White Paper Information Security Risk Management
White Paper Information Security Risk Management
Risk Management"
Protection objectives: confidentiality, integrity, availability
Version: 1.1
Date: March 3, 2021
Classification: public
V D A W H I T E P A P E R - INFORMATION SECURITY RISK MANAGEMENT
Content
The objective of this White Paper is to inform companies in the automotive indus-
try with regard to risk-oriented information security management and to enable
those to establish an effective information security risk management (ISRM). In-
formation security risks exist in the creation and processing of information and
relate to potential events that have a negative effect on the achievement of the
information security protection objectives.
The explanations in this White Paper are based on the risk management stand-
ards ISO 31000 and ISO/IEC 27005, but additionally take into account specific
requirements of the automotive industry.
In addition, the VDA ISA (current version 5.0) contains a specific control question
on information security risk management (1.4.1):
In the following two examples are attached to each of the process steps for illus-
tration purposes. These are carried along throughout the entire process.
Definitions of Terms
Information Assets
Threat
Vulnerability
Probability of Occurrence
Damage
Risk
Risk Manager
The risk manager controls the risk management in the company and "keeps the
overview" of the risks. He1 consolidates the individual risks and reports them to
the organization's management. He defines processes, methods, tools / tem-
plates and is responsible for the quality assurance of reported risks.
Risk Owners
The risk owner is responsible for assessing and handling the risks assigned to
him. The risk owner must therefore be determined at a hierarchical level within
the organization that is empowered to make appropriate decisions in dealing with
those risks. In practice, the risk owner usually works in a “business department“
and is the information owner. To assess and deal with risks, the risk owner should
draw on professional expertise from the business. The risk owner can delegate
the implementation of risk assessment and handling, but never the responsibility.
Any employee or third party who has access to information or to the organiza-
tion's IT systems is responsible for identifying threats that may jeopardize the
information security objectives and communicating them to the risk owner (if
known), risk manager or security officer of the organization. Risk management
essentially consists of the steps risk assessment, risk treatment and monitoring.
1
In this White Paper the male gender is used only for convenience, but refers to all genders equally.
Risk Assessment
This chapter explains how the requirements of VDA ISA control question 1.4.1
can be implemented with regard to the first step - risk assessment.
+ Risk assessments are carried out both regularly and on an ad hoc basis
The result of the risk assessment is an overview ("risk register") of all identified
risks, the clustering into "very high", "high", "medium" and "low" risks and the
allocation of risks to the risk owners. This overview is the basis for the next step
- risk treatment.
The sub-steps for identifying, analyzing and assessing risks are explained in the
following and can be seen as a process description, supplemented by the respec-
tive responsibilities for the individual steps.
1) Risk identification
2) Risk analysis (and evaluation)
Risk Identification
The purpose of risk identification is to systematically record the risks affecting an
organization. Possible tools for identifying risks are workshops (with technical ex-
perts) or assessments (e.g. a TISAX self-assessment using the VDA ISA).
Examples:
Examples:
In control question 5.2.6, the VDA ISA requires the timely sourcing of information
(e.g. information from IT security companies) regarding potential vulnerabilities
and, in addition, in 5.2.7, the testing of IT systems for vulnerabilities. In addition,
the opinion of internal technical experts should be obtained or taken into account
in order to identify concrete potential vulnerabilities (depending on the information
asset).
Examples:
Finally, the results of the individual steps of risk identification are combined.
These results can be presented in the form of damage/risk scenarios.
Examples:
The risks described in this way form the result of the risk identification process
and represent the input for the risk analysis.
Risk Analysis
During risk analysis, the risks identified in risk identification are further examined.
The objective is to assess the existing risk in the form of risk classes. For exam-
ple, the calculation can be done as follows:
In a pragmatic way, the potential damage is taken directly from the information
classification according to the protection classes defined in the VDA ISA ("nor-
mal", "high" and "very high"), supplemented by the protection class "low" (recom-
mendation of the BSI).
The probability of occurrence indicates how likely the vulnerability will be ex-
ploited. Again, a four-step scheme (e.g. "unlikely", "possible", "likely" and "very
likely") can be used.
Risk Evaluation
The risk evaluation enables the identified risks to be weighted and thus a risk-
oriented approach: Risks threatening the continued existence of the company
require different treatment and control measures than insignificant risks. In the
course of the evaluation, all identified risks are analyzed and their probability of
occurrence and extent of damage are assessed.
