the inventory, clas-
sification, use, and disposal of assets. Asset management is a foundational activity, with-
out which several other activities could not be effectively done, including vulnerability
management, device hardening, incident management, data security, and some aspects of
financial management.
In information security, asset management is critical to the success of vulnerability
management. If assets are not known to exist, they may be excluded from processes used
to identify and remediate vulnerabilities. Similarly, it will be difficult to harden assets if
their existence is not known. What’s more, if an unknown asset is attacked, the organiza-
tion may have no way of directly realizing this in a timely manner. If an attacker com-
promises an unknown device, the attack may not be known until the attacker pivots and
selects additional assets to compromise. This time lag could prove crucial to the impact
of the incident.
Asset Identification
A security management program’s main objective (whether formally stated or not) is the
protection of the organization’s assets. These assets may be tangible or intangible, physi-
cal, logical, or virtual. Here are some examples of assets:
• Buildings and property These assets include real estate, structures, and other
improvements.
• Equipment This can include machinery, vehicles, and office equipment such as
copiers, printers, and scanners.
• IT equipment This includes computers, printers, scanners, tape libraries
(the devices that create backup tapes, not the tapes themselves), storage systems,
network devices, and phone systems.
• Virtual assets In addition to the tangible IT equipment cited, virtual assets
include virtual machines and the software running on them.
• Supplies and materials These can include office supplies as well as materials
used in manufacturing.
• Records These include business records, such as contracts, video surveillance
tapes, visitor logs, and far more.
• Information This includes data in software applications, documents, e-mail
messages, and files of every kind on workstations and servers.
• Intellectual property This includes an organization’s designs, architectures,
patents, software source code, processes, and procedures.
• Personnel In a real sense, an organization’s personnel are the organization.
Without its staff, the organization cannot perform or sustain its processes.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
8
• Reputation One of the intangible characteristics of an organization, reputation
is the individual and collective opinion about an organization in the eyes of its
customers, competitors, shareholders, and the community.
• Brand equity Similar to reputation, this is the perceived or actual market value
of an individual brand of product or service that is produced by the organization.
• Financial system asset inventory An organization that keeps all of its assets
on the books will have a wealth of asset inventory information. However, it may
not be entirely useful: asset lists often do not include the location or purpose
of the asset and whether it is still in use. Correlating a financial asset inventory
to assets in actual use may consume more effort than the other methods for
creating the initial asset list. However, for organizations that have a relatively
small number of highly valued assets (for instance, an ore crusher in a gold
mine or a mainframe computer), knowing the precise financial value of an asset
is highly useful because the actual depreciated value of the asset is used in the
risk analysis phase of risk management. Knowing the depreciated value of other
assets is also useful, as this will figure into the risk treatment choices that will be
identified later.
TIP Financial records that indicate the value o an asset do not include the
value o inormation stored on (or processed by) the asset.
It is usually useful to organize or classify assets. This will help to get identified assets
into smaller chunks that can be analyzed more effectively. There is no single way to orga-
nize assets, but here are a few ideas:
Risk Governance
Risk governance has several different aspects. As mentioned earlier, governance provides
the overall requirements of what the organization must adhere to and could include
legal, ethical, safety, and professional requirements. Risk governance, then, describes the
requirements that the organization must adhere to in terms of managing both business
and IT risk. Laws, regulations, and other external governance can dictate portions of
risk governance, as can internal governance, which comes in the form of policy. Risk
governance is also set forth by executive management in the form of risk appetite and
tolerance, risk strategy, and throughout the various policies that support risk manage-
ment. Risk governance includes adopting a risk assessment and analysis methodology,
risk treatment and response options, risk monitoring processes, and so on. A multitude
of risk governance and management frameworks have been published to assist in this
process, which we will discuss next.
1. Prepare.
2. Categorize information systems.
3. Select security controls.
4. Implement security controls.
5. Assess security controls.
6. Authorize information systems.
7. Monitor security controls.
Operational Management
Operational management refers to the tactical management activities that take place at
the business unit or business process level. At this level, risk is managed on a day-to-day
basis by monitoring control effectiveness as well as any risk associated with the business
process itself or its supporting systems. This line of defense may be implemented by the
risk practitioner, the business process owner, or even IT and cybersecurity personnel.
This is the layer in which controls are operated as a part of business processes and often
implemented as a part of information systems.
Risk Profile
A risk profile encompasses an overall asset, organization, or business process under review
and includes detailed information on all aspects of those items and how they contribute
to, mitigate, or influence risk. The risk profile for a system, for instance, would present
detailed information on all the different characteristics of the system, its security con-
trols, the risk assessment and analysis for the system, the risk responses for the system,
and ongoing management for that risk. Risk profiles periodically change based on a
variety of factors, including the criticality or sensitivity of the system, the vulnerabili-
ties inherent to the system, the threats that may exploit those vulnerabilities, and the
mitigating security controls that protect the system. Regulations and societal norms also
influence risk profile, particularly in areas such as data privacy. The risk profile is used to
actively manage ongoing risk and ensure that it remains within acceptable levels.
EXAM TIP Know the dierences between risk appetite and risk tolerance; risk
appetite involves how much risk the organization is willing to endure, whereas
risk tolerance is how much variation rom that amount is acceptable to the
business or a particular venture. Risk culture drives both o these actors.
Chapter Review
Organizational governance drives how an organization conducts itself within legal, reg-
ulatory, and even self-imposed constraints. Governance focuses on legal compliance,
due diligence and care, and ethical behavior. This governance can come from both
external and internal sources in the form of laws, regulations, professional standards,
and internal policies and procedures. Risk management is often a requirement included
in governance standards.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
16
Quick Review
• Governance guides the conduct of an organization in terms of legal and
ethical behavior.
• Governance can come from external and internal sources.
• External governance is imposed through laws, regulations, professional standards,
risk frameworks, and contract requirements.
• Internal governance comes from internal policies and procedures.
• The organization’s mission, goals, and objectives must include and support
governance requirements.
• Senior management defines risk appetite and tolerance for the organization.
• Risk capacity is the amount of loss an organization can incur without its very
existence being threatened.
• Risk appetite is the amount of risk an organization is willing to take on in pursuit
of its mission.
• Risk tolerance is the level of variance from the appetite an organization is willing
to permit for any particular business venture.
• An organization’s mission, goals, and objectives are typically defined at the strategic
or long-term level.
• Organizational structure can affect an organization’s ability to deal with risk in
terms of its risk culture, appetite, tolerance, and resilience.
• Organizational business units, which consist of various business processes, must
deal with both business and IT risk at the process level.
• Business process risk contributes to the overall organizational risk and is managed
at various levels, starting with the risk owner, who is responsible and accountable
for risk management for a particular set of business processes or business units.
• An enterprise risk management strategy and program must be in place to deal
with lower-, middle-, and higher-tier risks. Risk governance drives the enterprise
risk management program.
• Organizational risk culture defines how an organization feels about and deals
with risk and comes from the organization’s leadership and governance.
• Organizational policies are internal governance that reflects the management
philosophy, culture, and directives of senior leaders.
• Policies are intended to articulate with external governance.
• Organizational assets include anything of value to the organization, including
physical equipment, facilities, human assets, and information.
• Asset management is a collection of activities used to manage the inventory,
classification, use, and disposal of assets.
• The three lines of defense in managing enterprise risk are operational management,
risk and compliance management, and auditing accountability.
Chapter 1: Governance
17
• The risk profile consists of detailed information on all aspects of an asset and
how those aspects contribute to, mitigate, or influence risk.
• The risk profile is used to manage risk for an asset.
• Governance can be imposed by laws, regulations, and contracts, which are
legally enforceable.
• Codes of conduct and ethics dictate the behavior of risk management professionals.
Questions
1. An organization is subject to healthcare regulations that govern the protection
requirements of individual health data. Which of the following describes this
type of governance?
A. External
B. Internal
C. Regulatory
D. Professional
2. Your company handles credit card transaction processing as part of its business
processes. Which of the following best describes the source and type of governance
it may incur because of these business processes?
A. Internal, policies and procedures
B. External, industry standards
C. External, laws and regulations
D. Internal, industry standards
3. Your organization is structured into various departments, and each of these
has its own activities that support the mission, goals, and objectives of the
organization. These activities are decomposed from a high level and include
various tasks to support the various business units. Which the following best
describes these activities?
A. Operational management
B. Organizational strategy
C. Business processes
D. Risk management functions
4. An organizational culture that is averse to risk and change is more likely to have
the following in terms of risk appetite and tolerance?
A. High risk appetite, low risk tolerance
B. Low risk appetite, high risk tolerance
C. Low risk appetite, low risk tolerance
D. High risk appetite, high risk tolerance
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
18
5. Which of the following roles is the lowest level of responsibility in terms of risk
ownership for a business process or unit?
A. Organizational CEO or president
B. VP for risk management
C. Risk practitioner
D. Business process owner
6. Which of the following is the level of variation or deviance an organization is
willing to accept for a particular business venture?
A. Risk appetite
B. Risk tolerance
C. Risk acceptance
D. Risk capacity
7. A small business unit in the production department is incurring risk for one of
its lower-level business processes. Although this risk is focused on the business
process and not at the organizational level, it must be accounted for in the overall
organizational risk assessment. At what level should this risk be considered?
A. Organizational risk
B. Operational risk
C. Strategic risk
D. Tactical risk
8. An organization needs to create its internal risk management program and begins
with risk governance. Which of the following should the organization create first?
A. Risk strategy
B. Risk management policy
C. Risk assessment procedure
D. Risk management methodology
9. Which of the following describes why the organization exists?
A. Organizational mission statement
B. Organizational strategy
C. External governance
D. Organizational policy
10. Which of the following activities is considered foundational, without which other
management activities, such as vulnerability management, incident management,
and data security, could not be accomplished?
A. Configuration management
B. Risk management
Chapter 1: Governance
19
C. Asset management
D. Financial management
11. Which of the following is not one of the three domains listed in ISACA’s Risk IT
Framework?
A. Risk Governance
B. Risk Evaluation
C. Risk Assessment
D. Risk Response
12. Which of the following requires that a risk practitioner perform duties professionally,
with due diligence and care, as required by professional standards?
A. Risk IT Framework
B. NIST Risk Management Framework
C. ISACA Code of Professional Ethics
D. Laws and regulations
13. A risk manager is analyzing a risk item and intends to recommend that risk
acceptance be the recommended treatment. Which of the following must the
risk manager consider to make this determination?
A. Risk awareness
B. Risk capacity
C. Risk tolerance
D. Risk appetite
14. The organization’s legal counsel is considering the prospect of real estate prices,
including office space leasing costs, increasing significantly in the next five years.
What level of risk management should be used to manage this risk?
A. Asset
B. ERM
C. Program
D. Market
15. All of the following are factors that influence an organization’s culture except
which one?
A. Published values
B. Policies
C. Leadership behavior
D. Behavioral norms
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
20
Answers
1. A. Laws and regulations are a form of external governance.
2. B. This describes an external source of governance in the form of industry
standards, specifically the Payment Card Industry Data Security Standard
(PCI DSS).
3. C. Business processes are the activities that support the organizational mission
and can be broad or broken down into detailed activities and tasks.
4. C. An organization that is risk averse likely has both a low risk appetite and low
risk tolerance.
5. D. Although various levels of organizational management may be responsible and
accountable for risk, the lowest level of risk ownership for a business process or
unit is the business process owner.
6. B. Risk tolerance is the amount of variation or deviation an organization is willing
to accept from its risk appetite that a particular business venture may incur.
7. D. Tactical risks are those encountered by smaller production sections—those
that carry out the day-to-day work of the organization. A lower-level business
process may be considered to have a tactical risk.
8. A. The risk strategy for the organization should be created first because it provides
long-term direction for the risk management program. The risk management
strategy also supports external governance. Policies and procedures are created
afterward to support the strategy as well as implement external governance.
9. A. The organizational mission statement is developed by the organization to
describe its overall mission, which is its very reason for existence.
10. C. Asset management is one of the foundational activities on which other activities
depend (vulnerability management, configuration management, and so on) because
assets must be inventoried and accounted for first.
11. C. Risk Assessment is not one of the domains covered in the Risk IT Framework.
The three domains are Risk Governance, Risk Evaluation, and Risk Response.
12. C. The ISACA Code of Professional Ethics establishes requirements for ethical
conduct and behavior that all certified professionals must adhere to, including
the requirement to perform all duties professionally, with due diligence and care,
as required by professional standards.
13. C. Risk tolerance determines the amount of risk an organization will accept for
any individual risk situation.
14. B. A risk matter such as macroeconomic risk generally will be managed by an
organization’s enterprise risk management (ERM) program.
15. B. Of the available choices, an organization’s policies are the least likely to influence
an organization’s culture.
IT Risk Assessment
CHAPTER
2
In this chapter, you will:
• Understand the role o risk assessments and risk analysis in the risk management
lie cycle
• Learn about the techniques used to identiy various types o risks
• Become amiliar with risk identiication and risk analysis techniques such as
threat modeling, vulnerability analysis, control deiciency analysis, root cause
analysis, and risk scenario development
• Understand the concepts and steps taken in a risk assessment
• Be amiliar with the role and structure o a risk register
• Understand the concepts o inherent risk and residual risk
This chapter covers Certiied in Risk and Inormation Systems Control Domain 2, “IT Risk
Assessment.” The domain represents 20 percent o the CRISC examination.
The CRISC Task Statements relevant to this domain address several key activities pres-
ent in a risk management program, starting with conducting IT risk assessments and
the impact of IT risks on the organization’s objectives or operations. These risk assess-
ments should identify and evaluate threats, vulnerabilities, and risks, and they should
be recorded in an IT risk register. In many organizations, the IT risk register would be
integrated into an enterprise risk management program, if it exists. IT risk assessments
should evaluate the existence and effectiveness of IT controls and identify the need for
new or changed controls based on risk. This risk and control information should be
reported to stakeholders to facilitate risk-driven decision-making, aligning with the orga-
nization’s established risk appetite and risk tolerance. IT risk personnel should periodi-
cally evaluate new and changing technologies for changes to risk. The risk management
program should be aligned to industry frameworks and standards.
IT risk assessments are performed to identify risks associated with a specific scope
of business operations or information technology in an organization. The purpose of
identifying risks is the need for an organization to be aware of specific hazards that,
if unchecked, could interrupt business operations and incur additional cost. Business
executives and owners don’t want bad and unexpected things to happen; rather than stick
their heads in the sand, it’s wiser to identify those risks and see what can be done about
them. The alternative means flying blind and being unaware of risk scenarios, some of
which may be highly likely to occur.
21
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
22
Figure 2-1
The components IT Risk Identication
(Chapter 1)
o risk
management
This chapter explores the broad picture of IT risk assessment, which is the search
for—and identification of—various risks. We also explore the detailed view of risk
analysis, which is the careful examination of individual risks, to better understand
them in detail and explore various remedies. Conceptually, risk assessment and risk
analysis are simple enough, but because there are so many ways in which risk assess-
ments and risk analyses may occur, and many standards and techniques for each, all of
this can become a clutter.
In our opinion, ISACA’s layout of this domain, IT Risk Assessment, isn’t quite right.
Both the macro (risk assessment) and micro (risk analysis) are scattered throughout
the two main parts of the domain. We will, however, stay true to the structure of the
domain, like it or not, but we’ll be sure to clarify the context within risk management
in each section.
IT risk assessments and risk analysis, covered in this chapter, are a part of the overall
risk management life cycle, depicted in Figure 2-1. Risk governance, including risk
profile, risk appetite, and risk tolerance, are covered in Chapter 1, while risk treatment,
emerging risks, third-party risk management, controls, and risk reporting are covered
in Chapter 3.
IT Risk Identification
IT risk identification comprises the activities performed to identify various types of risks
associated with an organization’s use of information technology. The types of IT risks
that can be identified fall into these categories:
NOTE The context o IT risks includes on-premises and cloud and service-
provider uses o inormation technology.
Risk Events
Risk events are the specific scenarios that, if they occurred, would inflict some impact
on an organization’s ongoing operations. A risk event includes a description of one
or more threat scenarios, the identification of the types of threat actors, statements of
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
26
vulnerabilities that could enable a threat scenario to occur, the value of relevant assets,
and the probability of occurrence.
• Threat actor The person or thing that would carry out a threat if they
chose to. Examples of threat actors include a lone hacker and a military-based
cyberhacking unit.
• Threat realization A threat that is carried out and causes some harm to an asset.
• Threat modeling A specific type of analysis performed to better understand
likely attack scenarios.
• Event A more common term that is synonymous with threat realization.
• Exploit (noun) A specific tool or method that can be used to carry out a threat.
• Exploit (verb) The act of attacking an asset, made easier by the presence of
a vulnerability.
• Inherent risk The risk associated with a specific type of activity, before controls
are considered.
Chapter 2: IT Risk Assessment
27
• Probability (also known as likelihood) The chance that a specific threat event
would occur, generally within a period such as one year.
• Residual risk The risk that remains after any risk reduction has been applied.
• Risk register A listing of risks that have been identified.
• Risk analysis The examination of one or more specific risks.
• Risk assessment An examination of a process or system to identify and describe
one or more risks.
• Risk treatment A decision made about potential action to be taken concerning
a specific risk.
• Risk management The life-cycle process that includes risk assessments, risk
analysis, and risk treatment.
These are just the basic terms used in risk management, defined briefly here. These
terms, and several others, are explained in detail throughout this chapter. Figure 2-2
depicts threat agent, threat, vulnerability, impact, and risk concepts.
Here are some statements you might overhear in a conversation with IT risk managers:
Produces
Risk Impact
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
28
Types of Risk Events
Several types of risk events can occur that are related to an organization’s uses of informa-
tion technology. The potential range of risk events includes scenarios such as the following:
• Breaches
• Equipment failure
• Extortion
• Natural disasters
• Fires and floods
• Sabotage
• Intrusion, data theft, and ransomware
• New regulations
• Regulatory fines
• Staff turnover
• Supplier shortages
• Strikes, riots, and demonstrations
• Terrorist attacks and acts of war
Threat Modeling
Threat modeling is a risk identification technique that involves examining every possible
threat agent, action or event, attack vector, and vulnerability for a given system, asset,
or process, and then modeling or simulating how it could progress and the damage that
could occur. Threat modeling has its origins in the U.S. and U.K. defense industries. A
threat assessment examines how these threats could affect the particular asset, organiza-
tion, or system you are looking at, in context, and it can be done on one of several levels,
either simultaneously or separately. For example, you could perform a threat assessment
on a new system being developed or installed. You would examine the different threat
agents and threats that could affect that particular system. You could also look at an orga-
nizational process, or even the entire organization itself, and perform a comprehensive
threat assessment. In addition to scaling a threat assessment, as we just described, you
could look at threats from a particular perspective, performing a threat assessment specifi-
cally for technical threats, physical ones, or even external operating environment threats.
Chapter 2: IT Risk Assessment
29
Figure 2-3
Scoping and Organization
scaling a threat
assessment
Technical, Physical,
Scale
Operational,
Mission or Business Processes
Managerial
Perspectives
Organizational
System System
Element
Scope
This relates to the scope of the assessment. For example, you could look at the technical
aspects of a given system or examine threats inherent to the processes and procedures asso-
ciated with a particular business unit. Figure 2-3 shows this scoping and scaling process.
As this figure illustrates, you could scale an assessment to include only specific sys-
tems within some functional regions. You could scope it by examining not only all
the threats that apply to the technical aspects of systems in those particular functional
areas but also threats that affect associated business or management processes. You
could have any combination of scope and scale that the organization needs to fulfill its
assessment goals.
Threat landscape is a term that connotates a visual metaphor for considering all the
threats that have been examined and identified as relevant to a given system or process.
A risk manager could be overheard as saying, “The threat landscape for our online com-
merce system is particularly hostile,” meaning there are many significant threats that
need to be considered as controls and defenses are designed.
Table 2-1 illustrates how threat agents and threats could be categorized, given factors
such as intent, relationships, skills, and so on. Note that these could affect any number
or combination of elements (processes, systems, and so on) within an organization. You
could categorize threats and threat agents using these characteristics and develop others
that frame and define threats and threat agents for your organization.
Note that this information is only a sampling of what you may come up with in a
threat assessment. You may also break down some of these elements into far more spe-
cific ones, based on your needs and the organization and systems you are focused on. For
example, a defense contractor or military organization would likely have a more specific
set of threats and agents in its assessment than a nonprofit, charitable organization.
TIP Threat and vulnerability assessments are discussed a great deal in this
chapter. These two assessment processes are critical to understanding the
elements that ormulate the risk or an asset.
• Lack of off-site backup media that makes disaster recovery difficult in the case of
a fire or flood that damages on-site systems and backup media.
• Excessive current load on power supply circuits that could result in overtemperature
or power failure.
Vulnerability Analysis
Vulnerability analysis is a detailed examination of vulnerabilities that may exist or vulner-
abilities that have been determined to exist. A vulnerability assessment can give you infor-
mation about the weaknesses inherent to one or more assets. The vulnerability assessment
might include examining all aspects of an asset or capability to determine any vulner-
ability it has, including the physical, technical, and operational vulnerabilities inherent
to the asset. For example, technical vulnerabilities can be related to configuration issues
or lack of hardening on a network device. Physical vulnerabilities could relate to the lack
of physical protection for the network device. Operational vulnerabilities might include
the lack of backup processes or configuration control exercised for the device.
Control Gaps
A control gap is a situation where controls either do not exist or are not sufficient to provide
adequate protection for an asset to reduce either impact or likelihood (and thereby risk) to
an acceptable level. In this situation, after the lack of existence or effectiveness of the con-
trol is established, the organization must remediate the problem. We won’t go into much
depth on remediation here; that’s the subject of the Risk Response and Reporting domain,
which you’ll read about in Chapter 3. However, during your analysis, you must identify
control gaps and make recommendations for possible response options that would close
those gaps. You may identify gaps in physical, technical, or administrative controls, even
when other types of controls perform some security and protection functions. For exam-
ple, suppose an organization implements account management processes, such as creating
accounts in a standardized fashion, verifying identities before user accounts are created,
and so on. In that case, the organization has operational and technical controls in place
that help provide secure account management. However, if the organization has no writ-
ten policy that requires this process and dictates that it be performed consistently, how can
the organization be assured that these procedures will always be followed uniformly and in
a secure manner? If there is no policy, the organization leaves it up to individual account
operators to perform this function as they want, regardless of how “most people do it.” In
this case, a control gap would be that, although the organization is applying some level of
control over this process, there is no written policy ensuring that it is standardized.
Control Recommendations
Once you’ve identified existing controls, determined how effective they are, and identi-
fied gaps between the current and desired end states of controls, you should be able to
make sound, risk-based recommendations to senior managers on how controls should
Chapter 2: IT Risk Assessment
35
be supplemented, added, or changed. Recommending controls is a risk-based process;
remember that there is a risk that you are trying to minimize, but you must balance this
between control functionality and economy of resources. You have several considerations
to keep in mind when making control recommendations:
• What more could be done to supplement or change existing controls to close the
gap between current and desired end states of risk?
• Should new or different controls be applied to replace existing ones?
• What are the costs involved in applying additional controls, and do they exceed
the value of the asset or the costs to replace it?
• Would additional controls require retooling or significantly changing the
infrastructure, processes, or asset itself?
• Would additional controls require new personnel or training for current personnel?
• Can additional controls be implemented that also reduce risks in other areas
(economy of use)?
The answers to these questions, at least some of them, will determine how you make
the recommendations to management about closing the “control gap.” Both the cost of
implementation and the return on investment (ROI) received from implementing new
controls or strengthening existing ones will affect management’s acceptance of the recom-
mendations. The asset value, or impact if it were significantly damaged or lost, will also
affect how well the recommendation is received. Implementing a costly control to protect
an asset worth less in terms of impact is not usually an economically sound decision.
Organizational levels of risk appetite and tolerance will also affect control recommenda-
tions since any new or additional control must reduce risk enough to fall within those
levels. In general, when recommending ways to close the control gap, whether it is by
introducing new controls, modifying existing ones, or modifying the infrastructure to
reduce likelihood or impact, you should do the following:
• Try to leverage existing controls that can be used across the board to include
additional assets.
• Look for “quick wins” first—controls that are quickly and inexpensively
implemented (such as policies, training, procedure changes, and so on).
• Prioritize control recommendations with risk; the greater the risk, the more attention
to those particular control gaps.
• Be realistic in your recommendations: You can’t reduce risk to absolute zero, you
don’t have all the resources you would like at your disposal, and you don’t have
to offer a 100 percent solution. Sometimes a 70 percent solution is better than a
0 percent solution.
• Provide alternatives to your primary recommendation for each control gap. Give
management alternatives based on cost, level of risk reduction, and effectiveness.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
36
Considering Risk and Control Ownership
Risk and control ownership are issues that must be considered during a risk analysis.
Depending on how the organization is structured and the risk management strategy,
risk ownership may be assigned to one or several different managers, spanning multiple
functional areas. This is because the risk that affects one area likely affects other areas,
so many different people may have responsibility for affected areas and be required
to deal with and respond to risk. Control ownership should also be examined; often,
controls that provide protections for a given asset or many systems may not fall under
the operational purview of the risk owner. Some controls span the entire organization
and protect multiple assets rather than only a specific system. These are referred to as
common controls, and the responsible entity for these controls is the common controls
provider. For example, consider physical security controls. There may be a physical
security officer for the organization that oversees guards, personnel security, and access
to secured areas. They may also be responsible for locks, closed-circuit televisions
(CCTVs), and physical intrusion detection systems and alarms. These controls serve
to protect information systems and data assets that might be in a secure data center.
Risks may be presented to the person who is responsible for information systems in
the data center. However, the controls that serve to protect them may belong to the
physical security functional area. This will require some coordination between the dif-
ferent functional areas if controls managed by one functional area are insufficient to
protect assets managed by another area. This may also affect organizational structures,
budgets, and resource allocations.
CAUTION Risk, asset, and control owners are not always the same person,
unctional area, department, or organization. It’s essential that you identiy
these particular owners early in the assessment process and maintain
careul coordination and communication between these and other relevant
stakeholders within the boundaries o your authority and assessment scope.
Dierent types o owners can result in politically sensitive issues that revolve
around resourcing, responsibility, accountability, and, sometimes, blame.
NOTE Threat actors are not only human entities but also events such as
natural disasters.
Scenario Objective
Risk Key
Scenario Objective
Risk
Key Asset
Scenario
Risk assessment and risk analysis are logical, analytical activities. Risk scenario devel-
opment, on the other hand, particularly top-down risk scenario development, is by far an
intuitive, creative activity. In pop culture, one would associate risk assessment and analy-
sis as left-brain activity, with top-down risk scenario development as right-brain activity.
The primary benefit of using top-down risk scenarios is the ability to communicate
risks more clearly to executive management. As the developers and promoters of corpo-
rate goals and objectives, senior executives should understand the various types of IT
risks that could threaten to delay or increase the effort or cost required to achieve them.
Risk managers should look to outside sources to identify realistic risk scenarios.
Trade journals and even mainstream media report on cybersecurity and other disrup-
tive IT-related events. Developing a more compelling narrative than “this scenario
happened to them, and it could also happen to us” can be difficult.
• Relevant to the business Risk scenarios should indicate specific relevance and
impact to the organization instead of being generic.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
40
• Kept current An organization’s use of technology (at both the macro and micro
levels) changes over time, meaning risks will vary in magnitude.
• Communicated to management with a purpose Often, risk scenarios are the
way that new risks are shared with management to proceed to risk treatment—
that is, to make decisions about what to do about new risks. This is often the
only time that management is informed of risks.
Impact
Likelihood
Very Low Low Medium High Very High
Very High Very Low Low Medium High Very High
High Very Low Low Medium High Very High
Medium Very Low Low Medium Medium High
Low Very Low Low Low Low Medium
Very Low Very Low Very Low Very Low Low Low
Figure 2-7 Likelihood and impact are evaluated together to produce a risk level.
Chapter 2: IT Risk Assessment
41
involves identifying the threats, vulnerabilities, assets, and existing controls. On the other
hand, evaluation focuses on determining the likelihood and impact if the vulnerabilities
are exploited by the threats, resulting in damage to the asset. Risk analysis puts every-
thing together, informs the organization about the risk involved, and helps determine
how effective existing controls are and the gaps between current and desired risk states.
Risk assessment processes sometimes include the risk identification piece of the pro-
cess but are often separate from this part, depending on the framework or standard you
are using. In general, this process includes threat source and event identification, vulner-
ability identification, control analysis, likelihood determination, impact analysis, risk
determination, control recommendations, and results documentation; these steps follow
the same pattern and path as we’re describing here for you in terms of identifying risk
and then evaluating it. We’ll describe some of these generic processes here in this chapter.
Types of Assessments
Several types of assessments can be performed to determine the presence of risks, threats,
or vulnerabilities in a system or process. Some of the techniques discussed here involve
different ways of thinking about risk, while others employ manual or automated tools to
examine information of some type.
Scope of an Assessment
Before an assessment can begin, its scope needs to be determined. By this, we mean that
the systems, processes, locations, teams, and/or time periods that are the focus of the
assessment need to be formally established and communicated.
The opposing forces that influence scope are the desire to make it large enough to
identify hard-to-find risks, but small enough to be efficient and complete in a reasonable
period. A balance must be reached that enables the assessment to succeed.
Method Examples
Walkthrough System administrators, acilities personnel, security personnel, asset managers,
common control providers, risk management personnel, and control owners
Documentation Architectural diagrams, printed system coniguration iles, printed audit logs,
review access control logs, risk and incident reports, and security procedures
Observation System coniguration, resource access controls, physical controls, security
processes and procedures as they are being perormed, and system unctions
Test Systems, networks, devices, controls, procedures, ports, protocols, services,
system security coniguration, and vulnerability scanning
Table 2-2 Summary o Data Collection Methods During a Risk Assessment, with Examples
Chapter 2: IT Risk Assessment
45
NOTE While you may not be directly tested on data collection methods, it
is a good idea to understand these methods, as in actual practice, you will
likely use them extensively.
Business Alignment
One of the most important considerations for selecting standards and frameworks
is business alignment. When selecting a standard, whether for risk assessment, risk
management, security controls, or integrated risk management systems, the risk
management leader must select a framework or standard that best aligns with the
organization’s needs. Selection considerations include the following:
• Industry sector
• Customer expectations and requirements
• Applicable regulations
• Risk appetite
• Organizational maturity
• Current and future technology in use
Security and risk professionals who strive for business alignment will achieve bet-
ter outcomes by building and selecting processes, frameworks, and standards that
are more likely to succeed.
OCTAVE Methodology
As part of a U.S. government contract with Carnegie Mellon University, the Operation-
ally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) methodology was
developed to assist organizations in identifying and assessing information security risk.
The methodology was initially developed by the Software Engineering Institute (SEI) at
Carnegie Mellon University in 1999 and has been updated over the years to its current
version, OCTAVE Allegro, in 2007. OCTAVE uses a concept called workshops, made up
of members of an organization, sometimes including outside facilitators with risk manage-
ment and assessment expertise. The methodology has prescribed procedures, including
worksheets and information catalogs to assist organizational members, drawn from all
functional areas of an organization, to frame and assess risk based on internal organiza-
tional context (infrastructure, governance, business environment, and so on). OCTAVE
has three iterations: the original OCTAVE, OCTAVE-S, and OCTAVE Allegro.
OCTAVE and OCTAVE-S The original OCTAVE methodology was released in 1999
and was designed for organizations with at least 300 employees. The assumptions for
using OCTAVE included that the organization operates and maintains multitiered infor-
mation infrastructure and performs vulnerability assessments. While OCTAVE is flex-
ible and allows an organization to tailor its use based on its own assessment needs, the
methodology is performed as three sequential phases. The first phase covers identifying
assets, threats, protection practices, vulnerabilities, and security requirements. You can
see where this maps to the practices we’ve described throughout this chapter as determin-
ing threats, identifying assets and their vulnerabilities, and evaluating existing controls.
In the second phase, the members of the workshop perform assessment activities and
evaluate the infrastructure. In the third phase, the workshop members develop response
strategies for the identified risks.
OCTAVE-S is fundamentally the same as the original OCTAVE, with a few minor
differences. First, OCTAVE-S was designed to assess smaller organizations, usually with
fewer than 100 people. Second, this iteration relies more on internal personnel with
extensive knowledge of the organization and its infrastructure and less on outside risk
experts or facilitators. The number of workshop members will also be considerably less;
the team may rely on fewer than ten key experts in the organization. OCTAVE-S pro-
cesses and procedure documents were also written to include more detailed security-
related information. This approach does not rely on outside security experts or risk facili-
tators to assist the team.
OCTAVE Allegro The OCTAVE Allegro methodology, introduced in 2007, expands
the previous two iterations but does not necessarily replace them. It includes a more busi-
ness-centered and operational risk approach to the assessment. It is also asset-centered in
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
48
its approach; it focuses on assets and their use or misuse, the environment they are used
in, and how threats and vulnerabilities specifically target and affect the assets. Allegro
can be used on a scaled basis; either individuals or workshop teams can use this method
without requiring a high degree of risk management or assessment knowledge and expe-
rience. OCTAVE Allegro is divided into four phases, which include eight steps. These
phases and steps are described next.
Phase 1: Establish Drivers Step 1: Establish risk measurement criteria. This step serves to
develop and establish the organization’s methodology and measurement criteria used to
assess risk. OCTAVE uses a qualitative assessment methodology and measurements but
can use quantitative methods for certain aspects of the overall process, such as determin-
ing likelihood and impact.
Phase 2: Profile Assets Step 2: Develop an information asset profile. In this step, the
organization develops an asset profile, which is a collection of information that describes
the asset, including its characteristics, priority, impact on the organization, and value.
This profile also contains security requirements the asset may have.
Step 3: Identify information asset containers. The information asset container describes
how data is stored, where it is processed, and how it is transported. Containers are usually
networks and systems, including those that the organization directly operates and those
that it outsources.
Phase 3: Identify Threats Step 4: Identify areas of concern. In this step, potential risk
factors are identified and are used to develop threat scenarios.
