ONAP Risk Assessment – Preparation Material - Overview of the Process - Terminology - Assumptions 2018-05-30.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Module 1 Evaluation Overview © Crown Copyright (2000)
OCTAVESM Process 4 Create Threat Profiles
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
1 Network Security Ola Flygt Växjö University
Lecture 1: Overview modified from slides of Lawrie Brown.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
1 An Overview of Computer Security computer security.
Introducing Computer and Network Security
Computer Security: Principles and Practice
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Quantitative.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Risk Assessment Frameworks
Application Threat Modeling Workshop
Introduction to Network Defense
SEC835 Database and Web application security Information Security Architecture.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Project Risk Management. The Importance of Project Risk Management Project risk management is the art and science of identifying, analyzing, and responding.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
Information Systems Security Computer System Life Cycle Security.
Security Risk Assessment Applied Risk Management July 2002.
1 Oppliger: Ch. 15 Risk Management. 2 Outline Introduction Formal risk analysis Alternative risk analysis approaches/technologies –Security scanning –Intrusion.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Lecture 1: Overview modified from slides of Lawrie Brown.
Risk Assessment Farrokh Alemi, Ph.D. Monday, July 07, 2003.
Security Mark A. Magumba. Definitions Security implies the minimization of threats and vulnerabilities A security threat is a harmful event or object.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Information Security What is Information Security?
Search Engine Optimization © HiTech Institute. All rights reserved. Slide 1 What is Solution Assessment & Validation?
Alaa Mubaied Risk Management Alaa Mubaied
Introduction to Information Security
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Information Security: Model, Process and Outputs Presentation to PRIA WG November 10, 2006.
Visual 1. 1 Lesson 1 Overview and and Risk Management Terminology.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
NIST Computer Security Framework and Grids Original Slides by Irwin Gaines (FNAL) 20-Apr-2006 Freely Adapted by Bob Cowles (SLAC/OSG) for JSPG 13-Mar-2007.
Information Security Governance and Risk Chapter 2 Part 2 Pages 69 to 100.
Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 16 – IT Security.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Network Security Overview
Template for CORAS Risk Analysis. The eight steps of a CORAS risk analysis.
Security Management in Practice
Basic Terms and Concepts – 1/3
ISSeG Integrated Site Security for Grids WP2 - Methodology
Design for Security Pepper.
Security Risk Analysis & Management
Information System and Network Security
OSG Computer Security Plans
CNET334 - Network Security
ONAP Security Sub-committee Update
Chapter 19: Building Systems with Assurance
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Chapter 27 Security Engineering
How to Mitigate the Consequences What are the Countermeasures?
Network Security Ola Flygt Växjö University
Proposal on TSC policy for ONAP release Maintenance
Cryptography and Network Security
Presentation transcript:

ONAP Risk Assessment – Preparation Material - Overview of the Process - Terminology - Assumptions 2018-05-30

Introduction The purpose of Risk Assessment (RA): produce a prioritized list of security improvements Identify risks Rate the identified risks Recommend treatment for the risks with unacceptable high level The following slides have a brief description of The RA process and terminology The scope of RA workshop, planned for the F2F event in Beijing June 2018 The proposed assumptions for the RA WS

The Process of Risk Assessment Preparation phase, need to have these clear before WS Scope (see separate slide) & ensure relevant participants Assumptions (see separate slide) The Core of Risk Assessment: F2F Workshop Risk identification is the main focus Think from different angles, like: main use cases, functionality, deployment, operations. Good if persons with different background/roles participate in RA. Make full use of the F2F aspect: creativity, brainstorming Completion phase Put together the WS outcome eg. in form of mindmap Risk rating in follow-up meetings Recommendations by security sub-committee, including the risk mitigation plan for the risks with unacceptable high level Proposal: TSC to sign off the RA output material & risk mitigation plan TBD: Handling and exposure of the RA output material

The scope of Risk Assessment General: security and privacy (privacy regulations) related risks Beijing release of the following ONAP components VID; External API; Controllers, DCAE SO UI components: SDC and Use-Case UI, Portal The “ONAP architecture level”, eg Data at rest, Data in transit Container deployment of ONAP: any specifics for this case Send checklist of the few most important/typical risk items for all projects, to be checked & reported back (to be checked, there was earlier a ~similar activity)

The Assumptions for Risk Assessment Assumptions that should be agreed prior to (very latest at) the RA WS: ONAP deployment environment Level of protection around ONAP: something between a “walled garden” and Internet Any assumed security mechanisms in the infra? Like self-encrypting storage. ONAP operational aspects? Eg, the assumption can be that multiple organizations (w/o mutual trust) can be users of one ONAP deployment. Division between ONAP & the rest of service provider’s OSS/BSS Which functionalities shall be covered by ONAP vs. are assumed to be covered outside of ONAP For example: data de-identification of the Personally Identifiable Information (PII) is needed when trouble-shooting data originating from VNFs is sent back to VNF vendors. ONAP or ‘some other entity’ needs to perform this.

Concepts, Definitions Asset Something that has a value, can be tangible or intangible (like information) Attack An assault on system security that derives from an intelligent threat, i.e., an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system. An attack violates one or more of the following properties of an asset: Confidentiality the asset property that information is not made available or disclosed to unauthorized individuals, entities, or processes Integrity the asset property of safeguarding the accuracy and completeness of assets Availability the asset property of being accessible and usable upon demand by an authorized entity Threat A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm Vulnerability A flaw or weakness in a system's design, implementation, or operation and management that could be exploited to violate the system's security policy Impact The business impact caused by a security incident, when the attacker exploits the vulnerability and realizes the threat Probability The likelihood of the security incident to occur due to an attacker exploiting the vulnerability and realizing the threat Risk An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result Risk assessment Systematically identify the assets and threats to those, quantify loss exposures (i.e., loss potential) based on estimated frequencies and costs of occurrence, and (optionally) recommend how to allocate resources to countermeasures so as to minimize total exposure

Concepts, Definitions Impact values

Concepts, Definitions Probability values

Concepts, Definitions Risk Levels: Low (L), Medium (M), High (H), Very High (VH)

Identification of a Risk – A Fictious Example Risk identification (= main focus in the F2F WS) Asset: VNF O&M passwords at rest (in storage / other) Threat (can be several per asset): unauthorized disclosure Vulnerability (can be several per threat): passwords included in plain text in a log file Existing controls: only specific user/group has read access to the log file Risk rating Impact (business impact if the risk materializes): “major” Probability (of the risk to ever materialize): “likely”  HIGH risk level (according to the table on previous slide) Risk mitigation plan, done eg. for all the VERY HIGH and HIGH level risks In this could be: do not include any secrets in any log files in plain text