IT Risk Management Based On COBIT 5 For Risk at Deutsche Telekom AG Joa Eng 0518

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

FEATURE

IT Risk Management Based on COBIT 5


for Risk at Deutsche Telekom AG
The purpose of risk management is to protect incident will have on organizational targets to an
the values of an organization.1 This means that appropriate level. Starting from this premise, this
risk management first describes methods and article will answer the following questions:
procedures for analyzing potential scenarios that,
if they occur, could have a negative effect on the • What risk and/or risk scenarios can have a
organization. Organizations that are reliant on negative impact on organizational targets?
functioning IT operations are, therefore, faced with • What controls/measures are appropriate?
the challenge of identifying the specific scenarios
that could arise from IT operations that have a Categorizing Risk
potential negative impact on the organization.
The responsibility for effective risk management
Second, risk management recommends measures lies with organizational management. Accordingly,
that have a mitigating effect on potential risk. It is the challenge for risk management is to handle
at this point that organizations must consider the and summarize the numerous individual incidents
measures that are adequate and/or appropriate, of risk associated with running an IT system
since resources for implementing measures are (referred to as operational risk) in such a way that
finite and it is impossible to be 100 percent safe. the organization’s management team can make
effective decisions regarding risk control.
This article describes an approach that can be used
to establish the correlation among operational IT
risk, the appropriateness of mitigating measures
and organizational targets. This, in turn, means
organizations can assess organizational targets
that may be exposed to risk emanating from IT
operations and to what extent.

How does the risk associated with running an IT


system impact organizational targets? When has
an organization put in place sufficient measures
to ensure an appropriate level of protection?
Regardless of how many security measures are
put in place to counter a risk, it is impossible to be
completely safe. As a result, the key question an
organization may ask is, “When have adequate,
cost-effective and, therefore, appropriate controls
and measures been implemented to ensure a risk
does not seriously endanger the achievement of
organizational targets?” Risk management is tasked
with precisely providing the answer to this question.
Horst Moll, CISA, CRISC, CISM, CCSE, CISSP, ISO 27001 LA, MBCI, MCP
Is a security risk governance expert and currently working at Telekom Security.
What follows is based on the following premise:
He has more than 20 years of experience in information security. Before
A risk scenario is manageable when adequate
he joined Telekom Security, he worked as a security consultant for several
controls/measures have been put in place that different companies in Europe.
reduce the negative consequences a potential

ISACA JOURNAL VOL 3 1


©2018 ISACA. All rights reserved. www.isaca.org
One example of a risk incident (isolated incident) of a potential incident that, if it occurs, will impact
would be a faulty turnstile system in a data center. corporate and/or IT objectives. This impact can be
This isolated incident arises from the operation positive or negative. A structure for describing a risk
of an IT system and is, therefore, an operational scenario can be found in the COBIT® framework
risk. The faulty turnstile system could result in and can be used to describe organization-specific
unauthorized individuals gaining access to the data risk scenarios.
center, constituting a potential risk of data and/or
infrastructure theft. If an organization runs several Risk Scenarios and Risk Categories
sites with access control systems, it is highly
probable that faults will occur in these systems on Standardization is essential to ensuring results
more than one occasion. Furthermore, when an can be compared; in this case, a standardized
organization is above a certain size, it no longer description of risk scenarios as suggested in COBIT
makes sense to report every isolated incident to 5 for Risk2 is described.
the organization’s management team because the
total number of incidents can be very large. For
example, instead of reporting every single denial-
of-service (DoS) attack to the management team,
ONE AIM OF RISK MANAGEMENT IS,
an aggregation can be reported (e.g., the number THEREFORE, TO STOP TALKING ABOUT
of attacks per day or month). The challenge here is
how to group together isolated incidents so that the
INDIVIDUAL RISK INCIDENTS AT THE
management team can use a range of aggregations MANAGEMENT LEVEL AND INSTEAD
to build up a complete picture of the operational
risk that has been identified and, thus, make well-
TALK ABOUT THE NATURE OF SIMILAR
founded decisions. INCIDENTS.
One aim of risk management is, therefore, to
stop talking about individual risk incidents at the
management level and instead talk about the nature
of similar incidents. It is essential to describe, A number of scenarios are defined in the framework
group together and summarize pertinent incidents, itself. Some of these scenarios are very generic, but,
using standardized criteria. When looking at the nonetheless, offer guidance for describing in-house
characteristics of a risk, it is important to consider situations. The structure specifications help when
the characteristics that will ensure a grouping standardizing scenarios. The individual structure
produces sensible results. elements have the following meanings:

