Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

FEATURE

Addressing Risk Using the New


Enterprise Security Risk
Management Cycle
Enterprise Security Risk Management (ESRM) is a The ESRM cycle shown in figure 1 is based on new
holistic security program designed to identify and ESRM guidelines from ASIS,1 which were drafted
prioritize assets and risk to mitigate those risk based on globally established and accepted risk
areas. ESRM bridges security professionals and management principles, implemented by identifying,
asset owners in making informed decisions through evaluating and mitigating the security risk areas of an
the ESRM cycle. enterprise to reach its business objectives. Practicing

Figure 1—ESRM Strategic Approach

Identify and
Prioritize Content
Assets

Mission
and Vision

Analysis
Monitoring Assessment Identify and
Continuous Core
Improvement Prioritize Values
Risk
Mitigation
Operating
Environment

Mitigate Stakeholders
Prioritized
Risk

Holistic Risk Stakeholders Transparency Governance


Management Partnership

Foundation

Source: ASIS International, Enterprise Security Risk Management Guideline, 2019. Used with permission.

Harisaiprasad Kumaragunta, CISA, APP, ISO 22301 LI, ISO 27001 LA, ISO 9001 LA, Six Sigma Green Belt
Is an associate consultant with Mahindra Special Services Group with more than 12 years of experience in the industry. He is the
ISACA® New Delhi (India) Chapter leader and social media chair. He is also a topic leader for the ISACA Certified Information
Systems Auditor® (CISA®) online forum. He is a frequent contributor to blogs and has published articles related to the information
security domain in ISACA Now , COBIT Focus and the ISACA® Journal. He conducts user awareness training, internal auditor training,
International Organization for Standardization ISO 27001 audits, regulatory audits, third-party audits, internal audits, IT audits, risk
assessments and implements ISO 27001, among other tasks. He can be contacted at harisaiprasad@gmail.com.

© 2020 ISACA. All rights reserved. www.isaca.org


ISACA JOURNAL VOL 5 1
acceptable value. Risk areas that exceed the
acceptable value are called high risk and risk that
match or are below acceptable value are called
low/acceptable risk. The processes of identifying
high risk areas and listing them in order for
mitigation is called prioritizing risk.
3. Mitigating the prioritized risk—Controls that are
determined high risk need to be brought to an
acceptable level. This process is called risk
mitigation. Risk mitigation is one type of risk
treatment; the other three types are accept, avoid
and transfer. In risk acceptance, risk scenarios
are accepted based on an organization’s risk
tolerance level/risk appetite. Risk can be
transferred through insurance and outsourcing.
ESRM helps an enterprise improve the maturity of its Avoidance of risk is accomplished by changing
security process. This cycle can be initiated after or ceasing certain operations. In risk mitigation,
understanding an enterprise’s context. Understanding the probability or impact of risk is reduced by
the context involves understanding the mission, additional controls such that the risk level gets
vision, core values, operating environment (i.e., reduced to an acceptable level. Examples of risk
physical, nonphysical and logical) and stakeholders. mitigation measures include electronic access
This helps security professionals identify the risk controls, video surveillance, security awareness
areas that restrict the organization in achieving its training and data loss prevention (DLP).
goals and objectives. The ESRM cycle includes
four processes: 4. Continuous improvement of the security
program—The ESRM cycle is based on an iterative
1. Identifying and prioritizing assets—Anything approach of assessment, mitigation and
that adds value to the organization is defined as monitoring to continuously improve the four
an asset. Assets are owned by asset owners who processes. Investigations and analysis,
are responsible for mitigating risk areas of information sharing and incident response
assets to an acceptable level for the contribute to continuous improvement. Incident
organization. Assets should be valued and response is a process of responding to incidents
prioritized based on the organization’s goals and and tracking them until their resolution as per the
objectives. The value of the asset could be based defined timelines. Continuous improvement can be
on cost or replacement cost of the asset or analyzed by tracking incidents over a period of
operational and reputational impact of time and comparing the incidents that occurred
unavailability. and the resolution time with the previous cycle.
2. Identifying and prioritizing risk—This involves Lessons learned from incidents should also be fed
conducting risk assessment for the assets by back into the security program through its
identifying risk based on the enterprise risk continuous improvement process.
assessment methodology. The methodology Emerging risk can be determined through
should involve determining risk level based on investigation and analysis. In this process, root
threats, vulnerabilities, impact, probabilities and causes are identified, mitigation controls are devised
value of assets. Risk level is determined for the and prioritized and response time is monitored.
identified risk and matched with the risk