Step 5: Identify threat scenarios. In the context of OCTAVE, threat scenarios describe
categories of actors and the relevant threats in each category. The scenarios are typically
identified by using a threat tree, which simply maps actors and scenarios.
Phase 4: Identify and Mitigate Risks
Step 6: Identify risks. In this step, consequences such as impact and likelihood are identi-
fied and measured, which inform risk.
Step 7: Analyze risks. Once impact and likelihood have been identified and measured,
risks are analyzed. During this step, risk scores are developed. These come from devel-
oping impact and likelihood values, emphasizing impact in particular, since this is an
asset-driven assessment.
Step 8: Select mitigation approach. In this step, risk response strategies are developed,
analyzed, and recommended.
ISO/IEC Standards
ISO stands for the International Organization for Standardization, and IEC stands for
the International Electrotechnical Commission. Together, these two organizations are
responsible for a plethora of information technology and manufacturing standards used
worldwide, including several that apply to information security and risk management.
Chapter 2: IT Risk Assessment
49
ISO/IEC 27005:2018 Standards in the ISO/IEC 27000 series are all about information
security, and the 27005:2018 standard (“Information technology – Security techniques
–Information security risk management”) supports the common ideas promulgated in
both ISO/IEC 27001 and 27002. The standard defines the entire risk management
life cycle, including detailed risk assessment principles. The standard doesn’t offer spe-
cific risk management or assessment methodologies. However, it does serve to describe
a formalized, structured risk management process, such as developing context, scope,
methods, and so on. It also describes the two primary types of assessment methodolo-
gies: qualitative and quantitative. Additionally, it describes processes used to develop risk
response strategies, communication with stakeholders, and continuous risk monitoring.
ISO/IEC 31010:2019 ISO/IEC 31010:2019 is where the meat of information regard-
ing risk assessments is located for the ISO/IEC standards. This document, “Risk
Management – Risk Assessment Techniques,” articulates and extends the risk man-
agement principles of ISO/IEC 31000:2018 and provides a concrete overview of the
risk assessment process. This standard describes risk assessment as the combination
of risk identification, analysis, and evaluation, with a precursor step of establishing the
risk context within the organization. The standard also addresses communication and
consultation with various stakeholders and management, risk treatment (response), and
monitoring risk.
EXAM TIP O the ISO/IEC standards, ISO/IEC 31010:2019 is essential or the
exam because it covers risk assessments in detail.
Risk Ranking
When risks have been identified in a risk assessment, it generally makes sense to display
these risks in an ordered list. Most often, the highest risks will appear at the top of a list,
indicating the nature of the sequencing. For instance, risks with the most significant
impact may appear first, or perhaps a composite risk score will be calculated for each risk
(based on probability, impact, and asset value) and risk items sorted by this overall risk
calculation. Risk ranking, then, helps tell the story of the most critical risks that have
been identified.
Risk ranking can be portrayed visually, which helps the reader better understand the
universe of risks that have been identified. Figure 2-8 shows a risk map that visually indi-
cates the nature and severity of risks.
Risk Ownership
To correctly manage and act on unacceptable risks, each risk is assigned a risk owner.
Generally, the risk owner is the department head or business unit leader associated with
the business process that is the focus of a risk. It is usually not appropriate to assign risk
ownership to IT, as IT is the steward of information and information systems as well as
provides services as directed by department heads and business unit leaders.
Similarly, the organization’s cybersecurity leader (often a CISO) is not the assignee of
risks. Instead, the cybersecurity leader facilitates risk conversations and decisions with
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
52
Impact
Mobile device security
Endpoint security
Stolen laptops
Probability
department heads and business unit leaders, particularly those whose business processes
are associated with individual risks.
In risk management, there are usually several different “owners” associated with each
risk, including the following:
• Risk owner This is usually the department head or business unit leader
associated with the business process where the risk resides. Even if a risk is
related to an IT system, IT is generally not the risk owner. Rarely, if ever, is
the cybersecurity leader assigned as a risk owner.
• Risk treatment decision-maker This person makes a business decision
regarding the disposition (treatment) of an individual risk. Risk treatment is
discussed fully in Chapter 3.
• Risk remediation owner This is the person responsible for any remediation
that has been selected as a part of risk treatment.
An organization’s risk management program charter (or other formal document)
should define the roles and responsibilities of each type of risk owner.
These and other facets of risk ownership are generally indicated in the risk register,
which is discussed next.
Risk Register
A risk register is a business record containing information about business risks and their
origin, potential impact, affected assets, probability of occurrence, and treatment. A risk
register is the central business record in an organization’s risk management program (the
set of activities used to identify and treat risks).
Chapter 2: IT Risk Assessment
53
Together with other records, the risk register serves as the focal point of information
that an organization is attempting to manage risk. Other records include information
about risk treatment decisions and approvals, tracking projects linked to risks, risk assess-
ments, and other activities that contribute to the risk register.
When new risks are identified, they are added to the risk register to be later analyzed,
discussed, and decisions will be made about their disposition.
A risk register can be stored in a spreadsheet, database, or within an integrated risk
management (IRM) tool—formerly known as a governance, risk, and compliance (GRC)
tool—used to manage risk and other activities in the security program. Table 2-4 shows
a typical risk register entry.
Item Description
Entry number A unique numeric value identiying the entry. This can be in the
orm o a date, such as 20210127a.
Status Current status o the entry:
• Open
• Assigned
• Closed
Date entered The date the risk register entry was created.
Entered by The person who created the risk register entry.
Source The activity or event that compelled someone to create this
entry. Sources include the ollowing:
• Risk assessment
• Vulnerability assessment
• Security incident
• Threat intelligence
• External party
Incident number Reerence to an incident record, i applicable.
Title Short title describing the risk entry.
Description Description o the risk.
Threat description Description o the potential threat activity.
Threat actor Description o the type o threat actor:
• Worker
• Former worker
• Supplier, vendor, or partner
• Cybercriminal
• Nation-state
Vulnerability description Description o one or more vulnerabilities that increases the
probability or impact o threat realization.
Third-party organization Name o the third-party organization where the risk is present,
i applicable.
Table 2-4 Sample Risk Register Data Structure
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
54
Item Description
Third-party classiication Classiication level o the third-party organization, i applicable.
Business impact Business language description o the impact o threat realization.
Technical impact Technical language description o the impact o threat
realization, i applicable.
Asset The speciic asset, asset group, or asset class aected by the risk.
Asset owner The owner o the aected asset.
Risk owner The owner o the risk.
Control group A reerence to the aected control group, i applicable.
Control A reerence to the aected control, i applicable.
Process A reerence to the aected process, i applicable.
Untreated probability o An estimate o the probability o occurrence o the threat event
occurrence associated with the risk. Usually expressed as high, medium, or
low or as a number on a scale such as 1 to 5.
Untreated impact o An estimate o the impact o occurrence o the threat event
occurrence associated with the risk. Usually expressed as high, medium, or
low or as a number on a scale such as 1 to 5.
Untreated risk score An overall risk score that is generally a product o probability,
impact, and asset value.
Treated probability o An estimate o the probability o occurrence o the threat event
occurrence associated with the risk ater risk treatment. Usually expressed
as high, medium, or low or as a number on a scale such as 1 to 5.
Treated impact o An estimate o the impact o occurrence o the threat event
occurrence associated with the risk ater risk treatment. Usually expressed
as high, medium, or low or as a number on a scale such as 1 to 5.
Treated risk score An overall risk score that is generally a product o probability,
impact, and asset value, ater risk treatment.
Estimated cost o risk An estimated cost o risk treatment. This is expressed in dollars
treatment or the local currency.
Estimated level o eort o An estimated level o eort o risk treatment. This can be
risk treatment expressed as high, medium, or low, as a number on a scale such
as 1 to 5, or as an estimate o range o man-hours, as ollows:
• Less than 1 hour
• Less than 10 hours
• Less than 100 hours
• Less than 1,000 hours
• Less than 10,000 hours
Risk treatment The chosen method o risk treatment:
• Accept
• Mitigate
• Transer
• Avoid
Table 2-4 Sample Risk Register Data Structure (continued)
Chapter 2: IT Risk Assessment
55
Item Description
Risk treatment approver The person or body that approved the risk treatment method.
Risk treatment approval date The date that the risk treatment method was approved.
Risk treatment owner The person responsible or carrying out risk treatment.
Risk treatment description A description o the risk treatment.
Risk treatment planned The date when risk treatment is expected to be completed.
completion
Actual cost o risk treatment The actual cost o risk treatment, which would be known when
risk treatment has been completed. This is expressed in dollars
or the local currency.
Actual level o eort o risk The actual level o eort o risk treatment, which would be
treatment known when risk treatment has been completed. This is
expressed in man-hours.
Risk treatment closure date Date when risk treatment is completed.
Table 2-4 Sample Risk Register Data Structure (continued)
• Internal and external risk assessment A prime source for risk register entries,
a risk assessment identifies risks in the organization’s staff (for example, excessive
workload, competency, and training issues), business processes, and technology.
• Vulnerability assessment The high-level results of a vulnerability assessment
(or penetration test, code review, social engineering assessment, and so on) may
indicate overarching problems in staff, business processes, or technology at a
strategic level.
• Internal audit Internal audit and other internal control self-assessments can
identify problems in staff, business processes, or technology.
• External audits Audits performed by external parties can identify issues in
business processes and information technology.
• Security incident The occurrence of a security incident may reveal the
presence of one or more risks that require attention. Note that a security incident
in another organization may highlight risks in one’s own organization.
• Threat intelligence Formal and informal subscriptions or data feeds on threat
intelligence may reveal risks that warrant attention.
• Industry development Changes in the organization’s industry sector, such as
new business activities and techniques, may reveal or magnify risks that require
attention.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
56
• New laws and regulations The passage of new laws, regulations, applicable
standards, and private legal obligations may reveal the presence of risks that require
attention. Also, note that compliance risk (that is, the possibility that regulators or
others may impose fines or sanctions on the organization) may well be included in
one or more risk register entries if the organization has identified such risks.
• Consultants A visit by or conversation with an expert security consultant may
reveal previously unknown risks. The consultant, who may be an auditor or assessor
or may be working in the organization on a project, may or may not expect to find
risks that the organization’s security manager would want to be aware of.
• Asset identification The asset(s) involved in a particular risk are identified. This
could be an IT or IoT device, a business application, an entire IT environment (or
specific parts therein), a database, a building, a procedure, or a business process.
• Vulnerability Various weaknesses related to the asset are identified that could
be exploited by a threat event.
• Threat Various threat scenarios are considered, particularly those that are
reasonably applicable to identified vulnerabilities.
• Asset value The value of the asset is identified and considered. Various iterations
of risk analysis may consider different types of asset value, including replacement
cost, repair cost, lost revenue, and more. For various risk scenarios, it may be
necessary to use and identify different types of asset value. For instance, one risk
scenario may use replacement value while another might use repair cost.
• Business context Because risk analysis is often an abstract mental exercise, it is
necessary to define the business context for the risk. For example, risk analysis is
performed on a database server; the business context is the organization’s financial
accounting system that supports all of the organization’s accounting department’s
business processes. Without identifying business context, a risk remains abstract,
and it is more difficult to apply risk treatment later on.
Actual
Resources Estimated Completion Current
Risk Description Likelihood Impact Risk Owner Required Completion Date Date Status Comments
Data thet rom a Medium High Engineering $10,000 or January 2023 Assessing Purchase and
malicious user (via department new DLP dierent implementation
risk assessment in system DLP vendors by December 2022
April 2021)
Loss o primary High High Accounting $15,000 October 2021 September 2021 Vendor Final purchase
accounting department or backup selected and installation in
server data system August 2022
Table 2-5 Sample Entries in a Risk Register
CAUTION Make sure you consider controls and their eectiveness when
analyzing risk since controls can help decrease likelihood or reduce impact,
thereby reducing the assessed risk or an asset and the organization.
Evaluation involves the measurement of these two primary factors: likelihood and
impact. We’ve already discussed how there can be different ways to measure these fac-
tors based on subjectivity or concrete values. This is where the discussion on qualitative
and quantitative techniques comes into play. We’ll go into depth on those assessment
techniques next.
EXAM TIP Remember that risk assessments are composed o the steps o
risk identiication, evaluation, and analysis. Identiication produces threat–
vulnerability pairs, asset inventories, and risk scenarios. Evaluation covers
likelihood and impact calculations, resulting in risk values. Analysis looks at
the overall application o these actors, as well as control analysis, to produce
a comprehensive picture o risk.
NOTE These ormulas are based on standard basic risk analysis concepts
taught in inormation security certiication programs, such as CompTIA’s
Security+ and (ISC)2’s CISSP program.
Again, the previous scenario is a simplistic (but not too unrealistic) example. Other
factors could come into play that are not considered in the previous simple analysis.
For example, suppose the business is losing $1,000 per day in revenue for every day
this server is out of commission, which the previous calculations do not consider. This
consideration is not only related to the SLE value (since it increases the SLE over time)
but also influences your RTO and RPO values. You should also realize that this scenario
considers only one of the servers; a better risk assessment should include the possibility
of all the assets being partially or completely lost.
Additionally, it’s possible that a total loss of a server may not occur; let’s say it’s only a
partial loss (say, 40 percent, or an EF of 0.4), which would reduce the SLE for that single
asset ($10,000 [AV] × 0.4 [EF] = $4,000). So, you must take all of this into account
when performing a quantitative risk analysis. There are so many other factors that we
haven’t mentioned here that could figure into your SLE values (asset depreciation, lost
labor hours to repair or replace the server, and so on). However, you can see the basics
based on this simple example.
The final piece of this puzzle is how much it would cost the organization to reduce
this risk. Let’s examine all of the factors that the organization could influence. First, it
could not affect the weather, so the threat agent and threat can’t be reduced or eliminated.
However, the organization could address the vulnerability (the server building with its
inadequate protection against bad weather, in this case), reducing it somewhat by relocat-
ing the server farm or even moving its applications and data to the cloud, for example.
The organization could also reduce the likelihood for that particular threat-vulnerability
pairing if it removed or changed the nature of the vulnerability itself, as described earlier.
The organization could also reduce the impact of this specific event in several ways.
It could create a real-time failover cluster for the servers in another location that would
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
62
instantly be available if said servers got struck by lightning, or it could at least have a hot
spare server and a recent backup, if nothing else. The organization can affect the risk
factors, but there is a cost for doing this. What is essential in developing risk responses
is that the organization must balance the cost of mitigations (for example, acquiring
another facility, moving to the cloud, using server clusters, or at least having hot spares
and better backups) with how much it loses in terms of SLE and ALE and the added
impact of lost revenue per day, as in this example. The bottom line is that you must find
a solution that isn’t more expensive or impacts the organization to a degree worse than
the risk event itself. Risk responses are covered in more detail in Chapter 3.
Qualitative A qualitative risk analysis, on the other hand, involves using subjective
scales. These scales could be numeric (a scale from 1 to 10) or have subjective labels
(High, Medium, and Low, for instance). Qualitative risk analysis can come from his-
torical trend analysis, experience, expert opinion, existing internal and external environ-
mental factors, governance, and other inputs that are not always necessarily quantifiable
but exist and are important nonetheless. Qualitative risk analysis is appropriate when
you must evaluate risk based on factors that can be hard to quantify, such as those not
typically measured with concrete, repeatable values. For example, what numerical value
could you assign to a potential impact of the loss of consumer confidence or damage
to reputation? You may attempt to frame it in terms of lost revenue (an educated guess
at best) or loss of business. For example, you could also survey a sample population to
determine how many people would or would not do business with the organization after
a data breach. However, even that would be subjective and offer only a small statistical
insight into a hard-to-define measurement.
That’s not to say you couldn’t assign numerical values to different risk factors, however.
Instead of values such as Low, Medium, and High, you might assign numerical values
that roughly correspond to those levels. For example, you might use a type of Likert
scale, which may have values such as 1 (Very Low), 2 (Low), 3 (Medium), 4 (High),
and 5 (Very High). This might characterize the subjective level of impact or likelihood
the organization wants to assign to a particular risk event. In assigning these subjective
values, you must also decide how they relate to each other, yielding an overall risk calcu-
lation. In other words, given likelihood values of 1 (Very Low), 2 (Low), 3 (Medium), 4
(High), and 5 (Very High), and identical values for impact, what would the overall risk
level be when these two dimensions of risk are viewed together? How do their values
affect each other? NIST Special Publication 800-30 offers an excellent example of how
risk is calculated using qualitative analysis.
In Figure 2-9, taken from NIST SP 800-30, you can see how the relationships of
likelihood and impact affect different risk levels. The values of each are correlated, and
a qualitative risk determination results. For example, according to this figure, a moderate
Chapter 2: IT Risk Assessment
63
Likelihood
(Threat Event Level of Impact
Occurs
and Results in
Adverse Impact) Very Low Low Moderate High Very High
level of likelihood combined with a very high level of impact results in a level of risk
determined as high. Determining what constitutes a likelihood of moderate and what
is required for an impact level of very high is subjective. However, it should be defined
within the organization for consistency and standardization.
Combining Quantitative and Qualitative Techniques If you think that a qualitative
or quantitative assessment alone may not be enough to adequately capture the different
elements of risk and develop an overall risk determination, you’re right. While there are
instances where each of these techniques can be used alone, they are used together to
varying degrees in most situations. Each technique is good at producing a valuable piece
of the puzzle, but sometimes you need both a quantitative perspective and a qualitative
perspective on risk. For example, in the scenario we described earlier for quantitative risk,
say you have numerical values for AV, EF, SLE, and ALE. These values account primarily
for impact. However, suppose you don’t have enough solid information for a calculation
of likelihood. You might have to give it a “best guess” that comes from a reasonably well-
thought-out analysis, using anecdotal data or another type of data that can’t necessarily
be quantified but is a reasonably accurate predictor. You may have to assign likelihood
values that are semiquantitative or the subjective High, Medium, and Low values. There
might also be other subjective factors contributing to these values, so you would not have
a purely quantitative assessment. Suppose you added “customer confidence” or “reputa-
tion” into the discussion on impact or loss to the company, for instance. Those would
almost have to be qualitative values, so the assessment couldn’t always be expressed in
exact numerical terms that are easily repeatable or defendable.
In practice, most risk assessments are usually qualitative with some quantitative ele-
ments, or vice versa. There are usually few purely quantitative or entirely qualitative
assessments performed. You should understand the elements and characteristics of both,
however, for the exam and your profession.
Event
Firewall Configuration
Appliance Error
No Rule Due to in Rule
Error
Unknown Nature
of Traffic
Malformed
Traffic
No Rule Due to
Firewall
Administrator Hardware
Software
Error or Lack Issue
Issue
of Training
Maximum
Break-in Low
No Loss or
Frequency
Damage
No Loss
Medium
No or
Frequency
Damage
Factor Analysis of Information Risk The Factor Analysis of Information Risk (FAIR)
is a semiquantitative methodology used to determine the probable loss event frequency
and magnitude for individual risks.
The FAIR methodology consists of four stages:
• Identify scenario components This step identifies the asset at risk, as well as
the threat community being analyzed.
• Evaluate loss event frequency Activities in this stage include an estimation
of threat event frequency, threat capability, protective control strength,
vulnerabilities, and the frequency of loss events.
• Evaluate probable loss magnitude This stage is used to develop worst-case
and most likely loss magnitude.
• Derive and articulate risk Derived from the values established in earlier steps,
the level of risk is calculated and portrayed.
The FAIR methodology is presented in the book Measuring and Managing Informa-
tion Risk: A FAIR Approach, by Jack Freund and Jack Jones. An organization known
as the FAIR Institute offers membership, training, and events and is found at www
.fairinstitute.org.
Bow-Tie Analysis A bow-tie analysis uses diagrams to analyze and explain relation-
ships between various risk elements, from causes (threats) to events and then to impacts
(consequences). It is similar to both the fault-tree analysis and the event-tree analysis. It
looks at the various causes of a risk event (fault tree) and analyzes the consequences of the
event (event tree). The difference, however, is that the bow-tie analysis looks at the inter-
vening characteristics of the events and causes, such as the path by which the cause leads
to the event and then the consequences. Figure 2-12 illustrates a bow-tie diagram. In this
figure, the adverse event is shown as the center of the bow tie, with potential causes on
the left and possible consequences on the right.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
66
Potential Cause 1 Potential Consequence 1
Other Methods As mentioned, there are too numerous other methods to perform
the different types of assessments to discuss them all here. Some of these methods focus
on data collection, while others emphasize different group analysis techniques. All are,
again, some variation of either the qualitative or quantitative method and may require
looking at specific aspects of data to determine various elements of risk. Other examples
of these techniques include the Delphi method, which centers on expert opinion from
questionnaires; the Bayesian analysis method, which uses data distribution and statistical
inference to determine risk probability values, checklists, scenario analysis, and business
impact analysis (described later in this chapter); root-cause analysis (discussed earlier in
this chapter); and various collaborative techniques, such as brainstorming. You won’t be
expected to know all these methods for the exam, but you should be familiar with the
concepts of qualitative and quantitative analysis and some of the techniques that use
each. For further knowledge on various assessment and analysis techniques, consult with
ISO/IEC 31010:2019.
EXAM TIP You will not have to know any particular risk analysis method
in detail or the exam, but you should understand how the qualitative,
quantitative, and semiquantitative methods work.
TIP The use o an intake orm is not the only accepted approach when
gathering inormation about critical processes and systems. It’s also
acceptable to conduct one-on-one or group interviews with key users
and IT personnel to identiy critical business processes and systems. We
recommend using an intake orm (whether paper-based or electronic),
even i the interviewer uses it hersel as a ramework or note-taking.
Figure 2-13 BIA sample intake orm or gathering data about key processes
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
68
Statements of Impact
When processes and systems are being inventoried and cataloged, it is also vitally impor-
tant to obtain one or more statements of impact for each process and system. A statement
of impact is a qualitative or quantitative description of the impact on the business if the
process or system were incapacitated for a time.
For IT systems, you might capture the number of users and the names of departments
or functions affected by the unavailability of a specific IT system. Include the geography
of affected users and functions if that is appropriate. Here are some sample statements of
impact for IT systems:
• Three thousand users in France and Italy will be unable to access customer records,
resulting in degraded customer service.
• All users in North America will be unable to read or send e-mail, resulting in
productivity slowdowns and delays in some business processes.
Statements of impact for business processes might cite the business functions that
would be affected. Here are some sample statements of impact:
• Accounts payable and accounts receivable functions will be unable to process, impacting
the availability of services and supplies and reducing revenue.
• The legal department will be unable to access contracts and addendums, resulting in
lost or delayed revenue.
Statements of impact for revenue-generating and revenue-supporting business func-
tions could quantify financial impact per unit of time (be sure to use the same units of
time for all functions to be easily compared with one another). Here are some examples:
• Inability to place orders for materials will cost at the rate of $12,000 per hour.
• Delays in payments will cost $45,000 per day in interest charges and late fees.
As statements of impact are gathered, it might make sense to create several columns
in the main worksheet so that like units (names of functions, numbers of users, financial
figures) can be sorted and ranked later.
Chapter 2: IT Risk Assessment
69
When the BIA is completed, you’ll have the following information about each process
and system:
Criticality Analysis
When all of the BIA information has been collected and charted, the criticality analysis
(CA) can be performed.
Criticality analysis is a study of each system and process, a consideration of the impact
on the organization if it is incapacitated, the likelihood of incapacitation, and the esti-
mated cost of mitigating the risk or impact of incapacitation. In other words, it’s a some-
what special type of risk analysis that focuses on key processes and systems.
The criticality analysis needs to include, or reference, a threat analysis. A threat analysis
is a risk analysis that identifies every threat that has a reasonable probability of occur-
rence, plus one or more mitigating controls or compensating controls, and new prob-
abilities of occurrence with those mitigating/compensating controls in place. To give you
an idea of what this looks like, refer to Table 2-6, which provides a lightweight example
of what we’re talking about.
• Multiple threats are listed for a single asset. In the preceding example, we
mentioned just eight threats. For all the threats but one, we listed only a
single mitigating control. For the extended power outage threat, we listed
two mitigating controls.
• The cost of downtime wasn’t listed. For systems or processes where you have a
cost per unit of time for downtime, you’ll need to include it here, along with
some calculations to show the payback for each control.
• Some mitigating controls can benefit more than one system. That may not have
been obvious in this example. However, in the case of an uninterruptible power
supply (UPS) and an electric generator, many systems can benefit, so the cost for
these mitigating controls can be allocated across many systems, thereby lowering
the cost for each system. Another example is a high-availability storage area
network (SAN) located in two different geographic areas; although it’s initially
expensive, many applications can use the SAN for storage, and all will benefit
from replication to the counterpart storage system.
• Threat probabilities are arbitrary. In Table 2-6, the probabilities are for a single
occurrence in an entire year (for example, 5 percent means the threat will be
realized once every 20 years).
• The length of the outage was not included. You may need to include this also,
particularly if you are quantifying downtime per hour or another unit of time.
It is probably becoming evident that a threat analysis and the corresponding criticality
analysis can get complicated. The rule here should be as follows: the complexity of the
threat and criticality analyses should be proportional to the value of the assets (or rev-
enue, or both). For example, in a company where application downtime is measured in
thousands of dollars per minute, it’s probably worth taking a few weeks or even months
to work out all of the likely scenarios and a variety of mitigating controls and then work
out which ones are the most cost-effective. On the other hand, for a system or business
process where the impact of an outage is far less costly, a good deal less time might be
spent on the supporting threat and criticality analysis.
Inherent Risk
No personal or business activity is entirely free of risk, and some activities are inherently
more risky than others. The concept of inherent risk expresses the level of risk associated
with a process or activity before applying any protections or safeguards. In the vernacular,
some activities are just riskier than others.
Take, for example, two personal activities: gardening and hang gliding. We would
state that the inherent risk associated with hang gliding is significantly higher than that
of gardening. With hang gliding, any number of realistic scenarios can result in the
death of the hang glider. At the same time, gardening is relatively safe, and death by
gardening is highly unlikely. In both gardening and hang gliding, the probability of risk
realization is relatively low, although the impact of risk realization is decidedly higher
for hang gliding.
One approach to risk analysis is assigning inherent risk to a process or system, and
then calculating changes to risk after protective controls and safeguards are applied. This
helps a risk analyst understand the changes in risk when individual controls and safe-
guards are applied, and it better informs management of the full nature of risk for a given
part of the organization.
Residual Risk
The risk management and risk treatment processes tend to reduce risk, but they rarely
eliminate all risk. Instead, risk mitigation and risk transfer reduce risk to a lower level.
This “leftover” risk is known as residual risk.
Residual risk is best explained with a real-world example. An organization’s workforce
is equipped with laptop computers running Windows or macOS, neither of which uti-
lizes whole-disk encryption. Risk analysis suggests that the risks associated with the theft
or disappearance of an unencrypted laptop computer are quite high, with potential for
a significant security or privacy incident, depending on whose laptop computer is lost
or stolen.
In this scenario, the organization decides to implement whole-disk encryption on all
of its laptop computers. Note that this measure does nothing to change the probability of
laptop computers being lost or stolen. However, this measure changes the impact signifi-
cantly. While, with whole-disk encryption, the organization need no longer worry about
the potential data compromise, the stolen laptop will still need to be replaced. The residual
risk, in this example, is the financial risk associated with the funds required to purchase a
new laptop computer, plus any labor needed to make it ready for employee use.
To continue this example further, this residual risk is one in which the residual risk
may still be a risk that warrants further analysis and treatment. Analysis of the risks
associated with the need to replace a lost or stolen laptop computer could result in a
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
72
Original Risk
1st risk treatment 2nd risk treatment 3rd risk treatment Accepted risk
recommendation of the purchase of security cables that are issued to each employee,
together with directives that laptop computers are to be locked to a piece of furniture
(or locked in a safe) when not in the direct control of the employee. This measure
reduces the probability of theft or loss, but not the impact: if the laptop computer is
stolen, it must still be replaced, but theft is less likely to occur since, at least some of the
time, employees will use those cable locks, reducing the number of opportunities for
someone to steal them.
Larger and more complex risk scenarios may require multiple rounds of risk analysis
and risk treatment. However, an organization will eventually reach the point where the
residual risk is low enough that business leaders and department heads will accept the
residual risk.
Often, risk analysis, risk treatment, and residual risk are more complicated than this.
A risk assessment performed on a business process or information system is likely to iden-
tify multiple risks, which should be considered in whole as well as individually. It may
be easier to understand all the risks together to compare various types of risks and risk
treatment options when considered together. Sometimes, a single risk treatment measure
may mitigate more than one of the identified risks. Figure 2-14 visually depicts multiple
rounds of risk analysis and risk treatment until the final remaining risk is accepted.
Let’s go back to our stolen laptop example for a moment. Imagine that multiple risks
are identified in a stolen laptop scenario, all having to do with the compromise of dif-
ferent types of information: personally identifiable information (PII) such as human
resource information, non-public financial information, intellectual property, and trade
secrets. Whole-disk encryption will reduce the impact of all four of these scenarios to
near zero.
Chapter Review
IT risk identification consists of activities performed to identify various types of risks
associated with an organization’s use of information technology, including strategic,
operational, cybersecurity, privacy, supply chain, and compliance risks.
The types of activities where risks may be identified include risk assessments, audits,
incidents, penetration tests, news and social media, advisories, threat modeling, word of
mouth, whistleblowers, and passive observation.
Threat modeling is a risk identification technique that involves examining every pos-
sible threat agent, action or event, attack vector, and vulnerability for a given system,
asset, or process, and then modeling or simulating how it could progress and the damage
that could occur.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
74
Vulnerability and control deficiency analysis are important parts of risk analysis,
focusing on weaknesses in a system or process that could result in a potentially serious
incident if exploited by a threat actor.
Root cause analysis, or RCA, is a method of problem-solving that seeks to identify the
root cause of an event, situation, or problem.
A risk scenario is a potential real-world, business-impacting event that consists of a
threat, threat actor, vulnerability, and asset.
Risk analysis is a detailed examination of a risk to better understand basic factors,
including the likelihood and impact of risk occurrence, and the development of a mea-
sure that might be enacted to reduce likelihood or impact.
Several types of assessments can be used to identify risks, including a gap assessment,
threat modeling, vulnerability assessment, maturity assessment, penetration test, data
discovery, code review, architecture review, design review, code scan, audit, and risk
assessment.
Several techniques are used in a risk assessment to identify risks, including interviews,
documentation review, observation, and system testing.
Risk ranking is the process of sequencing risks, generally with the greatest risks appear-
ing first.
A risk owner is the owner of a business process or system that focuses on an identi-
fied risk.
A risk register is a business record containing information about business risks and
their origin, potential impact, affected assets, probability of occurrence, and treatment.
A risk analysis is the detailed analysis of a risk that has been identified in an activity,
such as a risk assessment.
Quantitative risk analysis uses concrete (nonsubjective) numerical values and statistical
analysis to calculate the likelihood and impact of risk. On the other hand, a qualitative
risk analysis involves using subjective scales, such as a numeric scale from 1 to 10, or sub-
jective values, such as High, Medium, and Low.
There are several risk analysis techniques, including fault- and event-tree analysis, fac-
tor analysis of information risk (FAIR), and bow-tie analysis.
A business impact analysis (BIA) is used to identify an organization’s business processes,
the interdependencies between processes, the resources required for process operation,
and the impact on the organization if any business process is incapacitated for a time for
any reason.
A statement of impact is a qualitative or quantitative description of the impact on the
business if the process or system were incapacitated for a time.
A criticality analysis is a study of each system and process, a consideration of the impact
on the organization if it is incapacitated, the likelihood of incapacitation, and the esti-
mated cost of mitigating the risk or impact of incapacitation.
Inherent risk is the level of risk associated with a specific activity or function before
applying any protective controls or safeguards.
Residual risk is the risk that remains after any risk transfer or risk mitigation that may
have been performed.
The materiality of a risk may help to highlight its importance to management.
Chapter 2: IT Risk Assessment
75
Quick Review
• CRISC candidates and risk managers must be familiar with the vocabulary of
terms related to risk assessment and risk analysis, including asset, vulnerability,
threat, impact, attack, and risk.
• CRISC and IT Risk Management consider cybersecurity risks and operational
risk, workforce risk, privacy risk, and compliance risk.
• Appendixes D and E in NIST Special Publication 800-30, “Guide for
Conducting Risk Assessments,” offer a comprehensive list of threat agents
and their related threats.
• Risk, asset, and control owners are not always the same person, functional area,
department, or organization.
• Risk analysis is a detailed, focused examination of a risk performed as a part of an
overall risk assessment.
• The scope of an assessment determines the boundaries of inquiry and analysis of a
process or system.
• Well-known risk assessment standards include NIST SP 800-30 (Guide for
Conducting Risk Assessments), OCTAVE, ISO/IEC 27005 (Information
technology – Security techniques – Information security risk management),
ISO/IEC 31010 (Risk Management – Risk Assessment Techniques), and
ISACA’s Risk IT Framework.
Questions
1. Awareness of new risks can be obtained through all of the following activities
except which one?
A. Security advisories
B. Privacy incidents
C. Budget reviews
D. Audits
2. In a discussion about the security of endpoint devices, one security professional
described that some endpoints’ antivirus programs are not functioning correctly.
What is this a description of?
A. Threat
B. Vulnerability
C. Risk
D. Threat model
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
76
3. A security specialist is examining a particular preventive control and has
determined that the control is not operating as designed. What term describes
the state of the control?
A. Undocumented
B. Inefficient
C. Fail-open
D. Ineffective
4. A risk analyst reviewing a business process has identified a control gap. What is
the meaning of this conclusion?
A. A control exists but is undocumented.
B. A control does not exist.
C. An earlier risk assessment determined that a control is not necessary.
D. A new risk has been discovered.
5. Several security professionals are discussing a recent security incident. The
discussion is proceeding through the phases of the incident and the conditions
preceding the incident in order to understand why those conditions occurred.
What are the security professionals performing?
A. Root cause analysis
B. Incident debrief
C. Incident forensics
D. Reverse engineering
6. What is the primary purpose for risk scenario development?
A. To identify the highest rated risks
B. To quantify the highest rated risks
C. To prepare an executive briefing
D. To associate risks with business objectives
7. A risk manager wants to better understand the factors in particular business processes
that could lead to an incident. What activity should the risk manager perform?