• Threat—In very general terms, a threat is a set of


Aggregating risk incidents based on the information circumstances or an incident that could result
assets (primary assets) that are affected provides in a loss. This loss relates to a specific value
an insight into the information values that are such as an asset, expertise, objects or health.
threatened by operational risk and potentially Transposed to the world of IT, a threat is a set
weighing which values are more or less affected. of circumstances or an incident that could have
Grouping risk according to information assets an adverse impact on the availability, integrity or
brings information closer to business risk, because confidentiality of information, thereby potentially
the IT systems (secondary assets) are excluded at resulting in a loss for the owner and/or user of
the highest aggregation level. the information. Examples of threats include
force majeure, human error, technical failure and
Another option is to group operational risk according intentional acts.3
to risk scenarios. A risk scenario is the description

ISACA JOURNAL VOL 3 2


©2018 ISACA. All rights reserved. www.isaca.org
• Vulnerability—A vulnerability is a security-relevant and the stability of categories has an enormous
fault in an IT system or institution. Causes can lie advantage in reporting. If category-based reporting
Enjoying
in the design, algorithms used, implementation, is introduced, the number and meaning of the
configuration, operation and organization. A categories will not change significantly over an
this article?
vulnerability can result in a threat taking effect extended period. This makes it easier for the people
and an institution or system incurring a loss as receiving the reports to read and understand the
• Learn more about,
a consequence. A vulnerability makes a subject issues that are being presented.
discuss and
(institution or system) susceptible to threats.4 In
collaborate on
this context, it is important to note that both a COBIT defines 20 risk categories (figure 1)
information security
threat and a vulnerability must be present when comprising a total of 112 risk scenarios.
management in the
describing a risk. For example, fire is irrelevant as
Knowledge Center.
a threat to nonflammable substances, due to the Figure 2 illustrates the correlation between risk
www.isaca.org/
absence of the associated vulnerability (burning). categories and risk scenarios by setting out the
information-security-
management
• Asset/resource—In general terms, an asset/
resource can be described as an item of property Figure 1—Risk Categories Defined in COBIT
belonging to an organization. In the case of Number Scenario
Telekom Security, a distinction is made between 1 Portfolio Establishment and Maintenance
primary assets (i.e., information) and secondary
2 Program/Project Life Cycle Management
assets (e.g., people, buildings, IT assets).
3 IT Investment Decision Making
• Time—Time plays a crucial role in the description
4 IT Expertise and Skills
of risk as time is, among other things, an indicator
for the probability of an incident taking place. 5 Staff Operations
6 Information
• Threat type—A threat type describes in general
terms the cause of an incident, i.e., whether an 7 Architecture
incident has been caused deliberately or 8 Infrastructure
by mistake. 9 Software
• Actor—Who is the actor? Is it an internal employee 10 Business Ownership of IT
or external third party? 11 Supplier
12 Regulatory Compliance
The first step in aggregating operational risk
13 Geopolitical
incidents is to group them according to scenarios. In
complex environments, the number of risk scenarios 14 Infrastructure Theft or Destruction
can quickly rise to three figures, making it a good 15 Malware
idea to further aggregate the incidents. In COBIT, 16 Logical Attacks
risk scenarios are allocated to risk categories. The
17 Industrial Action
advantage of aggregating into risk categories is that
this classification is generic enough to be applied 18 Environmental
to any organization and the number of categories 19 Acts of Nature
remains stable over time. This type of aggregation 20 Innovation
Source: ISACA, COBIT® 5 for Risk, USA, 2013. Reprinted with permission.

Figure 2—Scenarios in Regulatory Compliance


Number Scenario
1201 Noncompliance with regulations There is noncompliance with regulations, e.g., privacy,
accounting, manufacturing.
1202 Unawareness of potential regulatory changes Unawareness of potential regulatory changes has an
impact on the operational IT environment.
1203 Regulatory prevention of cross-border data flow The regulator prevents cross-border data flow due to
insufficient controls.
Source: ISACA, COBIT® 5 for Risk, USA, 2013. Reprinted with permission.

ISACA JOURNAL VOL 3 3


©2018 ISACA. All rights reserved. www.isaca.org
risk scenarios for the risk category Regulatory • What does the percentage distribution say about
Compliance (line 12 in figure 1). how safe the enterprise’s IT operations are? For
example, are the enterprise’s operations safe
Applying Categorization enough from risk incidents in the Logical Attacks
category?
Once the risk scenarios have been described and
allocated to a risk category, this categorization • How does this risk portfolio affect the enterprise’s
can be applied, i.e., risk incidents or risk from IT targets?
operations (operational risk) can be allocated to a
risk scenario.

