Friday 18 January 2013

Risk Control Strategies

Risk Control Strategies


Avoidance

  • Applying safeguards that eliminate or reduce the remaining uncontrolled risks for the vulnerability.
  • This risk control strategy attempts to prevent the exploitation of the vulnerability.
  • This strategy is accomplished by application of policy, application of training and education, countering threats and implementation of technical security controls and safeguards.
Transference
  • Shifting the risk to other areas or to outside entities.
  • This control approach attempts to shift the risk to other assets, other processes or other organizations.
  • May be accomplished by rethinking how services are offered; revising deployment models, outsourcing to other organizations, purchasing insurance or implementing service contracts with providers.
Mitigation
  • Reducing the impact if the vulnerability is exploited.
  • This control approach attempts to reduce, by means of planning and preparation, the damage caused by the exploitation of vulnerability
  • Types of mitigation plans
    • Disaster recovery plan (DRP)
    • Incident response plan (IRP)
    • Business continuity plan (BCP)
Acceptance
  • Understanding the consequences and accepting the risk without control or mitigation.
  • The choice to do nothing to protect an information asset from risk and accept the loss when it occurs.
  • Before using the acceptance strategy, the organization must:
    • Determine the level of risk to the information asset
    • Assess the probability of attack and the likelihood of a successful exploitation of a vulnerability
    • Approximate the annual rate of occurance (ARO) of the exploit
    • Estimate the potential loss from attacks
    • Perform a thorough cost benefit analysis
    • Evaluate controls using each appropriate type of feasibility analysis report
    • Determine that particular function, service, information, or asset did not justify the cost of protection

              Popular Posts