A. Risk analysis
B. Threat modeling
C. Vulnerability analysis
D. Root cause analysis
Chapter 2: IT Risk Assessment
77
8. Hackers, cybercriminal organizations, disgruntled employees, and hurricanes are
known as what?
A. Threat agents
B. Threat actors
C. Threats
D. Attacks
9. An auditor has contacted an organization’s data center security manager and has
requested a walkthrough. What is the auditor asking for?
A. A meeting to discuss one or more security controls
B. A tour of the data center
C. An explanation for a recent incident
D. Interpretation of a security report
10. What does NIST Special Publication 800-30 describe?
A. A risk management methodology
B. A risk assessment methodology
C. Security and privacy controls
D. Audit procedures for security and privacy controls
11. A security analyst is finishing up a risk assessment and is about to identify the
risk owner for each risk in the report. In general, who should be the risk owner
for each risk?
A. The board of directors
B. The CISO or CIRO
C. The CIO
D. The related business process owner
12. Which of the following is the best description of a risk register?
A. A list of threat agents and threat actors
B. A list of identified risks
C. The root cause analysis (RCA) for a security incident
D. A list of likely risk scenarios
13. A risk manager is performing risk analysis on a specific risk to better understand
the risk and to identify potential remedies. Various aspects of the initial risk and
its potential remedies are scored on a scale of 1–10. What type of risk analysis is
being performed?
A. Qualitative risk analysis
B. Quantitative risk analysis
C. Semiquantitative risk analysis
D. Factor Analysis of Information Risk (FAIR)
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
78
14. An organization has performed a risk analysis of a complex scenario. Two different
mitigation strategies have been approved that will reduce the original risk to a
much lower level. The risk that remains after these mitigation strategies have been
completed is known as what?
A. Inherent risk
B. Leftover risk
C. Residual risk
D. Accepted risk
15. Which of the following is the best method for managing residual risk?
A. Subject it to risk analysis and risk treatment.
B. Retain it on the risk register and consider it as accepted.
C. Retain it on the risk register and label it as closed.
D. Add it to the cumulative total of risk tolerance.
Answers
1. C. Awareness of risks can be obtained through numerous sources and activities,
such as audits, incidents, advisories, threat modeling, assessments, and news
articles. Budget reviews are an unlikely source of information about new risks.
2. B. The matter of a failure of a protective control such as antivirus or a firewall
is known as a vulnerability. The basic terms of risk, such as vulnerability, threat,
control, and risk, are sometimes misused.
3. D. A control that is not operating as designed is considered ineffective. To
reach this conclusion, an analyst or auditor needs to understand the objective
of the control and determine whether the control as it is presently operating
meets that objective.
4. B. A control gap is a situation where a control does not exist, but should exist.
A control gap can also describe a situation where a control is not properly
designed or implemented.
5. A. A root cause analysis (RCA) attempts to get to the ultimate explanation of an
incident, by proceeding backward through time to ask “why” specific conditions
or events occurred.
6. D. Risk scenario development is performed to associate specific risks with specific
business objectives or business activities. Risk scenario development makes
risks more tangible by describing their potential impact on the organization in
business terms.
7. C. A vulnerability analysis is a detailed examination of a process or system to
discover vulnerabilities that a credible threat agent could exploit.
8. A. Threat agents are the entities, human or not, that may perform actions that
could cause harm to an organization, its processes, or its systems.
Chapter 2: IT Risk Assessment
79
9. B. A walkthrough with an auditor is a discussion where a control owner describes
the operation of one or more controls and answers specific questions about them.
10. B. NIST SP 800-30, “Guide for Conducting Risk Assessments,” is a step-by-step
guide to performing qualitative and quantitative risk assessments. The standard
also briefly describes the overall risk management life-cycle process to provide
context for individual risk assessments.
11. D. The owner of individual risks should be the business unit leader or department
head that manages business processes most closely related to those risks. In rare
circumstances, risks should be assigned to the CIO, CISO, or CIRO.
12. B. A risk register is a master list of all credible risks that have been identified and
are awaiting further analysis, treatment, or follow-up.
13. A. Qualitative risk analysis uses a scoring scheme such as “high-medium-low” or a
simple numeric scale such as 1–3, 1–5, or 1–10.
14. C. Residual risk is the risk that remains after risk treatment (whether mitigation,
transfer, or avoidance) has been completed.
15. A. The best way to manage residual risk is to include it in the risk register and then
subject it to the usual risk analysis, risk scenario development, and risk treatment.
Risk Response
and Reporting
CHAPTER
3
In this chapter, you will:
• Understand the concepts o risk and control ownership
• Understand the various risk treatment and response options
• Learn about the risk response process
• Understand risk response options and how to align choices with business objectives
• Understand how controls are designed, implemented, and evaluated
• Learn methods to document and assess risk responses
• Understand and deine key perormance indicators (KPIs)
• Understand and deine key risk indicators (KRIs)
This chapter covers Certiied in Risk and Inormation Systems Control Domain 3,
“Risk Response and Reporting.” This domain comprises 32 percent o the CRISC
examination.
The CRISC Task Statements relevant to this domain address several key activities present
in risk response and reporting, beginning with the collection of information about an
organization’s business and IT environments as well as identifying impacts to the orga-
nization’s objectives and operations. This includes the identification and evaluation of
threats and vulnerabilities and establishing accountability by assigning risk and control
ownership. An IT risk register is used to document the risk profile. Identifying risk appe-
tite and tolerance and conducting security awareness training help to promote a risk-
aware culture. IT risk assessments and risk analysis help to identify control deficiencies
that bring about risk responses, risk treatment plans, and the design and implementation
of controls—all of which should be validated. Risk reporting includes the use and moni-
toring of key control indicators, key risk indicators, and key performance indicators.
Assessments of controls and analysis of risks can help understand their maturity and
effectiveness. New and emerging technologies should be evaluated to identify changes in
risks. All of this should drive risk-driven decision-making.
In this chapter, we will review the concepts that comprise CRISC Domain 3, which
is focused on risk response and reporting. There is a natural progression from the risk
framing, analysis, and assessment discussions in the previous chapters, which covered
81
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
82
CRISC Domains 1 and 2, to the discussion of risk response in this chapter; you will see
that many of the outputs from those processes lead directly to this chapter because an
organization generally wants a meaningful response to any risk to itself and its systems
and data. After discussing how risk responses are chosen, we will discuss how to imple-
ment those risk responses, including how to design, develop, and adjust controls, and
then, finally, how to report on risk.
Risk Response
Every organization has risk. The leaders of smart organizations, however, have deter-
mined how they will deal with that risk appropriately for their business context. Will
they accept all risks? Will they transfer some risks to a third party, such as an insurance
company? These are some questions that need to be considered within the risk response
process, as discussed in this chapter.
We will also discuss the major control frameworks within the field and how they are
incorporated into risk response. You should note that risk is different for every organiza-
tion; risk within an educational context is different from a financial context, which is
different from a government context. Also keep in mind that IT risks are different from
business or mission-oriented risks. It’s important to note that the mission of the organiza-
tion helps to shape risk responses as well. This is why it’s so important that organizations
conduct a thorough risk analysis and understand and prioritize the response options that
are right for them. You should also remember that the risks to the business, the business
goals and objectives, and the systems supporting those functions should all be considered
throughout the risk response process. It’s easy as an IT professional to forget that the
business objectives are the top priority, but to maximize efficiency and effectiveness (and
to pass the exam), you should keep that in mind.
NOTE Risk, asset, and control owners are not always the same person,
unctional area, or even organization. It’s important that you identiy these
particular owners early in the assessment process and maintain careul
coordination and communication between these and other relevant
stakeholders, within the boundaries o your authority and assessment
scope. Having dierent types o owners can result in politically sensitive
issues that revolve around resourcing, responsibility, accountability, and
sometimes even blame.
Risk Mitigation
Risk mitigation generally involves the application of controls that lower the overall level
of risk by reducing the vulnerability, the likelihood of a successful threat exploiting that
vulnerability, or the impact to the asset if the risk were to be realized. Mitigation actions
come in a number of forms; a policy requiring nightly offsite backups of critical data
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
84
can mitigate the risk of data loss, for instance. Similarly, applying a newly released web
browser patch can mitigate the risk of exploitation. The goal is to get the risk down to a
level considered acceptable by the organization’s leadership. We will discuss controls and
their implementation a bit later in the chapter, but for now you should understand that
you may have to add new controls; update, upgrade, or even change controls; or even in
some cases change the way your business processes work. All of these actions are designed
to mitigate or reduce risk.
Risk Sharing
Risk sharing (often referred to as risk transference) entails the use of a third party to
offset part of the risk. Risk sharing can involve the outsourcing of some activities to a
third party to reduce the financial impacts of a risk event in many cases. Sharing offsite
(co-location) assets and contractual obligations with other entities is one way that organi-
zations implement risk sharing; a cloud service provider can be used within this scenario.
The cloud provider might be contractually obligated to assume part of the financial
impact in the event of a breach, but be aware that there is a potential loss of brand good-
will or other intangible assets that can be difficult to offload. Another example of risk
sharing is the use of an insurance service to cover the financial impacts (at least partially)
of a breach; however, the intangible losses mentioned previously would still be present.
The point is that risk sharing (or transference) typically only works with a portion of
the risk; it does not reduce all of the risk. Therefore, multiple risk response options used
concurrently will likely be needed.
EXAM TIP Don’t orget that use o a risk-sharing scheme does not totally
absolve an organization o its responsibilities; organizations may still retain
responsibility—and more importantly, accountability—i there is loss o data
or revenue. Additionally, legal liabilities may also be involved.
Risk Acceptance
There will always be some level of residual risk, no matter how many controls you imple-
ment or the amount of insurance you purchase. Again, the goal is to get the risk down to
a level considered acceptable by the leadership. Risk acceptance occurs when the active
decision is made to assume the risk (either inherent or residual) and take no further
action to reduce it. The word active is critical here; risk acceptance is different from being
risk ignorant in that the risk is identified, alternatives are considered, and a conscious
decision is made to accept it. A good example of this would be when you have taken
all practical steps to reduce the risk of an attack from a malicious entity. Your organiza-
tion may have installed perimeter security devices, strong authentication methods, and
intrusion detection systems, which will reduce the risk significantly. However, since risk
cannot be completely eliminated, there is always a chance that an attacker may enter the
infrastructure through some other means. This residual risk may have to be accepted
because it might be financially unwise to invest more resources into further mitigating
the risk. Similarly, a company might choose to willfully ignore government-mandated
Chapter 3: Risk Response and Reporting
85
control implementation that would incur fines or other financial penalties, assuming that
the financial cost incurred would be less than the cost of implementing the controls. As
we will also discuss, the value of the asset may be far less than the cost of implementing
any mitigating controls, so in those cases risk acceptance may be the right choice.
Note that risk acceptance of any kind should be a formal management decision, and
fully documented, along with provisions to monitor the risk, typically through the risk
register. As with all risk response options, management should be cognizant of monitor-
ing risk, since it frequently changes, and in turn make changes to the response as dictated
by the changing operating environment, new technologies, and the threat landscape.
EXAM TIP It’s important to note that risk acceptance doesn’t insinuate
ignorance; it’s an active acknowledgment and conscious decision to accept
risk as it is, assuming it is at a level that is comortably within risk appetite
and tolerance ranges.
Risk Avoidance
Risk can be avoided through a number of methods. Sometimes risk can be avoided by
simply choosing not to participate in the activity that incurs the risk. For example, an
organization may decide that a particular business venture or entry into a new market
would incur far more risk than it is willing to take on. Perhaps you don’t need to conduct
the activity at all. Avoiding risk can mean eliminating risk associated with a particular
activity by not performing that planned activity. Risk avoidance is the option taken
when, after all risk treatment options, including mitigating controls, have been consid-
ered, the level of risk is still not acceptable. An organization might choose not to take on
a proposed project because of the probability of failure and subsequent loss of capital,
for example. Another scenario might be the organization choosing to not adopt a cloud
solution because of the level of sensitivity of information that would be stored within
the cloud. In any event, risk avoidance does not simply mean ignoring the risk, as some
people may be led to believe. Risk avoidance requires careful thought and planning as
well as balancing the level of risk incurred in following a particular path versus eliminat-
ing the risk by not following that path at all.
Third-Party Risk
In today’s business world, an organization rarely functions independently from other
entities. Most businesses are not entirely independent and self-sustaining; they depend
on suppliers, service providers, and so on to help them bring their products and ser-
vices to market. These third parties often perform services that are outsourced from the
organization because of a lack of infrastructure or simply a desire to not perform these
functions or services internally. A great example of a third-party service provider is one
that provides cloud services to businesses, such as data storage, applications, and even
entire infrastructures to organizations that don’t have the means or the desire to create the
internal structures needed to manage them internally. Sometimes it is more cost effec-
tive for an organization to simply hire a third party to perform a function or provide a
service than it is to expend the resources to create and maintain all of the equipment and
processes itself.
If you recall the risk treatment options discussed earlier, transferring (or sharing) risk
includes the use of third parties to bear some of the risk in performing certain business
functions. Insurance is the classic example of transferring risk used in most risk manage-
ment training texts, but this instance usually only provides monetary funds in case of a
disaster or liability scenario. Transferring risk to third parties also includes outsourcing
certain functions and services to third parties, so this, too, is a standard risk treatment
method. The organization, for example, can reduce its risk of accounting and budget
errors with a small, untrained staff by outsourcing its accounting functions to a third-
party accounting firm.
Chapter 3: Risk Response and Reporting
87
It’s important to note that while this strategy of dealing with risk is effective and
common, the organization is transferring only risk, not responsibility. The organization
almost always retains final accountability and responsibility for functions and services
outsourced to a third party. For example, transferring a business’s accounting functions to
an outside firm mitigates risk by transferring some of it to the third party, but the orga-
nization is still ultimately responsible to its stakeholders, government regulators, banks,
and financial obligations, even if the accounting firm makes an error. As another exam-
ple, an organization that makes use of cloud data storage services still maintains account-
ability and responsibility for any data stored with a cloud provider if that provider suffers
a breach that results in the release of sensitive information. While third-party providers
may still incur some level of liability in these cases, the final liability rests with the orga-
nization that contracted with them. Liability, accountability, and responsibility are also
some of the key risk factors with third parties that we’ll discuss next.
Third-Party Vulnerabilities
Vulnerabilities that result from associations or dealings with third-party providers
include failure to adequately cover contingencies in contractual agreements, such as
system or data availability or loss, lack of or inadequate security protections, and service
levels that fall below an acceptable standard. Furthermore, any vulnerabilities that the
third-party provider has inherent to its own organization are, unfortunately, indirectly
incurred by any organization that deals with the third party, since those vulnerabilities
could affect data in its custody or services provided to others. Examples of internal
vulnerabilities that could affect organizations for whom the third party provides ser-
vices include infrastructure vulnerabilities (such as patch or configuration management
issues, loss of equipment, or malicious intrusion by hackers), organizational vulnerabili-
ties (such as loss of revenue or bankruptcy), and even technological vulnerabilities (such
as lack of sufficient encryption strengths or strong authentication methods). All these
vulnerabilities could indirectly affect any organization that has a contractual agreement
with a third-party provider.
Exception Management
No matter how standardized security controls are, there are always exceptions, and you
need to have a process in place to manage those exceptions and keep them minimized.
Consider the example in the previous section where an operating system patch cannot be
applied because of a legacy application that is critical to the organization’s mission. This
mitigation is important, but less important than the legacy application and its associated
mission. Exception management, as mentioned earlier, comes into play here; you should
evaluate the risk of implementing the patch and breaking the application, thus putting
the organization’s mission in jeopardy, versus the risk of not implementing the patch and
dealing with the security ramifications that come with that decision. Management will
have to make a decision regarding which is the riskier choice. If the choice is to make
an exception and not implement the patch, you need to document this as an accepted
exception to the policy and track it, usually in the risk register. Perhaps the patch can
be implemented in the future, or another mitigation could come along and make the
exception moot. This is another aspect of risk acceptance; you are asking management to
accept an ongoing risk, as an exception, because the response cannot be implemented for
whatever reason. Either way, keeping a close eye on the issue is key to not letting these
exceptions slip through the cracks.
Regardless of where issues, security findings, and exceptions to normal processes,
policies, or baselines occur, these departures should be avoided as much as possible, and
when they cannot be avoided, they must be carefully considered, with great care taken to
reduce the risks they present.
Emerging Technologies
New or emerging technologies can present risks to organizations simply because there are
several different important considerations when integrating the latest technologies into
the existing infrastructure. Many organizations have an unfortunate tendency to rush
out, buy, and attempt to implement the latest (and often unproven) technologies on the
market, without careful planning or consideration of the existing infrastructure and how
it will react to the new technologies. One of the primary considerations organizations
must look at is making a business case for a new technology, which may be to fill a gap
that the older technology does not provide or to provide a capability that the organiza-
tion must now have to compete in the market space. In other words, the company really
must justify new technologies to make them worth the risk they could incur.
At the opposite end of the spectrum, many companies are averse to investing a great
number of resources in new technologies, instead relying on older, tried-and-true tech-
nologies that have always worked in the past. These organizations fail to consider the
changing threat landscape, and sometimes the need for maintaining a cutting edge in
the marketplace. The threat landscape can render older technologies obsolete and inef-
fective in protecting the company’s information assets. The market a particular organi-
zation participates in can also drive the need to update its older technologies to those
that make it able to produce goods and services faster, more efficiently, and to better
meet the needs of its customers.
In any event, emerging technologies present challenges to organizations that must be
considered. These challenges include the emerging risk factors, vulnerabilities, and threats
that go along with those technologies. We will discuss those in the next few sections.
Emerging Threats
Threats resulting from the introduction of new and emerging technologies into the exist-
ing infrastructure are numerous. If the organization has failed to adequately plan for
the new technology, these threats can become significant. These include untested or
unproven technologies, non-interoperability, incompatible security mechanisms, and
lack of suitability of the technology for use in the organization. The organization could
also incur additional cost and require more resources because of a faulty implementation.
These threats can be minimized by careful planning and integrating new technologies
using a stable systems development life cycle (SDLC) model.
Additionally, organizations should implement both threat modeling and threat hunt-
ing processes into their security program when new technologies are considered. Threat
modeling and threat hunting can help an organization identify not only the generic
threats that affect all organizations, but those specific to its own business model, pro-
cesses, assets, vulnerabilities, and risk scenarios involving the new technology.
Emerging Vulnerabilities
As with threats, vulnerabilities that go along with working with emerging technologies
are numerous as well. General vulnerabilities could include a lack of trained staff com-
mitted to managing and implementing the new technology. Lack of adequate project
planning is also a serious vulnerability that could affect the organization’s ability to effec-
tively integrate new technologies. Another vulnerability could be a weak support con-
tract or other type of warranty, guarantee, or support for a new technology or system.
Most of these vulnerabilities appear when new technologies are first implemented and
tend to become mitigated or lessened as the technologies are integrated into the existing
infrastructure, but they still exist.
Beyond general vulnerabilities, new technologies also have their own inherent techni-
cal vulnerabilities. Often these vulnerabilities are not discovered until long after a tech-
nology has been implemented. Although vendors are increasingly security conscious in
implementing and designing technologies from a secure perspective, zero-day vulner-
abilities are often discovered months or even years after those technologies are installed
and operational.
Chapter 3: Risk Response and Reporting
93
To make matters more challenging, some vulnerabilities are not detectable by vulner-
ability management tools. They are only detailed by the vendor, and only if they happen
to detail them. In some situations, this makes monitoring the updates for the applica-
tions all the more relevant to ensure, including in the vulnerability management process.
When implementing a new technology, organizations should make an extra effort
toward vulnerability scanning and assessment, and they should pay particular attention
to new vulnerabilities, even those that seem unrelated to the new technology. Often these
vulnerabilities could be indirectly related and appear because of interoperability or inte-
gration issues with the infrastructure.
In some cases, it may make sense to perform other types of validations against new
technology—especially if there are additional risk factors such as large amounts of sen-
sitive data. Validations may include but are not limited to penetration testing, secure
configuration reviews, and application security testing.
EXAM TIP The key areas o concern with emerging technologies are
interoperability and compatibility. These two concerns aect the security,
unctionality, and perormance o the new technologies when they are
installed into an existing inrastructure.
Control
Function Definition Example
Deterrent Deters individuals rom perorming Video surveillance, guards, login
policy violations or illegal acts warning banners, policies
Preventive Prevents policy violations Firewall rules, permission settings,
or illegal acts perimeter encing
Detective Detects or discovers policy Physical intrusion detection systems
violations or illegal acts and alarms, system intrusion detection
systems, integrity checks, audit logs,
video surveillance
Corrective Temporarily corrects an immediate Guards, systems conigured to shut
security issue down when an attack occurs or logs
are ull, acility lockdowns
Compensating Longer-term alternative solution Cards, physical obstructions, signage,
when primary controls cannot additional network security devices,
be implemented or legitimate encryption mechanisms
business reasons; used to reduce
risk in lieu o a desired control
Table 3-1 Control Functions and Descriptions
Chapter 3: Risk Response and Reporting
95
EXAM TIP Controls may be categorized by unction, which includes
preventative, deterrent, detective, corrective, and compensating controls.
Oten, controls can serve more than one unction simultaneously, and it
may be diicult to completely categorize them as one particular unction
or another.
Note that different control functions can fall within all three control types; there are
deterrent, preventative, detective, corrective, and compensating controls that are techni-
cal, administrative, or physical. You will also notice some significant overlap between
these types and functions. For example, video surveillance can be a deterrent control
as well as a detective control. Also, since some experts do not distinguish between, for
example, deterrent controls and preventative controls, it is important to point out their
difference here.
A deterrent control must be known by an individual or entity in order for it to be
effective since it dissuades them from committing a policy violation or an illegal act.
For example, a video surveillance camera can be a deterrent control—if a person sees it
in operation, they are less likely to commit a malicious act because they know they are
being viewed and recorded. This deters them from that act. A preventative control, on
the other hand, does not have to be known by an individual for it to be effective. An
example of this would be a firewall rule that prevents a user from surfing to a malicious
site. The user doesn’t have to know that the firewall rule exists in order for it to still be
effective and prevent them from committing this policy violation.
Another difference worth pointing out is the one between corrective and compensat-
ing controls. As indicated in Table 3-1, compensating controls are implemented to take
the place of a more desired or primary control, which can’t be implemented for various
legitimate business reasons (for example, lack of resources). Even if the primary control
can’t be implemented, the risk must still be reduced, so a control (or sometimes multiple
controls) is implemented in its place. Compensating controls are longer-term controls,
which are not likely to be changed anytime in the immediate future.
Corrective controls, however, are temporary, short-term duration controls. They are
designed to correct an immediate security issue. For example, let’s say that a storm comes
through your area and destroys a section of strong concrete wall surrounding your facil-
ity. Now there is a huge hole in the perimeter, which could allow an unauthorized person
to enter at the facility grounds. To immediately mitigate this risk, you may post a guard
to patrol that particular area for a few days until you can come up with something better.
Obviously, keeping a guard there on a long-term basis is not wise financially or from a
resource usage perspective. After a few days, you might be able to fix the wall, if possible,
which restores the primary control to its operational state. If for some reason that portion
of the wall can’t be fixed, however, you may install temporary fencing or another physi-
cal obstruction in its place, and supplement it with surveillance cameras, an intrusion
detection system, and additional alarms so that it would reduce the risk of an intruder
entering the area, without having to keep a guard there all the time. These might be con-
sidered compensating controls since the primary control (the strong concrete wall) can’t
be immediately addressed.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
96
As mentioned previously, control types and functions can overlap. They can also
complement each other. For a given administrative control (for example, a policy that
dictates that all sensitive data must be encrypted), there is usually a technical control,
such as the encryption mechanism, and possibly even a physical control, such as hard-
ware encryption devices being locked in a secure area, to back it up. Again, it should be
pointed out that the various standards and frameworks, which we’ll discuss in a moment,
often categorized these types and functions of controls differently, so don’t be surprised if
sometimes you see them referred to in a different manner.
Figure 3-1 summarizes some of the key characteristics of controls and their implemen-
tation, with regard to types and functions. Note that, as depicted in the figure, controls
that are designed to prevent a malicious act or policy violation are generally known as
safeguards, whereas controls that come into play after a violation has occurred, and must
be used to respond to the event, are called countermeasures.
Safeguards Countermeasures
TIP You’ll ind that most control libraries similarly group controls into
speciic categories based on unction or context, and most use speciic
identiiers or each control.
Which controls from the various frameworks are used by an organization depends on
several factors, including governance, market segment or area, level of regulation, and
internal factors such as risk tolerance, risk appetite, and maturity of the risk manage-
ment processes. We cover more of how controls are selected, designed, implemented,
and used later in this chapter and in the other chapters, but suffice it to say for now that
controls are usually developed and applied to specific risk scenarios. These risk scenarios
are developed by the organization or industry as part of their risk identification process.
NOTE Most control catalogs have controls that can be easily mapped to
controls in other catalogs, although in some cases, this mapping may be
imprecise, may not be as detailed, or may even map to multiple controls
in another control library.
Control Frameworks
Now that we’ve covered some generalities about controls, it’s time to look at various
control frameworks you might use in your professional career. Keep in mind that some
control frameworks go into more depth than others on their controls; some controls
in a given framework may treat a particular subject area lightly, whereas others may go
into detail on a particular subject area. Also keep in mind that some control frameworks
are geared toward specific environments or areas, and not all frameworks are necessarily
geared toward security specifically; some frameworks apply to a broad general business or
risk management area but may have security controls built into them for specific needs
or direct security actions from a higher level. Not all control frameworks are technical
in nature either; some frameworks apply to security and risk from a business process
perspective rather than a technical perspective. Some control frameworks are privacy
oriented and provide a different set of controls. The control frameworks described in the
following sections are just some of the more popular ones you may encounter in your
professional career as a risk practitioner.
NIST The U.S. Department of Commerce’s National Institute of Standards and
Technology (NIST) has produced several documents—some of which we have already
mentioned—that relate to risk management. The entire Risk Management Framework
(RMF), and all of its different components, spans several documents. We’re not going to
provide a comprehensive review of the framework and its related documents here, but
we will examine a particular piece of the framework: the controls catalog. NIST Special
Chapter 3: Risk Response and Reporting
99
Publication (SP) 800-53, revision 5, “Security and Privacy Controls for Information
Systems and Organizations,” is the control catalog supporting NIST’s RMF. The NIST
controls are a comprehensive set of security measures and processes intended to mitigate
and reduce risk from an IT security perspective. The NIST control catalog is divided
up into 20 separate control groups, called families, each related to a particular aspect of
IT security.
The NIST control families span a great deal of subject areas. Each family has several
controls in it; there are smaller families (such as the Awareness and Training family) that
may have as few as six controls, but there are others that have many different controls
that go into great detail on security measures. An example is the System and Communi-
cations Protection (SC) family, with 51 controls.
EXAM TIP You will likely not be tested on any speciic NIST controls; however,
it’s a good idea to have this knowledge in order to dierentiate among the
dierent control rameworks you may see on the exam, as well as or real lie.
PCI DSS The Payment Card Industry Data Security Standard (PCI DSS) is a set of
security requirements levied on merchants that process credit card transactions. The
standard was developed jointly by the major payment card industry players, including
Discover, Visa, MasterCard, and American Express. The standard was developed in an
effort to impose security requirements and controls on retailers (merchants and service
providers) to reduce credit card fraud and identity theft. Note that PCI DSS is not a
law; rather, it is an effort by the credit card industry to self-regulate. Although not a
law, it does have the effect of being mandatory in terms of governance requirements;
retailers must comply with PCI DSS to be allowed to process credit cards from the
major industry brands. A few U.S. states, however, have codified into their laws the
use of PCI DSS standards.
The PCI DSS (currently in version 3.2.1 as of this writing) is a set of six control objec-
tives, broken down into 12 major requirements, which are further broken down into
sub-requirements. Table 3-3 lists the basic PCI DSS requirements.
On the surface, these objectives and requirements don’t seem to go into much depth.
Understand, however, that PCI DSS further decomposes the requirements into detailed
processes and procedures. The standard also provides guidance for testing at the control
level. For example, requirement 5, “Protect all systems against malware and regularly
update antivirus software or programs,” breaks down into four sub-requirements, some
of which break down even further. Requirement 5.1.2, continuing the example, specifies
continuous monitoring and evaluation of hosts for malware threats. Overall, there are
actually more than 200 sub-requirements, which are the equivalent of controls.
EXAM TIP You likely won’t be asked any PCI DSS control–speciic questions
on the exam, but you should keep in mind its applicability to merchants
and retailers that process credit card transactions. You can ind more
detailed inormation on the PCI DSS standards at the website o the PCI
Security Standards Council at https://www.pcisecuritystandards.org/
security_standards/.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
100
Control Objective Requirement
Build and Maintain a 1. Install and maintain a irewall coniguration to protect
Secure Network and cardholder data.
Systems 2. Do not use vendor-supplied deaults or system passwords
and other security parameters.
Protect Cardholder Data 3. Protect stored cardholder data.
4. Encrypt transmission o cardholder data across open,
public networks.
Maintain a Vulnerability 5. Protect all systems against malware and regularly update
Management Program antivirus sotware or programs.
6. Develop and maintain secure systems and applications.
Implement Strong Access 7. Restrict access to cardholder data by business need to know.
Control Measures 8. Identiy and authenticate access to system components.
9. Restrict physical access to cardholder data.
Regularly Monitor and 10. Track and monitor all access to network resources and
Test Networks cardholder data.
11. Regularly test security systems and processes.
Maintain an Inormation 12. Maintain a policy that addresses inormation security or
Security Policy all personnel.
Table 3-3 PCI DSS Control Objectives and Requirements
CIS Controls The Center for Internet Security (CIS) publishes 18 critical security
controls, which are essentially areas or families that decompose into 153 individual
safeguards, spanning three implementation groups. These 18 areas are similar to other
control sets in that they cover areas of common security concern, including malware,
penetration testing, inventory of software assets, account management, access control,
and so on. The three Implementation Groups (IGs) are designed to provide a path for
progressively implementing safeguards, with prioritization and scalability in mind, to
help smaller organizations, or those that have limited resources, implement a minimum
of 56 core security controls that are absolutely necessary to secure systems and data.
The CIS controls were formally known as the SANS Top 20 Critical Security Con-
trols, before the CIS took responsibility for them in 2015. They were originally devel-
oped by an effort led by the National Security Agency (NSA) and many other govern-
ment and industry partners. The most current version of the CIS controls is version 8,
published in May 2021.
ISO/IEC 27001 Although we’ve primarily discussed different control sets that origi-
nate in the United States (such as PCI DSS and NIST), most of the various control
frameworks map to, and in some cases originate from, standards used worldwide and
developed by internationally respected governing bodies. In Chapter 1, we briefly men-
tioned some of these standards, including those from ISO and IEC. The ISO and IEC
produce information technology standards used internationally, including several that
apply to information security and risk management. You may see individual standards
Chapter 3: Risk Response and Reporting
101
prepared by each of these organizations, but you may also see combined standards, usu-
ally indicated as ISO/IEC for those standards that are jointly developed. We discussed
standards that applied more specifically to risk assessments in Chapter 1, but there are
also ISO/IEC standards that are essentially control requirements. Two examples are
ISO/IEC 27001:2013, “Information technology – Security techniques – Information
security management systems – Requirements,” and its companion guide, ISO/IEC
27002:2022, “Information security, cybersecurity and privacy protection – Information
security controls.” These two standards, like the ones discussed previously, break down
their controls into different areas or categories and include areas such as information
security policies, human resource security, asset management, access control, cryptog-
raphy, and so on. Since the ISO/IEC 27001 and 27002 standards are developed by an
international standards organization, they can be used across the globe.
As mentioned earlier, most of the control standards we have discussed have built-in
mappings to help facilitate their implementation where organizations may have multiple
governance requirements to which they are required to adhere. Both the NIST and CIS
controls have mappings to the ISO/IEC standards, for example. In examining these con-
trol mappings, a couple points should stand out. First, there’s not necessarily a straight
one-to-one mapping of controls. In some cases, the requirements for a given control in
a control set may map to one, many, or even none of the other control set’s controls.
Second, controls tend to follow similar patterns and requirements, such as acceptable
use, password requirements, media and storage, encryption, and so on. Most controls
from the various control sets have these commonalities because all of them in some way
trace back to the three goals of security (confidentiality, integrity, and availability) as well
as the supporting elements of identification, authentication, and authorization. This is
generally true regardless of which security control framework you examine.
NOTE You’ll ind that many control rameworks are derived rom and map to
the ISO/IEC standards. They are international standards and can be applied
across most industries and market spaces.
Control Design
Controls are designed and applied to a system, data, process, or even organizational ele-
ment to address a weakness or vulnerability or to counter a specific threat. Often, controls
are designed to address a specific risk response strategy, such as risk reduction/mitigation,
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
102
sharing, avoidance, and acceptance. Controls are applied to reduce the impact and likeli-
hood elements of risk, as follows:
EXAM TIP Remember that controls can aect the likelihood or impact o risk
elements only by reducing vulnerabilities or protecting assets. They cannot
eliminate or reduce threats or threat actors; they only serve to reduce the
likelihood or impact resulting rom an attempted or successul exploitation
o a vulnerability by a threat.
Control Selection
When an organization selects controls to be applied to protect systems and minimize
risk, several considerations come to mind. First, the organization should look at its gov-
ernance requirements and ensure that its controls meet those requirements, particularly
where specific data protection requirements are indicated. This may include level of per-
formance or function of a control (encryption strength, for instance). The organization
also has to look at its existing infrastructure. It is likely to already have some level of
controls in place, although the controls might not be applied directly to the system
in question. Take, for example, an organization that has industrial control systems and
other types of operational technologies present. Many of these devices cannot support
basic security measures, such as authentication or encryption; however, as compensating
controls, the organization could implement network segmentation by putting them in
their own physically or logically separated subnets and install authentication and encryp-
tion mechanisms specifically for those devices, since they do not have their own built-in
capabilities. If there are existing controls that can already fulfill the requirements for a
control, those should be used to the maximum extent possible.