During practical application, it quickly becomes


A RISK SCENARIO IS MANAGEABLE
apparent that a risk incident cannot always WHEN ADEQUATE CONTROLS/MEASURES
be allocated one-to-one to a risk scenario. A
certain learning curve is required, and a series of
HAVE BEEN PUT IN PLACE THAT REDUCE
discussions is needed to make the process of THE NEGATIVE CONSEQUENCES OF AN
allocating a risk scenario more practicable within
an organization. However, this effort pays for itself
INCIDENT TO AN APPROPRIATE LEVEL.
twice over, first by improving the quality of results
and, second, by initiating a substantive discussion
that boosts risk affinity in the organization. When
operational risk is allocated to one of these risk Defining an Appropriate Security Level
scenarios, a picture begins to emerge. Figure 3 The question of what constitutes an appropriate
shows an example. security level in a risk scenario should be answered
by the premise defined in the introduction: A risk
Without delving too deeply, it is clear that the scenario is manageable when adequate controls/
operational risk can be restricted to five risk measures have been put in place that reduce
categories. The other risk categories are either the negative consequences of an incident to an
irrelevant in terms of numbers, have not been found appropriate level.
or are simply not relevant to the organization.
This picture or, to put it another way, risk portfolio, The following hypothesis is being established as
initiates two key questions: a metric for adequate controls/measures: The

Figure 3—An Example of Risk Portfolio Based on Scenarios

6%

16% Regulatory compliance


39%
Infrastructure theft or destruction
Malware

29% Logical attacks


Software
10%

ISACA JOURNAL VOL 3 4


©2018 ISACA. All rights reserved. www.isaca.org
controls/measures are adequate when the organization’s risk portfolio. This approach is the
associated control processes can be considered equivalent of a bottom-up analysis. Evaluating the
to meet a high maturity level as per International control processes’ maturity level allocated to a
Organization for Standardization/International risk scenario enables the enterprise to determine
Electrotechnical Commission (ISO/IEC) 15504. a maturity or security level. This approach is the
equivalent of a top-down analysis.
If both hypotheses are combined, the following
statement emerges: The maturity level of the The bottom-up approach delivers the relevant risk
control processes assigned to a risk scenario is a scenarios for the company. Knowing them, the
key performance indicator (KPI) for an appropriate organization can focus on these scenarios during
security level. the top-down analysis. The maturity level for each
scenario is calculated through a self-assessment
This statement necessitates reexamining the risk of the relevant control processes. If the standard
categories from COBIT. Control processes are COBIT scenarios are used, the relevant controls
allocated to each risk category. If these control are the process enablers assigned to each risk
processes have a high maturity level, it can be scenario.5 The assessment can be based on the
argued that the organization is well protected COBIT Process Assessment Model. At the end of
against risk incidents arising from that particular risk the self-assessment of each control process for one
category. By contrast, if the maturity level is lower, scenario, an average must be calculated to get to
there is a higher probability that the organization can one aggregated number—the maturity level.
expect negative consequences from risk incidents The next step is to compare the bottom-up and top-
arising from that particular risk category. down analyses, as shown in figure 4.

Quantitative Correlation Between In the Infrastructure Theft or Destruction category,


Organizational Targets and Security Level as an example (line 14 in figure 1), it can be seen
that there is real, concrete risk in IT operations that
Allocating risk incidents from IT operations to infrastructure could be stolen. Compared to the
risk scenarios and combining these to form overall number of risk factors, the number of risk
risk categories enables one to comment on the factors in this particular category is low. At the same

Figure 4—Example of a Risk Portfolio Based on Scenarios and Maturity Level of Control Processes

