Information Security Risk Management Policy

Information Security Risk Management Policy
PREPARED BY
Information Security Team
uExcelerate
*Updated - 1st Sep 2024
Content
Summary â Overview
Information Security Risk Management Framework
Required Process Areas
Risk Governance
Risk Scope
Risk Categories and Control Mappings
Risk Impact
Risk Likelihood
Risk Rating
Risk Identification Process
Risk Analysis
Risk Evaluation
Risk Treatment
Definitions
SUMMARY
This document deals with the risk management policy of uExcelerate. The objective of this policy is to clearly define the required processes and controls needed to effectively identify, analyze, report, and manage information risks related to assets and information of uExcelerate and the services offered by uExcelerate.
uExcelerate has approved the introduction and embedding of risk management into the key controls and approval processes of all major activities and functions of the organizations and the services it offers.
Risk is inherent in all organizational activities, and every member of the organization continuously manages risk. uExcelerate recognizes that the aim of risk management is not to eliminate risk totally but rather to provide the structural means to identify, prioritize, and manage the risks involved in all organizational activities. It requires a balance between the cost of managing and treating risks and the anticipated benefits that will be derived.
uExcelerate acknowledges that risk management is an essential element in the framework of an organization. When dealing with critical and confidential data in large scale uExcelerate believes in the risk that mitigates with the development stages right to the deployment and support. In all such stages, uExcelerate strives hard to keep the data of its client in the most secure manner possible. Though no organisation is exempted from risk, uExcelerate believes in regular monitoring and risk analysis to prevent any breaches at the root itself.
1. Overview
This standard covers all information resources including systems, data, and services. This standard is applicable to all uExcelerate employees, staff and affiliates.
2. Information Security Risk Management Framework
2.1 â Information Security Risk Management Framework of uExcelerate will utilize an information security risk management framework to define the method and logical interrelation of risk management activities.
uExcelerate Information Security Risk Management Framework is guided by the ISO 27005:2011 standard (Information Technology â Security Techniques â Information security 1 risk management).
3. Required Process Areas
The information risk management methods and processes are divided into five required process areas -
S.No
Risk Process Area
Description
Conducted By
3.1
Risk
Identification
These processes are intended to help identify all risks that are relevant to the organisationâs information assets.
InfoSec Team Lead
3.2
Risk Analysis
These processes are intended to establish the overall level of risk based on a determination of scope, impact, and likelihood.
InfoSec Team Lead
3.3
Risk
Evaluation
These processes are intended to help determine if existing risk criteria are sufficient to determine a treatment option
InfoSec Team Lead
3.4
Risk
Treatment
These processes and steps are intended to have risk treatment options selected by appropriately parties.
InfoSec Team Lead
3.5
Risk
Monitoring
These processes and steps are intended to ensure that risk treatment options are validated for important risks on periodic basis.
InfoSec Support Team
4. Risk Governance
All risks identified as relevant to uExcelerate information assets will be managed by the Risk Analysis team and the InfoSec will be added to the loop as per necessity.
To effectively manage these risks, the following roles and responsibilities have been established and agreed upon.
The CEO - The CEO has authority and responsibility for annually reviewing and approving the uExcelerate IT Risk Assessment and treatment plan related to those areas that present highest degree of risk.
The CTOâs Core Team - The CTO Core Team has authority and responsibility for overseeing processes needed to establish risk tolerance and selection of treatment options for extreme and serious risks that may be uncovered throughout the year.
InfoSec Team - The InfoSec team is the guardian of customer trust. Infosec collaborates with uExcelerate engineering to protect data at uExcelerate.
Project Lead - âThe Project Lead is required to analyse and follow the security risk management standards for each of the applications and products developed under his/her supervision.
Information Security Advisory Council - The uExcelerate Information Security Advisory Council is responsible for periodically reviewing and providing advisement and recommendations concerning university information security risks.
Information Security Incident Response Team - âThe Information Security Incident Response has the authority and responsibility to review incident information and threat intelligence to help evaluate risks pertaining to technical IT defences, data security and related processes.