Second, controls should be selected also based on their level of effectiveness, as indi-
cated by the design parameters we discussed earlier. A control that is minimally effective,
Chapter 3: Risk Response and Reporting
103
and perhaps meets governance requirements, may still not be desirable if it does not
provide the level of security the organization needs. Effectiveness also may mean how
good the control is at reducing risk or ensuring compliance. If either of these levels of
functionality or performance are not met by the control, the organization should con-
sider strengthening or changing the control.
Third, cost is also an issue with control selection. A control that costs $10,000 to
implement but only protects a single system that is valued at $2000 is not cost-effective.
However, a control that costs $10,000 and protects several systems, even if individually
they are not high-value systems, but collectively generate $100,000 in revenue for the
organization per year, is likely more cost-effective. Control selection with regard to cost
should include the cost of the control as well as the cost to maintain it. This includes spare
parts and components, service contracts, and the cost of qualified personnel to maintain
the control. This is where quantitative data elements, such as asset value (AV), exposure
factor (EF), single loss expectancy (SLE), and annualized loss expectancy (ALE), which
you learned about in earlier chapters, come into play, since they affect whether a control
is worth it financially to implement.
Ultimately, security and risk practitioners recommend controls based on their effec-
tiveness and cost to management, who must make the decision regarding their imple-
mentation. If the desired controls cannot be implemented, for whatever reason, both
the practitioners and management must consider selecting appropriate compensating
controls, which must be approved and documented.
Control Analysis
Controls are analyzed at several different points in their life cycle. They are looked at to
ensure they fulfill their basic functions of asset protection, compliance with governance,
and risk reduction. They’re examined for not only effectiveness (how well they do their
job) but also efficiency (meaning that they do their job with as little additional effort,
resources, and management as possible). Even if a control is performing its job functions
wonderfully, if the cost to maintain it is prohibitive, the organization may need to look
at changing the control or its implementation in some fashion.
The most common way to analyze controls is through controls assessment, where con-
trols are evaluated for their effectiveness. A control can be evaluated using various meth-
ods, such as interviewing key personnel responsible for managing and maintaining the
control, reviewing the documentation associated with the control, observing the control
in action, and testing the control through technical means. These different assessment
methods will give a risk practitioner an idea of how effective the control is in meeting its
primary functions.
Risk assessments for the specific system under review, as well as the entire organi-
zation, will also indicate how well a control is performing its function. Even if a risk
practitioner is not examining a particular control, levels of increased or decreased risk for
the system itself or the entire organization would indicate whether or not one or more
controls are effective. Historical and trend analysis methods tell a risk practitioner how
risk has changed over time. They also help the practitioner predict how risk will change,
given changes in the environment, technology, the threat landscape, and how effective
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
104
the control will be. If risk has increased inexplicably, the practitioner must analyze the
different controls designed and implemented to mitigate that risk.
After controls have been tested and analyzed, results from those analyses should be
recorded on the overall risk register, particularly with regard to risk the control is sup-
posed to mitigate. Obviously, management must be informed of any changes in risk
caused by control effectiveness issues.
Control Implementation
Controls aren’t simply installed in infrastructures, even in the event there is urgency to
do so. As we have previously discussed, some planning goes into control implementation.
Most of this planning focuses on determining the effectiveness of the control and ensur-
ing it is designed to protect assets, assist in compliance, and reduce risk. There are also
other considerations when implementing controls, including the change management
process, configuration management, and testing.
Implementation Testing
Although controls undergo testing at various points in their life cycle, testing before
implementation is critical because often it is difficult to go back to a previous control
or a point in time before the control is implemented. This is especially true if the infra-
structure is significantly altered to accommodate the new control. Consider a network
Chapter 3: Risk Response and Reporting
105
infrastructure that has a new firewall or other network security device installed. The
network may have to be rerouted and reconfigured and new rules configured on the
network security device. If for some reason it is installed without testing and then fails, it
may cause serious impact to business operations if users cannot use the network, get on
the Internet, or otherwise are unable to perform their duties.
Several types of implementation testing should occur on new controls before they
are implemented. One of the first is interoperability testing. Interoperability is criti-
cal since the new control must work with existing technologies and infrastructure. If
for some reason they do not work together, this can cause work stoppages or outages
and will impact business operations. A risk analysis conducted before implementing
a new control should take this into account, and the organization should be reason-
ably informed about how the new technology or control will interact with the existing
infrastructure before it is tested and implemented. Another type of testing involves
testing security mechanisms that are inherent to the new control, such as authentica-
tion and encryption mechanisms. Not only should they be interoperable with existing
infrastructure, but they should also be tested for function and performance as well as
compliance with any governance. It would not do to install a security control that has
legacy authentication or encryption mechanisms that do not meet governance require-
ments, for example, and therefore fails to protect systems and data.
Testing a control, especially a complex one, before implementation ensures that it is
interoperable, satisfies technical requirements, meets governance requirements, and per-
forms and functions as it should. Understanding the limitations and operating param-
eters of a complex control through testing before implementation is in itself a method
of risk reduction.
• Interviews with key personnel, such as operators, security analysts, engineers, and
even managers
• Observation of the control in operation to ensure it does what it is supposed to do
• Review of any documentation supporting the control, such as policies, procedures,
maintenance records, architectural diagrams, exceptions, and so on
• Technical testing, such as that conducted during vulnerability assessments and
penetration testing
All of these different types of tests are critical in getting the complete picture of how
well a control is functioning and performing. The results of control testing should be
documented and reported on in various circumstances as part of different assessments
and tests.
Controls that fail testing or do not perform or function as expected should be further
evaluated in more detail for any possible changes and any additional increase in risk. A
control may need to be reinstalled, replaced, or upgraded, or compensating controls may
need to be added to strengthen the function the control is meant to perform.
4.0 4.0
Risk Level
3.0
4.0 3.5
5.0
Some of these data reporting techniques include heat maps, scorecards, centralized
dashboards, and real-time information feeds. Heat maps focus on data that shows areas
of red, yellow, and green, for example, with data points in red (darker) being the obvi-
ous areas of concern, and data points in the green (lighter) areas being of lesser concern.
Figure 3-2 shows an example of a heat map.
Scorecards are used to collect pieces of data and offer a comparison with other pieces
of data, showing a relative performance or effectiveness increase, compared to previously
collected data. Centralized dashboards, along with real-time information feeds, have the
goal of showing a one-stop single view of all the necessary data points risk practitioners and
managers need to view, often in real time, the status of control effectiveness, compliance,
or risk. Often, however, these dashboards can seem to be very complex and “busy” with
information, so extra effort must be taken to ensure they only display critical information,
in the most simplistic manner possible, while allowing a risk practitioner or manager to
“drill down” further to obtain more details about a piece of data in the dashboard.
Regardless of the data presentation technique used, reporting must be clear, accurate,
and complete, and it must convey the critical information needed for managers to make
meaningful risk-based decisions.
• Specific
• Measurable
• Attainable
• Relevant
• Timely
When a KPI is S.M.A.R.T., it is tailored to the organization and the area being mea-
sured. The first question you need to answer is, what are you trying to measure? You
should be, according to the S.M.A.R.T. methodology, specific. Are you attempting to mea-
sure availability? Then you may want to look at a metric that measures how often your
systems go down—or, conversely, what is the percentage of time your systems are up?
A KPI also needs to be measurable, in a way that is ensured to be accurate. In the case
of the availability, how would you measure it accurately? Perhaps you could determine
how often the systems went down based on the “uptime” command in the UNIX operat-
ing system.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
112
When a KPI is attainable, it is readily achievable. For example, you wouldn’t want to
set a performance goal of 100 percent uptime in a situation where you have an entirely
new staff, new equipment, new management, and so on. Perhaps 85 percent is more
achievable, and then you can work toward a higher goal.
KPIs that are relevant matter to your organization. If you’re in a situation where time
is of the essence, such as stock trading, then availability is essential. Without availabil-
ity, your systems cannot buy or sell stocks, and your user base will quickly move on to
another organization that values availability as much as they do. However, other con-
texts, such as educational institutions, may not care so much about availability. Usability
might be of more concern, or the ability to access content via mobile applications or
other cutting-edge technologies. Take the time to consider what’s important or relevant
to your organization when determining your KPIs.
Finally, timely KPIs allow the data to be collected when needed to quickly determine
the performance of your measured initiative. You should be able to obtain data for the
metric relatively easily from existing sources and repositories.
In some instances, a KPI may not meet all the criteria of S.M.A.R.T. For example, a
firewall may block a number of external attacks per month. Depending on the organiza-
tion, there may be nothing to attain, but most of the S.M.A.R.T. criteria is still met. This
is perfectly fine in some circumstances.
• Bandwidth utilization
• Number of false positives or false negatives detected
• Number of instances of malware detected
• Number of incidences per month attributable to user complacency or
policy violations
• Number of vulnerabilities discovered during a scan
Additionally, not all KCIs have to be technical in nature, although those likely are the
majority of the ones many organizations concern themselves with. KCIs can be devel-
oped for not only technical controls but also administrative and physical controls as well.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
114
Chapter Review
Once an organization has assessed and analyzed its risk, it must respond accordingly. In
this chapter we discussed several key areas of risk response, including the different risk
treatment and response options. Risk and control ownership are key to responsibility and
accountability for risk response. Risk and control owners are not always business process
owners, although they could be. Sometimes controls are dispersed across an organization
and protect multiple assets in several areas at once. These are called common controls, and
the control owners are common control providers. These entities are responsible and
accountable for risk and its mitigation, respectively, and must be given the authority to
carry out their responsibilities.
Risk treatment and response options include risk mitigation, risk sharing or trans-
ference, risk acceptance, and risk avoidance. Risk mitigation involves the reduction of
risk through the implementation of adequate security controls. Risk sharing involves
transferring risk to a third party, such as a cloud services provider, or through insurance.
Note that even if risk is shared, responsibility and accountability are retained with the
organization. Risk sharing usually involves offsetting financial responsibility or liability
in the event of an incident or disaster. Risk acceptance means that the organization must
accept any remaining or residual risk after all other risk response options have been
implemented. Risk must be formally accepted and documented as well as monitored
through the risk register. Risk avoidance does not mean simply ignoring risk; it means
that an organization has chosen a different path or solution that eliminates a particular
risk associated with an activity. Evaluating risk response options involves considering
many factors, including the cost effectiveness of controls and how much they reduce risk
versus the cost of the control and the asset’s value, organizational structure, governance,
and other factors. More often than not, more than one risk response is necessary.
Third-party risk management involves considering all the different threats, vulner-
abilities, and other risk factors inherent to engaging with third-party providers. Third
parties incur many of the same vulnerabilities and threats that other organizations do,
including external attack, infrastructure and system vulnerabilities, governance issues,
and so on. Key considerations with third parties include contractual obligations to pro-
tect data, division of legal liability, data ownership, and so on.
Issues, findings, and exceptions management means the organization must have pro-
active measures in place to reduce risk when situations or events occur that are out of the
normal processing parameters or configuration baselines. Examples of these cases include
vulnerabilities that cannot be easily remediated, exceptions to security policies, and com-
pliance findings. Each of these types of events should be considered carefully for risk and
mitigated as much as practical by the organization. In the end, exceptions may have to be
made, but they must be formally approved by management after due risk consideration,
thoroughly documented, and monitored through the risk register.
Risk is dynamic; it changes according to the operating environment, new technolo-
gies, the threat landscape, and organizational changes. These emergent risks must be
considered, since they may present unknown vulnerabilities that might not surface for
a long time after new technologies have been implemented or the environment has
changed. Emerging technologies are a key source of emergent risk, and organizations
Chapter 3: Risk Response and Reporting
115
must be careful about the rush to implement those technologies. The implementation
of emerging or new technologies should justify a valid business need, and appropri-
ate risk assessment and analysis should take place before their implementation. Risk
responses should be changed based on those emergent risks.
Security controls are measures or safeguards implemented to protect organizational
assets and reduce risk. The three general types of controls you must understand are
administrative, technical, and physical. Administrative controls usually involve policies
and procedures, technical controls involve equipment and software, and physical con-
trols involve physical barriers used to protect people, equipment, and facilities. Control
functions are divided into five general categories: deterrent, preventive, detective, cor-
rective, and compensating. Deterrent controls must be known in order to be effective.
Preventive controls do not have to be known in order to prevent a violation of policy or
illegal act. Detective controls are used to discover a violation of policy or malicious act.
Corrective controls are temporary in nature and are used to solve an immediate security
issue. Compensating controls are more longer-term controls and are used when a pri-
mary or desired control is unavailable. There are several control frameworks published by
various entities, including government and professional frameworks. Examples of these
include the ISO/IEC 27001 controls, the NIST controls, and the PCI DSS control set.
Controls are evaluated and selected based on their effectiveness in protecting assets,
the level of risk they help to reduce, and compliance with governance. Controls are also
evaluated based on cost-effectiveness. If the cost of an asset and its continued mainte-
nance versus the revenue it produces or its value to the organization compared to the cost
of the controls used to protect it do not correspond, a decision must be made whether to
implement the controls for the asset.
Several considerations go into control design, including reducing risk elements such as
the likelihood of an event occurring, the impact to an asset, and the severity of the vul-
nerability. Threats cannot normally be reduced through controls, but their interactions
with the organization can be mitigated through properly designed controls. Controls are
selected based on several factors, which include the cost to acquire and maintain, the
level of risk they reduce, and the amount of protection they offer. Existing controls in
an organization can be leveraged if they provide the proper security protections and are
interoperable with all systems. If desired controls cannot be implemented, compensating
controls must be considered. Controls are analyzed at different points in their life cycle,
particularly during installation and periodically to ensure they are still effective, comply
with governance, and reduce risk. Controls may need to be updated or changed periodi-
cally when technology changes, the controls become outdated, threats to the organiza-
tion increase, and the operating environment changes.
Control implementation must consider how the control will interact with the infra-
structure. Change and configuration management processes are critical to ensuring
the safe, secure, and stable implementation of new security controls. Both before and
after controls have been installed, they should be tested to ensure they meet functional
and performance requirements and are interoperable with the existing infrastructure.
Controls must also be documented thoroughly and any risks should be included in
the risk register. Controls must be periodically tested during various assessments by
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
116
interviewing those responsible for maintaining the controls, reviewing all documenta-
tion related to the controls, observing the controls in operation to ensure they fulfill their
security functions, and testing the controls through technical means.
Risk monitoring and reporting are necessary to conveying control and risk informa-
tion to management. Internal management policy as well as external governance will
drive reporting requirements. Risk practitioners should understand reporting require-
ments as well as stakeholder needs so that they will be able to report data with clar-
ity, accuracy, completeness, and timeliness. Risk treatment options and plans should
be conveyed to management through reporting channels on a periodic and as-needed
basis, rather than after the risk response is complete. Data used to create information
for consumption by managers should be accurate, complete, and trustworthy. Risk prac-
titioners must determine, based on their audience, how the information is presented
using various techniques. Risk control and monitoring techniques should be part of a
formally approved risk management methodology and promulgated in the risk strat-
egy, policy, and procedures. Various risk reporting techniques exist, including narrative
reports, scorecards, graphs, and real-time information feeds such as those that are part of
a centralized management dashboard.
Key performance indicators are pieces of information that measure and show per-
formance levels of different aspects of the security and risk management programs. Key
risk indicators show how risk has changed. Key control indicators show how effective
controls are functioning and performing as well as ensure compliance and reduce risk.
Quick Review
• Risk response is what is needed after risk has been appropriately assessed
and analyzed.
• Risk and control ownership must be carefully considered as part of risk response.
• Business process owners are not necessarily risk or control owners.
• Controls that span the entire organization are called common controls.
• There are four generally accepted risk responses: mitigation, sharing or transference,
acceptance, and avoidance.
• Risk mitigation means to reduce risk through the implementation of controls.
• Risk sharing allows an organization to transfer some of the risk to a third-party
provider or through insurance.
• Risk sharing does not absolve an organization of its responsibility, accountability,
or legal liability.
• Risk acceptance means to take on any leftover risk after all other risk treatment
options have been implemented.
• Risk avoidance does not mean to ignore risk; it simply means to avoid actions
that result in the risk.
Chapter 3: Risk Response and Reporting
117
• Evaluating risk response options involves considering several factors, including
cost, effectiveness, value of the asset, the organization, and governance, as well as
other external factors.
• Third-party risk management means that the organization must manage any risk
inherent to third-party risk sharing, contracts, and so on.
• Third-party risk factors include the same vulnerabilities and threats that other
organizations encounter.
• Considerations with third-party risk include protection of controls, responsibility,
accountability, legal liability, and data ownership.
• Issues, findings, and exceptions management helps to manage risk when there are
departures from normal processes, security controls, or baselines.
• Exceptions must be approved by management, thoroughly documented, and tracked
in the risk register.
• Emerging risk must be managed due to a changing operating environment,
emerging technologies, or a changing threat landscape.
• Emerging technologies should not be immediately adopted until they have been
evaluated for risk.
• The primary risks of emerging technologies include interoperability and
compatibility with existing systems as well as security mechanisms.
• Controls are security measures or safeguards implemented to protect systems and
data, ensure compliance with governance, and reduce risk.
• The three types of controls are administrative, technical, and physical.
• Administrative (managerial) controls are implemented through policies
and procedures.
• Technical (logical) controls are implemented through hardware and software.
• Physical (operational) controls are implemented through physical barriers and
systems used to protect people, equipment, data, and facilities.
• The five control functions are deterrent, preventative, detective, corrective,
and compensating.
• Deterrent controls must be known in order to be effective.
• Preventative controls do not have to be known; they serve to prevent malicious
actions or policy violations.
• Detective controls are used to discover or detect malicious actions or policy
violations.
• Corrective controls are used to remedy an immediate security issue and are
temporary in nature.
• Compensating controls are used in place of a preferred primary control and are
generally longer-term in nature.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
118
• Control frameworks are available to assist organizations in implementing controls
to protect their systems, meet governance requirements, and reduce risk.
• Which control framework an organization selects may be based on governance.
Some governance vehicles require specific controls, but others are more flexible.
• Control frameworks include the NIST controls, CIS controls, PCI DSS, and the
ISO/IEC 27001/27002 control catalogs.
• Controls are designed and selected based on their cost effectiveness, how well
they perform and function, how well they protect assets, how they assist in
meeting compliance requirements, and how well they reduce risk.
• Controls are tested and evaluated during various points in their life cycle,
including before and after implementation and during security assessments
such as vulnerability assessments, risk assessments, and penetration testing.
• Controls can be tested using four primary methods: interviews with key
personnel, documentation reviews, control observation, and technical testing.
• Change and configuration management are key processes involved in control
implementation.
• Interoperability with the existing infrastructure is a key concern while implementing
a new control.
• Controls must be thoroughly documented in the risk register.
• Risk responses and risk treatment options should be reported to management on
both a periodic and as-needed basis.
• Risk practitioners should understand reporting requirements levied on the
organization by both internal management and external governance.
• Risk practitioners should ensure that all data collected to form reports and give
information to management must be complete, accurate, and trustworthy.
• Risk and control monitoring techniques should be part of the formally adopted
risk management methodology and included in various documents, including
risk strategy, policy, and procedures.
• Risk reporting techniques include narrative reports, charts, and graphs such as
heat maps, scorecards, and centralized dashboards, among other techniques.
• The risk reporting technique used, as well as the complexity of the data and the
goal of the report, should be tailored to the audience.
• Key performance indicators are pieces of information that help measure the
performance of controls and other aspects of the security program as well as
show progress toward the organization’s goals in those areas.
• Key risk indicators show how risk has increased or been reduced.
• Key control indicators show how controls are performing and functioning in
terms of effectiveness, compliance, or risk reduction.
Chapter 3: Risk Response and Reporting
119
Questions
1. You are the business process owner for the manufacturing department of your
company. After a risk assessment, several key risks have been identified that
directly involve the protection of data within your department. Both the IT
security and physical security departments have security safeguards in place, or
planned for implementation, to help reduce those risks. Which of the following
most accurately describes ownership in this scenario?
A. You are the risk owner, and the IT and physical security departments are the
control owners.
B. As the business process owner, you are both the risk and control owner.
C. The IT and physical security departments own both the risk and the controls.
D. Executive management owns both the risk and controls; neither you nor the
IT and security department have any responsibility for that ownership.
2. As a risk practitioner in a larger organization, you have been asked to review the
company’s risk response options for a particular risk and make recommendations
to the company’s executive management. For some of the risk, there are obvious
controls that could be implemented, but this will not completely eliminate all
of the risk. None of the risk can be borne by any third party, and the business
processes involved with the risk are extremely critical. Which of the following risk
treatment options would you recommend after all possible mitigations have been
put in place?
A. Risk avoidance
B. Risk mitigation
C. Risk acceptance
D. Risk sharing
3. Your company has just established a contract with a third-party cloud services
provider. Based on the contract language, in the event of a breach, the provider
must disclose details of the event as well as allow an audit of the security controls
that should have protected any data disclosed during the breach. The contract
language as well as laws and regulations also stipulate that the third-party
provider retains some legal liability for the loss. Which of the following accurately
describes the responsibility and accountability borne by both your organization
and the third-party provider during this event?
A. All the responsibility and accountability are placed on the third-party provider.
B. All of the responsibility and accountability are placed on the organization.
C. The third-party provider has the responsibility for protecting the data, but the
organization retains accountability.
D. Both the third-party provider and the organization bear responsibility and
accountability for the loss of the data as well as legal liability.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
120
4. Which of the following is the major risk factor associated with integrating new or
emerging technologies into an existing IT infrastructure?
A. Security mechanisms
B. Data format
C. Vendor supportability
D. Interoperability
5. During a vulnerability scan of its systems, your organization discovers findings
that cannot be remediated without breaking several critical line-of-business
applications. Which of the following should be the path forward in determining
a solution to this problem?
A. You should patch the systems regardless of the impact of the line-of-business
applications since security is far more critical to the organization. Business
process owners must accept this and configure their line-of-business
applications accordingly.
B. You must not patch a system that would affect the line-of-business applications,
since this affects the mission and bottom line of the organization, which is far
more important to the organization than its security posture.
C. You should employ the risk avoidance response by not worrying about the
security or business ramifications of the problem, since it is beyond your
control and will waste critical resources in addressing it.
D. You should evaluate the risk of patching systems and suffering the impact to
the line-of-business applications versus the security risk if the systems are not
patched and then allow management to make a decision based on that risk.
Any exceptions should be formally approved and documented.
6. Your company has implemented several new controls to strengthen security inside
its facility. These controls include stronger steel doors, with new cipher locks, and
two more guard stations to keep unauthorized personnel from entering sensitive
areas. Which of the following types and functions would those new controls be
considered?
A. Physical, detective
B. Physical, preventive
C. Administrative, preventive
D. Administrative, deterrent
Chapter 3: Risk Response and Reporting
121
7. Your company is now doing business internationally, and as a result, one of its key
business partners overseas requires that it adopt international security standards. You
examine several different standards, and you are already using internally developed
controls that may be mapped to a new standard. Which of the following control
standards is the most appropriate to use when working with international partners?
A. NIST SP 800-53
B. CIS controls
C. ISO/IEC 27001/27002
D. HIPAA controls
8. Your company is concerned about implementing controls for a new sensitive
system it is about to install. Some existing controls can be easily used, but the
new system will require more advanced network security devices since the data
sensitivity requirements are much higher under laws and regulations imposed on
the company. These laws and regulations mandate a higher level of protection
because of the sensitivity of that system and data. Which of the following is the
most important concern the company must consider when implementing the
new security devices?
A. Cost
B. Compliance
C. Risk reduction
D. Interoperability
9. Your company has installed a new network security device and is testing it in
parallel with the rest of the infrastructure before cutting over all systems on the
infrastructure to rely on the device. Security mechanisms within the device meet
your strict governance compliance requirements, and risk analysis shows that
it can reduce risk of an external attack significantly. However, some but not all
critical systems on the network refuse to communicate with the device, making it
difficult to troubleshoot any issues and stopping critical data from transiting the
network. Which of the following is the most likely issue you should examine?
A. Interoperability
B. Authentication mechanisms
C. Encryption mechanisms
D. Network protocol issues
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
122
10. Your organization is preparing to implement many new security controls,
including upgrading legacy network security devices. While a thorough risk
analysis has been performed, there is still uncertainty about how the network
devices will interact with the rest of the infrastructure. Management is concerned
with interoperability issues and the ability to monitor the installation carefully.
Which of the following will assist in helping the implementation go smoothly?
A. Vulnerability assessment prior to installation
B. Parallel cutover
C. Risk analysis
D. Change and configuration management processes
11. You are collecting data for your annual risk and control effectiveness report to
the company’s board of directors. You’re gathering data from multiple sources,
but you are concerned about the usefulness of the data used to create a report.
Which of the following is not a concern regarding the data you’re collecting?
A. Completeness
B. Accuracy
C. Trustworthiness
D. Complexity
12. You are creating a schedule for risk reporting for various managers and events.
Which of the following strategies should you employ regarding reporting of risk
treatment options and plans?
A. Report on their progress periodically and as needed.
B. Report annually to senior management and quarterly to middle management.
C. Report results only when the risk treatment options have been implemented
and are complete.
D. Do not report on risk treatment options; only report on increases or decreases
in risk as required by governance.
13. Which of the following documents should describe the risk management
methodology, to improve risk assessment and analysis methodologies, adopted
by the organization?
A. Risk management policy
B. Risk management strategy
C. Risk assessment procedures
D. Organizational strategy
Chapter 3: Risk Response and Reporting
123
14. You are implementing a new method to quickly inform management of any
changes in the overall control effectiveness or risk posture of the organization. You
want it to be in near real time but only include the critical information necessary
that managers need to make informed decisions. You also want management to
have the ability to drill down into more detailed information if needed. Which of
the following reporting techniques would fill these requirements?
A. Heat map
B. Narrative report
C. Centralized dashboard
D. Scorecard
15. You are developing metrics for senior management regarding control effectiveness
and the risk posture of the organization. You need to create a metric that shows
managers how potential risk has been reduced due to implementing several new
controls over the past six months. You want to aggregate this measurement into
one indicator. Which of the following would be the most effective indicator to
show this reduction?
A. Key performance indicator
B. Key risk indicator
C. Key management indicator
D. Key control indicator
Answers
1. A. As the business process owner, you have responsibility and accountability for
the risk, while the IT and physical security departments are the control owners.
2. C. After all other risk reductions and mitigation actions have been implemented,
any residual risk must be accepted. Risk mitigation has already occurred, and the
scenario states that risk cannot be shared with any third party. Since these are
critical business processes, the risk cannot be avoided.
3. D. Both the third-party provider and the organization bear some level of
responsibility, accountability, and legal liability for the data loss since both the
contract language and laws address this situation. However, it is likely that the
organization will ultimately bear the most responsibility and accountability for
the data loss to its customers.
4. D. Interoperability is the major risk factor associated with integrating new or
emerging technologies into an existing IT infrastructure. It covers a wide range
of factors, typically including backward compatibility, data format, security
mechanisms, and other aspects of system integration.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
124
5. D. You should evaluate the risk of patching systems and suffering the impact to
the line-of-business applications versus the security risk if the systems are not
patched and then allow management to decide based on that risk. Any exceptions
should be formally approved and documented. You cannot simply ignore the risk,
and taking any action without carefully considering the risk would be detrimental
to the organization, whether it is making the choice to break the line-of-business
applications or ignoring the security ramifications of the problem.
6. B. The controls are physical because they involve using physical barriers to
secure the interior of the facility. The controls are also preventive because
they prevent people from entering sensitive, restricted areas. The controls are
not administrative because they do not involve written policy or procedures
established by management.
7. C. ISO/IEC 27001 and 27002 are international standards developed to
ensure interoperability and translation of security controls across international
boundaries. The other control sets, while they may possibly be used in areas
outside the United States, are unique to the U.S.
8. B. Compliance is actually the most important consideration in this scenario
because the company is installing a system that is considered sensitive enough
to be regulated by laws and regulations. Since the data sensitivity requirements
under those laws and regulations require that level of protection, the company has
no choice but to implement those advanced network security devices, regardless
of cost, interoperability, or any other consideration.
9. A. Interoperability seems to be the issue here. Since authentication and encryption
mechanisms meet compliance standards, it may be that they are not interoperable
with existing infrastructures. Network protocols aren’t likely an issue since some
devices on the network can communicate with the new device. All indications
are that the new device may not be interoperable with some of the other devices,
security mechanisms, or protocols on the network.
10. D. Proper change and configuration management processes will assist in an
orderly implementation and changeover to the needed network security devices.
Management has the ability to carefully consider, prove, and monitor changes to
the infrastructure, with the ability to back out the changes according to defined
processes if something goes wrong.
11. D. Data complexity is not an issue since it will be your job as risk practitioner to
distill the data into understandable information for the board of directors. You
are most concerned with the completeness of the data, how accurate it is, and
whether it comes from a trustworthy source.
12. A. You should report the progress of risk treatment options both periodically, as
determined by organizational policy, and as needed, depending on the criticality
or importance of the information and the desires of management.
Chapter 3: Risk Response and Reporting
125
13. A. The risk management policy, which supports external and internal
governance, should dictate the risk management methodology used by the
organization. Often this methodology will include any risk assessment or analysis
methods mandated for use. Both the risk management strategy and the overall
organizational strategy are long-term, higher-level documents that do not go
into this level of detail. Risk assessment procedures are step-by-step processes,
activities, and tasks used to perform a risk assessment, but they do not direct
overall risk management methodologies.
14. C. A centralized dashboard can supply all the necessary critical information
managers need to view control effectiveness and risk posture, all in one location.
Information can be fed to the dashboard in real time, and managers would have
the ability to drill down on particular data elements to gain more details if needed.
15. B. In this scenario, a key risk indicator (KRI) could be developed to show the
reduction in risk. A key performance indicator (KPI) would show the level of
performance of a control or other aspect of organizational security, not necessarily
the reduction in risk. A key control indicator (KCI) would show the effectiveness
of a particular control, not the reduction in risk. Key management indicators are
published by executive management and cover various metrics they are concerned
with regarding the overall performance of organizational objectives. They do not
indicate a reduction in risk.
Information Technology
and Security
CHAPTER
4
In this chapter, you will:
• Learn to describe how business goals, inormation criteria, and organizational
structures aect risk
• Determine how enterprise architecture presents risk to the organization
• Analyze actors o enterprise risk, including areas such as data liecycle
management, hardware and sotware, third-party relationships, the system
development lie cycle, project management, business continuity and disaster
recovery, IT operations management, and implementation o new technologies
• Learn basic inormation security concepts
• Examine dierent rameworks and standards
This chapter covers Certiied in Risk and Inormation Systems Control Domain 4,
“Inormation Technology and Security.” The domain represents 22 percent o the CRISC
examination.
The CRISC Task Statements relevant to this domain focus on several key activities
found in an information security program, including identifying threats and vulner-
abilities, establishing accountability through the assignment of risks and control owner-
ship, creating a risk-aware culture through security awareness training, reviewing risk
analyses, developing remediation plans to fill gaps, collaborating on the development
of risk treatment plans and on the selection and design of controls, and ensuring that
business practices align with risk management, risk appetite, and risk tolerance, and
selected security frameworks.
Information is a commodity. Even if an organization is in the business of producing
goods to bring to market, it still relies on its information and its technology as enablers
to produce those goods and deliver them to the market and consumers. Without the
ability to generate, process, and otherwise use information, modern businesses would
not be able to produce goods or services and compete in market spaces. Therefore,
any negative events that affect the organization’s ability to process information directly
affect the ability of the organization to survive. Information technology directly sup-
ports business goals, objectives, and strategies. All elements of a business endeavor
127
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
128
depend on IT, including the organization’s information (or data), its people, its line-
of-business applications and systems, and its overall infrastructure, including all of its
equipment and processes.
Information technology affects risks to the business enterprise in two different ways.
First, information technology is used to help protect the enterprise from risk; in other
words, it serves to protect the information the business generates and relies on. That’s
the purpose of having high-capacity storage, faster networking equipment, redundant
systems, and security devices sprinkled throughout the infrastructure. The second way
that IT affects risk is that it helps the organization to produce the information needed to
fulfill its business goals and objectives in the first place. Without IT, there would be no
information processed, no systems designed, and no advanced technologies developed
for a business to take to market and compete with. Therefore, IT serves to both protect
information and generate it to advance business goals.
The information the business generates and uses has several key characteristics. First,
the information should be relevant to the processes that the business supports. It should
also be timely; stale information can prevent a business from fulfilling its functions in
both short-term and long-term time frames. It should also be accurate and complete.
This is where information integrity comes in, which is one of the goals of information
security. Anything that affects the accuracy and completeness of information is a risk.
Information should also be controlled for access. Confidentiality is one of the goals of
information security, and controlled access to information and the systems that process
it is a must to maintain business function. As you might guess, another characteristic of
business information is its availability to the users who need it whenever and however
they need it. This means that authorized users should have business information, again,
on a timely basis, but also in a format that suits their needs. Risk factors that affect any
of these information characteristics, such as relevance, timeliness, integrity, confidential-
ity, and availability, must be considered in the overall risk management process for the
organization. Any detrimental impact on these characteristics presents a risk to the busi-
ness mission.
Enterprise Architecture
The enterprise architecture within an organization affects the business’s risk in several
different ways. Aspects of enterprise architecture risk include interoperability, support-
ability, security, maintenance, and how the different pieces and parts of the infrastructure
fit into the systems development life cycle. The business views IT as an investment of
capital funds, much like it does facilities and other equipment: as a means of support-
ing the business mission. Information systems represent a risk to the business because of
interoperability, supportability, security, and other issues. It costs the organization money
to maintain and support all the IT assets within the organization, in the form of parts,
software licenses, training for administrators and users, and upgrades. There are also the
intangible aspects of IT, such as business value and liability. IT systems affect the bottom
line of the organization, so a lot of thought is put into managing risk for them. Addition-
ally, you should take care to remember that information technology risk is only a piece
Chapter 4: Information Technology and Security
129
of the entire enterprise risk picture. In the next few sections, we’re going to talk about
different aspects of the information systems architecture and how they contribute to the
overall enterprise risk in the organization.
