Question: Given the scenario provided below in 2 . 4 , identify the level of the risk assessment you will perform. Your risk assessment may cover
Given the scenario provided below in identify the level of the risk assessment you will perform. Your risk assessment may cover multiple tiers.
APPLICATION OF RISK ASSESSMENTS
As stated previously, risk assessments can be conducted at all three tiers in the risk management
hierarchyorganization level, missionbusiness process level, and information system level.
Figure illustrates the risk management hierarchy defined in NIST Special Publication
which provides multiple risk perspectives from the strategic level to the tactical level. Traditional
risk assessments generally focus at the Tier level ie information system level and as a result,
tend to overlook other significant risk factors that may be more appropriately assessed at the Tier
or Tier levels eg exposure of a core missionbusiness function to an adversarial threat based
on information system interconnections
FIGURE : RISK MANAGEMENT HIERARCHY
Risk assessments support risk response decisions at the different tiers of the risk management
hierarchy. At Tier risk assessments can affect, for example: i organizationwide information
security programs, policies, procedures, and guidance; ii the types of appropriate risk responses
ie risk acceptance, avoidance, mitigation, sharing, or transfer; iii investment decisions for
information technologiessystems; iv procurements; v minimum organizationwide security
controls; vi conformance to enterprisesecurity architectures; and vii monitoring strategies and
ongoing authorizations of information systems and common controls. At Tier risk assessments
can affect, for example: i enterprise architecturesecurity architecture design decisions; ii the
selection of common controls; iii the selection of suppliers, services, and contractors to support
organizational missionsbusiness functions; iv the development of riskaware missionbusiness
processes; and v the interpretation of information security policies with respect to organizational
information systems and environments in which those systems operate. Finally, at Tier risk
assessments can affect, for example: i design decisions including the selection, tailoring, and
supplementation of security controls and the selection of information technology products for
organizational information systems; ii implementation decisions including whether specific
information technology products or product configurations meet security control requirements;
and iii operational decisions including the requisite level of monitoring activity, the frequency
of ongoing information system authorizations, and system maintenance decisions
TIER
ORGANIZATION
TIER
MISSION BUSINESS PROCESSES
TIER
INFORMATION SYSTEMS
InterTier and IntraTier
Communications
Feedback Loop for
Continuous Improvement
TACTICAL RISK
STRATEGIC RISK
Traceability and Transparency of
RiskBased Decisions
OrganizationWide
Risk Awareness
Special Publication Guide for Conducting Risk Assessments
CHAPTER PAGE
Risk assessments can also inform other risk management activities across the three tiers that are
not securityrelated. For example, at Tier risk assessments can provide useful inputs to: i
operational risk determinations including business continuity for organizational missions and
business functions; ii organizational risk determinations including financial risk, compliance
risk, regulatory risk, reputation risk, and cumulative acquisition risk across largescale projects;
and iii multipleimpact risk including supply chain risk and risk involving partnerships At
Tier risk assessments can provide the same useful inputs to operational, organizational, and
multipleimpact risks, specific to missionbusiness processes. At Tier risk assessments can
inform assessments of cost schedule, and performance risks associated with information systems,
with information security experts coordinating with program managers, information system
owners, and authorizing officials. This type of coordination is essential within organizations in
order to eliminate silos andor stovepiped activities that produce less than optimal or inefficient
information technology and security solutionsthus affecting the ability of organizations to carry
out assigned missionsbusiness functions with maximum efficiency and costeffectiveness.
It is important t
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