5. Risk Scope
Information risks will be scoped according to their applicability and origin. The scoping of information risk utilizes three tiers to differentiate risks and identify risk treatment responsibilities
Client Service Information Risks - âThese risks are issued if there is any risk identified to the data or deployment stack of the clients or the services that are offered by uExcelerate to its clients.
Enterprise Information Risks - âEnterprise risks are issues that are derived from a shared policy/compliance state, common organizational behaviour, or central control deficiency that impact a large number of uExcelerate units. These risks are often inherited due to their nature.
Unit Level Information Risks - Unit level risks are issues that are derived from a behaviour, business practice, or control deficiency that is relevant to a single unit.
6. Risk Categories and Control Mappings
âRisks will be categorized based on the eleven ISO 27005:2011 information security standard control categories to allow for correlation between risks and gaps analysis review and comparatives to varied IT security standards and risk frameworks (COBIT, NIST, PCIâDSS).
The risk categories will include :-
Organizational / Management Risks
Human Resource Risks
Asset Management Risks
Access Control Risks
Cryptography Risks
Physical and Environmental Risks
Operational Risks
Communications Risks
System Acquisition, Development, and Maintenance Risks
Supplier Relationship Risks
Information Security Incident Management Risks
Business Continuity Management Risks
7. Risk Impact
Risk impact levels are established based on both quantitative (financial) and qualitative risks as listed below:
Impact Level
Description
Critical
Critical impact information risks represent dire threats to the uExcelerateâs mission including issues such as the sustainment of essential services solvency of the organisationâs financial position, and the safety and wellbeing of uExcelerate community.â
High
High impact information risks represent the potential for serious fiscal and reputational harm to the organisation and its immediate clients and the services that are being offered by uExcelerate
Medium
Appreciable information risks represent the potential for moderate fiscal and reputational harm to the organisation, or attempt to harm the security of the data and information of the organisation and the client services.
Low
Low impact information risks represent the potential for minor fiscal and reputational harm to the organisation.
8. Risk Likelihood
The risk likelihood represents the estimation of how likely a risk is to be identified within a given year. The following levels are utilized to differentiate varying degrees of probability.
Risk Likelihood
Annualised Rate of Occurrence
Description
Certain
75% - 100%
Risks with a âCertainâ likelihood have a very high chance of being realized each year.
Probable
30% - 75&
Risks with aâ Probableâ likelihood have a fair chance of being realized every year.
Occasional
5% - 30%
Risks with an âOccasionalâ likelihood have a modest chance of being realized every year.
Rare
>0% â 5%
Risks with a âRareâ likelihood have a small chance of being realized each year.
9. Risk Rating
Risks ratings will be calculated using the impact and likelihood assessments in order to classify and prioritize risks that present the greatest dangers to the institution.
Impact
--------------------
Likelihood
Critical
High
Medium
Low
Certain
Severity 1
Severity 2
Severity 3
Severity 4
Probable
Severity 1
Severity 2
Severity 3
Severity 4
Occasional
Severity 2
Severity 3
Severity 4
Severity 5
Rare
Severity 3
Severity 4
Severity 5
Severity 5
Risk Rating
Description
Designated Risk Owner
Time Frame to report
Severity 1
Severity 1 is the highest form of risk, that has been identified, which makes a critical impact as in section 7
CEO, CTO core team, Oncall
Within 30 mins of identification
Severity 2
Severity 2 risk as identified, wil make an impact that is High or Critical in some cases.
CTO core team, Oncall
Within 1 hour of identification
Severity 3
Severity 3 risk as identified will make a Medium impact
Information Security Team Lead
Within 24 hours
Severity 4
Severity 4 risk as identified will make Low impact
Information Security Team Lead
Within 48 hours
Severity 5
Severity 5 risk as identified will make a low impact.
Information Security Support Team Lead
Within 7 working days
10. Risk Identification Process
Risk Identification processes will be followed to determine the existence of potential risks that may require further analysis.
