GRC Risk Assessment Home Lab - reachchrisyoung/GRC-Risk-Assessment GitHub Wiki

`# GRC Risk Assessment Home Lab Cybersecurity relates works in Risk Assessment are contained in this portfolio item.

Description

Overview

  • Conducted a comprehensive risk assessment to enhance data security practices within an organization.

Key Points

  • Assessment: Develop and document risk mitigation strategies based on audit findings NIST SP 800-53 3.1 Media Protection family (MP-1 through MP-8).

  • Prioritization: Objectively identify high-priority risks and effectively communicate them to the organization, fostering an informed and proactive risk management strategy.

  • Frameworks: Employed the assessment scales outlined in NIST SP 800-30, providing a quantifiable framework for identifying and prioritizing risks.

Objectives

  • Combine threat modeling results with existing Standard Operating Procedures (SOP) and System Security Plan (SSP) to understand the organization's risks.

  • Tailor risk explanations to resonate with a non-technical audience.

  • Develop strategies to mitigate identified risks.

Project Walkthrough

For the purpose of this project, I will be using the findings from an audit previously conducted, combined with threat modeling, to understand the risks involved with the organization.

Step 1: Understanding Control Status

Based on NIST SP 800-53, my disposition was that control MP-1 (Media Protection Policy and Procedures) was not in place.

RiskAssessment1

Based on the interview with the Director of IT, the review of the SOP and SSP, and the threat modeling conducted prior to the audit, I determined that the biggest risk of not having Media Protection policies and procedures in place is unauthorized access.

riskassessment2

Step 2: Identifying Mitigating Factors

From the evidence I gathered in the interview, I can say that a mitigating factor for this risk is "Tribal knowledge in place" for people within the organization.

RiskAssessment3

Step 3: Quantitative Risk Assessment

I then used NIST SP 800-30 assessment scales for the quantitative determination of the impact and likelihood of this risk. Understanding these values allows me to consistently determine the risk for each control.

riskassessment4

Using these values, I can objectively determine that the likelihood of unauthorized access would be a 5 (low), and the impact if it were to happen would also be a 5 (low); the overall impact for this risk is 25/100 (low).

riskassessment5

Step 4: Objective Risk Explanation

My objective, defensible explanation for this risk: "Staff do not know what expectations or standards are, and no process around media protection, storage, or sanitization is documented, so may not be done properly. Without standards and policy, no process can be repeated consistently, and staff will develop their own individual processes."

riskassessment6

Step 5: Repetition for Each Control

After completing the risk assessment for Media Access control MP-1, I repeated steps 1-4 for controls MP-2 through MP-8.

riskassessment7

(reference image for evidence gathering...)

riskassessment8

Step 6: Prioritizing Risks

I then sorted the spreadsheet by overall risk to prioritize the controls that have the highest risk.

riskassessment9

Now that I had an organized list of the risks, I created an executive report to effectively communicate the risks with the organization.

riskassessment10

Portfolio Piece: [Risk Assessment Worksheet](https://docs.google.com/spreadsheets/d/1jQR1PamUc_pIrJh2ZrTXUHRLDr-6X21qSU-_bdhj4EA/edit?usp=sharing_

Optional Step: Risk Mitigation Recommendations

The risk assessment could also include next steps to mitigate the risks in scope.

Perhaps the organization I work for offers a solution to mitigate a specific risk, then I could include it in the risk assessment and add additional value for the organization.

End of Risk Assessment

`