Platforms
Platforms are an element of the enterprise infrastructure that contributes to information
security and business risk for several reasons. First, it costs to field and simultaneously
maintain different operating systems and environments that come in different platforms.
Platforms also introduce risk into the environment in the form of interoperability, secu-
rity, and supportability. A diverse platform environment (with mixed platforms, such as
Windows, Linux, Macs, Unix, and so on) can affect interoperability with other systems
due to different versions of software, different network protocols, security methods, and
so on. A diverse environment can also affect supportability because the organization must
maintain different skillsets and a wide knowledge base to support the diverse platforms.
On the other hand, maintaining a homogeneous environment can reduce costs,
ensure interoperability, and allow a more common set of security controls and mecha-
nisms, such as patch management and configuration management. However, there is
even risk involved in a homogeneous platform environment because of the likelihood
that a vulnerability discovered in one system would also be shared in many others,
offering a wider attack vector for a potential malicious actor. It is really a matter of the
systems development life cycle as to how and when platforms are developed, introduced
into the infrastructure, implemented, maintained, and, eventually, disposed of, and
there is risk inherent in all of these different phases, as we’ll discuss in more detail later.
Software
Software introduces risk simply because, today, it’s so critical to business operations.
Businesses need not only basic word processing and spreadsheet software but also com-
plex databases, line-of-business applications, specialized software, security software, and
other types of applications. Software must be managed within its own life cycle as well; it
is constantly being patched, upgraded, superseded, and replaced by better, faster software
with more features that usually costs more. Risks that are inherent to managing applica-
tions within an organization include supportability, backward compatibility, data format
compatibility, licensing, and proper use.
Adding to this complexity are the decisions an organization makes in terms of the selec-
tion of proprietary software, open-source software, general-purpose commercial software,
or highly specialized software. All these different categories incur different levels of cost,
supportability, licensing, and feature sets. Interoperability also plays a part in application
risk, as it does with other infrastructure components. Applications that do not use com-
mon data formats or produce usable output for the organization create the risk of expense
or additional work that goes into transforming data between incompatible applications.
Applications also introduce risk into the business environment with the level of security
mechanisms built into them and how effective those security mechanisms are in protect-
ing data residing in the application.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
130
It’s worth mentioning here that web-based applications, in addition to presenting
the same risks as normal client-server apps, also have their own unique risks. Security
is a definite risk imposed by web-based applications since they often directly connect
to unprotected networks such as the Internet. Other risks include those that come
from the wide variety of web programming languages and standards available for
developers to use.
Databases
Databases, as a subset of applications, impose some of the same risks that applications
and other software do. Additionally, databases incur risks associated with data aggrega-
tion, compatibility, privacy, and security. Aggregation and inference are risks associated
with database systems. Unauthorized access and data loss are also huge risks that data-
bases introduce into the enterprise environment.
Operating Systems
Although we discussed platforms in a previous section, it’s also worth mentioning oper-
ating systems as their own separate risk element in the enterprise infrastructure. The
terms platform and operating system are sometimes used interchangeably, but, truthfully,
a platform is more a hardware architecture than an operating system categorization.
A platform could be an Intel PC or a tablet chipset, for example, which are designed
and architected differently and run totally different operating systems. Different operat-
ing systems, on the other hand, could run on the same platform but still introduce risk
into the organization for the same reasons discussed previously with applications. For
example, there are interoperability and supportability risks and all the other issues that go
hand in hand with the normal operating system life cycle, such as patch and vulnerability
management. Licensing, standardization, level of user control, and configuration are also
issues that introduce risk into the organizational computing environment.
Networks
Networks are another aspect of enterprise infrastructure that is absolutely critical to pro-
tecting data. They are most effective when they are implemented in a way that not only
incorporates the business logic of the organization but also follows the data flow—taking
into account how the software is most implemented and integrated with other systems
such as databases.
Let’s first take a step back to understand what a network is. At its most basic level, a
network is a mechanism that allows systems to communicate with each other. The com-
ponents are often devices such as switches (for local network communication) and routers
(for communications between networks). There are a number of protection mechanisms
Chapter 4: Information Technology and Security
131
on networks such as firewalls (which regulate network traffic), intrusion protection sys-
tems (which protect traffic at a deeper level than firewalls), threat intelligence gateways
(which are designed to protect external networks prior to connecting to firewalls), and
so on. This is only a sampling of the protective technologies that are network based. The
deeper the understanding of the technologies, the more granular a risk assessor may be.
The philosophy one uses to set up the location of protective network devices can be
referred to as the architecture. For example, for sensitive data, most compliance frame-
works require that the data not be stored in the database on the same local network seg-
ment as a web server. This way, if the web server is compromised, attackers will not have
immediate access to the data. If they sit on the same network, that may be considered
a higher risk in a risk assessment—the recommendation being to move the database to
another network behind the web server, with firewalls and intrusion detection systems
being the intermediary between the two local networks.
Another factor to consider is encryption of data in motion. If a legacy system does
not have encryption and it is sending data to another location on the Internet, there is a
risk to anyone between the networks for an on-path attack (formerly known as a “man-
in-the-middle attack”). A VPN tunnel can be set up between the two networks to ensure
that at least the traffic is encrypted as it traverses the networks (or Internet).
In the end, networks and networking can be extremely challenging and detailed.
What we have covered here only scratches the surface of what is entailed by networks
and networking. It is worth your time to explore this topic in depth to help create a better
network and ultimately add to a risk assessment.
Cloud
No book on risk would be complete without considering cloud-based risks. The con-
cept of “Anything as a Service” (XaaS) means that, for a price, nearly anything a user or
company would use a computing system for can be delivered to them by a cloud service
provider through the cloud infrastructure—typically through a thin client or web inter-
face. In such a serverless architecture, a cloud provider manages the server and associ-
ated architecture and allocates resources as necessary to the end users. This requires less
upfront investment in hardware and software by the customer, greater scalability, and
centralized management for administration and security concerns. Each cloud infrastruc-
ture is a little different, but there are three main types of cloud infrastructure to consider
when looking at risk:
• Preliminary
• Architecture vision
• Business architecture
• Information systems architecture
• Technology architecture
• Opportunities and solutions
• Migration planning
• Implementation governance
• Architecture change management
• Requirements management
Chapter 4: Information Technology and Security
133
Figure 4-1
TOGAF Preliminary
components
Architecture
Vision
Architecture
Business
Change
Architecture
Management
Information
Implementation Requirements
Systems
Governance Management
Architecture
Migration Technology
Planning Architecture
Opportunities
and
Solutions
IT Operations Management
Managing the enterprise infrastructure is one of the most work-intensive efforts in an
organization, especially in a larger business. The enterprise infrastructure in an orga-
nization covers a broad scope of areas. Infrastructure, of course, covers workstations,
printers, and other end-user devices. It also covers the major pieces needed to conduct
business, such as servers, cabling, switches, routers, and a variety of other network and
security devices. Most organizations also include wireless networks in their support-
ing equipment. Additionally, the infiltration of mobile devices into businesses makes
this a new and sometimes difficult area to bring under the organization’s infrastructure
umbrella. Challenges with the enterprise infrastructure include not only maintenance,
upgrades, updates, and implementing new technologies but also includes some of the
more typical traditional management challenges, such as budgeting, project manage-
ment, and staffing.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
136
Key areas in IT operations management include server and infrastructure manage-
ment, end-user support, help desk, problem escalation management, and, of course,
cybersecurity. IT managers must maintain and meet any internal agreements that cover
guaranteed service delivery in support of the different divisions within the organization,
as well as service level agreements (SLAs) with other organizations. While information
security personnel tend to focus more on IT risk, we find that most of the risk factors,
threats, and vulnerabilities affecting IT also affect all the operations within the business.
In the next few paragraphs, however, we’ll focus on those that directly affect managing
the IT operations in an organization.
Management of IT operations incurs risk factors such as the size and complexity of the
organization and its IT infrastructure, the criticality and priority of the different systems
that make up the infrastructure, and the internal management processes of the organiza-
tion. Resourcing issues also affect the management piece of IT operations; staffing the
right people who have trained on the various technologies the organization needs as well
as creating a budget that helps maintain the current level of support and future growth
for IT are examples of resource-related risk factors. Additionally, compliance with legal
and governance requirements in the face of increased regulation are also risk factors the
IT managers must deal with.
Organizational structure also affects IT operations because the IT infrastructure may
be managed on either a centralized or a decentralized basis—sometimes by one central-
ized IT shop, or in the case of larger organizations, by multiple areas within other divi-
sions that are delegated the task of managing their own piece of the infrastructure. IT
might also be managed on a functional basis; the accounting and human resources divi-
sions may have the responsibility for managing the systems that support their mission.
Additionally, the IT infrastructure may be managed on a geographical basis, in the case of
physically separated locations in large organizations. All these structural considerations
are factors that contribute to risk in managing IT operations.
Also directly affecting IT operations risk are two key processes: the change and
configuration management processes. We’ve already discussed risk factors that affect
the SDLC model in an organization, as well as how new and emerging technologies
can affect the existing infrastructure. These same risk factors also directly affect the
daily management of IT operations simply because they introduce change into the
network. Some of this change can be planned and carefully introduced, but often
there is change—from the large-scale network side, all the way down to individual
configuration items on hosts—that may have unforeseen consequences and affect the
network in different ways. How the organization deals with change and configuration
management is a risk factor that affects not only the SDLC but also the management
of day-to-day operations.
Threats that affect the IT operations are like those that affect other areas of the busi-
ness and could be external or internal threats from a variety of sources. Some of these
threats have a ripple effect in that they may first affect other areas of business and, in
turn, affect IT. For example, the threat of a poor economy may affect the profitability
Chapter 4: Information Technology and Security
137
and sustainment of the business, resulting in cuts, which often include IT personnel or
equipment. Obviously, there are also direct threats to the daily management of the IT
infrastructure. These include external threats such as hackers, of course, but also more
commonly come as increases in cost to maintain operations, issues with external service
providers, and disaster-related events (weather, fire, and so on). Internal threats could
include those carried out by malicious insiders or even careless workers, such as theft,
sabotage, accidental equipment breakage, and so on. Internal threats could also come
from management processes and include budget cuts, loss of trained personnel, shifts in
organizational priorities, and transitioning from one market segment to another.
Technical vulnerabilities are beyond the scope and purpose of this book; our focus here
is on those associated with the IT management aspect of the organization. Vulnerabilities
affecting IT management include faulty processes and procedures, lack of resources, and
lack of trained technical personnel. An end-user population that has not been trained
or held accountable for proper care and treatment of the infrastructure could also be a
vulnerability. Other vulnerabilities might include a lack of infrastructure monitoring, a
lack of control of sensitive information in IT systems, and a failure to maintain a stable
SDLC throughout the entire infrastructure.
Project Management
Organizations use project, program, and portfolio management to oversee and sustain
both short- and long-term aspects of systems and processes. These categories apply to the
scope and scale of different sets of activities or processes within an organization. Projects
are limited duration sets of activities geared toward a particular goal; programs are ongo-
ing, longer term, and may also encompass several individual projects as well as other
activities specific to processes that may have an indefinite duration. Portfolio manage-
ment is the oversight of several different programs by a senior person in the organization.
Keep in mind that the major difference between a project and a program is duration; a
project has a definite beginning and ending, whereas a program is indefinite.
At the core of a project are three primary drivers: the scope (the amount or range of
work), schedule (when work is to be done and its completion date), and cost (including
all the resources expended toward the completion of the project). All projects depend on
these three elements to ensure success. Any shortfalls in cost, delays in schedule, or out-
of-scope work (also called scope creep) affect the ability of the project to succeed, on time,
within budget, and all the agreed-upon work completed. We’ll discuss the risk factors
that can affect all three of these elements next.
Since the three major elements of a project or program are scope, schedule, and cost,
risk factors associated with projects and programs primarily affect each of these elements.
Factors that affect scope often come from disagreement on exactly what work must be
accomplished, in what order, and who will do it. These factors should be examined
and agreed upon during the requirements process, where the project is formally scoped.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
138
In complex projects, factors that may affect scope include the necessity to task workers
from different sections or departments, the exact amount of work to be done, in what
order it will be done, and the priority of each task and subtask. The political culture
within the organization can adversely affect scope as well since there may be disagree-
ment between departments or executives on what work is required and whose responsi-
bility it is to accomplish it.
The scheduling component of a project has several risk factors as well. The amount of
work to be done (scope) affects the schedule as a risk factor because of the time given to
accomplish a specific amount of work and the resources allocated to this work. Lack of
workers or materials adversely affects the schedule, as does the availability of equipment,
work location or site, and external factors such as contract negotiations, government
shutdowns, and so on, as examples.
Cost risk factors stem from lack of budget control during the project, including an
inaccurate budget or estimation of cost, unexpected expenditures, a weak economy, and
so on. Project costs are affected by the cost of labor (to include wages, insurance, and
benefits) as well as the cost of supplies or materials needed to complete the project. Addi-
tionally, since all three of the elements of scope, schedule, and cost are also risk factors
for each other, a delay in schedule or any extra, out-of-scope work impacts the project
budget and costs as well.
Other risk factors for projects include training, staffing the project with the right
mixture of personnel who have the right skill sets, attitudes, and focus on making the
project or program a success. A manager without the right project management skill
set is a risk factor that can affect scope, schedule, and cost if they do not manage those
three critical elements properly. A technician without the right technical skills may
cost the project more money in training or delay work unnecessarily due to rework or
slow production.
In addition to factors such as scope, cost, and schedule, adding an indefinite or lon-
ger-term duration affects programs as a risk factor because you must project how they
will be staffed, funded, equipped, and otherwise managed in the future, over a longer,
indeterminate period. Therefore, risk factors could be long term and fluctuate over that
time. Factors such as market, economy, and technology changes will influence risk in
a program much more so than a project, affecting its scope, schedule, and cost over a
longer period.
The threats to a project or program are similar; the major difference is the duration of
the time that the threat represents potential harm to a project or program. Keep in mind
that threats for a project or program aren’t those you might traditionally think of as threat
sources; they are rarely malicious in nature and usually come from the business environ-
ment itself. For example, threats to cost are usually those that involve money or resource
issues, such as price increases, currency value fluctuation, stock market variations, and
so on. These are usually external threats; internal threats to costs might include a sudden
budget restructuring, cutting funds for a project, bankruptcy, and so on. Threats to the
schedule might include worker shortage, strikes, inadequate training, delays in contract
Chapter 4: Information Technology and Security
139
negotiations, delays from suppliers, and so on. Scope threats usually involve extra or
additional work due to faulty requirements gathering and decisions about what falls into
the project’s scope and scale.
The project or program manager must monitor and control these things to prevent cost
overruns, schedule slippage, and scope creep. Failure to monitor or control these ele-
ments is a serious vulnerability and could jeopardize the success of the entire project or
program. Table 4-2 gives examples of some of the risk factors, threats, and vulnerabilities
related to project and program management.
Business Continuity
and Disaster Recovery Management
Business continuity and disaster recovery management are necessary parts of running
a business, regardless of its market area. This is because incidents, disasters, and other
negative events happen to all organizations eventually, despite the most favorable
conditions and the most careful planning. Business continuity and disaster recovery
are primarily concerned with the goal of business resilience. An entire area of expertise
is dedicated to this goal with these processes in mind; sometimes, it’s referred to as
continuity management.
One thing to keep in mind is the difference between business continuity and disaster
recovery. Business continuity is concerned with the careful planning and deployment
of resources involved in keeping the mission of the business going (that is, keeping the
business functioning regardless of negative events). This process is more long term and
requires continual commitment from the organization. Disaster recovery, on the other
hand, is primarily concerned with the quick reaction involved with preserving lives,
equipment, and data immediately following a serious negative event. Disaster recovery
is (hopefully) a short duration process and does not concern itself with conducting the
daily mission of the business. Business continuity is more concerned with the long-term
survival of the business, while disaster recovery is more concerned with the short-term
Chapter 4: Information Technology and Security
141
process of reacting to a disaster. While closely related, these two efforts are not the same
thing; in fact, disaster recovery could be viewed as a subset of the activities that go on
during the overall continuity management strategy.
Recovery Objectives
Two key areas of concern in business continuity are the recovery point objective (RPO)
and the recovery time objective (RTO). Both areas can be measured in the context of time.
The recovery point objective is the amount of data that can be lost based on a time mea-
surement. In other words, if the recovery point objective is two days, the most amount
of data that can be lost without a serious effect on the organization’s ability to function
would be two days’ worth of data. Note that this measurement isn’t concerned with the
actual amount of data in terms of quantity, such as gigabytes, for example; instead, it’s
concerned with measuring how many days or hours’ worth of data can be lost, at most,
without impeding the function of the business. The recovery time objective, also mea-
sured in terms of time, is the maximum amount of time the organization can afford to
lose before it starts recovery. This measurement of time could be days, hours, minutes,
or even seconds.
Recovery Strategies
The recovery strategy developed by the organization is a result of careful planning, as
well as budgeting and allocating resources to the continuity management efforts. The
recovery strategy should address the most efficient methods of getting the business back
online and functioning after properly responding to the critical needs of protecting peo-
ple and equipment during the disaster itself. Keep in mind that recovering the business
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
142
to an operational state does not necessarily mean it will be working at 100 percent of
its previous operational capacity; the business may only be able to get a few key services
up immediately following a disaster. The organization should take a realistic look at the
degree of continuity possible, given the seriousness and scope of the disaster, its resources,
the environment it is working with after the disaster, and the availability of people, sup-
plies, infrastructure, facilities, and equipment. All of this should be considered in the
recovery strategy planning.
Plan Testing
Testing the disaster recovery plan is of critical importance; without testing the plan, the
organization won’t really know whether it’s effective until a disaster occurs. Normally,
that’s a bit too late to find out that you haven’t carefully considered all the different events
that could occur during a disaster and how you will deal with them. Testing the plan
involves making sure that people know what their responsibilities are, that they are well-
trained, that they have all the equipment and resources needed to adequately respond
to disaster, and that they practice these responses. Testing the disaster recovery plan will
point out deficiencies in training, equipment, resources, and response activities.
EXAM TIP Be amiliar with the dierent business process areas and their
respective risk actors, threats, and vulnerabilities. Remember that risk
actors, while not a threat or a vulnerability, contribute to the overall risk
o the organization by increasing or decreasing the likelihood or impact
o threats exploiting vulnerabilities or the organization’s resilience to
negative events.
• Data classification
• Document handling, retention, and storage
• Document disposal
Data Classification
An organization’s documentation can be voluminous, comprising a variety of docu-
ments of varying levels of value and importance. Depending on the type of document,
the amount of security and types of procedures used in storing and distributing that
document can greatly vary. Some documents might be considered public, so they can
be posted in a public forum or distributed freely to anyone. Other documents might
be highly confidential and contain information that only certain individuals should be
allowed to see.
To aid in the document management effort, documents need to be assigned security
classifications to indicate their level of confidentiality and then labeled appropriately.
Each classification requires different standards and procedures of access, distribution,
and storage. The classification also sets a minimum standard of privileges required by a
user to access that data. If a user doesn’t have the necessary access privileges for that clas-
sification of data, the user won’t be able to access it. Typically, access is delineated using
subjective levels such as high, medium, and low. These should be agreed upon by man-
agement based on the data’s sensitivity and the damage to the organization if the data is
subjected to unauthorized access.
Several levels of classification can be assigned, depending on the type of organization
and its activities. A typical organization might have only two classifications: private and
public. Private classified documents are intended only for the internal use of the organiza-
tion and can’t be distributed to anyone outside the organization. Public documents, how-
ever, would be available to anyone. Government and military institutions might have
several levels of confidentiality, such as Unclassified, Confidential, Secret, Top Secret,
and so on. Each level of classification represents the level of severity if that information
is leaked. For example, the lowest level (Unclassified) means that the document is not
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
146
considered confidential or damaging to security and can be more freely distributed
(though not necessarily releasable publicly). At the highest level (Top Secret), docu-
ments are highly restricted and would be severely damaging to national security if they
were to fall into the wrong hands. Each document needs to be assigned a classification
depending on the sensitivity of its data, its value to the organization, its value to other
organizations in terms of business competition, the importance of its integrity, and the
legal aspects of storing and distributing that data.
EXAM TIP The type o security protections, access controls, data retention,
and storage and disposal policies to be used all depend on a document’s
security classiication.
Document Disposal
Document disposal can often be a tricky issue. In some cases, a document needs to be
destroyed to avoid future legal or confidentiality ramifications. In other cases, it’s illegal
to destroy certain documents that are required by law as evidence for court proceedings.
Only your organization’s legal department can decide on retention and disposal policies
for documents. Once decided on, these policies need to be communicated to workers
to ensure that sensitive documents are either destroyed or retained as per their classifica-
tion. Without proper disposal techniques, the organization is susceptible to dumpster
diving attacks.
At the basic level, the SDLC consists of several phases that include conceptualizing the
system, discovering the requirements for a system, designing its architecture, developing
the system, testing it as both a single unit and as integrated with larger systems in its
environment, implementing the system, and, finally, disposing of the system after it has
reached the end of its useful life. Each of these different phases of the life cycle has dif-
ferent aspects that include planning, management, resourcing, and so on. Each also has
inherent risks. We’ll discuss these phases generically in the next few paragraphs.
NOTE Some o the names we give to the dierent liecycle phases may
vary among dierent liecycle models, but in general, the concepts are
the same.
Requirements
The next phase of the SDLC is generally the requirements phase, and this phase is typi-
cally named as such in most models. During this phase, different sets of requirements
are developed. These requirements might include functional requirements, performance
requirements, security requirements, and business requirements. Requirements dictate
concrete terms, such as what a system is exactly supposed to do, how it will do it, to what
degree, and what standards it must meet. Without a clear set of requirements, there can’t
be any good traceability back to what the system was supposed to do in the first place.
That’s why it’s very important to try to accurately cover all the possible requirements
and needs the system may have to meet. This is also where the scope of the development
process is established. Security and privacy professionals should be invited to develop
security and privacy requirements for the system, to ensure that later phases of the project
will include all required characteristics.
Design
The next few phases can be a bit different based on the model under discussion and
whether the product being developed is a system or software. System developers would
move from the requirements phase into designing the architecture in terms of devel-
oping a general high-level design of how the system is supposed to work, what major
components it might have, and what other systems it might interface with. Software
developers similarly might design software architecture at a higher level during this phase.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
150
As the SDLC development process moves forward, this overall architecture is decom-
posed down into smaller pieces until finally individual components or pieces of code
can be developed. Again, how this design process progresses depends on which model is
being used. Security and privacy professionals should be asked to review the design of the
system to ensure that requirements were properly represented.
Development
After the design phase, decisions must be made as to whether to build a system or soft-
ware or simply acquire it from a third party. Some systems and software can be bought
from other developers, but some must be developed specifically for the end applica-
tion or end use. If the system is to be acquired from some other source, and the design
specifications are provided to the best source, then a system or software that meets the
requirements and design will be provided. If the system is to be developed, the next phase
of the SDLC comes into play. During this phase, the software is written, and systems
are assembled from individual components. Organizations can use tools to examine a
system’s source and object code to identify any security-related defects that could be
exploited by an attacker.
Testing
Following the development phase, many SDLC models include a test phase. In the
test phase, different aspects of the software and systems are tested. Many different tests
can take place during this phase. Some of these tests might involve unit testing, which
simply means to test an individual component or unit of software at its most basic level
for functionality and performance. Integration testing, another type of testing, usually
involves testing the overall function and performance of all the components of the sys-
tem or piece of software working together, as they would when assembled. During this
phase, other types of testing could take place, including interface testing (testing differ-
ent aspects of the system when it interfaces with other separate systems in its environ-
ment) and security testing (which may include compliance testing, vulnerability testing,
and even penetration testing). User acceptance testing involves end users of the system
performing various functions to determine whether they will accept the system in its
current, developed state.
EXAM TIP While you will likely not be expected to know the details o
any speciic SDLC model, be amiliar with the generic phases o the SDLC:
Initiation, Requirements, Design, Development, Testing, Implementation,
and Disposal. Also, keep in mind that dierent models may reer to these
phases by dierent names or even combine or separate phases out to
some degree.
SDLC Risks
Most of the risk factors inherent to the SDLC affect both the entire model and each of
the different phases separately. Since the SDLC could be considered to have several dif-
ferent facets, including a management process, an engineering framework, and even a
methodology, you could say that risk factors that affect the SDLC are also common to
other types of processes. For instance, earlier, we discussed risk factors that affect project
and program management. These risk factors affect scope, schedule, and cost. The SDLC
suffers from similar risk factors because each of the phases, as well as the SDLC, have
different scope, schedule, and cost elements. Each of these phases can also be affected
by risk factors that impact the availability of resources (manpower, funding, equipment,
facilities, and so on), such as management commitment and organizational structure.
Unique risk factors that affect the SDLC include those that affect system changes,
system configuration throughout the life cycle, and those that affect releasing differ-
ent versions of the system as updates take place. Most of these elements occur during
implementation, maintenance, and sustainment of a system but also can occur in other
phases of the SDLC where multiple versions of a system are fielded simultaneously, as
well as in models where there is a continuous iterative process of updating and upgrading
a system or software. Risk factors that affect system changes include how well the change
and configuration management processes work and how changes are implemented into
the system. Change and configuration management processes that are not well managed
are risk factors, because this could cause changes that are not documented or not tested
for security, functionality, or performance. Additionally, factors such as the complexity
of the system, how the organization is structured to manage the systems development
process, and how rapid system changes occur are also potential risk factors.
Threats to the SDLC manifest themselves when systems are produced that are not
interoperable or compatible with other systems and their environment or systems are
not secure. Other threats might include systems that do not meet the requirements they
were originally intended to meet. These threats would affect both the functionality and
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
152
performance of the system as well. Threats to the design process include faulty design
specifications as well as faulty requirements input from the previous requirements phase.
Most of the threats to the SDLC come in the form of mismanagement, miscommunica-
tion, incorrect expectations, and lack of a commitment of resources or expertise.
Many different vulnerabilities can affect the SDLC; again, a great many of them have
been previously discussed as also affecting the project or program management process.
These vulnerabilities affect scope, schedule, and cost, of course, but can also affect the
quality of the system or product. In addition, the system’s security, functionality, and
performance are also affected by these different vulnerabilities. While probably too many
to list here, examples of vulnerabilities that affect the SDLC start with a lack of firm
requirements and mixed expectations from the different system stakeholders. A lack of
documentation in all phases is also a significant vulnerability to the entire SDLC, but
particularly to the requirements and design phases. Failure to develop solid design speci-
fications and systems architecture is a vulnerability that can result in a faulty design that
does not meet system requirements. In the development phase, lack of adequate consid-
eration for system interfaces, as well as how subcomponents fail to support higher-level
components or meet technical requirements, can result in a shoddy system or software.
Failure to test systems properly and thoroughly, as well as their interaction with their
environment, may mean that serious functional or performance issues with the system
are not discovered until well after it is put into production. Vulnerabilities in the imple-
mentation phase include faulty implementation, lack of traceability to original require-
ments, and failure to properly maintain a sustained system after it has been put into
production. And lastly, vulnerabilities associated with the disposal or retirement phase of
the SDLC can result in systems that are not properly replaced or not securely disposed
of. This can cost the organization money and potential liability.
Emerging Technologies
New or emerging technologies can present risks to organizations simply because there are
several different important considerations when integrating the latest technologies into
the existing infrastructure. Many organizations have an unfortunate tendency to rush
out, buy, and attempt to implement the latest and greatest technologies on the market
without careful planning or consideration of the existing infrastructure and how it will
react to the new technologies. One of the primary considerations organizations must
look at is making a business case for the new technology, which may be to fill a gap that
the older technology does not provide or to provide a capability that the organization
must now have to compete in the market space. In other words, the organization really
must justify new technologies to make them worth the risk they could incur.
Emerging technologies have several risk factors inherent to their integration into the
existing infrastructure. If the organization has been able to justify the implementation
based on a true business need for the emerging technology, it must consider several
risk factors. One of the major risk factors is interoperability with existing infrastructure.
Frequently, newer technologies don’t always work properly with older systems right out
of the box; adjustments may need to be made to the existing infrastructure to integrate
Chapter 4: Information Technology and Security
153
the new technology, or even bridging technologies may be needed to connect the two
together. Interoperability doesn’t just involve the right connections; it can involve data
formats and flows, security methods, interfaces into other systems, and changes to busi-
ness processes. These considerations, and many others, are risk factors that must be con-
sidered before acquiring and integrating new technologies.
Another risk factor is security. New technologies may have security mechanisms that
are not necessarily backward compatible with existing ones. Examples include encryp-
tion algorithms and strengths, identification and authentication technologies, integrity
mechanisms, and even redundant or backup systems. Additionally, the systems may
involve a learning curve that may intimidate users who must now learn new security
methods for the system. The human factor can be a weak link in the security chain,
so either lack of training or a lack of adaptability to the new security mechanisms can
introduce risk.
Earlier, when we discussed the SDLC model, we pointed out that system updates and
changes can be risky if not managed properly. Integrating new technologies into the envi-
ronment with older ones can introduce both intentional and unintended changes into
the environment as well, affecting the stability of the organization’s SDLC with a par-
ticular system. Therefore, change is also a risk factor. Even in the disposal or replacement
phase of the SDLC, introducing new technologies to replace older ones can be prob-
lematic if not planned and executed properly. New technologies that are not adequately
tested for functionality, performance, integration, interoperability, and security may not
be able to adequately replace older systems, resulting in extended costs and possibly even
requiring an extension of the older systems’ life cycle.
Threats resulting from the introduction of new and emerging technologies into the
existing infrastructure are numerous. If the organization has failed to adequately plan for
the new technology, these threats can become significant. Some of these threats include
untested or unproven technologies, non-interoperability, incompatible security mecha-
nisms, and suitability of the technology for use in the organization. The organization
could also incur additional costs and require more resources due to faulty implementa-
tion. These threats can be minimized through careful planning and by integrating new
technologies using a stable SDLC model.
As with threats, vulnerabilities associated with emerging technologies are numerous
as well. Vulnerabilities could include a lack of trained staff committed to managing and
implementing the new technology. Lack of adequate project planning is also a serious vul-
nerability that could affect the organization’s ability to effectively integrate new technolo-
gies. Another vulnerability could be a weak support contract or another type of warranty,
guarantee, or support for a new technology or system. Most of these vulnerabilities appear
when a new technology is first implemented and tend to become mitigated or lessened as
the technology is integrated into the existing infrastructure, but they still exist.
EXAM TIP The key areas o concern with emerging technologies are
interoperability and compatibility. These two concerns aect the security,
unctionality, and perormance o new technologies when they are installed
into an existing inrastructure.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
154
Information Security Concepts,
Frameworks, and Standards
In order to successfully sit for the CRISC exam, you should be familiar with some basic
information security concepts. You can’t be expected to know how to manage risk in a
security environment if you don’t understand the basics of information security in the
first place. Now, we’re going to assume you have some level of experience already as an
information security professional, since risk management is a significant portion of (and
a logical career progression from) the information security profession. You may also have
had some level of experience in specific risk management processes at some point during
your career. As such, we’re not going to go into great detail on the basic information secu-
rity concepts in the upcoming sections; this will just serve as a quick refresher to remind
you of certain security concepts. We’ll also review a few key control frameworks in detail,
including the NIST Risk Management Framework (RMF) and COBIT 2019, and how
these frameworks are used in managing risk. Additionally, you’ll find that this chapter
covers more material than you might find on the exam; this is for two important reasons.
First, it’s important that you understand foundational and conceptual knowledge about
controls and some of the relevant control frameworks you will find on both the exam
and in the real world as a risk and control assessor. Second, this book is intended to be
not only a study guide for the exam but also a comprehensive reference you will use even
after you have passed the CRISC exam.
You may learn traditional information security doctrine, as well as fundamental infor-
mation security knowledge, from various training courses and on-the-job experience over
the years. One such doctrine teaches that there are three fundamental information secu-
rity goals. These goals are what we’re striving for as risk and information security profes-
sionals; they are confidentiality, integrity, and availability. You’ll sometimes see these three
terms strung together as an acronym, such as the CIA triad or, occasionally, the AIC triad,
depending on the different information security literature you read. In any event, these
three goals are what we want to achieve for all our information systems and data. They
are also characteristics we want to ensure all our systems, processes, procedures, methods,
and technologies display.
Popular security theory sets forth these three overarching security goals but also pro-
vides for auxiliary elements that support these goals in various ways. These are concepts
that, both individually and combined, help us as security professionals to ensure we
maintain data confidentiality, integrity, and availability, as well as protect our systems
from unauthorized use or misuse. We’ll discuss all these different security elements and
other concepts, as well as how they support three primary goals of information security,
in the next few sections.
EXAM TIP You will need to understand the deinitions o the goals o
inormation security—conidentiality, integrity, and availability—very well
or the exam. Almost everything in inormation risk management supports
those three goals, either directly or indirectly.
Access Control
As an information security professional, you probably already know that a security control
is a security measure or protection applied to data, systems, people, facilities, and other
resources to guard them from adverse events. Security controls can be broken down
and categorized in several ways. Access controls directly support the confidentiality and
integrity goals of security, and indirectly support the goal of availability. Access control
essentially means that we will proactively ensure that only authorized personnel are able
to access data or the information systems that process that data. Access controls ensure
that only authorized personnel can read, write to, modify, add to, or delete data. They
also ensure that only the same authorized personnel can access the different information
systems and equipment used to store, process, transmit, and receive sensitive data.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
156
There are several different types of access controls, including identification, authenti-
cation, and authorization methods, encryption, object permissions, and more. Remem-
ber that access controls can be administrative, technical, or physical in nature. Admin-
istrative controls are those implemented as policies, procedures, rules and regulations,
and other types of directives or governance. For example, personnel policies are usually
administrative access controls. Technical controls are those we most often associate with
security professionals, such as firewalls, proxy servers, VPN concentrators, encryption
techniques, file and folder permissions, and so on. Physical controls are those used to
protect people, equipment, and facilities. Examples of physical controls include fences,
closed-circuit television cameras, guards, locked doors, gates, and restricted areas.
