Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

IAA202 IA17A Lab2 Team1

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

Laboratory #2

Lab 2: Align Risk, Threats, & Vulnerabilities to COBIT P09 Risk Management

Controls Learning Objectives and Outcomes

Upon completing this lab, students will be able to:

• Define what COBIT (Control Objectives for Information and related Technology) P09

Risk Management is for an IT infrastructure

• Describe the 6 control objectives of COBIT P09 which are used as benchmarks for IT

risk assessment and risk management

• Relate how threats and vulnerabilities align to the COBIT PO9 Risk Management

definition for the assessment and management of IT risk

• Use the COBIT PO9 controls as a guide to define the scope of risk management for

an IT infrastructure

• Apply the COBIT PO9 controls to help plan and organize the identified IT risks, threats,

and vulnerabilities and the on-going management and remediation operation


requirements

Required Setup and Tools

This is a paper-based lab. A PDF copy of the COBIT v4.1 Framework from ISACA is needed for
this paper-based lab. ISACA is the global organization that defines the roles of information systems
governance, security, audit and assurance professionals worldwide through its Certified Information
Systems Auditor (CISA) and Certified Information Security Manager (CISM) professional
certifications. ISACA’s website is: www.isaca.org.

The standard Instructor and Student VM workstation with Microsoft Office 2007 or higher is
required for this lab. Students will be required to answer the Lab #2 – Assessment Worksheet
questions as part of this lab.

Recommended Procedures

Lab #2 – Student Steps:


Student steps needed to perform Lab #2 – Align Risk, Threats, & Vulnerabilities to the COBIT
Risk Management Controls:

1. Connect your removable hard drive or USB hard drive to a classroom workstation.

2. Boot up your classroom workstation and DHCP for an IP host address.

3. Login to your classroom workstation and enable Microsoft Word.

4. Conduct a high-level narrative discussion and review of the COBIT v4.1 Framework.

5. Review the COBIT P09 Control Objective definition, scope, and focus areas for assessing
and managing IT risk.

6. Relate how the COBIT (P09) Control Objective definition relates to assessing and
managing IT risk within each of the seven domains of a typical IT infrastructure: User,
Workstation, LAN, LAN-to-WAN, WAN, Remote Access, Systems/Applications Domains

7. Explore the structure and format of how to align risks, threats, and vulnerabilities identified
from your IT infrastructure to the COBIT P09 Control Objective definition, scope, and focus
areas Information, Applications, Infrastructure, and People.

8. Explore the hierarchy for assessing and managing IT risks:

• Step #1: Align the risk, threat or vulnerability assessment to C-I-A primary first and
assess

• Step #2: Align the risk, threat, or vulnerability remediation to Effectiveness,

Efficiency, Compliance, and Reliability secondary

• Step #3: Assess the risk impact for each threat or vulnerability in the following focus
areas:

o Information – What is the risk impact? How can this be mitigated? How can this
be managed?
o Applications – What is the risk impact? How can this be mitigated? How can this
be managed?
o Infrastructure – What is the risk impact? How can this be mitigated? How can this
be managed?
o People – What is the risk impact? How can this be mitigated? How can this
be managed?
9. Using the list of identified threats and vulnerabilities that were identified from the Lab #1 –
How to Identify Threats and Vulnerabilities in Your IT Infrastructure, align the high,
medium, and low vulnerabilities to the COBIT (P09) Risk Management control objectives
for assessing and managing risk. See Lab #2 – Assessment Worksheet - Part A - COBIT
(P09) Alignment.

10. Answer Lab #2 – Assessment Questions.

Deliverables

Upon completion of the Lab #2 – Align Risk, Threats, & Vulnerabilities to the COBIT Risk
Management Controls, students are required to provide the following deliverables as part of this lab:

1. Lab #2 – Assessment Questions and Answers. This will include details about using the
COBIT (P09) assessment and risk management approach for the identified vulnerabilities
from Lab #1

Evaluation Criteria and Rubrics

The following are the evaluation criteria and rubrics for Lab #2 that the students must perform:

1. Was the student able to define what COBIT (Control Objectives for Information and
related Technology) P09 Risk Management is for an IT infrastructure? – [20%]

2. Was the student able to describe the 6 control objectives of COBIT P09 which are
used as benchmarks for IT risk assessment and risk management? – [20%]

3. Was the student able to relate how threats and vulnerabilities align to the COBIT PO9
Risk Management definition for the assessment and management of IT risk? – [20%]

4. Was the student able to use the COBIT PO9 controls as a guide to define the scope of
risk management for an IT infrastructure? – [20%]

5. Was the student able to apply the COBIT PO9 controls to help plan and organize the
identified IT risks, threats, and vulnerabilities and the on-going management and remediation
operation requirements? – [20%]
Lab #2: Assessment Worksheet

Align Risk, Threats, & Vulnerabilities to COBIT P09 Risk Management Controls

Course Name: _____________________________________________________________

Student Name: _____________________________________________________________

Instructor Name: ___________________________________________________________

Lab Due Date: _____________________________________________________________

Overview

Think of the COBIT framework as a giant checklist for what an IT or Risk Management auditors
would do if they were going to audit how your organization approaches risk management for your
IT infrastructure. COBIT P09 defines 6 control objectives for assessing and managing IT risk
within four different focus areas.