E E
EXAMPL EXAMPL
Bottom-Up Analysis Top-Down Analysis

Scenario Maturity Level


Risk portfolio based on scenarios
Regulatory
6% compliance 3.2

16% Regulatory compliance


39% Logical attacks 2.5
Infrastructure theft or destruction
Malware

29% Logical attacks Malware 4


Software
10%

Software 3.8

Infrastructure theft
or destruction 4.2

ISACA JOURNAL VOL 3 5


©2018 ISACA. All rights reserved. www.isaca.org
time, figure 4 shows that the control processes A simplified example helps to clarify the correlations
the organization uses to mitigate the risk in this at work here. Imagine that an organization has
category have scored a high maturity level. In this defined six organizational targets. One of these
example, it can, therefore, be said that the measures objectives is to offer a portfolio of competitive
to protect against infrastructure theft constitute products and services and is linked to revenue of
an appropriate security level. Nonetheless, there C100 million. This particular organizational target is
can—and will—be cases when infrastructure (e.g., dependent on a ratio of one-sixth of the IT objective,
cellphones, laptops) is stolen. It goes without “Realizing the benefits of IT-supported investment
saying that these isolated incidents must be and the service portfolio.” For its part, this IT
analyzed and evaluated for potential improvements objective is dependent on the risk category, Portfolio
to be identified. However, from the viewpoint of Establishment and Maintenance. The maturity level
the organization management team, there is no for the control processes has been scored at just
immediate need for action because an appropriate 50 percent of the specified target maturity level. If it
security level has been achieved in relation to is assumed that the other five objectives have been
infrastructure theft. scored at 100 percent, then the target achievement
level for the organizational target, Portfolio of
Once a systematic correlation has been established Competitive Products and Services, is (100% × 5/6
between operational risk from IT and the risk + 50% × 1/6) = 91.6%. From a risk management
categories, COBIT also provides a concept for viewpoint, approximately eight percent of the
analyzing how organizational targets can be revenue target (i.e., C8 million in this example) is
dependent on risk categories. According to COBIT, at risk.
the achievement of IT objectives supports the
achievement of organizational targets. In turn,
risk emanating from IT operations influences
the achievement of IT objectives. Therefore, the
ONCE A SYSTEMATIC CORRELATION
following correlations apply: HAS BEEN ESTABLISHED BETWEEN
• Corporate objectives depend on IT objectives. OPERATIONAL RISK FROM IT AND THE
• IT objectives depend on risk categories. RISK CATEGORIES, COBIT ALSO PROVIDES
• Risk categories are groupings of risk scenarios. A CONCEPT FOR ANALYZING HOW
• Risk scenarios are groupings of risk incidents from ORGANIZATIONAL TARGETS CAN BE
IT operations.
DEPENDENT ON RISK CATEGORIES.
• Risk incidents from IT operations influence
organizational targets.

The following approach is used to make a


Based on these workings, the organization’s
quantitative statement on the dependency of
management team has three choices:
organizational targets:
1. Accept the situation.
• Corporate objectives are linked to a revenue
expectation. 2. Instigate immediate measures to improve control
processes for the affected risk category.
• Each organizational target is linked to one or more
IT objectives. 3. Lower the target maturity level, resulting in a
higher target achievement.
• Each IT objective is linked to at least one risk
category.
It is not possible to comment here on the most
• A security level (maturity level) is stipulated for appropriate target maturity level for each risk
each risk category. category, as this will vary depending on how

ISACA JOURNAL VOL 3 6


©2018 ISACA. All rights reserved. www.isaca.org
risk-averse the organization is. An organization that
is more willing to accept risk will stipulate a lower
target maturity level than an organization that is less THE STANDARDIZATION OF
prepared to accept risk.
OPERATIONAL IT RISK DOES PRESENT
Conclusion
ORGANIZATIONS WITH AN OPPORTUNITY
Every risk incident must be subjected to a
detailed risk analysis and assessment. Not even TO IDENTIFY SYSTEMATIC PROBLEMS.
standardization will change that. Furthermore, it
will always be essential that the organization’s
management team is kept informed about matters Endnotes
in line with their importance and value. However,
the standardization of operational IT risk does 1 ISACA Germany Chapter, IT-Governance:
present organizations with an opportunity to identify Zeitschrift des ISACA Germany Chapter e.V.,
systematic problems. Moreover, standardization on Heidelberg: Dpunkt-Verl., Germany, 2007,
the basis of risk scenarios provides an opportunity p. 20-25
to link organizational targets with risk incidents 2 ISACA, COBIT® 5 for Risk, USA, 2013, www.isaca.
arising from IT operations. Determining the maturity org/COBIT/Pages/Risk-product-page.aspx
level of the control processes for a risk category 3 German Federal Office for Information Security
is a simple means of establishing a correlation (BSI), “Glossary,” https://www.bsi.bund.de/DE/
between the achievement of organizational targets Themen/ITGrundschutz/ITGrundschutzKataloge/
and risk incidents from IT operations. Clearly, this Inhalt/Glossar/glossar_node.html
methodological approach still requires further 4 Ibid.
practical evidence. However, the initial results from 5 ISACA, Risk Scenarios Using COBIT® 5 for Risk,
implementing it in organizational units at Deutsche USA, 2014, http://www.isaca.org/Knowledge-
Telekom AG gives cause to be optimistic that this is Center/Research/ResearchDeliverables/Pages/
the right direction. Risk-Scenarios-Using-COBIT-5-for-Risk.aspx

ISACA JOURNAL VOL 3 7


©2018 ISACA. All rights reserved. www.isaca.org

You might also like