In addition to classifying controls in terms of administrative, technical, and physical,
we can also classify access controls in terms of their functions. These functions include
preventative controls, detective controls, corrective or remedial controls, deterrent con-
trols, and compensating controls. All the different controls can be classified as one or more
of these different types of functions, depending on the context and the circumstances in
which they are being used. Controls were described in more detail in Chapter 3.
Authorization
Authentication to a resource doesn’t automatically guarantee you have full, unrestricted
access to a resource. Once you are authenticated, the system or resource defines what
actions you are authorized to take on a resource as well as how you are allowed to inter-
act with that resource. Authorization is what happens once you’ve successfully identified
yourself and have been authenticated to the network. Authorization dictates what you
can or can’t do on the network, in a system, or with a resource. This is usually where
permissions, rights, and privileges come in. In keeping with the concept of least privilege,
users should only be authorized to perform the minimum actions they need in order
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
158
to fulfill their position’s responsibilities. Authorization has a few different components.
First, there is need-to-know. This means that there must be a valid reason or need for an
individual to access a resource, and to what degree. Second, an individual may have to
be trusted, or cleared, to access a resource. This may be accomplished through a security
clearance process or non-disclosure agreement, for example.
Accountability
Accountability means that a person is going to be held responsible for their actions on
a system or with regard to their interaction with data. Accountability is essentially the
traceability of a particular action to a particular user. Users must be held responsible for
their actions, and there are different ways to do this, but it is usually ensured through
auditing. First, there must be a unique identifier that is tied only to a particular user.
This way, the identity of the user who performs an action or accesses a resource can be
positively established. Second, auditing must be properly configured and implemented
on the system or resource. What we are auditing is a user’s actions on a system or interac-
tions with a resource. For example, if a user named Sam deletes a file on a network share,
we want to be able to positively identify which user performed that action, as well as the
circumstances surrounding the action (such as the time, date, from which workstation,
and so on). This can only be accomplished if we have auditing configured correctly and
take the time to review the audit logs to establish accountability.
Non-Repudiation
Non-repudiation is closely related to accountability. Non-repudiation ensures that the
user cannot deny that they took an action, simply because the system is set up such that
no one else could have performed the action. The classic example of non-repudiation is
given as the proper use of public key cryptography. If a user sends an e-mail that is digi-
tally signed using their private key, they cannot later deny that they sent the e-mail since
only they are supposed to have access to the private key. In this case, the user can be held
accountable for sending the e-mail, and non-repudiation is ensured.
Note that there is no hard and fast rule about mapping security elements and access
controls to security goals; all of these elements and controls can support any one or even
Chapter 4: Information Technology and Security
159
more than one goal at a time. For example, encryption, a technical access control, can
support both confidentiality and integrity at the same time.
NOTE Although other texts may describe the supporting elements o the
security goals dierently, the basic ones we’ve described here are very
common and directly support the three goals o conidentiality, integrity,
and availability.
Frameworks
A framework is a generally overarching methodology for a set of activities or processes.
It may not get into the detailed processes and procedures; instead, it provides for a
500-foot view of the general direction and steps used to build a more detailed pro-
gram or process. A framework is used as an overall architecture for a greater effort. A
framework has characteristics that include defined steps and repeatability, and it can be
tailored based on the organization’s needs. In terms of a risk management framework,
you may have a set of general steps defining how to approach risk management, which
include listing the processes and activities necessary to build such a program or effort.
You would then break down these larger steps into specific supporting procedures for
this effort based on the needs of your organization and using standards (described
next). Frameworks are typically selected and adopted at the strategic level of corporate
management and governance.
Standards
A standard is a mandatory set of procedures or processes used by the organization and
usually fits into an overall framework. Standards often define more detailed processes or
activities used to perform a specific set of tasks. Standards are used for compliance rea-
sons and made mandatory by an organization or its governance. The National Institute
for Standards and Technology (NIST) standards are mandatory for use by the United
States federal government, for instance, but are published as an option for private orga-
nizations and industries to adopt if they so choose. If an organization adopts the NIST
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
160
standards for risk management, for example, the organization may make them manda-
tory for use by its personnel. Then all processes and activities for a given effort within
the organization would have to use and meet those standards. Some standards define the
level of depth or implementation of a security control or measure. The Federal Informa-
tion Processing Standards (FIPS) for cryptography and encryption are an example of this;
they set forth the different levels of encryption strength for various cryptography applica-
tions that may be required in certain circumstances. So, if you create security policies and
procedures for implementing cryptography within the organization, the FIPS standard
could tell you to what level those policies and procedures must be implemented.
Practices
A practice is a normalized process that has been tried and proven as generally accepted
within a larger community. Practices could also be developed by a standards organization
or a recognized authority regarding a particular subject or particular process. Professional
industry organizations or vendors often develop practices documents. You might also see
“best practices” promulgated by various industries or organizations, for example. Prac-
tices are not usually mandatory but could be made mandatory by the corporate manage-
ment or other governance if they were so inclined.
The next few sections give more detailed examples of some of the formal frameworks
and standards you should be familiar with for the exam and in real life as a risk manage-
ment professional. We recommend you pay particular attention to the ones developed
and published by ISACA; these will likely be present in some form on the exam. Of
course, in this book, we’re only going to give you a brief overview of each, and you should
take the time to review the actual standards and frameworks in depth before you sit for
the exam.
Step 1: Prepare
The first step, Prepare, has the purpose of carrying out essential activities to help prepare
all levels of the organization to manage its security and privacy risks using the RMF. It
involves identifying key risk management roles, establishing the organizational risk man-
agement strategy, determining the organization’s risk tolerance, assessing the organiza-
tion’s risk assessment, developing the organizational strategy for continuous monitoring,
and identifying the implemented common controls.
Step 2: Categorize
Step 2, Categorize, involves inventorying the types of information on target systems and
assigning categorization levels to that information based on the level of impact if the
security goals of confidentiality, integrity, and availability were affected or compromised
for the information on the system. This step uses subjective values of high, medium,
and low to assign values to each of the three goals for a particular type of information.
Chapter 4: Information Technology and Security
161
Types of information processed on the system could include business-sensitive, financial,
protected health information, and so on. FIPS 199, “Standards for Security Categoriza-
tion of Federal Information and Information Systems,” as well as NIST Special Publica-
tion 800-60, “Guide for Mapping Types of Information and Information Systems to
Security Categories,” provide detailed guidance on categorizing information systems.
Step 3: Select
Based on these individual values, as well as an aggregate of them, the applicable security
controls you would assign to this information system would be accomplished in Step 3,
Select. This step provides baselines of security controls based on the high, medium, and
low values assigned during step 2. If the aggregate value of information or system has
been rated as high, for example, the high baseline of security controls is employed for that
system. Once a security control baseline has been established, the organization has the lati-
tude and flexibility to add or subtract security controls from the baseline as it sees fit based
on different factors, including the applicability of some controls, the environment the
system operates within, and so on. The selected controls can be found in the supporting
NIST Special Publication 800-53, revision 5, “Security and Privacy Controls for Informa-
tion Systems and Organizations,” which contains a catalog of all the NIST controls.
Step 4: Implement
In Step 4 of the RMF, Implement, the selected controls are applied to the information
systems and data is processed on those systems. This is a large process that can cover a
good deal of the life cycle of the system in question, and it may take significant time and
resources. In this step, the organization is essentially securing the information system
against any validated threats and protecting identified vulnerabilities.
Step 5: Assess
Step 5, Assess, is where a lot of security professionals who manage certification and
accreditation activities or perform risk assessments come into the picture. During this
step, the controls the organization selects for the information system are formally assessed,
verifying that they were implemented correctly and validating whether they perform as
they were designed. They are assessed based on their effectiveness in protecting against
the threats they were implemented to protect against. During this step, the system is
assessed in its current state, with all existing controls and mitigations in place. Based on
the assessment findings, there may be recommendations for further controls and mitiga-
tions, as well as alterations to the existing security posture for the system. In this step, the
level of risk to the system and its data is normally analyzed and determined.
Step 6: Authorize
Step 6, Authorize, involves the decision from the entity in charge to authorize a
system to be implemented and put into operation. This decision is based on various
factors, including the level of risk assessed during step 5, the risk appetite the organi-
zation has settled on, and the tolerance for risk the organization is willing to accept.
The decision to authorize a system for use may also come with caveats, including
conditional authorization based on the continued mitigation and reduction of risk by
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
162
the system or data owner. This authorization is a formal authority for the system to
operate, made by someone with the legal authority to make that decision. It is typi-
cally in writing and only valid for a specified period, after which the system must be
reassessed for risk and control compliance.
Step 7: Monitor
Continuous monitoring of security controls defines step 7 in the RMF; just because an
authorization decision is rendered doesn’t mean the system will now be operated forever
without continually monitoring its security posture for new or changed risks. Existing
controls should be monitored for continued compliance and effectiveness against identi-
fied threats. New risks will be occasionally discovered for the system as new threats and
vulnerabilities are identified, and the system will have to be reauthorized after a certain
period. Note that the RMF is a cyclical process; all these steps will be accomplished again
for each system at various times over its life cycle.
ISO 27001/27002/27701/31000
Whereas the NIST RMF is very much an American framework, the International Orga-
nization for Standardization (ISO) frameworks are used globally. The ISO family is
largely focused on keeping information assets secure, ensuring privacy, and managing
risk across the following major documents:
EXAM TIP While you may not be expected to know the intricate details o
each ramework described here, it will be helpul to know at least the basic
characteristics and descriptions o each. You may be asked to identiy a
particular characteristic o a ramework on the exam.
EXAM TIP While training programs are sometimes the irst things that are
cut rom the budget or the last things to be developed in a program, don’t
underestimate the importance o awareness training within the overall risk
management strategy. Training not only can make the risk management
process within the organization more eective, it can also actually help to
reduce or mitigate risk because it educates people about the subject, and
this alone may minimize risk.
Security Policies
Security policies and procedures are official organization communications created to sup-
port those critical principles of data privacy and data protection. These policies and pro-
cedures define how the workers must interact with the organization’s computer systems
to perform their job functions, how to protect the computer systems and their data,
and how to service the organization’s clients and constituents properly. Essentially, these
policies define how an organization will implement the principles that must be upheld.
Access Control
The following access control principles and policies help provide a consistent organizational
structure and procedures to prevent internal fraud and corruption in your organization:
• Least privilege The least privilege principle grants users only the access rights they
need to perform their job functions. This requires giving users the least amount of
access possible to prevent them from abusing more powerful access rights.
• Separation of duties The separation of duties principle ensures that one single
individual isn’t tasked with high-security and high-risk responsibilities. Certain
critical responsibilities are separated between several users to prevent corruption.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
168
• Job rotation Job rotation provides improved security because no worker retains
the same amount of access control for a position indefinitely. This prevents
internal corruption by workers who might otherwise take advantage of their
long-term position and security access.
• Mandatory vacation A mandatory vacation policy requires employees to use
their vacation days at specific times of the year or to use all their vacation days
allotted for a single year. This policy helps detect security issues with employees,
such as fraud or other internal hacking activities, because the anomalies might
surface while the user is away. Increasingly, organizations are implementing
a policy requiring mandatory administrative leave for situations in which an
employee is under any sort of investigation, systems related or otherwise.
Network Security
Several policies provide standard guidelines for implementing network security prin-
ciples within an organization and encompass areas such as the use of the Internet and
internal network, data privacy, security incident response, human resources (HR) issues,
and document security. These policies are often enforced by technical controls such as
data loss prevention (DLP) tools that monitor for breaches of policy and issue a report
when a breach occurs. Other tools may alert an administrator to machines joining the
network that don’t meet security requirements (having out-of-date antivirus signatures,
for example) or report to an administrator when an unauthorized machine has been
added to the network or an inappropriate website has been visited.
Chapter 4: Information Technology and Security
169
Acceptable Use
An acceptable use policy (AUP) is a policy consisting of a set of established guidelines for
the appropriate use of computer networks within an organization. The AUP is a written
agreement, read and signed by workers, that outlines the organization’s terms, condi-
tions, and rules for Internet and internal network use and data protection.
An AUP helps educate workers about the kinds of tools they will use on the network
and what they can expect from those tools. The policy also helps to define boundaries
of behavior and, more critically, specifies the consequences of violating those boundar-
ies. The AUP also lays out the actions that management and the system administrators
may take to maintain and monitor the network for unacceptable use, and it includes the
general worst-case consequences or responses to specific policy violations.
Developing an AUP for your organization’s computer network is extremely important
for both organizational security and limiting legal liability in the event of a security issue.
An AUP should cover the following issues:
• Legality The organization’s legal department needs to approve the policy before
it’s distributed for signing. The policy will be used as a legal document to ensure
that the organization isn’t legally liable for any type of Internet-related incident
and any other transgressions, such as cracking, vandalism, and sabotage.
• Uniqueness to your environment The policy should be written to cover the
organization’s specific network and the data it contains. Each organization has
different security concerns—for example, a medical facility needs to protect data
that differs significantly from that of a product sales organization.
• Completeness Beyond rules of behavior, the AUP should also include a statement
concerning the organization’s position on personal Internet use on company time.
• Adaptability Because the Internet is constantly evolving, the AUP will need to
be updated as new issues arise. You can’t anticipate every situation, so the AUP
should address the possibility of something happening that isn’t outlined.
• Protection for employees If your employees follow the rules of the AUP, their
exposure to questionable materials should be minimized. In addition, the AUP
can protect them from dangerous Internet behavior, such as giving out their
names and e-mail addresses to crackers using social engineering techniques.
The focus of an acceptable use policy should be on the responsible use of com-
puter networks and the protection of sensitive information. Such networks include
the Internet—for example, web, e-mail (both personal and business), social media,
and instant messaging access—and the organization’s intranet. An AUP should, at a
minimum, contain the following components:
Social Media
Websites such as Facebook, Twitter, and Instagram are more popular than ever, and
workers often use these sites, sometimes during the workday, to keep up with friends,
family, and activities. While keeping your workers’ morale high is a plus, it’s important
to limit social media usage at work, as it can be a hit to overall productivity. Perhaps even
more importantly, workers who are posting negative comments about your organization,
or even posting potentially private intellectual property, can be a competitor’s dream. For
example, consider a disgruntled employee who begins tweeting about your organization’s
secret spaghetti sauce recipe, which is then copied by a competitor. Not good!
However, some pleasant scenarios for an organization can be directly attributed to
workers’ social media usage. That’s why it’s important to determine what level of social
media use your organization is comfortable with while workers are on the clock. Many
organizations have a policy that social media use during work is only allowed on breaks
and lunch hours and that workers may not discuss or disclose any information regarding
their workplace or intellectual property.
Personal E-Mail
As with social media, many workers have personal e-mail accounts they may want to keep
an eye on throughout the day; this lets them know that bills are being paid, packages have
been delivered, and so on. Maybe they even use e-mail to keep up with friends. Although
this can be positive for workers’ morale, it is important that an organization understands
how personal e-mail is being used throughout the workday. An important consideration
is a potential threat associated with sophisticated adversaries in cyberspace who know a
great deal about the organization’s workers and may use their personal e-mail account
for spearfishing and other nefarious activities. If malware is introduced through this per-
sonal e-mail usage during the workday, it then becomes your problem—assuming they’re
using one of the organization’s systems to read their personal e-mail. That malware could
potentially leak trade or other secrets about your organization. Again, as with social
media, it is important for an organization to dictate the terms of how personal e-mail
will be used throughout the workday and whether personal e-mail is allowed to be used
on the organization’s more sensitive systems. For example, it is generally considered bad
Chapter 4: Information Technology and Security
171
practice to allow personal e-mail to be used on production computers, where malware
could have a catastrophic effect if introduced into the environment.
Privacy
Privacy policies are agreements that protect individually identifiable information. An
organization engaged in online activities or e-commerce has a responsibility to adopt
and implement a policy to protect the privacy of personally identifiable information
(PII). Increasingly, regulations such as the European Union’s General Data Protection
Regulation (GDPR), the California Consumer Privacy Act (CCPA), and the U.S. Health
Insurance Portability and Accountability Act (HIPAA) require a privacy policy that is
acknowledged before use. Organizations should also take steps to ensure online privacy
when interacting with other organizations, such as business partners. Privacy obligations
also extend to an organization’s use of the PII of its workers.
The following recommendations pertain to implementing privacy policies:
• An organization’s privacy policy must be easy to find, read, and understand, and
it must be available prior to or at the time the PII is collected or requested.
• The policy needs to state clearly what information is being collected; the
purpose for which that information is being collected; possible third-party
distribution of that information; the choices available to an individual regarding
the collection, use, and distribution of the collected information; a statement of
the organization’s commitment to data security; and what steps the organization
takes to ensure data quality and access.
• The policy should disclose the consequences, if any, of a person’s refusal to provide
information or the refusal to permit its processing.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
172
• The policy should include a clear statement of what accountability mechanism
the organization uses, such as procedures for dealing with privacy breaches,
including how to contact the organization and register complaints.
• Individuals must be given the opportunity to exercise choice regarding how
PII collected from them online can be used when such use is unrelated to the
purpose for which the information was collected. At a minimum, individuals
should be given the opportunity to opt out of such use.
• When an individual’s information collected online is to be shared with a third
party, especially when such distribution is unrelated to the purpose for which
the information was initially collected, the individual should be given the
opportunity to opt out.
• Organizations creating, maintaining, using, or disseminating PII should
take appropriate measures to ensure its reliability and should take reasonable
precautions to protect the information from loss, misuse, or alteration.
Each organization must evaluate its use of the Internet and its internal systems to
determine the type of privacy policy it needs in order to protect all involved parties.
The privacy policy will protect the organization from legal issues, raising employees,
customers, and constituents’ comfort levels regarding the protection of their informa-
tion. A privacy policy should include the following elements:
• Information collection Collect, use, and exchange only data pertinent to the
exact purpose, in an open and ethical manner. The information collected for one
purpose shouldn’t be used for another. Notify persons of information you have
about them, its proposed use and handling, as well as the enforcement policies.
• Direct marketing The organization can use only non-PII for marketing
purposes and must certify that the persons’ personal information won’t be resold
to third-party organizations.
• Information accuracy Ensure the data is accurate, timely, and complete and
has been collected in a legal and fair manner. Allow people the right to access,
verify, and change their information in a timely, straightforward manner. Inform
people of the data sources and allow them the option of removing their names
from the marketing lists.
• Information security Apply security measures to safeguard the data on databases.
Establish worker training programs and policies on the proper handling of PII.
Limit the access to a need-to-know basis on personal information and divide
the information so that no one worker or unit has the whole picture. Follow all
government regulations concerning data handling and privacy.
EXAM TIP Privacy policies must be easy to ind, and they must provide
inormation on how to opt out o any use o personally identiiable inormation.
Chapter 4: Information Technology and Security
173
Human Resources
An organization’s HR department is an important link regarding the organization and
worker security. The HR department is responsible for hiring employees, tracking
contractors, consultants, and other temporary workers, ensuring workers conform to
company codes and policies during their term of work, and maintaining organization
security in case of a worker termination. The following sections outline the respon-
sibility of human resources during the three phases of the employment cycle: hiring,
maintenance, and termination.
Hiring
When hiring employees for a position within the organization, the HR department is
responsible for the initial employee screening. This usually takes place during the first
interview: an HR representative meets with the potential employee to discuss the orga-
nization and to get a first impression, gauging whether this person would fit into the
organization’s environment. This interview generally is personality based and nontech-
nical. Further interviews are usually more oriented toward the applicant’s skill set and
are conducted by the department advertising the position. Both types of interviews are
important because the applicant could possess excellent technical skills for the position,
but their personality and communications skills might not be conducive to integration
with the work environment.
During the interview process, HR also conducts background checks of the applicant
and examines and verifies their educational and employment history. Reference checks
are also performed, where HR can obtain information on the applicant from a third party
to help confirm facts about the person’s past. HR will also verify professional licenses and
certifications. Depending on the type of organization, such as the government or the
military, the applicant might have to go through security clearance checks or even a credit
check, medical examination, and drug testing.
To protect the confidentiality of organization information, the applicant is usually
required to sign a non-disclosure agreement (NDA), which legally prevents the applicant
from disclosing sensitive organization data to other organizations, even after termination
of employment. These agreements are particularly important with high-turnover posi-
tions, such as contract or temporary employment.
When an employee is hired, the organization also inherits that person’s personality
quirks or traits. A solid hiring process can prevent future problems with new employees.
Termination
The dismissal of workers can be a stressful and chaotic time, especially because termina-
tions can happen quickly and without notice. A worker can be terminated for a variety
of reasons, such as performance issues, personal and attitude problems, or legal issues
such as sabotage, espionage, or theft. Alternatively, the worker could be leaving to work
for another organization. The HR department needs to have a specific set of procedures
ready to follow in case a worker resigns or is terminated. Without a step-by-step method
of termination, some procedures might be ignored or overlooked during the process and
thus compromise the organization’s security.
A termination policy should exist for each type of situation where a worker is leaving
the organization. For example, you might follow slightly different procedures for termi-
nating a worker who’s leaving to take a job in an unrelated industry than a worker who’s
going to work for a direct competitor. In the latter case, the worker might be considered a
security risk if they remain on the premises for their two-week notice period, where they
could transmit organization secrets to the competition.
Similarly, terminating a contractor or consultant will involve different policies and
procedures since their employment relationship is with another organization. Finally,
organizations with one or more labor unions must navigate those waters according to
collective bargaining agreements and rules.
A termination policy should include the following procedures for the immediate ter-
mination of a worker:
• Securing work area When the termination time has been set, the worker in
question should be escorted from their workstation area to the HR department.
This prevents them from using their computer or other organization resource
once notice of termination is given. Their computer should be turned off and
disconnected from the network. When the worker returns to their desk to collect
personal items, someone should be with them to ensure that they do not take
private organization information. Finally, the worker should be escorted out of
the building.
Chapter 4: Information Technology and Security
175
• Return of identification As part of the termination procedure, the worker’s
identification should be returned. This includes identity badges, pass cards, keys
for doors, and any other security device used for access to organization facilities.
This prevents the person from accessing the building after being escorted from
the premises.
• Return of equipment All organization-owned equipment must be returned
immediately, such as desktops, laptops, cell phones, tablets, organizers, or any
other type of electronic equipment that could contain confidential information.
• Suspension of accounts An important part of the termination procedure is
the notification to the network administrators of the situation. They should
be notified shortly before the termination takes place to give them time to
disable any network accounts and phone access for that worker. The network
password of the account should be changed, and any other network access the
worker might have, such as remote access, should be disabled. The worker’s file
server data and e-mail should be preserved and archived to protect any work or
communications the organization might need for operational or legal reasons.
EXAM TIP All user access, including physical and network access controls,
needs to be disabled or a worker once they have been terminated. This
prevents the worker rom accessing the acility or network.
Chapter Review
The enterprise architecture within an organization affects the risk of the business in
several different ways. Aspects of enterprise architecture risk include interoperability,
supportability, security, maintenance, and how the different pieces and parts of the infra-
structure fit into the systems development life cycle.
Key areas in IT operations management include server and infrastructure manage-
ment, end-user support, help desk, and problem escalation management, and, of course,
cybersecurity.
Organizations use project, program, and portfolio management to oversee and sustain
both short- and long-term aspects of systems and processes.
At the core of a project are three primary drivers. These are scope (amount or range of
work), schedule (when work is to be done and its completion date), and cost (including all
the resources expended toward the completion of the project).
Business continuity is concerned with the careful planning and deployment of resources
involved in keeping the mission of the business going (that is, keeping the business func-
tioning regardless of negative events). Disaster recovery is primarily concerned with the
quick reaction involved with preserving lives, equipment, and data immediately follow-
ing a serious negative event.
Resilience refers to the ability of the business to survive negative events and continue
with its mission and function.
Data lifecycle management is a lifecycle process concerned with the creation, protec-
tion, use, retention, and disposal of business information.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
176
The systems development life cycle, or SDLC, is essentially the entire life of a system
or product, from concept to development, from implementation to disposal. Security
should be a part of every step in the SDLC, thus ensuring security by design.
New or emerging technologies can present risks to organizations simply because there
are several different important considerations when integrating the latest technologies
into an existing environment.
Access controls ensure that only authorized personnel can read, write to, modify, add
to, or delete data. They also ensure that only the same authorized personnel can access
the different information systems and equipment used to store, process, transmit, and
receive sensitive data.
The three goals of security, known as the CIA triad, are confidentiality, integrity, and
availability. Supporting these three goals are other elements of security, such as access
control, data sensitivity and classification, identification, authentication, authorization,
accountability, and, finally, non-repudiation.
Standards, frameworks, and practices relevant to risk management include NIST
RMF, COBIT 2019, and the various ISO standards.
Data classification policy defines data sensitivity levels, as well as handling and disposal
procedures to ensure adequate protection of sensitive information.
Industry frameworks, standards, and practices can be adopted when building an infor-
mation security program, as opposed to building these elements from scratch.
The NIST Risk Management Framework (RMF) is a seven-step methodology that
provides for risk management all the way through the information systems life cycle.
COBIT is a management framework developed by ISACA and facilitates the gover-
nance of enterprise information and technology. COBIT consists of two layers, gover-
nance and management, which further break down into a total of 40 separate objectives.
The Risk IT Framework comes from traditional risk management principles of vari-
ous enterprise risk management (ERM) standards and describes activities and processes
thought of as best practices.
Information security awareness training ensures an organization’s workforce is aware
of policy, behavior expectations, and safe computer and Internet usage.
Security policies and procedures are official organization communications that are cre-
ated to support those critical principles of data privacy and data protection.
Effective physical access controls ensure that only authorized personnel are permitted
to access work centers, processing centers, and other work areas. This contributes to an
environment with better information security as well as workplace safety.
An organization practices due care by taking responsibility for all activities that take
place in corporate facilities.
An organization practices due diligence by implementing and maintaining these secu-
rity procedures consistently to protect the organization’s facilities, assets, and workers.
Due process guarantees that in the event of a security issue by a worker, the worker
receives an impartial and fair inquiry into the incident to ensure the worker’s employ-
ment rights are not being violated.
Each organization must evaluate its use of the Internet and its internal systems to
determine the type of privacy policy it needs in order to protect all involved parties.
Chapter 4: Information Technology and Security
177
An organization’s HR department is an important link regarding organization and
worker security. The HR department is responsible for hiring employees, tracking con-
tractors, consultants, and other temporary workers, ensuring workers conform to com-
pany codes and policies during their term of work, and maintaining organization security
in case of worker termination.
Quick Review
• Two common enterprise architecture frameworks are The Open Group Architecture
Framework (TOGAF) and the Zachman framework.
• Business continuity and disaster recovery are primarily concerned with the goal
of business resilience.
• Two of the key processes involved in business continuity planning are conducting
a business impact assessment (BIA) and determining a recovery strategy.
• Two key areas of concern in business continuity are the recovery point objective
(RPO) and the recovery time objective (RTO).
• Resilience is the ability of an organization to resist the effects of negative events
and its ability to bounce back after one of these events.
• Data classification refers to policies that define the proper use, handling, and
protection of data at various sensitivity levels.
• The term systems development life cycle represents an evolution of the original term
software development life cycle, reflecting an earlier age when most organizations
wrote their own custom business applications.
• Some of the risks associated with emerging technology involve staff unfamiliarity,
resulting in improper implementation or use.
• Access controls directly support the confidentiality and integrity goals of security
and indirectly support the goal of availability.
• Identification refers to the act of an individual or entity presenting valid credentials
to a system. Authentication involves the verification of one’s identity with a
centralized database. Authorization refers to the access rights or privileges assigned
to a user account. Non-repudiation is a record-keeping property of a system whereby
a user will not be able to deny having performed some action.
• A framework is a generally overarching methodology for a set of activities
or processes.
• A standard is a mandatory set of procedures or processes used by the organization
and usually fits into an overall framework.
• A practice is a normalized process that has been tried and proven as generally
accepted within a larger community.
• Periodic security awareness training can be used to reinforce and refresh stale
knowledge and bring workers up to date on the latest tools, techniques, and
risk considerations.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
178
• The least privilege principle grants users only the access rights they need to
perform their job functions.
• Separation of duties ensures that one single individual isn’t tasked with high-security
and high-risk responsibilities.
• Job rotation provides improved security because no worker retains the same amount
of access control for a position indefinitely.
• Mandatory vacations enable security and audit staff to examine absent workers’
procedures and records to identify signs of misbehavior or fraud.
• An acceptable use policy (AUP) is a policy consisting of a set of established
guidelines for the appropriate use of computer networks within an organization.
• Social media policy governs acceptable use regarding the sharing of organization
information and representation of the organization.
• The use of personal e-mail is a potential distraction as well as a risk for information
leakage and the introduction of malware into an environment.
• Privacy policies are agreements that protect individually identifiable information.
• Human resources should track not only employees but temporary workers,
contractors, and consultants to ensure the integrity of access controls.
Questions
1. You are managing a project that involves the installation of a new set of systems
for the accounting division of your organization. You have just been told
that there have been budget cuts and the project will not be able to purchase
additional equipment needed for the installation. You now have to find other
areas to cut in order to fund the extra equipment. Which element of project
management is most affected by this threat?
A. Schedule
B. Scope
C. Cost
D. Quality
2. As a risk practitioner in a larger organization, you have been asked to review
the company’s SDLC model for potential risk areas. The model includes the
Requirements, Design, Development, Implementation, and Disposal phases.
Software and systems are moved from the development environment immediately
into the production environment and implemented. Which SDLC phase
would you recommend that the business add to reduce risk of integration or
functionality issues as the system is implemented?
A. Initiation
B. Test
C. Sustainment
D. Maintenance
Chapter 4: Information Technology and Security
179
3. Lack of a well-written work breakdown structure document can contribute to a
vulnerability that affects which aspect of project management?
A. Cost
B. Schedule
C. Scope
D. Quality
4. Which of the following is the major risk factor associated with integrating new or
emerging technologies into an existing IT infrastructure?
A. Security mechanisms
B. Data format
C. Vendor supportability
D. Interoperability
5. Which of the following is a short-term process primarily concerned with
protecting personnel, facilities, and equipment immediately following a disaster
or major incident?
A. Disaster recovery
B. Business continuity
C. Business impact analysis
D. Recovery point objective
6. Which of the following would be a vulnerability that stems from the
business not identifying its critical assets and processes during the continuity
management process?
A. Failure to adequately consider system requirements during the SDLC
B. Failure to perform a business impact analysis
C. Failure to consider interoperability with integrating new technologies
D. Failure to maintain redundant systems or data backups
7. Your business just went through a major storm, which has flooded your data
center. Members of your recovery team are attempting to salvage equipment as
well as locate critical data backups. No one seems to know exactly what they’re
supposed to do, and they don’t have the right equipment available to them.
Additionally, there is no coordinated effort within the team to perform specific
tasks. Which of the following vulnerabilities most likely led up to this scenario?
A. Failure to back up sensitive data
B. Failure to acquire an alternate processing site
C. Lack of a business impact analysis
D. Failure to test the disaster recovery plan
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
180
8. After a few incidents where customer data was transmitted to a third party,
your organization is required to create and adhere to a policy that describes the
distribution, protection, and confidentiality of customer data. Which of the
following policies do you create?
A. Privacy
B. Due care
C. Acceptable use
D. Service level agreement
9. You need to create an overall policy for your organization that describes how
your users can properly make use of company communications services, such as
web browsing, e-mail, and File Transfer Protocol (FTP) services. Which of the
following policies do you implement?
A. Acceptable use policy
B. Due care
C. Privacy policy
D. Service level agreement
10. Which of the following security goals is concerned with ensuring that data has
not been modified or altered during transmission?
A. Confidentiality
B. Availability
C. Integrity
D. Non-repudiation
11. Which of the following is most concerned with ensuring that users cannot deny
that they took an action?
A. Accountability
B. Non-repudiation
C. Auditing
D. Authorization
12. Which of the following describes a set of mandatory procedures or processes used
by an organization?
A. Standard
B. Framework
C. Practice
D. Policy
Chapter 4: Information Technology and Security
181
13. Which of the following frameworks might be used in business governance and
IT enterprise management?
A. NIST RMF
B. COBIT 2019
C. The Risk IT Framework
D. ISO 27001
14. You are implementing an organization-wide risk management strategy, and
you are using the NIST Risk Management Framework (RMF). You have just
completed step 1 of the RMF, “Categorize information systems.” Which of the
following steps should you complete next in the RMF sequence?
A. Authorize system.
B. Assess security controls.
C. Continuous monitoring.
D. Select security controls.
15. Which of the following statements most accurately reflects the effect of information
technology (IT) on risk to the business enterprise? (Choose two.)
A. Information technology is a serious risk to the mission of the organization.
B. Information technology is used to protect the organization’s information.
C. Information technology is used to eliminate risk to the mission of the
organization.
D. Information technology is used to generate the organization’s information.
Answers
1. C. Cost is the element of project management that is most affected by the threat
of not enough funding.
2. B. A test phase introduced into this model would reduce risk by ensuring that
a system or software application meets performance and functionality standards
before it is introduced into the production environment, potentially eliminating
costly issues before they occur.
3. C. Lack of a well-written work breakdown structure document can contribute to
a vulnerability that affects a project’s scope.
4. D. Interoperability is the major risk factor associated with integrating new or
emerging technologies into an existing IT infrastructure. It covers a wide range
of factors, which typically include backward compatibility, data format, security
mechanisms, and other aspects of system integration.
5. A. Disaster recovery is a short-term process primarily concerned with
protecting personnel, facilities, and equipment immediately following a
disaster or major incident.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
182
6. B. Failure to perform a business impact analysis could cause a vulnerability in
that the organization would not be able to adequately identify its critical business
processes and assets.
7. D. Failure to test the disaster recovery plan on a periodic basis—as well as make
sure people are trained and have the right equipment—can result in poor or
ineffective recovery efforts.
8. A. A privacy policy concerns the protection and distribution of private customer
data. Any company, especially one engaged in online activities or e-commerce,
has a responsibility to adopt and implement a policy for protecting the privacy of
individually identifiable information.
9. A. An acceptable use policy establishes rules for the appropriate use of computer
networks within your organization. The policy describes the terms, conditions, and
rules of using the Internet and its various services within the company’s networks.
