CyberSecurity risks are a significant concern for all organizations, potentially leading to financial losses, reputational harm, and even life-threatening situations. As these risks continue to evolve in scale and complexity, organizations must proactively manage them in a strategic and cost-effective manner.
Two crucial elements in CyberSecurity are Zero Trust and Risk Management. The National Institute of Standards and Technology (NIST) and the CyberSecurity and Infrastructure Security Agency (CISA) provide various methodologies and standards to assist in this endeavor, including the Risk Management Framework (RMF) and the CyberSecurity Framework 2.0. Our focus will be on RMF, CSF, and Open FairTM. Integrating Risk Management with the Zero Trust CyberSecurity strategy model can provide a holistic and powerful approach to proactively detect and defend your business against most advance persistent threats in today's complex and evolving threat environment. Let's start with reviewing the Zero Trust CyberSecurity strategy components:NIST has recently published Special Publication (SP) 800-207, "Zero Trust Architecture," delineating the foundational components of a zero trust architecture (ZTA). This approach shifts from the Defense in Depth's broad network perimeters concept to securing individual resources or small clusters on a request by request basis. It addresses contemporary CyberSecurity challenges, including remote users and cloud-based assets.
Although zero trust architecture (ZTA) strategies is being integrated into current federal CyberSecurity policies, SP 800-207 identifies areas for further research and standardization to support the development and implementation of ZTA strategies. The publication offers a clear definition of both zero trust and ZTA, suggests deployment models, illustrates scenarios where ZTA can enhance IT security, and provides a high-level roadmap for ZTA adoption. Within SP 800-207, the NIST CSWP 20 outlines the implementation of ZTA, referencing a comprehensive introduction to the NIST SP 800-37 Revision 2, which is the Risk Management Framework (RMF) for Information Systems and Organizations. The RMF employs a risk-based approach encompassing security control selection, specification, implementation, assessment, authorization, and continuous monitoring, structured around seven steps. The RMF is a dynamic process that allows organizations to manage CyberSecurity risks by applying a set of security controls and continuous monitoring, all tailored to the organization's specific needs.Typically, when embarking on a Zero Trust implementation or migration, we kick-start the process with our Risk Management Framework (RMF). In the initial phase, we often follow a systematic approach, though subsequent implementations may deviate from this sequence. The RMF steps closely align with the overarching steps advocated by John Kindervag for zero trust [6-7]. Below, we provide a partial mapping. This procedure assumes that the authorization boundary has been defined and that we have a clear understanding of the system components involved in the work flow (indicating that the PREPARE step has been accomplished and pertinent data has been gathered). It's worth noting that Kindervag's original high-level description did not explicitly incorporate a CATEGORIZE step, as it wasn't initially tailored to consider federal agency policies. In our endeavors, we heavily rely on the CyberSecurity Framework 2.0 in conjunction with the OpenFairTM Risk Management Framework to ensure a thorough and robust implementation.
The Framework's set of CyberSecurity outcomes provides a structured taxonomy for understanding, assessing, prioritizing, and communicating about CyberSecurity risks. It encompasses the following key areas:
The Framework accommodates organizations at various stages of their CyberSecurity program maturity. Those with existing programs can use the Framework to identify opportunities for enhancing and communicating their CyberSecurity Risk Management efforts while considering their current practices and necessary adjustments. Conversely, organizations without existing programs can utilize the Framework as a foundation and reference point for establishing one, while they are planning their CyberSecurity Risk Management and Zero Trust strategy.
Within an Open FAIRTM Risk Management System [1] incorporates a Risk Management Stack [5], a proficient team of security experts, guided by robust Corporate and Security Policies, establishes a well-informed and rigorously tested process and technology model. This model is sourced from reputable providers and follows a systematic approach, involving continuous evolution and monitoring of Risk Targets, Controls, and a proactive security stance, all managed in a cost-effective manner. The Risk Management Stack [5], as depicted below, consists of two primary elements: RISK and RISK MANAGEMENT. The Controls module within the RISK Element oversees and manages all identified Assets, evaluating factors like loss frequency and magnitude based on their assigned policies (e.g., password resets, backups, encryption). The Risk Control element is susceptible to potential Threats that could Impact the overall architecture if they were to materialize.