The first lab task is to align your identified threats and vulnerabilities from Lab #1 – How to
Identify Threats and Vulnerabilities in Your IT Infrastructure.

Lab Assessment Questions

1. From the identified threats & vulnerabilities from Lab #1 – (List At Least 3 and No
More than 5, High/Medium/Low Nessus Risk Factor Definitions for Vulnerabilities)
a. Workstation OS has a known software vulnerability - LOW
b. Service provider has a major network outage – LOW
c. User inserts CDs and USB hard drives with personal photos, music, and videos on
organization owned computers - MEDIUM
d. User downloads and unknown email attachment – HIGH
e. User destroys data in application and deletes all files - MEDIUM

2. For the above identified threats and vulnerabilities, which of the following COBIT
P09 Risk Management control objectives are affected?

• PO9.1 IT Risk Management Framework – b

• PO9.2 Establishment of Risk Context – b

• PO9.3 Event Identification – a, e

• PO9.4 Risk Assessment – c, d, e

• PO9.5 Risk Response – none

• PO9.6 Maintenance and Monitoring of a Risk Action Plan – none

3. From the identified threats & vulnerabilities from Lab #1 – (List At Least 3 and No More
than 5), specify whether the threat or vulnerability impacts confidentiality – integrity –
availability:

Confidentiality Integrity Availability


a. x x
b. x
c. x
d. x
e. x x
4. For each of the threats and vulnerabilities from Lab #1 (List at Least 3 and No More than 5)
that you have remediated, what must you assess as part of your overall COBIT P09 risk
management approach for your IT infrastructure?
Denial of Service attack of organized e-mail serverUser downloads and unknown email
attachmentLoss of Production DataWorkstation browser has software vulnerability
Unauthorized access to organization owned Workstation

5. For each of the threats and vulnerabilities from Lab #1 – (List at Least 3 and No More than
5) assess the risk impact or risk factor that it has on your organization in the following areas and
explain how this risk can be mitigated and managed:

1. Threat or Vulnerability #1:


o Information – Vulnerability
o Applications – Vulnerability
o Infrastructure – Vulnerability
o People – none
2. Threat or Vulnerability #2:
o Information – Vulnerability
o Applications – Vulnerability
o Infrastructure – Vulnerability
o People – Threat
3. Threat or Vulnerability #3:
o Information – Threat
o Applications – Vulnerability o
Infrastructure – Threat
o People – Vulnerability
4. Threat or Vulnerability #4:
o Information –Vulnerability
o Applications - Vulnerability
o Infrastructure - Vulnerability
o People – Threat
5. Threat or Vulnerability #5:
o Information – Threat
o Applications – Vulnerability
o Infrastructure – Threat
o People – Vulnerability

6. True or False – COBIT P09 Risk Management controls objectives focus on


assessment and management of IT risk.

True

7. Why is it important to address each identified threat or vulnerability from a C-I-A perspective?
Because CIA is a balanced perspective. When it’s too secure, people will not use it, when
it’s not secure enough people run the risk of losing information

8. When assessing the risk impact a threat or vulnerability has on your “information” assets, why
must you align this assessment with your Data Classification Standard? How can a Data
Classification Standard help you assess the risk impact on your “information” assets?

We have to align it because it helps you classify the importance of the information and
use. It will determine the level the risk factor is if it was compromised.

9. When assessing the risk impact a threat or vulnerability has on your “application” and
“infrastructure”, why must you align this assessment with both a server and application
software vulnerability assessment and remediation plan?

It is what any high level company works on. Anything less is unacceptable.

10. When assessing the risk impact a threat or vulnerability has on your “people”, we are
concerned with users and employees within the User Domain as well as the IT security
practitioners who must implement the risk mitigation steps identified. How can you
communicate to your end-user community that a security threat or vulnerability has been
identified for a production system or application? How can you prioritize risk remediation tasks?

Send e-mail, memos, setup a training class. The risk that can come to users the quickest
or highest threatmust be prioritized first.

11. What is the purpose of using the COBIT risk management framework and approach?

Comprehensive framework that assists enterprises in achieving their objectives for the
governance and management of enterprise information and technology assets (IT). Simply
stated, it helps enterprises create optimal value from IT by maintaining a balance between
realizing benefits and optimizing risk levels and resource use

12. What is the difference between effectiveness versus efficiency when assessing risk
and risk management?

Effectiveness is following the instructions of a specific job while efficiency is doing the
instructions in lesser time and cost. They say Effectiveness is doing what’s right and efficiency is
doing things rightly done.

13. Which three of the seven focus areas pertaining to IT risk management are primary focus
areas of risk assessment and risk management and directly relate to information systems security?

Assessing the risk, Mitigating Possible Risk and Monitoring the Result.
14. Why is it important to assess risk impact from four different perspectives as part of the
COBIT P.09 Framework?

The more perspectives you have, the better view of all the risk that are available.

15. What is the name of the organization who defined the COBIT P.09 Risk Management
Framework Definition?

The IT Governance Institute

You might also like