10. C. Integrity is concerned with ensuring that data has not been modified or altered
during transmission or storage.
11. B. Non-repudiation is concerned with ensuring that users cannot deny that they
took a particular action.
12. A. A standard is a set of mandatory procedures or processes used by an organization.
13. B. COBIT is used in business governance and IT enterprise management.
14. D. Step 2 of the RMF is “Select security controls” and is accomplished after
information systems have been categorized.
15. B, D. Information technology is used to generate the business’s information as
well as protect it.
Implementing and
Managing a Risk
APPENDIX
A
Management Program
This appendix takes a more pragmatic view of building and managing a risk management
program. Rather than the somewhat academic view in the CRISC job practice, we draw
directly from our experience building several risk management programs in our careers.
We have built or improved numerous risk management processes and programs
between the three of us. The process and technique are not overly complicated. The
most challenging part of building a risk management process is figuring out how to
engage with executives in the organization—so that they understand what the process is
all about and participate meaningfully. After all, it’s their business, and we just want to
make sure they make informed decisions related to various types of risks.
183
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
184
Figure A-1
Pressure comes Spend
rom all sides on
security and risk
programs today.
Cyber Digital
Criminals Transformation
Regulation
Imagine, if you will, that General Weyand is taking in information from scouts on
the enemy’s position and discussing where and when to deploy troops to counter
the enemy’s moves and even gain territory. This is all about the allocation of scarce
resources to provide the maximum margin of victory.
(continued)
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
186
The soldiers on the front line depend on this strategizing—their very lives depend
on it. Political leaders depend on this strategizing as well so that their armies will
meet their objectives of countering the enemy’s objectives.
Imagine, for a moment, that an army lacked this planning and decision-making
function. Without it, lower-level officers would be commanding their regiments to
go this way and that, based on what they could see within their limited purview.
Lacking big-picture information and purpose, they may succeed or fail, but they
won’t be operating with a clear, central purpose.
Risk management is the modern equivalent of those field commanders. In risk
management, security specialists are examining threat intel, considering available
internal capabilities, and making decisions on which of many issues are the most
important to discuss and take action on. Formal risk management is the modern
equivalent of field commanders studying the enemy’s plans, available resources, and
most effectively applying their resources to meet their objectives.
Most organizations do not do this, at least not in any repeatable way. Instead,
when decisions are made, they usually lack any analysis or triage to determine the
best way forward on any given issue. The result: high-risk matters get little attention,
while other issues get more than their fair share. Scarce resources are applied to the
wrong issues, while the highest risk issues go poorly resolved or entirely unaddressed.
• Program charter This document defines the purpose and scope of the risk
management program, roles and responsibilities, and describes its processes
and records.
Appendix A: Implementing and Managing a Risk Management Program
187
• Process or procedures This document describes the steps in various risk
management processes and procedures, who carries them out, and what records
are maintained.
• Risk register This is the central repository of risks that have been identified.
The risk register is one of the historical records of a risk management program.
• Risk analyses Individual risks are often studied in greater detail, with additional
risk analysis to help decision-makers decide what to do about these risks.
• Minutes This is a business record of decisions and other actions taken.
So far, this may sound formal. Risk management should be consistent and methodical
so that its proceedings are managed and recorded.
Risk Discovery
In Chapter 2, we made a list of the ways in which new IT risks can be discovered, with
complete explanations for each. We’ll provide just the summary here:
• Risk name
• Risk description in terms of the risk context
• Threat description
• Vulnerability description
As you accumulate records in the risk register, you’ll find it helpful to add more
columns. These columns indicate when the entry was recorded, its context, and a
business-centric explanation:
• Entry date
• Entered by
• Risk description in business terms
• Risk context
While the description of risk in business terms appears to be just another bullet item,
it is perhaps the most important field in the risk register. Without it, risk managers will
have a more difficult time describing the risk in business terms to executives who may be
asked to decide on the disposition of the risk. Including this column in the risk register
compels the risk manager to begin thinking about the risk in business terms early, giving
them time to ponder and develop the risk story.
Rating risks for severity is a topic all its own, discussed in more detail in the following
subsections.
You will need to add more columns as you move through the life cycle and make risk
treatment decisions. These columns describe basic risk treatment parameters:
• Risk status
• Risk treatment selection
• Risk treatment description
• Risk treatment owner
• Risk treatment commit date
As risk treatment activities reach their conclusions, you’ll need additional columns:
• Location.
• Business unit.
• Technology type. This may consist of one or more columns that enable you
to view risks in discrete categories. For instance, you may wish to view all
risks related to mobile devices, endpoints, specific types of servers, database
management systems, network devices, or other components.
Rating Risks—Qualitative
Not all risks are created equal. Some may be nearly trivial, while others represent an
existential threat to the organization. A risk register must contain some columns used to
describe the level of risk for each entry.
The two basic qualitative measures of risk are probability and impact, as detailed next:
• 5 = Certain
• 4 = Likely
• 3 = Possible
• 2 = Unlikely
• 1 = Rare
Appendix A: Implementing and Managing a Risk Management Program
191
• 5 = Global
• 4 = Country
• 3 = Department
• 2 = Team
• 1 = Individual
These impact terms describe the scope of impact for a risk event. The highest-
rated events would affect the entire organization, while the lowest-rated events
would affect only a single worker.
Two additional qualitative measures can be introduced that help the risk manager
better understand the overall risk for each entry:
• Asset value This qualitative term expresses the value of the asset(s) involved
in a specific risk. Like other qualitative terms, asset value is expressed as High,
Medium, or Low or on a numeric scale. Generally, this represents an asset that
would have to be recovered or replaced should a relevant threat occur.
• Operational criticality This term expresses the operational importance of an asset
or function. An asset that the organization depends on for high-value operations
(even if the value of the asset itself is low) would be assigned a higher value.
While these two measures are not seen as often in qualitative risk analysis, they help
distinguish risks in that all-important triage used to identify the most critical risks.
Calculating Overall Risk The four qualitative risks explained here can help the risk
manager sort out various risks in the risk register. One final column can help tie them
all together that would simply be called “Risk.” This column can easily be calculated by
multiplying the ratings of the four risk columns together. For example, a risk item in the
risk register is rated as follows:
• Probability = 4
• Impact = 2
• Asset value = 2
• Operational criticality = 1
The risk value in this example is 4 × 2 × 2 × 1 = 16.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
192
Using Qualitative Risk Ratings In qualitative risk analysis, the individual risk
columns, as well as the column representing overall risk, exist to help the risk manager
better understand how various risks compare to one another. No attempt is made to
calculate the actual probability of occurrence or the costs incurred if a risk event occurs.
Instead, qualitative risk ratings help the risk manager understand which risks warrant
more focus and attention.
Other columns in the risk register provide opportunities for focus, including those
columns specifying the type of asset or system, the business unit, the geographic loca-
tion, and more. The ability to focus on a portion of the risk register associated with a
specific part of the organization, a particular location, or other distinguishing charac-
terization helps the risk manager focus on the risks that matter more versus the ones
that matter less.
In a sample risk management scenario, a risk manager is preparing to have a conversa-
tion with the part of IT that manages end-user endpoints—primarily laptop and desktop
computers—in a particular region of the world. To prepare, the risk manager can filter
the risk register to view just the risks associated with end-user endpoints as well as risks in
particular global regions. The resulting risk will contain just those items, which the risk
manager can then examine more deeply to distinguish the items of greater concern from
those of lesser concern. Now, the risk manager can have a more meaningful conversation
with the IT leaders about risks directly associated with their work.
Rating Risks—Quantitative
Sometimes, a risk manager is asked to go beyond qualitative risk rating and provide
actual probabilities and financial impacts of risks. “How much will it cost us if customer
data is stolen?” is a reasonable question that an executive may pose to a risk manager.
Arguably, the risk manager should attempt to arrive at an estimate to help the executive
better understand the consequences of a security breach.
In our practice, we do not attempt to uplift every item in the risk register from quali-
tative to quantitative terms. Doing so would take a considerable amount of time and
not result in much additional insight. Instead, we embark on quantitative risk analysis
when examining individual risks. We discuss this further in the section “Performing
Deeper Analysis.”
• Entity-level risk These are the overall “big picture” risks that affect an entire
organization. The types of subject matter in an entity-level risk register generally
include the following:
• Workforce-related risks
• Currency exchange risks in organizations operating in multiple countries, or
with suppliers in other countries
• Economic risks having to do with macroeconomic business cycles
• Risks that exist as an aspect of organizational culture
• Program-level risk These are risks most often associated with business processes
throughout the organization. Examples of the types of risks found at this level
include the following:
• Effectiveness of vulnerability management If, for instance, the IT department
is lackadaisical in its security patching, an entry may be created in the risk register
that describes this systemic problem.
• Identity management An organization may have little discipline in its access
request, fulfillment, and termination procedures.
• BYOD An organization may not have controls to prevent employees’ use of
personally owned devices for managing critical data, leading to a significant
data leakage risk.
• Asset-level risk These risks are associated with individual assets and groups
of assets. Often, these risks are identified with scanning tools and other tooling.
Examples of risks at this level include the following:
• Misconfiguration of critical devices
• Missing critical patches
• Newly discovered unmanaged devices
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
194
Communicating Between the Layers
A single risk manager may be involved in two or all three of these risk registers in smaller
organizations. More often, however, different persons manage each risk register separately.
One might think that these risk registers would be isolated from each other. While this
may be true, organizations are wise to be cognizant of opportunities for communication
between those who manage various risk registers.
Classic examples of the crossover between risk registers include the following:
The most frequent communication between risk register layers is a chronic or repeated
failure of processes at lower layers that suggests a systemic problem at a higher layer.
NOTE Our requent use o the term risk manager signiies a role rather
than a job title. The job title o risk manager is generally seen only in larger
organizations, whereas those with other job titles ulill the role.
Reviewing Risks with Business Leaders At times, it is appropriate for the risk leader
to review the contents of the risk register with business leaders. This discussion can take
many forms, including the following:
Untreated risk:
• The same columns from the risk register, including likelihood, impact, criticality,
asset value, and risk score.
Treated risk:
• An additional set of risk score columns, including likelihood, impact, criticality,
asset value, and risk score.
• Additional columns that express the time, effort, and cost required to perform
the risk treatment.
• Columns that express the reduction in risk and residual risk.
Risk treatment:
• One or more columns that would specify who or what department or team
would perform the risk treatment.
Each risk treatment option occupies a new row in the worksheet. Each option is
scored, with the scores representing the levels of likelihood, impact, criticality, and asset
value, as well as the new calculated risk score, as though the risk treatment was in place.
Once each risk treatment option is scored, the risk reduction and residual risk are
shown. The risk reduction and residual risk, together with other columns showing hard
costs and impact on the workforce, can help the risk manager better understand the fea-
sibility of each risk treatment option.
Depending on the complexity of the risk, a detailed analysis may require many hours
of research and study. The amount of time available for this work will depend on the
risk manager’s availability compared with other tasks. In some cases, detailed risk analysis
may be considered a luxury.
Figure A-2 depicts a simple risk analysis worksheet that includes the initial risk rating,
plus a description of various risk treatment options with their ratings.
Figure A-2 A simple risk analysis worksheet showing risk treatment options
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
198
NOTE We preer to use a separate workbook or perorming detailed
risk analysis; otherwise, the central risk register workbook will soon be
overcrowded with numerous risk analysis tabs.
NOTE It’s always better to be prepared with more inormation than is used
in a risk treatment proceeding.
NOTE In some cases, it may be wise to discuss the risk treatment matter
with senior executives in one-on-one discussions, where they may be more
apt to ask questions to understand the situation better. These discussions
will also help the risk manager better prepare or the risk treatment
discussion, and in some cases, it may even sway the risk manager to
pursue a dierent remedy.
Risk Mitigation When the risk treatment decision is mitigation, the decision should
also include the naming of the person responsible for performing the risk treatment and
executives’ desire for the timing of risk treatment. This is particularly important if the
risk treatment owner is not present in the discussion.
Any discussion about risk treatment options should be captured so that the risk treat-
ment owner will have additional background and insight into why the particular risk
treatment option was selected. This may help the risk treatment owner proceed more
quickly with planning and execution without circling back to decision-makers to better
understand the rationale behind the decision.
All of the basic facts about risk mitigation (who made the decision, when the decision
was made, who the risk treatment owner is, when the risk treatment should be com-
pleted, and so on) should be entered into the risk register. Then, the risk manager can
conduct effective follow-up over the coming weeks, months, and quarters and report on
the progress to the decision-makers.
Risk Acceptance If the risk treatment decision is acceptance, we recommend that this
decision not be perpetual but instead have an expiration date. After that expiration date,
the risk will be reopened and a new risk treatment decision made. The reason for expiring
risk acceptance is this: conditions related to the risk may change in a year, so much so
that a different decision may be needed in the future. Many things can change in a year:
Risk Transfer One of the four basic risk treatment options, risk transfer means that
some outside organization is willing to take on the risk. Often, this comes in the form
of cyber insurance, but it could just as easily be a business process outsourcing (BPO)
arrangement in which a service provider is willing to accept certain risks.
We provide a note of caution here. While an organization can outsource risk, no orga-
nization can outsource accountability. Here is an example: a successful service business
specializing in water damage mitigation outsources its entire IT and IT security functions
to a large service provider, including information systems where customers register and
request one-time or recurring services. The IT service provider suffers a breach, resulting
in the exposure of its customers’ personal information and numerous identity theft and
fraud cases. The service business attempts to explain that the external service provider
is the party responsible for the breach. However, the customers are unhappy, blame the
service business, and threaten to organize a class-action lawsuit for the damages.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
202
In this example, the service business cannot absolve itself because the IT outsourcer’s
lapse resulted in the breach. The service business decided to use this particular IT out-
sourcer and cannot absolve itself of responsibility because of an unfavorable outcome.
Cyber insurance is similar to this example. An organization with cyber insurance may
suffer a breach, and the cyber insurance company may compensate the organization for
particular losses. However, the organization will have lost some goodwill and may have a
long-lasting tarnished reputation that can take years to undo.
It is imperative that senior executives fully grasp the complete picture of risk transfer.
Risk Avoidance Risk avoidance is often the least understood risk treatment option.
With risk avoidance, the activity that causes the risk is itself discontinued.
Here is an example: a risk assessment reveals the use of an unsanctioned cloud service
provider to process sensitive information. End users decided to employ a free online
service to perform language translation and use it for translating sensitive documents,
including contracts. In its end-user licensing agreement (EULA), the service provider
claims ownership over any content that it translates. When this matter was brought
to light in a risk treatment discussion, business executives directed the organization to
immediately discontinue use of the service provider, thus avoiding the risk.
Risk Register
The risk register itself is considered a detailed, operational business record. Reporting
about the risk register generally consists of high-level depictions of risk instead of report-
ing the detail. Challenges in reporting risk include the following:
• Trends Changes in the size of the risk register, or the aggregate or average risk
levels, may be misleading, particularly in newer risk programs that still identify risk.
• Completeness A risk register should not be considered a complete record of
risk, as there may be numerous undiscovered and unidentified risks.
New Risks
Risk leaders may opt to disclose the number of, or even some details about, new risks
identified in the reporting cycle. This reporting is a good indication that the risk program
continues to keep its risk radar operating and open to risk discovery.
Risk Review
Reporting and metrics on risk reviews are an indication of engagement and involvement.
Executives should expect risk leaders to periodically engage business leaders and depart-
ment heads throughout the organization and may want to know how often (and with
whom) this occurs.
Risk Treatment
The rate at which risk treatment decisions are made, and trends in risk treatment options,
shows that the risk leader continues to work through the risk register.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
204
Risk Mitigation Follow-Up
When mitigation is the chosen risk treatment for a given risk, the risk leader needs to
track that risk mitigation and report on whether mitigation is performed on schedule.
Mitigation activities that are behind schedule can be highlighted so that executives can
understand where their directives are falling short and which are being completed on time.
Risk Renewals
As discussed earlier in this appendix, risk acceptance should not be perpetual but should
expire. Risk leaders may want to publish, as a leading indicator, the number of risks
nearing renewal. Those risks will be redeliberated and new decisions made, whether to
continue to accept the risks for another year or take a different approach.
Risk Prioritization
In risk reporting, leaders often care only about the top-priority risk, such as a top 5, 10,
or 20 risks. These may not be precisely the top risks, according to the risk manager. How-
ever, these priorities represent an articulation of risk appetite and risk tolerance, as well
as leadership’s culture and focus on risk. All too often, risk prioritization with managers
boils down to nothing more than cost, unfortunately.
B
This book comes complete with TotalTester Online customizable practice exam software
with 300 practice exam questions.
System Requirements
The current and previous major versions of the following desktop browsers are
recommended and supported: Chrome, Microsoft Edge, Firefox, and Safari. These
browsers update frequently, and sometimes an update may cause compatibility issues
with the TotalTester Online or other content hosted on the Training Hub. If you run
into a problem using one of these browsers, please try using another until the problem
is resolved.
Privacy Notice
McGraw Hill values your privacy. Please be sure to read the Privacy Notice available
during registration to see how the information you have provided will be used. You
may view our Corporate Customer Privacy Policy by visiting the McGraw Hill Privacy
Center. Visit the mheducation.com site and click Privacy at the bottom of the page.
205
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
206
Access To register and activate your Total Seminars Training Hub account, simply
follow these easy steps.
1. Go to this URL: hub.totalsem.com/mheclaim
2. To register and create a new Training Hub account, enter your e-mail address,
name, and password on the Register tab. No further personal information
(such as credit card number) is required to create an account.
If you already have a Total Seminars Training Hub account, enter your e-mail
address and password on the Log in tab.
3. Enter your Product Key: cqpq-9s9f-3fbz
4. Click to accept the user license terms.
5. For new users, click the Register and Claim button to create your account.
For existing users, click the Log in and Claim button.
You will be taken to the Training Hub and have access to the content for this book.
Duration of License Access to your online content through the Total Seminars Train-
ing Hub will expire one year from the date the publisher declares the book out of print.
Your purchase of this McGraw Hill product, including its access code, through a retail
store is subject to the refund policy of that store.
The Content is a copyrighted work of McGraw Hill, and McGraw Hill reserves all
rights in and to the Content. The Work is © 2022 by McGraw Hill.
Restrictions on Transfer The user is receiving only a limited right to use the Content
for the user’s own internal and personal use, dependent on purchase and continued
ownership of this book. The user may not reproduce, forward, modify, create derivative
works based upon, transmit, distribute, disseminate, sell, publish, or sublicense the
Content or in any way commingle the Content with other third-party content without
McGraw Hill’s consent.
Limited Warranty The McGraw Hill Content is provided on an “as is” basis. Neither
McGraw Hill nor its licensors make any guarantees or warranties of any kind, either
express or implied, including, but not limited to, implied warranties of merchantability
or fitness for a particular purpose or use as to any McGraw Hill Content or the
information therein or any warranties as to the accuracy, completeness, correctness, or
results to be obtained from, accessing or using the McGraw Hill Content, or any material
referenced in such Content or any information entered into licensee’s product by users
or other persons and/or any material available on or that can be accessed through the
licensee’s product (including via any hyperlink or otherwise) or as to non-infringement
of third-party rights. Any warranties of any kind, whether express or implied, are
disclaimed. Any material or data obtained through use of the McGraw Hill Content is
at your own discretion and risk and user understands that it will be solely responsible for
any resulting damage to its computer system or loss of data.
Appendix B: About the Online Content
207
Neither McGraw Hill nor its licensors shall be liable to any subscriber or to any user or
anyone else for any inaccuracy, delay, interruption in service, error or omission, regardless
of cause, or for any damage resulting therefrom.
In no event will McGraw Hill or its licensors be liable for any indirect, special or
consequential damages, including but not limited to, lost time, lost money, lost profits or
good will, whether in contract, tort, strict liability or otherwise, and whether or not such
damages are foreseen or unforeseen with respect to any use of the McGraw Hill Content.
TotalTester Online
TotalTester Online provides you with a simulation of the CRISC exam. Exams can be
taken in Practice Mode or Exam Mode. Practice Mode provides an assistance window
with hints, explanations of the correct and incorrect answers, and the option to check
your answer as you take the test. Exam Mode provides a simulation of the actual exam.
The number of questions, the types of questions, and the time allowed are intended to
be an accurate representation of the exam environment. The option to customize your
quiz allows you to create custom exams from selected domains or chapters, and you can
further customize the number of questions and time allowed.
To take a test, follow the instructions provided in the previous section to register and
activate your Total Seminars Training Hub account. When you register, you will be taken
to the Total Seminars Training Hub. From the Training Hub Home page, select your
certification from the Study drop-down menu at the top of the page to drill down to the
TotalTester for your book. You can also scroll to it from the list of Your Topics on the
Home page, and then click the TotalTester link to launch the TotalTester. Once you’ve
launched your TotalTester, you can select the option to customize your quiz and begin
testing yourself in Practice Mode or Exam Mode. All exams provide an overall grade and
a grade broken down by domain.
Technical Support
For questions regarding the TotalTester or operation of the Training Hub, visit
www.totalsem.com or e-mail [email protected].
For questions regarding book content, visit www.mheducation.com/customerservice.
GLOSSARY
acceptable use policy (AUP) Organizational policy that describes both acceptable
and unacceptable actions when using organizational computing resources, as well as the
consequences of violating the policy.
access control The processes and technologies involved in protecting information,
systems, and data against unauthorized disclosure, modification, or loss through the
control of access to those resources physically and/or logically.
accountability The ability to trace an action or event to a specific subject and to hold
that subject responsible for their actions.
AIC triad See CIA triad.
assessment The process of determining whether a program, project, or control is
meeting specified objectives as well as determining whether the controls selected to
protect the system are performing their desired function to the level required.
asset Anything of value to an organization; assets can include tangible items such as
information, data, equipment, supplies, facilities, and systems as well as intangible items
such as customer loyalty and reputation.
asset valuation The practice of assigning a monetary value to an asset.
attack An offensive action that results in potential harm to an asset.
attack surface The set of components that could be the target of attack by an adversary.
audit A formal inspection of a control, process, or system to determine whether it is
being followed, operates effectively, and meets its objectives.
authentication The process of validating credentials a user has supplied to verify that
they are the actual authorized user and that the credentials belong to that user.
authorization The process of giving authenticated users the proper accesses to systems,
data, and facilities.
availability The goal of having information and systems available to authorized users
whenever and however they need them.
bow-tie analysis A risk analysis technique used to depict the relationships between
various elements of risk.
brainstorming A problem-solving technique in which participants spontaneously
generate potential ideas for discussion and analysis.
209
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
210
business case In the context of risk management, a written or oral presentation that
explains the reasoning for the expense and effort associated with risk response.
business continuity The process, generally detailed in a supporting plan, that keeps
the company operating and functioning in the event of a power outage, IT malfunction,
or major disaster.
business impact assessment (BIA) The process of analyzing critical business processes,
as well as the assets used to support them, and determining the impact to them when a
loss of or disruption in access to those assets occurs.
business process outsourcing (BPO) The process of outsourcing one or more business
processes to a service provider.
business triage A decision-making system used to prioritize resources to maximize
outcomes.
capability The ability for the organization to implement a risk response.
capability maturity model integration (CMMI) A business process maturity model
developed by Carnegie Mellon University and now owned by ISACA.
change management The overall process used to manage the request, review,
approval, and execution of changes to IT systems or business processes.
CIA triad The three security principles of confidentiality, integrity, and availability.
COBIT A management and governance framework developed and used extensively by
ISACA in its various risk management and business process frameworks.
code review A manual examination of software source code to identify defects,
including those that may be exploited by an attacker. See also code scan.
code scan An automated examination of software source code to identify defects.
See also code review.
common control A control spanning the entire organization that protects multiple
assets rather than only a specific asset. A physical control is a good example of a
common control, and the responsible entity for that control would be the common
controls provider.
confidentiality The goal of protecting systems and information from unauthorized
disclosure.
configuration management The use of recordkeeping to record changes made to
configuration settings in an information system.
Glossary
211
control A measure put in place to increase protection for an asset, to make up for a
lack of protection for an asset, or to strengthen a weakness for an asset. Controls can be
administrative, technical, or physical and operational. They can also be further divided
by functionality (deterrent, preventative, detective, and so on).
control baseline The initial set of controls selected, based on the security categorization
to be applied to systems and data and maintained throughout their life cycle.
control deficiency analysis The process of determining the difference between the
existing state of a control’s effectiveness and its desired state.
control gap A situation where controls do not exist or are insufficiently designed to
meet a control objective.
control objective An overarching statement describing the intent of a group
of controls.
control ownership The person or entity responsible for the proper implementation
and maintenance of security controls within the organization.
cost The financial impacts of any decision as well as the less-easily quantified aspects
such as loss of goodwill, loss of brand status, and other hard-to-define attributes. Cost
also includes the maintenance of the responsive mitigation over its required life span.
criticality analysis A study of each system and process, a consideration of the impact
on the organization if it is incapacitated, the likelihood of incapacitation, and the
estimated cost of mitigating the risk or impact of incapacitation
culture The values and norms in an organization that define how people treat each
other and work together to achieve organization objectives.
data classification Policies that define sensitivity levels and handling procedures, and
controls used to protect information at various levels.
data destruction The willful or malicious destruction of data that renders it unavailable
for intended uses.
data discovery A manual or automated technique in which a target system is examined
to determine the presence of specific types of data; additionally, this may include an
examination of access rights to particular sets of data.
data sensitivity The level of protection required for information or data based on
its impact to the organization if it were disclosed to unauthorized people, subject to
unauthorized modification, or otherwise lost.
Deming cycle A generic business life cycle model consisting of Plan, Do, Check,
and Act.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
212
denial of service (DoS) An attack on a system that renders it unavailable for
legitimate uses.
design review The examination of the design of a system or process to determine
whether it is sound and meets stated objectives.
disaster recovery (DR) The process of reacting to an incident or disaster and recovering
an organization, its personnel, and systems to a functioning state.
due care The process of taking the necessary responsibility and steps to protect an
organization and its workers.
due diligence The reasonable amount of investigation taken prior to entering into a
legal agreement.
due process An impartial and fair inquiry of violations of organization policy.
economy of use The design principle that states that you should attempt to design
and implement controls that can be applied to more than one system or set of data
or that provide more than one function in effectively mitigating risk. The goal is to
minimize single-use controls (controls that apply only to a specific system or set of data)
because they can be more expensive and specialized to implement.
effectiveness The extent to which the response reduces the likelihood or the impact
of the risk event to the organization; also, the degree and depth to which a control fulfills
its security requirements.
efficiency The interaction of a control with its environment, affecting factors such as
cost, reliability, supportability, and interoperability.
enterprise risk management (ERM) The practice of identifying and managing
strategic risk in an organization.
event An instance of threat realization.
event-tree analysis A bottom-up risk analysis technique that focuses on all possible
risk impacts and looks for all possible risk events.
exception management The process of accepting, documenting, and tracking
exceptions to security policies and risk mitigation strategies.
exploit 1) A specific tool or method that can be used to carry out a threat. 2) The act
of attacking an asset, made possible by the presence of a vulnerability.
Factor Analysis of Information Risk (FAIR) A risk analysis methodology used to
analyze the factors that contribute to individual risks.
false negative A situation where a vulnerability isn’t detected but does actually exist.
false positive A situation where a vulnerability is reported that isn’t actually legitimate.
Glossary
213
fault-tree analysis A top-down risk analysis technique that focuses on risk events and
looks for all possible causes of the event.
Federal Information Processing Standards (FIPS) Public standards published
by the National Institute of Standards and Technology (NIST) for use in U.S.
government systems.
Federal Information Security Management Act (FISMA) A U.S. federal law requiring
federal agencies to develop information security programs and capabilities aligned to
NIST Special Publication 800-53.
framework An overall methodology prescribing higher-level processes or controls.
fuzzing A technique used to generate various forms of input to a system to identify
potential vulnerabilities that could allow an attacker to compromise the system.
gap assessment An examination of a system or process to determine whether it
complies with established requirements or standards.
governance The legal or corporate standards that prescribe how an organization will
conduct itself with regard to its behavior in handling information and data.
governance, risk, and compliance (GRC) system See integrated risk management
(IRM) system.
Gramm-Leach-Bliley Act (GLBA) U.S. law that requires financial institutions
(including banks, loan companies, insurance, and investment companies) to protect
sensitive financial data and make their information-sharing practices known to their
customers. Of particular interest to security professionals is the Safeguards Rule
incorporated into GLBA, which requires institutions under the jurisdiction of the Federal
Trade Commission to have specific measures in place to protect customer information.
Health Insurance Portability and Accountability Act (HIPAA) Law passed in 1996
requiring the U.S. government’s Health and Human Services Department to establish
requirements for protecting the privacy and security of personal health information
(PHI). The two important elements of HIPAA of interest to security professionals are
the HIPAA Privacy Rule and the HIPAA Security Rule, which set forth specific standards
to protect electronic PHI.
identification The process of initially presenting credentials to a system to identify an
authorized user.
impact The level of potential harm or damage to an asset or the organization if a given
threat were to exploit a given vulnerability.
inherent risk The level of risk associated with a specific activity or function, prior to
applying any protective controls or safeguards.
integrated risk management (IRM) system An information system used to track and
manage various governance, risk, and compliance activities, including risk management.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
214
integrity The goal of preventing unauthorized modification to a system or data.
ISO/IEC The International Organization for Standardization (ISO) and the International
Electrotechnical Commission (IEC), which together are responsible for a majority of
the information technology standards used worldwide, including several that apply to
information security and risk management.
IT general control (ITGC) A control that is applied across all information systems and
supporting processes in an organization.
job rotation A practice where an organization occasionally moves personnel from one
job to another to help prevent practices contrary to policy.
key control indicator (KCI) A specific indicator that shows the relative effectiveness of
a control.
key performance indicator (KPI) An indicator that is used to understand and enable
the measurement of a control’s performance.
key risk indicator (KRI) A highly probable indicator designed to accurately predict an
important level of risk based on a defined threshold.
least privilege A security principle that dictates that subjects should be given only
the minimum level of rights, permissions, and privileges necessary to perform their
designated functions or jobs, and no more than that.
life cycle A characteristic of a business process where a sequence of activities is repeated.
likelihood The certainty that an incident will occur; often expressed statistically as a
probability of occurrence.
mandatory vacation A practice where an organization requires that each employee
use a minimum amount of vacation each year to provide the opportunity for audit,
security, and privacy specialists to examine the employee’s practices or records during
their absence.
materiality A quantitative or qualitative expression of significance.
maturity The degree of formality and optimization of a business process or capability.
maturity assessment An assessment of processes or capabilities to determine their
maturity. See also maturity.
maximum tolerable downtime (MTD) A theoretical period, measured from the onset
of a disaster, after which the organization’s ongoing viability would be at risk.
multifactor authentication Any means used to authenticate a user that is stronger
than just the use of a user ID and password. Examples of multifactor authentication
include digital certificates, tokens, smart cards, and biometrics.
Glossary
215
need-to-know A security concept that requires a subject have an actual requirement
to access systems or data, based on their job requirements.
NIST The U.S. Department of Commerce’s National Institute of Standards and
Technology, a standards development organization.
NIST Risk Management Framework (RMF) The overall risk management
methodology published and promulgated by the National Institute of Standards and
Technology (NIST) in Special Publication 800-37.
non-repudiation The security concept that requires a subject to be accountable for
their actions, such that they cannot deny that they took an action.
OCTAVE The Operationally Critical Threat, Asset, and Vulnerability Evaluation
(OCTAVE) methodology developed by Carnegie Mellon University and the U.S.
government to assist organizations in identifying and assessing information security risk.
Payment Card Industry Data Security Standard (PCI DSS) A set of security
requirements levied on merchants that process credit card transactions by the major
payment card industry providers, including Discover, Visa, MasterCard, and American
Express. PCI DSS was developed to impose security requirements and controls on
retailers (merchants and service providers) to reduce credit card fraud and identity theft.
penetration test An authorized assessment that actively identifies and exploits
vulnerabilities or weaknesses in a system or process.
personally identifiable information (PII) Data elements that uniquely identify a
natural person.
platform A hardware, software, or cloud infrastructure upon which to base computing
operating systems, applications, and networks. It may involve different operating systems,
network protocols, or particular types of hardware.
port scanner A software program that determines which ports on a target system are
listening for incoming requests. See also vulnerability scanner.
portfolio A grouping of programs managed as a whole. Portfolio management involves
the oversight of several different programs by a senior person in the organization.
practice A proven, standardized methodology or way of performing particular tasks
or processes.
privacy The principles and practices of ensuring the protection and proper use of the
personally identifiable information (PII) of customers, constituents, and workers.
probability The chance that an event will occur.
program 1) A grouping of similar projects; programs are usually ongoing and longer
term in nature and may also encompass several individual projects. 2) Activities specific
to processes that may have an indefinite duration.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
216
project A limited-duration set of activities geared toward a particular goal; projects
have definitive start and stop dates, resource allocations, scopes, schedules, and costs.
project management A set of processes covering a defined project from start to finish,
generally looking to cut costs such as time, scope, and overall project cost.
protocol analyzer A hardware or software tool that collects network traffic for the
purpose of examination, either for determining network issues or for capturing plaintext
usernames, passwords, or other sensitive information being sent in the clear.
qualitative assessment An assessment technique that uses subjective values, such
as low, moderate, and high, to describe various components of risk, such as likelihood
and impact. Qualitative techniques rely on data that is often not easily described in
numerical terms.
quantitative assessment An assessment technique that uses nonsubjective values,
such as numerical or other measurable data, to describe various components of risk,
such as likelihood and impact. Quantitative techniques rely on data that is numerically
derived and not easily subject to individual opinion.
quick win A high-reward, low-cost risk response that is both effective and efficient.
recovery point objective (RPO) The maximum tolerable period in which data can be
lost by the organization because of an incident or disaster.
recovery time objective (RTO) The maximum amount of time allowed to pass
between an incident and recovering a business process to an operational state.
residual risk The risk that remains after the application of risk treatment, acceptance,
or transfer.
resilience The ability of the business to survive negative events and continue with its
mission and function.
return on investment (ROI) The ratio between investment and value received.
risk The possibility of harm that can come to an asset or an organization.
risk acceptance An active decision made to assume risk (either inherent or residual)
and take no further action to reduce it.
risk acceptance letter A formal memo in which a business leader agrees to accept an
identified risk.
risk analysis The detailed examination of an individual risk identified in a risk
assessment.
risk appetite The organization’s overall acceptable level of risk for a given business venture.
risk assessment The process of identifying and assessing various factors, including
threats, threat actors, vulnerabilities, assets, and likelihood to determine their impact on
the organization.