To grasp the Risk Management System [4], let's begin with the Risk Management Stack [5]. This stack comprises five key components: "Accurate Risk Modeling," "Meaningful RISK Measurements," "Effective Risk Comparisons," "Well-formed Mitigation Decisions," and lastly, "Effective Governance (Management)." Additionally, having a clearly defined and logically structured taxonomy is a crucial element of any risk assessment approach. Without a well-established taxonomy (industry standards), there is a prevalence of uncertainty, which hinders the ability to accurately measure or estimate risk factor variables. This, in turn, affects Asset Visibility (Business Continuity Planning), leading to a suboptimal level of comprehension among management regarding the reports that drive effective decision-making. As highlighted in "Measuring And Managing Information Risk" by Jack Freund and Jack Jones, "The taxonomy is the foundation of the Risk Management process. It is the language of Risk Management." It underpins the entire process and forms the basis for a robust metric value proposition and the overarching Goal Question Metric (GQM) approach [4].
The Risk Management process is not strictly sequential. In practice, it involves simultaneous and ongoing engagement with various activities. The dynamic nature of business needs and the evolving risk landscape means that monitoring, assessment, and reporting function in a feedback loop. This allows for adaptive Risk Management measures in response to both realized and anticipated shifts in the landscape.
Returning to our Open FAIRTM Risk Management System, the RISK MANAGEMENT component governs the personnel, policies, processes, and logical controls (technologies) that an organization chooses to implement. These decisions and executions aim to enhance risk maturity and increase the overall value of the organization. Sound Risk Management decisions are rooted in accurate risk measurements, leading to cost-effective and value-added choices. All of this is contingent on a well-defined Corporate and Security Governance structure, which is responsible for overseeing and executing the Risk Management system. Governance serves as the linchpin that holds the entire system together, ultimately determining the overall success of the Risk Management endeavor.
The NIST (CSF) is a voluntary framework encompassing standards, guidelines, and best practices for managing CyberSecurity risk. It provides a universal language for CyberSecurity Risk Management, aiding organizations in managing and mitigating their CyberSecurity risks. The framework comprises six core functions: Govern, Identify, Protect, Detect, Respond, and Recover. Each function is further broken down into categories and subcategories, offering detailed guidance on Risk Management.
The CSF functions like a wheel, with labeled functions interrelated and to be followed during initial implementation. After implementation, individual functions may be executed as needed, based on the specific action or event. For instance, initially, an organization will categorize assets under IDENTIFY and implement measures to secure those assets under PROTECT. Investments in planning and testing in the GOVERN and IDENTIFY Functions will support timely incident response and recovery actions in the event of a CyberSecurity incident, addressed by the RESPOND and RECOVER Functions. GOVERN holds a central position as it establishes the policies and procedures guiding the implementation of the surrounding five Functions. During regular operations, if an event is triggered and detected, the organization will RESPOND and RECOVER accordingly. This process continues in a similar manner until changes are prompted by a change management event, necessitating a re-evaluation of the organization's risk posture.
CISA offers guidance on implementing the NIST CyberSecurity Framework (CSF), aiding organizations in enhancing their cyber resilience. It also provides direction on developing a comprehensive, risk-based CyberSecurity program that reduces an organization’s cyber risk and enables swift response and recovery from incidents.
The CSF Core functions are interconnected, with each one influencing and supporting the others. For instance, asset categorization under IDENTIFY leads to securing those assets under PROTECT. Investments in planning and testing in GOVERN and IDENTIFY Functions contribute to effective incident response and recovery in RESPOND and RECOVER Functions. GOVERN, positioned at the center of the wheel, informs how an organization will implement the remaining five functions.
In summary, combining Open FAIRTM Risk Management with the NIST Risk Management and Analysis Framework(s) is crucial for attaining CyberSecurity maturity. The NIST CyberSecurity Framework, along with guidance from CISA, offers a solid foundation for managing CyberSecurity risks. Open FAIRTM further enhances this by providing a reliable and quantitative assessment of the organization's risk posture in terms of likelihood and monetary impact. It is highly advisable for organizations to adhere to these guidelines to accurately identify, assess, and effectively mitigate CyberSecurity risks.
Johnny Sandaire PhD, PMP, CISSP, CC, OpenFAIR, MCAD