Sharing of security information with asset owners
and stakeholders forms an important part of
ESRM HELPS AN the continuous improvement process. This helps
security professions send and receive information
ENTERPRISE IMPROVE THE from asset owners, which contributes to


MATURITY OF ITS SECURITY continuous improvement.

PROCESS.

© 2020 ISACA. All rights reserved. www.isaca.org


2 ISACA JOURNAL VOL 5
ESRM addresses mitigating risk from physical also provided by the tool for each of the six
security, cybersecurity, information security, loss categories. Areas covered under each of the six
Enjoying
prevention, organizational resilience, brand protection, categories include:
travel risk, supply chain security, business continuity,
this article?
1. Program strategy—This includes the security
crisis management, threat management, fraud risk
management and workplace violence prevention. Its
department’s mission, goals and a formal • Read Risk IT
commitment to using ESRM and communicating Framework, 2nd
approach is shown in figure 1.
it to the relevant stakeholders. Strategy involves Edition.
adopting a formal risk model (e.g., International www.isaca.org/
The ESRM program for an organization can be
Organization for Standardization [ISO], COBIT®, risk-it-f2
started with an assessment using the ASIS ESRM
maturity assessment tool,2 where the rating for
American National Standards Institute [ANSI]), • Learn more about,
allotting resources and developing skills for discuss and
various categories is based on the current people,
implementation. collaborate on risk
process and governance scores. The current people
and process scores are shown in figure 2. 2. Program governance—This includes instituting a
management in
governance committee, setting up acceptable
ISACA’s Online
A governance score consists of a risk rating and risk limits for the enterprise, defining scope and
Forums.
thresholds set by the enterprise risk governance communicating the maturity levels.
https://engage.isaca.
committee. The assessment tool consists of
org/onlineforums
3. Understanding and awareness—Awareness
different categories that include program strategy,
training should be given to executives, leaders of
program governance, understanding and
all functions and departments, security
awareness, program implementation and
personnel, and third-party personnel under scope.
application, program management and
advancement, and alignment of security risk 4. Program implementation and application—This
mitigation activity. Each category has different involves identifying assets and their owners,
controls and, for each control, a people score, prioritizing assets, determining impact,
process score and governance score between one evaluating risk levels and documenting risk
and five should be given to get the enterprise score. mitigation plans.
The values and definitions of an enterprise score
5. Program management and advancement—This
are shown in figure 3. An average score for each of
includes reviewing and updating risk mitigation
the six categories is given for people, processes
plans and status reports at regular intervals and
and governance, respectively, by the online tool. The
delivering them to asset owners, executive
current level score and the recommended level is
management and the security department.

Figure 2—People and Process Scores

5 ESRM performance metrics are measured and


optimized. 5 ESRM/risk processes are reviewed and
proactively improved based on measurable
results.

4 Cross-functional teams are adequately staffed for


ESRM, performance for these teams is measured 4 ESRM/risk processes are measured
against established metrics.
and ESRM development/training programs are in
place for teams across the organization.

3 Cross-functional teams are in place, ESRM


knowledge is transferred between teams, and 3 ESRM/risk processes are defined and
documented as a standardized process
roles/responsibilities regarding risk knowledge are across the organization.
well-defined.

2 Cross-functional teams are mostly in place, and


roles/responsibilities regarding risk knowledge are 2 ESRM/risk processes exist and are
repeatable.
generally understood.

1 Risk knowledge is limited to a few key personnel, with


no cross-training between security teams/groups and 1 ESRM/risk processes do not exist or are
performed in an ad hoc manner.
departments.