Glossary
217
risk avoidance A risk treatment option taken when the level of risk is still not
acceptable after controls have been considered, resulting in an activity being canceled or
not being started.
risk capacity The amount of loss that an organization can incur without seriously
affecting its ability to continue as an organization.
risk culture The overall attitude toward risk, promulgated and supported by the
organization’s leadership.
risk factor Any factor that may contribute to an increase or decrease in risk; risk factors
could be external or internal, and they could affect either likelihood or impact should a
risk event actually occur.
risk identification The realization of a new risk to an organization, its systems, or its
processes.
Risk IT Framework ISACA’s own risk management methodology; it is strongly tied to
and integrated with COBIT. The Risk IT Framework merges traditional IT models with
a more risk-focused mindset.
risk ledger See risk register.
risk management The life cycle process of managing risk within an organization at all
levels, according to the organization’s risk appetite, tolerance, and strategy.
risk mitigation Involves the application of controls that lower the overall level of risk
through the reduction of the vulnerability, the likelihood of the threat exploit, or the
reduction of the impact to the asset, if the risk were to be realized.
risk monitoring Ongoing risk assessment activities in which risks are periodically
reviewed to determine whether the nature of threats, threat actors, vulnerabilities, impact,
or probabilities of occurrence have changed.
risk owner The person ultimately responsible and accountable for a risk.
risk ownership The state of being responsible and accountable for a risk.
risk profile A collection of detailed data on identified IT risks, typically applied to a
specific system or groups of systems.
risk ranking The process of placing risks into a sequence, usually with the greatest
risks appearing first.
risk realization The awareness that a potential risk scenario has become actualized.
risk register The master product or document that reflects the different risk scenarios
and factors for the organization; it could be broken down by asset or system and reflects
the different risk factors, including threats, vulnerabilities, assets, likelihood, and impact
to assets.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
218
risk response action plan A list of the risk responses that have been chosen, and
the charts of their progress and associated timeline, with an appropriate action owner
or owners.
risk scenario An identified risk event possibility, which consists of a threat actor,
threat, vulnerability, and asset.
risk sharing Often referred to as risk transference, risk sharing entails the use of a
third party to offset part of the risk. It can involve the outsourcing of some activities to
a third party to reduce the financial impacts of a risk event.
risk tolerance The organization’s level of acceptable variation from the risk appetite.
risk transference See risk sharing.
root-cause analysis (RCA) A method of problem-solving that seeks to identify the
root cause of an event or problem.
Sarbanes-Oxley Act of 2002 (SOX) U.S. law passed in 2002 establishing requirements
for public companies in the United States, as well as auditors and accounting firms,
to improve the accuracy and reliability of corporate disclosures concerning securities
laws. The law is enforced by the U.S. Securities and Exchange Commission (SEC) and
provides governance for the integrity and accuracy of data produced by an organization.
For security professionals, this has the effect of imposing specific integrity and protection
controls on information systems and processes.
scope The set of systems, processes, personnel, data, or work centers to be included in
an assessment.
security categorization The process of determining the impact to the organization
regarding the confidentiality, integrity, and availability of information and systems.
The security categorization uses qualitative benchmarks of low, moderate, and high.
FIPS 199 and NIST Special Publication 800-60 offer a defined process for the security
categorization of information.
security control A security measure or protection applied to data, systems, people,
facilities, or other resources to protect them from adverse events. See also control.
segregation of duties See separation of duties.
separation of duties The process design and access control concept that enforces the
rule that no single individual can carry out certain high-value or high-risk tasks.
service level agreement (SLA) A contractual agreement, signed by an organization
and a third-party provider, that details the level of security, data availability, and other
protections afforded the organization’s data held by the third party.
sniffer See protocol analyzer.
Software as a Service (SaaS) A third-party cloud-based service that offers outsourced
use of software; this allows an organization to use licensed software at a lower cost than
buying, installing, and maintaining hardware and software.
Glossary
219
stakeholder Any business-related individual, department, or entity directly affected
by risk to the organization.
standard A prescribed set of detailed processes, which may include specific levels of
performance or function, used to complete and measure a given task or function.
statement of impact A qualitative or quantitative description of the impact on an
organization if a process or system is incapacitated for a time.
systems development life cycle (SDLC) A framework describing the entire useful life
of a system or software, which usually includes phases relating to requirements definition,
design, development, acquisition, implementation, operations, and disposal.
tailgating A practice of unauthorized persons following authorized persons through a
security door or entrance.
The Open Group Architecture Framework (TOGAF) A life-cycle enterprise
architecture framework used for the designing, planning, implementation, and
governance of an enterprise architecture.
third-party risk management (TPRM) The set of activities used to identify and
manage risks associated with the use of external suppliers and service providers.
threat An event or occurrence that has the potential to cause harm or damage to
people, places, or things or to adversely affect operations.
threat actor A threat agent that is one or more people. See also threat agent.
threat agent An entity that has the intent to initiate a threat event. This doesn’t have
to be a person; it could also be nature, in the case of a natural disaster.
threat assessment An assessment that attempts to determine all potential threat
actors and threats that may affect a given asset or its vulnerabilities.
threat landscape The set of threats that have been identified that are associated with
a business activity or business asset.
threat modeling A threat assessment that attempts to determine all possible vectors
of attack and includes risk factors that may affect the ability of a threat actor to initiate
or complete a threat event.
threat realization A threat that is carried out that causes harm or damage to people,
places, or things.
three lines of defense The concept of defense within a risk management framework
that consists of operational management, risk and compliance management, and audit
and accountability.
triage See business triage.
vulnerability A weakness in a system, asset, or process, such as a flaw in software
code; it can also be considered a lack of protection for an asset, such as an unlocked
server room door.
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
220
vulnerability analysis Examination of a vulnerability in a system, asset, or process.
vulnerability assessment An assessment that attempts to discover potential
weaknesses for an asset. This involves identifying the assets that will be covered within
the scope of the assessment, conducting scans and other tests against those assets, and
providing a report of the vulnerabilities that have been found.
vulnerability scanner A software program designed to scan a system to determine
what services the system is running and whether any unnecessary open ports, operating
systems and applications, or back doors can be exploited because of a lack of patching or
other flaws. See also port scanner.
walkthrough An interview with a control, process, or system owner as a part of
an assessment.
work breakdown structure (WBS) A detailed decomposition of the work to be
performed during the project, including specific step-by-step tasks, as well as required
resources.
workers An inclusive term that means employees (full-time and part-time), temporary
workers, contractors, consultants, and others who are a part of an organization’s workforce.
Zachman framework An enterprise architecture framework used to describe an IT
architecture in increasing levels of detail.
INDEX
A scope, 42
acceptable use policies (AUPs), 169–170 types, 41–42
acceptance, risk, 84–85, 200–201 asset-level risk registers, 193
access control asset value (AV)
non-repudiation, 158 control selection factor, 103
PCI DSS, 100 qualitative risk analysis method, 191
principles and policies, 167–168 risk analysis, 56
types, 155–156 assets
account suspension, 175 collecting and organizing data for,
accountability 9–10
auditing relationship, 13 description, 26, 156
overview, 158 examples, 7–8
risk ownership, 83 identifying in risk analysis, 56, 58
third-party risk, 87 IT risk assessment, 43–44
adaptability issues in AUPs, 169 management systems, 9
administrative controls, 32, 94 organizational, 6–10
advisories, 24 sources of data for, 8–9
aggregation of data, 108–109 attacks, defined, 26
ALE (annual loss expectancy), 60–62, 103 attainability in KPIs, 111–112
analysis audience for training programs, 166
controls, 31–37, 103–104 audits
data, 108–109 accountability, 158
risk. See risk analysis methodologies description, 42
analysis worksheets, 197–198 new risk identification, 23
annual loss expectancy (ALE), 60–62, 103 overview, 13
annualized rate of occurrence (ARO), 60 risk register information source, 55
Anything as a Service (XaaS), 131 AUPs (acceptable use policies), 169–170
architecture and design reviews, 42 authentication, 157
ARO (annualized rate of occurrence), 60 authorization, 157–158
assess step in RMF, 161 authorize step in RMF, 161–162
assessments AV (asset value)
data collection for, 42–43 control selection factor, 103
defined, 40 qualitative risk analysis method, 191
IT risk. See IT risk assessment risk analysis methodology, 56
221
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
222
availability business impact in risk analysis, 58
description, 154–155 business leaders, risk register reviews with,
health data, 73 195–196
key performance indicators, 111–112 business processes
avoidance, risk, 85 asset organization by, 9
awareness training programs, 165–167 organizational governance, 5–6
BYOD devices, 184, 193
B
BAAs (business associate agreements), 87 C
background checks in hiring, 173 CA (criticality analysis), 69–70
battlefield allegory, 185–186 California Consumer Privacy Act
Bayesian analysis method, 66 (CCPA), 171
BCDR. See business continuity and categorize step in RMF, 160–161
disaster recovery (BCDR) management causal analysis step in root cause
BCP (business continuity planning) analysis, 37
projects, 67–68 CCBs (change control boards), 89
BIA. See business impact analysis (BIA) CCPA (California Consumer Privacy
bottom-up risk scenario development, 39 Act), 171
bow-tie analyses, 65–66 Center for Internet Security (CIS),
brainstorming and risk identification, 25 97–98, 100
brand equity assets, 8 centralized dashboards for controls, 110
building assets, 7 change control boards (CCBs), 89
business alignment, 45 change management, 89–90
business associate agreements (BAAs), 87 controls, 104
business context in risk analysis, 56 IT operations management, 136
business continuity and disaster recovery SDLC, 151
(BCDR) management change risk in emerging technologies, 153
business impact analysis, 66, 141 chief information security officers
overview, 140–141 (CISOs), 201
plan testing, 142 chronology step in root cause analysis, 37
recovery objectives, 141 CIS (Center for Internet Security),
recovery strategies, 141–142 97–98, 100
resilience and risk factors, 142–144 CISOs (chief information security
business continuity planning (BCP) officers), 201
projects, 67–68 classification
business impact analysis (BIA) assets, 58
criticality analysis, 69–70 data, 145–146, 156–157
inventory key processes and systems, 67 clearance for authorization, 158
overview, 66, 141 cloud services
recovery objectives, 70 enterprise architecture, 131
statements of impact, 68–69 risk, 184
Index
223
COBIT 2019, 162–164 contractors, tracking, 173–174
Code of Professional Ethics, 15 contractual requirements, 14–15
code reviews, 42 controls
code scans, 42 analysis, 103–104
codes of conduct and ethics, 174 change and configuration
collection of data, 108–109 management, 104
Committee of Sponsoring Organizations deficiency analysis overview, 30–31
of the Treadway Commission design, 101–102
(COSO), 163 effectiveness evaluation, 31–34, 106
common controls, 36, 82 frameworks, 98–101
common controls providers, 36 gaps, 34
Common Vulnerability Scoring System key control indicators, 113
(CVSS) score, 32 key performance indicators,
communication between risk register 110–112
layers, 194 key risk indicators, 112–113
compatibility in emerging monitoring techniques, 109
technologies, 153 overview, 93
compensating controls, 94–95 ownership, 36, 82–83
completeness issues recommendations, 34–35
acceptable use policies, 169 reporting techniques, 109–110
risk registers, 203 security, 155–156
complexity increases, 184 selecting, 102–103
compliance management, 12–13 standards, 96–101
compliance risks, 23 testing, 104–106
concepts in IT risk assessment, 40–45 types and functions, 93–96
conduct, codes of, 174 corrective actions in root cause analysis, 37
confidentiality corrective controls, 94–95
data classification, 145–146, 157 COSO (Committee of Sponsoring
health data, 73 Organizations of the Treadway
information security, 128 Commission), 163
overview, 154–155 cost
configuration assessments, 24 controls, 103
configuration management pressure on, 184
controls, 104 project management, 137–139
IT operations management, 136 risk response options, 85
overview, 89–90 countermeasure controls, 96
SDLC, 151 critical processes risks, 143
consultants criticality analysis (CA), 69–70
risk register information source, 56 culture in organizational governance, 4
tracking, 173–174 currency of technology in risk scenario
contingency responses, 203 development, 40
continuity. See business continuity and CVSS (Common Vulnerability Scoring
disaster recovery (BCDR) management System) score, 32
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
224
cyber insurance, 202 distance risks in BCDR, 143
cybercrime, 183 documents and documentation
cybersecurity risks, 23 classification, 145–146
control implementation, 104–105
D disposal, 146
dashboards for controls, 110 handling, retention, and storage, 146
data reviews in IT risk assessment, 43
availability, 155 due care, 171
classification, 145–146, 156–157 due diligence, 171
collecting for assessment, 42–43 due process, 171
destruction policies, 147, 155
discovery, 42 E
retention policies, 146–147 e-mail, 170–171
sensitivity, 156–157 EF (exposure factor) in control
data governance risks, 24 selection, 103
data in motion, 131 effectiveness
data lifecycle management controls, 102–103, 106
overview, 144–145 risk response options, 85
standards and guidelines, 145–146 effort in KRIs, 112
data processing in risk reporting, 108–109 electric generators, 70
databases emerging risk
enterprise architecture, 130 managing, 90–93
networks, 130–131 technologies, 152–153
risk analysis, 56 encryption for networks, 131
Delphi method, 66 enhance responses, 203
denial of service, 155 enterprise architecture
design cloud, 131
controls, 101–102 databases, 130
SDLC phase, 149–150 frameworks, 132–135
destruction of data, 147, 155 gateways, 132
detective controls, 94–95 networks, 130–131
deterrent controls, 94–95 operating systems, 130
development phase in SDLC, 150 overview, 128–129
differentiation step in root cause platforms, 129
analysis, 37 security architecture, 135
direct marketing, privacy policies for, 172 software, 129–130
discovery enterprise risk management (ERM),
data, 42 10–11
risk, 188–192 entity-level risk registers, 193
disposal equipment
documents, 146 description, 7
hardware, 147 recovery strategies, 141–142
SDLC phase, 151 returning in termination, 175
Index
225
ERM (enterprise risk management), G
10–11 gap assessments, 41
ethics codes, 15, 174 gateways in enterprise architecture, 132
evaluation General Data Protection Regulation
controls effectiveness, 31–34, 106 (GDPR), 171
defined, 40–41 geography issues
risk analysis, 59 asset collection and organization, 9
event-tree analysis, 64–65 business continuity and disaster
events recovery, 143
defined, 26 goals in organizational governance, 2–3
overview, 25–26 governance
types, 28 assessments, 24
vocabulary terms, 26–27 organizational. See organizational
exception management, 89–90 governance
exploits overview, 1–2
description, 26 questions, 17–20
risk responses, 203 review, 15–17
exposure factor (EF) in control risk, 10–15
selection, 103 governance level in COBIT, 163–164
external audits as risk register information governance, risk, and compliance
source, 55 (GRC) tools, 53
F government classified documents,
145–146, 157
Factor Analysis of Information Risk guards, 168
(FAIR), 65 guidelines for data lifecycle management,
families, control, 97, 99 145–146
fault-event-tree analysis, 64–65
Federal Information Processing Standards H
(FIPS), 160 hardware disposal, 147
financial system asset inventory, 8 Health Insurance Portability and
findings, managing, 89–90 Accountability Act (HIPAA)
FIPS (Federal Information Processing controls requirements, 96
Standards), 160 OCR involvement, 73
five whys in root cause analysis, 37–38 privacy issues, 171
formal risk register reviews, 195 heat maps for controls, 110
frameworks hiring employees, 173
controls, 98–101 human resources
enterprise architecture, 132–135 codes of conduct and ethics, 174
information technology and hiring, 173
security, 159 terminating, 174–175
IT risk assessment, 45–51 tracking, 173–174
risk management, 10–11
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
226
I data sensitivity and classification,
IaaS (Infrastructure as a Service), 131 156–157
identification emerging technologies, 152–153
assets, 6–8 enterprise architecture. See enterprise
and authentication, 157 architecture
risk, 22–25 frameworks, 159
identification step in root cause human resources, 173–175
analysis, 37 identification and authentication, 157
ignoring risk, 202 IT operations management, 135–137
impact network security, 168–172
business continuity and disaster non-repudiation, 158–159
recovery, 144 overview, 127–128
business impact analysis, 68–69 physical access security, 168
description, 26 project management, 137–140
key risk indicator criteria, 112 questions, 178–182
qualitative risk analysis, 190 review, 175–178
risk analysis, 58–59 security and risk awareness training
implement step in RMF, 161 programs, 165–167
implementation testing for controls, security concepts, 154
104–105 security policies, 167
incidents standards, 159–165
new risk identification, 23 systems development life cycle,
risk register information source, 55 147–152
indicators Information Technology Infrastructure
key control, 113 Library (ITIL), 162–163
key performance, 110–112 Infrastructure as a Service (IaaS), 131
key risk, 112–113 inherent risk
industry development as risk register description, 26
information source, 55 IT risk assessment, 71
information assets, 7 innovation in cybercrime, 183
information policies for privacy, 172 integrated risk management (IRM)
information sources for risk registers, tools, 53
55–56 integration testing in SDLC, 150
information technology and security integrity, 155
access control, 155–156, 167–168 intellectual property assets, 7
accountability, 158 intent threat category, 30
authorization, 157–158 intentional threats in BCDR, 143
business continuity and disaster interface testing in SDLC, 150
recovery management, 140–144 internal audits as risk register information
confidentiality, integrity, and source, 55
availability, 154–155 International Organization for
data lifecycle management, 144–147 Standardization (ISO) frameworks, 162
Index
227
interoperability review, 73–75
controls, 105 risk analysis methodologies, 56–66
emerging technologies, 153 risk events, 25–28
interviews risk identification, 22–25
asset identification, 8 risk ownership, 51–52
hiring, 173 risk ranking, 51
IT risk assessment, 43, 106 risk registers, 52–56
inventories risk scenario development, 38–40
financial system assets, 8–9 standards and frameworks, 45–51
key processes and systems, 67–68 threat landscape, 29–30
IoT devices, 184 threat modeling, 28–30
IRM (integrated risk management) vulnerability and control deficiency
tools, 53 analysis, 30–38
ISACA IT systems portfolios for asset
COBIT, 162–164 identification, 8
Code of Professional Ethics, 15 ITIL (Information Technology
key risk indicators, 112–113 Infrastructure Library), 162–163
Risk IT Framework, 11–12, 49–51,
164–165 J
system testing, 45 job rotation, 168
ISO (International Organization for
Standardization) frameworks, 162 K
ISO/IEC 27000, 162 key control indicators (KCIs)
ISO/IEC 27001, 100–101, 162 business processes, 6
ISO/IEC 27002, 101, 162 controls, 113
ISO/IEC 27005, 49 key performance indicators (KPIs)
ISO/IEC 27701, 162 business processes, 6
ISO/IEC 31000, 162 controls, 110–112
ISO/IEC 31010, 49 key processes and systems inventories, 67
ISO/IEC standards overview, 48–49 key risk indicators (KRIs)
issues management, 89–90 business processes, 6
IT equipment assets, 7 controls, 112–113
IT operations management, 135–137
IT risk assessment L
analysis and evaluation overview, 40 laws as risk register information source, 56
business impact analysis, 66–70 layers in risk registers, 193–194
concepts, 40–45 least privilege principle, 157–158, 167
inherent and residual risk, 71–72 legal requirements, 14–15
miscellaneous risk considerations, legality issues in AUPs, 169
72–73 likelihood
overview, 21–22 description, 27
questions, 75–79 risk analysis, 58–59
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
228
Likert scale in qualitative risk analysis, 62 Risk Management Framework, 11–12,
lines of defense, 12–13 97, 160–162
logical controls, 94 Special Publication 800-17, 97
loss event frequency in FAIR, 65 Special Publication 800-30
quantitative risk analysis, 62–63
M risk assessment guidelines, 45–47
management buy-in for training Special Publication 800-34, 142
programs, 166 Special Publication 800-37, 11–12
management level in COBIT, 163–164 Special Publication 800-53, 33–34,
managerial controls, 94 97–99, 161
mandatory vacations, 168 Special Publication 800-60, 161
market factor risks in BCDR, 143 standards, 159–160
maturity assessments, 41 natural threats in BCDR, 143
maximum tolerable downtime (MTD), 70 NDAs (non-disclosure agreements), 173
measurability of key performance need-to-know authorization, 158
indicators, 111 network security
methods threat category, 30 acceptable use policies, 169–170
military classified documents, 145–146 due care, due diligence, and due
minutes, 187 process, 171
mission risks in BCDR, 143 overview, 168
mitigation of risk personal e-mail, 170–171
deeper analysis, 200 privacy, 171–172
follow up, 204 social media, 170
process, 83–84 networks
risk analysis, 58 enterprise architecture, 130–131
monitor step in RMF, 162 new risk identification, 24
monitoring new risks, reporting, 203
controls, 109 news articles for risk identification, 23
risk, 106–108 NIST. See National Institute of Standards
MTD (maximum tolerable downtime), 70 and Technology (NIST)
multifactor authentication, 157 non-disclosure agreements (NDAs), 173
non-repudiation, 158–159
N
National Institute of Standards and O
Technology (NIST) objectives in organizational governance,
business continuity and disaster 2–3
recovery, 142 objectives threat category, 30
control effectiveness, 33–34 observation in IT risk assessment, 43
control framework, 98–99 OCR (Office of Civil Rights), 73
control guidelines and standards, OCTAVE (Operationally Critical Threat,
96–98 Asset, and Vulnerability Evaluation)
quantitative risk analysis, 62–63 methodology, 47–48
risk assessment guidelines, 45–47 Office of Civil Rights (OCR), 73
Index
229
online data for asset identification, 8 physical location risks in BCDR, 143
operating systems in enterprise PII (personally identifiable
architecture, 130 information), 171
operational controls, 32, 94 plan testing in BCDR, 142
operational criticality in qualitative risk planning phase in SDLC, 149
analysis method, 191 Platform as a Service (PaaS), 131
operational management, 12 platforms in enterprise architecture, 129
operational risks, 23 PMBOK (Project Management Body of
Operationally Critical Threat, Asset, and Knowledge), 162
Vulnerability Evaluation (OCTAVE) policies
methodology, 47–48 acceptable use, 169–170
organizational governance access control, 167–168
assets, 6–10 organizational governance, 5
business processes, 5–6 privacy, 171–172
culture, 4 retention and destruction, 146–147
overview, 2 security, 167
policies and standards, 5 termination, 174–175
strategy, goals, and objectives, 2–3 portfolios in project management, 137
structure, roles, and responsibilities, practices, 160
3–4 preparation step in RMF, 160
organizational units, asset organization preventive controls, 94–95
by, 9 PRINCE2 (PRojects IN Controlled
outsourcing risks in BCDR, 143 Environments 2), 163
ownership of risk and control, 36, 51–52, prioritization, risk, 204
82–83 privacy
assessments, 24
P network security, 171–172
PaaS (Platform as a Service), 131 risks, 23
passive observation for new risk private classified documents,
identification, 24 145–146
Payment Card Industry Data Security probability
Standard (PCI DSS), 99–100 description, 27
penetration tests qualitative risk analysis method,
description, 41 190–191
new risk identification, 23 probable loss magnitude in FAIR, 65
personal e-mail, 170–171 processes
personally identifiable information asset organization by, 9
(PII), 171 organizational governance, 5–6
personnel assets, 7 risk management programs, 187
PHI (protected health information), 73 professional ethics, 15
physical access security, 168 program charters, 186
physical controls, 32, 94 program-level risk registers, 193
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
230
programs recovery objectives in business impact
project management, 137 analysis, 70
risk management, 186–188 recovery point objectives (RPOs),
training, 165–167 60–61, 141
project management, 137–140 recovery strategies, 141–142
Project Management Body of Knowledge recovery time objectives (RTOs),
(PMBOK), 162 60–61, 141
PRojects IN Controlled Environments 2 regulations
(PRINCE2), 163 asset organization by, 10
property assets, 7 overview, 14–15
protected health information (PHI), 73 pressure on, 183–184
protection issues in acceptable use risk register information source, 56
policies, 169 relationship threat category, 30
public documents, 145–146 relevancy
publishing, 203–204 key performance indicators,
111–112
Q risk scenario development, 39
qualitative analysis method reliability in key risk indicators, 112
deeper analysis, 198 renewals, risk, 204
risk analysis, 59–60, 62–63 reporting, risk. See risk reporting
risk management programs, 187 reputation assets, 8
risk ratings, 190–192 requirements phase in SDLC, 149
quantitative analysis method residual risk
deeper analysis, 198 description, 27
risk analysis, 59–63 IT risk assessment, 71–72
risk management programs, 187 risk acceptance, 84
risk ratings, 192 resilience in BCDR, 142
responsibilities in organizational
R governance, 3–4
ranking risk, 51 results threat category, 30
ratings retention
qualitative analysis, 190–192 data, 146–147
quantitative analysis, 192 documents, 146
RCA (root cause analysis) retirement phase in SDLC, 151
key risk indicators, 113 return of identification in termination, 175
steps, 36–37 return on investment (ROI) in control
RE (Risk Evaluation) domain, recommendations, 35
11, 49–51 reviewing risk registers, 194–196
real-time data, 108–109 risk
recommendations for risk treatment, description, 26
199–203 emerging technologies, 152–153
records, 7 SDLC, 151–152
Index
231
risk acceptance, 84–85, 200–201 lines of defense, 12–13
risk analysis, description, 27 overview, 10
risk analysis methodologies risk identification, 22–25
asset identification, classification, and Risk IT Framework
valuation, 58 key risk indicators, 112–113
bow-tie analyses, 65–66 overview, 164–165
Factor Analysis of Information Risk, 65 process areas, 49–50
fault- and event-tree analysis, 64–65 risk landscape, 178–182
likelihood determination and impact risk management
analysis, 58–59 description, 27
miscellaneous, 66 frameworks, 10–11
overview, 56–58 overview, 12–13
qualitative analysis, 59 Risk Management Framework (RMF)
quantitative analysis, 59–62 controls, 97–99
risk appetite steps, 11–12, 160–162
deeper analysis, 198 risk management life cycle
description, 13–14 deeper analysis, 196–198
risk analysis, 58 publishing and reporting, 203–204
risk assessments risk discovery, 188–192
description, 27 risk registers, 193–196
IT. See IT risk assessment risk treatment recommendations,
risk register information source, 55 199–203
risk avoidance, 202 risk management programs
risk-aware culture, 24 processes, 186–187
risk awareness training programs, purpose, 187–188
165–167 risk managers, 194
risk derivation in FAIR, 65 risk mitigation
Risk Evaluation (RE) domain, 11, 49–51 deeper analysis, 200
risk events follow up, 204
overview, 25–26 process, 83–84
types, 28 risk analysis methodology, 58
vocabulary terms, 26–27 risk ownership
risk factors considerations, 36
business continuity and disaster IT risk assessment, 51–52
recovery, 142 risk prioritization, 204
emerging, 91–92 risk profiles
risk governance description, 13
enterprise risk management and risk ISACA Risk IT Framework, 50
management frameworks, 10–11 risk ranking in IT risk assessment, 51
ISACA Risk IT Framework, 49 risk ratings
legal, regulatory, and contractual qualitative analysis, 190–192
requirements, 14–15 quantitative analysis, 192
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
232
risk registers overview, 38
columns, 189–190 top-down, 38–39
data structures, 52–55 risk tolerance
description, 27, 188 deeper analysis, 198
information sources, 55–56 description, 13–14
layers, 193–194 risk analysis methodology, 58
managing, 192 risk transfer, 201–202
reports, 203 risk treatment
reviewing, 194–196 description, 27
types, 193 recommendations, 199–203
updating, 56 reports, 203
risk renewals, 204 RMF (Risk Management Framework)
risk reporting controls, 97–99
controls, 109–110 steps, 11–12, 160–162
data processing, 108–109 ROI (return on investment) in control
key control indicators, 113 recommendations, 35
key performance indicators, roles in organizational governance, 3–4
110–112 root cause analysis (RCA)
key risk indicators, 112–113 key risk indicators, 113
monitoring techniques, 109 steps, 36–37
overview, 81–82, 106–108 RPOs (recovery point objectives),
questions, 119–125 60–61, 141
review, 114–118 RTOs (recovery time objectives),
treatment plans, 108 60–61, 141
risk response
acceptance, 84–85 S
avoidance, 85 S.M.A.R.T. guidelines, 111–112
control design. See controls SaaS (Software as a Service), 131
ISACA Risk IT Framework, 49 safeguard controls, 96
managing, 89–93 SANs (storage area networks), 70
mitigation, 83–84 SANS Top 20 Critical Security
options, 83–86 Controls, 100
overview, 81–82 scaling process in threat modeling, 29
ownership, 82–83 scenario components in FAIR, 65
questions, 119–125 schedules in project management, 137–139
review, 114–118 scope
sharing, 84 assessment, 42
third-party risk, 86–88 project management, 137–139
risk reviews in reports, 203 threat modeling, 29
risk scenario development scorecards for controls, 110
bottom-up, 39 SDLC. See systems development life cycle
considerations, 39–40 (SDLC)
Index
233
secure configuration assessments, 24 SLE (single loss expectancy)
securing work area in termination, 174 control selection factor, 103
security quantitative risk analysis, 60–62
emerging technologies, 153 social media
policies, 167 policies, 170
tools, 185 risk identification, 23
training programs, 165–167 Software as a Service (SaaS), 131
security advisories, 24 Software Engineering Institute (SEI),
security architecture in enterprise 47–48
architecture, 135 software in enterprise architecture,
security concepts in information 129–130
technology and security, 154 specificity in key performance
security controls, 155–156 indicators, 111
security incidents staff
new risk identification, 23 project management, 138
privacy, 23 risk register reviews with, 195
risk register information source, 55 stakeholders in risk environment,
security professionals shortage, 185 106–107
security scans for asset identification, 9 standards
security testing in SDLC, 150 controls, 96–101
SEI (Software Engineering Institute), data lifecycle management,
47–48 145–146
select step in RMF, 161 information technology and security,
semiquantitative values, 62 159–165
sensitivity IT risk assessment, 45–51
asset organization by, 9 NIST. See National Institute of
data, 156–157 Standards and Technology (NIST)
key risk indicators, 112 organizational governance, 5
risk reporting information, 204 statements of impact in business impact
separation of duties principle, 148, 167 analysis, 68–69
service level agreements (SLAs) storage area networks (SANs), 70
IT operations management, 136 storage of documents, 146
third-party risk, 87 strategic risks, 22
service providers, asset organization by, 9 strategies
sharing risk, 84 organizational governance, 2–3
single-factor authentication, 157 recovery, 141–142
single loss expectancy (SLE) structure in organizational governance,
control selection factor, 103 3–4
quantitative risk analysis, 60–62 supply chain risks, 23
skills threat category, 30 suspension of accounts, 175
SLAs (service level agreements) systems
IT operations management, 136 IT risk assessment, 43–44
third-party risk, 87 testing, 44–45
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
234
systems development life cycle (SDLC) threat landscape, 29–30
design phase, 149–150 threat modeling
development phase, 150 description, 26, 41
disposal phase, 151 new risk identification, 24
implementation and operation, 150 overview, 28–30
overview, 147–148 threat realization, 26
planning phase, 149 threats
requirements phase, 149 business continuity and disaster
risks, 151–152 recovery, 143
separation of duties, 148 criticality analysis, 69
test phase, 150 description, 26
emerging, 92, 153
T IT operations management,
tailgating, 168 136–137
technical controls, 32, 94 project management, 138–140
technical data, 108–109 risk analysis, 56
technologies, emerging, 91 third-party, 88
telework, 184 time sensitivity risks in BCDR, 143
temps, tracking, 173–174 timeliness in key performance indicators,
termination, employee, 174–175 111–112
testing TOGAF (The Open Group Architecture
controls, 104–106 Framework)
penetration, 23, 41 COBIT, 162
recovery plans, 142 enterprise architecture, 132–133
SDLC, 150 Top 20 Critical Security Controls, 100
system, 44–45 top-down risk scenario development,
The Open Group Architecture 38–39
Framework (TOGAF) tracking employees, 173–174
COBIT, 162 training
enterprise architecture, 132–133 project management, 138
third-party risk security and risk awareness programs,
business continuity and disaster 165–167
recovery, 143 treatments
factors, 87 options, 198
managing, 88 plans, 108
overview, 86–87 recommendations, 199–203
threats, 88 reports, 203
vulnerabilities, 88 trends in risk registers, 203
threat actors, 26 triage apparatus
threat intelligence as risk register qualitative risk analysis, 192
information source, 55 risk management programs as, 187
Index
235
U vulnerability and control deficiency
unintentional threats in BCDR, 143 analysis
uninterruptible power supplies (UPSs), 70 control effectiveness, 31–34
uniqueness issues in AUPs, 169 control gaps, 34
unit testing in SDLC, 150 control recommendations,
updating risk registers, 56 34–35
UPSs (uninterruptible power supplies), 70 overview, 30–31
user acceptance testing in SDLC, 150 risk and control ownership, 36
root cause analysis, 36–37
V vulnerability assessments
description, 41
vacations, mandatory, 168
risk register information source, 55
validation of data, 108–109
valuation of assets, 58 W
virtual assets, 7
vocabulary terms for risk, 26–27 walkthroughs in IT risk assessment, 43
vulnerabilities whistleblowers for new risk
business continuity and disaster identification, 24
recovery, 144 work breakdown structures (WBSs), 139
description, 26 worksheets, analysis, 197–198
emerging technologies, 92–93, 153 X
IT operations management, 137
project management, 139–140 XaaS (Anything as a Service), 131
risk analysis, 56
SDLC, 152
Z
third-party risk, 88 Zachman framework, 133–135