Probability
of occurrence
The classification of the risk in the corresponding risk class ("low", "medium",
"high" or "very high") concludes the risk assessment. The risk assessment rep-
resents a conscious decision process by the risk owner.
Examples
As the risk class of risk scenario 1 ("very high") is higher than the risk class of
risk scenario 2 ("high"), risk scenario 1 has to be prioritized with regards to risk
treatment. The prioritized risks are entered in the risk register.
A risk owner must be determined and documented for each risk. This is usually
the information owner.
Risk Treatment
This chapter explains how the requirements of the VDA ISA control question 1.4.1
can be implemented with regard to the second process - risk treatment.
+ Measures for dealing with information security risks and their responsible
parties are defined and documented.
There are different ways of dealing with risks. A basic distinction is made between
four types of risk treatment:
▪ Risk Avoidance
▪ Risk Mitigation
▪ Risk Transfer
▪ Risk Acceptance
In order to achieve an acceptable residual risk level (risk class after effective
treatment), a risk can be treated in one or more ways. The risk owner decides on
the type of risk treatment.
Risk Avoidance
Risk Mitigation
Risk mitigation is the most common type of risk treatment. A mitigation of risk
can, for example, be achieved by one or more complementary measures that
counteract the risk. In this case, the probability of occurrence and/or the extent of
damage is reduced by security measures. Risk-reducing measures can be of a
technical or organizational/process-related nature (e.g. implementation of secu-
rity training, restructuring of processes/procedures, construction measures).
Risk Transfer
In the case of a risk transfer, the potential loss is borne by another area of re-
sponsibility or another institution. This can be done, for example, by outsourcing
or - as a prevention against financial risks - by taking out insurance (e.g. contin-
gency insurance, cyber security insurance). Responsibility for the risk remains
with the risk owner within the organization.
In the context of risk acceptance, risks are accepted in their present risk class.
Risks may only be accepted by risk owners whose financial responsibility at least
corresponds to the respective risk category.
Since risk acceptance can have consequences beyond the area under consider-
ation, organization-wide regulations and requirements (e.g. thresholds for the ac-
ceptance of risks, materiality limits) must be defined. Among other things, this is
intended to prevent a risk owner from accepting a risk that could become critical
for the entire organization.
The acceptance of a risk, whose risk class exceeds a defined threshold, must be
documented in the form of a risk acceptance form.
For risks resulting from a deviation from the agreed requirements of the automo-
tive industry (VDA ISA), risk acceptance by an organization is not possible.
The handling of each individual information security risk is defined in a Risk Treat-
ment Plan. It specifies how the respective assessed risk is to be handled, who is
responsible for implementation and by when implementation is to take place.
Examples:
▪ Risk scenario 1: The risk owner decides to reduce the risk by patching all
affected IT systems (measure 1) and installing encryption mechanisms on
relevant IT systems and data carriers (measure 2) used for processing im-
mobilizer-relevant data.
▪ Risk scenario 2: The risk owner would gladly accept the risk and would not
take any further measures to deal with the risk. However, since customer
data could be affected on the premises of research and development within
the scope of projects, risk acceptance is not possible and the risk must be
reduced. The risk owner then decides to replace the locking cylinder and all
keys (Measure 3) and to withdraw all outdated access authorizations (Meas-
ure 4).
Responsibilities for all measures are defined and time frames for implementation
are agreed. The measures are documented in the risk treatment plan.
This is where the risk awareness of the management comes into effect. If treat-
ment plans are not implemented properly, management must react as soon as it
becomes aware of the problem.
The approaches and measures described in this White Paper (e.g. roles and re-
sponsibilities, scope, risk management process) must be documented. In this
context, it may be useful to connect to or merge with any existing risk manage-
ment approaches or systems (e.g. environmental management, quality manage-
ment, compliance). The main results of risk management should be reported reg-
ularly to the organization’s management.
Examples
It is also important that the ISRM process is geared to the specific needs of the
respective organization and is integrated into any existing risk management sys-
tem, even if most of the risks identified in information security do not exceed the
threshold assets of corporate risk management.
The VDA recommends its members to use this White Paper as a guide.
List of Authors