Top Banner
Risk Assessment is good about the Microsoft approach to threat mode OCTAVE… Advantage: ___________ Disadvantage: ___________ hat is bad about it?
8

Risk Assessment

Jan 03, 2016

Download

Documents

Ella Paul

Risk Assessment. What is good about the Microsoft approach to threat modeling?. What is bad about it?. OCTAVE…  Advantage: ___________  Disadvantage: ___________. OCTAVE– a brief history. 1999. OCTAVE developed by Software Engineering Institute. 2003. OCTAVE-S a streamlined version. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Risk Assessment

Risk AssessmentRisk AssessmentWhat is good about the Microsoft approach to threat modeling?

OCTAVE… Advantage: ___________

Disadvantage: ___________

What is bad about it?

Page 2: Risk Assessment

OCTAVE– a brief history

OCTAVE– a brief history

1999OCTAVE developed by Software Engineering Institute

2003

2007

OCTAVE-S a streamlined version

OCTAVE Allegro

http://www.sei.cmu.edu/reports/07tr012.pdf

Page 3: Risk Assessment

OCTAVE Allegro Roadmap (see reference on previous slide)

OCTAVE Allegro Roadmap (see reference on previous slide)

Page 4: Risk Assessment

The purpose is to think about later threat ranking

Step 1: Establish Risk Mgmt CriteriaStep 1: Establish Risk Mgmt Criteria

This is concerned with things like …“organizational drivers”, “mission”,“business objectives”

Page 5: Risk Assessment

Step 2: Develop an Info Asset ProfileStep 2: Develop an Info Asset ProfileFor a software project we need to

__________________ __________________ ___________________

Step 3: Identify Asset ContainersStep 3: Identify Asset Containers

Where are the assets ..stored? ..transported? ..processed?

Page 6: Risk Assessment

Step 4: Identify Areas of ConcernStep 4: Identify Areas of Concern

Brainstorm possible threats

Step 5: Identify Threat ScenariosStep 5: Identify Threat Scenarios

Build threat trees

A scenario is ___________________________

Page 7: Risk Assessment

Step 6: Identify RisksStep 6: Identify Risks

Step 7: Analyze RisksStep 7: Analyze Risks

Use formula of probability * impact

Step 8: Select Mitigation ApproachStep 8: Select Mitigation Approach

An interesting omission from the Microsoft approach

Page 8: Risk Assessment

Ranking ExampleRanking ExampleFor a single threat/risk:

There are worksheets to help discover ranges for ranking