People Score Process Score


Source: ASIS International, Enterprise Security Risk Management Guidelines, USA, 2019. Used with permission.

© 2020 ISACA. All rights reserved. www.isaca.org


ISACA JOURNAL VOL 5 3
6. Alignment of security risk mitigation activity— security risk areas of an enterprise, and this
This includes developing and defining roles and framework is designed in such a way that it can
responsibilities and monitoring and integrate well with the enterprise risk management
communicating risk mitigation activities and framework. This is because an enterprise score
incident management. from the ESRM maturity assessment tool uses
defined people and process scores and leaves the
Periodic reviews and audits help assess the status
governance score to be defined by the particular
of ESRM and continuous improvement.
enterprise. None of the other standards have a
Communications with external and internal
provision to determine the risk management rating
stakeholders on the performance of risk
at an enterprise level. This helps an enterprise
management make the governance process
assess the maturity level of security risk
of an enterprise effective.
management and determine the road ahead
through the ESRM tool.
ISO 27005 is a standard for information security
risk management, which describes how risk should
The results of a simulated enterprise that has used
be assessed and managed and provides a risk
the ESRM tool and completed the survey is shown
matrix to determine risk levels of various risk areas.
in figure 4.
ISO 31000 and the Committee of Sponsoring
Organizations of the Treadway Commission (COSO)
The enterprise score is calculated and the current
only discuss risk management and principles for an
average score of each category determined. In this
enterprise.3 ESRM specifically addresses managing
example, even though the enterprise score is in the

Figure 3—Enterprise Score

5 Optimized: It is a characteristic of processes at this level that the focus is on continually improving process
performance through both incremental and innovative technological changes/improvements.

4 Managed: It is characteristic of processes at this level that, using process metrics, management can
effectively control the as-is process (e.g., for software development). In particular, management can
identify ways to adjust and adapt the process to particular projects without measurable losses of quality or
deviations from specifications. Process capability is established from this level.

3 Defined: It is characteristic of processes at this level that there are sets of defined and documented standard
processes established and subject to some degree of improvement over time. These standard processes are
in place (i.e., they are the as-is processes) and used to establish consistency of process performance across
the organization.

2 Repeatable: It is characteristic of processes at this level that some processes are repeatable, possibly with
consistent results. Process discipline is unlikely to be rigorous, but where it exists it may help to ensure that
existing processes are maintained during times of stress.

1 Ad Hoc: It is characteristic of processes at this level that they are (typically) undocumented and in a state of
dynamic change, tending to be driven in an ad hoc, uncontrolled and reactive manner by users or events. This
provides a chaotic or unstable environment for the processes.

0 Non-Existent/Not Wanted: The requirement is non-existent in the environment and/or not desired.

Figure 4—People, Process and Governance Average Score and Recommended Score
Requirements Current Score Average Recommended
Program strategy 3 3
Program governance 3 3
Understanding and awareness 4 3
Program implementation and application 2 3
Program management and advancement 3 3
Alignment of security risk mitigation activity 3 3
Enterprise Score: 3 “defined”

4 ISACA JOURNAL VOL 5


desired level, the enterprise did not achieve the Endnotes
recommended score in the program
implementation and application category and 1 Professional Standards Board; “Guideline:
achieved an above-recommended score in Enterprise Security Risk Management,”
understanding and awareness (figure 4). The ESRM ASIS International, September 2019
survey not only calculates the overall enterprise 2 ASIS International; “ESRM Maturity
score, but it also informs which area an enterprise Assessment Survey,” https://www.asis
needs to improve and what level the enterprise has online.org/publications—resources/esrm/
achieved in each category. From this, an enterprise esrm-survey/
can revise and implement strategies to improve its 3 International Organization for Standardization,
ESRM and achieve required scores of performance. ISO 31000:2018 Risk Management—Guideline,
Switzerland, February 2018, https://www.
iso.org/standard/65694.html

ISACA JOURNAL VOL 5 5

You might also like