The following processes will be conducted to support this process area:
uExcelerate Composite IT Risk Assessment â (Frequency: AnnualÍŸ Scope: Enterprise Level) - â An overall risk assessment and treatment plan will be developed by the Information Security team in collaboration with the Information Security Advisory Board on an annual basis that includes a high level view of the most significant risks uncovered throughout the year from identification processes as well as recommended risk treatment strategies and plans. The risk assessment and treatment plan will be collaboratively reviewed by the Information Security Advisory Team and the CTOâs core team to ensure that identified risks align with broad organisation risk perceptions and that treatment recommendations are evaluated for effectiveness and cost. â This annual assessment is reported to the CEO and CTOâs core team. The CEO and the CTOâs core team must review and sign and approve this assessment on annual basis.
ISO 27005 GAP, Maturity, and Risk Assessment (Frequency: BiâAnnualÍŸ Scope: Enterprise Level) - The Information Security Team will biâannually review ISO 270002 control areas to determine any areas that may be missing or underdeveloped. These controls areas will be analyzed and prioritized based on the maturity level of controls and related levels of risks associated with the control area. The top control areas with high risks and/or low maturity will be conveyed to the Information Security Advisory Counsel to ensure that risk area are reviewed and also reflect the broader view of risks held by representatives. This gap assessment will be used to determine risk review areas that may warrant more attention due to variance in control levels.
Threat Review â(Frequency: AnnualÍŸ Scope: System Level) - The UExcelerate Information Security Incident Response team will at least annually review emerging technical threats in relation to performance of existing IT defences against evolving attack threat trends/patterns and the tools, tactics and procedures (TTPs) of common threat actors.
Vulnerability Scanning â(Frequency: At least once a MonthÍŸ Scope: System Level) - Theâ Information Security team has the authority and responsibility to conduct vulnerability scans of all networked information systems, architectures, threat models, response and requests calls, authenticated users and access lists, architectures of all the products and services,â internet facing servers and systems that store, process, or transmit confidential information, Databases and data stores, at least once each month. Exemptions from these scans must be requested and reviewed. The Information Security Team Lead must approve exemption requests. Vulnerability scanning windows will be established to minimize potential conflicts with routine system operations or maintenance.
Confidential / Highly Confidential / Critical / Restricted Data Discovery and Loss
Prevention â (Frequency: Daily/MonthlyÍŸ Scope: Unit + System Level) - âThe Information Security Team has the authority and responsibility to scan for the presence of all the data in order to identify risks related to this data on systems that may have potential for system compromise or accidental disclosure. The team also has the responsibility to identify and classify any new category of data that has not been classified. It also scans for the services and requests responses both internal and external facing to identify that all the calls are have been identified and certified and been approved by the InfoSec team if they are handling RED data.
System Security Testing â(Frequency: As NeededÍŸ Scope: System Level) - Theâ Information Security team has the sole authority and responsibility to conduct directed security tests to simulate attacks against uExcelerate systems to determine their resiliency. This authority to test represents an exemption to relevant organisation standard computer and network usage policies so long as the requirements below are met.
âSecurity tests must be approved or requested by system owners. These approvals will be documented in a security testing approval form.
Security tests must be coordinated with relevant system and application administrators to differentiate testing from actual attacks and to minimize potential conflicts with routine system operations.
PostâIncident Analysis â (âFrequency:- As NeededÍŸ Scope: All Scoping Levels) - As part of the organisations Information Security Incident Response plan, the Information Security team will conduct postâincident analysis of security issues to determine their rootâcause and any associated risks that may need to be reviewed.
IT Procurement and Provider Review â(Frequency: As NeededÍŸ Scope: All Scoping Levels) - Theâ Information Security team has the authority and responsibility to review any IT related services or software that may reasonably have the potential to introduce significant information risks. New or proposed IT solutions and providers that manage store, transmit or process uExcelerateâs confidential data must always undergo a review.
If significant risks are uncovered during the review process than a risk mitigation/treatment review must be conducted by the appropriate risk owner prior to any decision.
11. Risk Analysis
The goal of risk analysis processes is to ensure that identified risks are consistently evaluated and scored in a common fashion. All identified risks must undergo the following steps:
Risk Scoping Analysis - Each risk must be assessed as either enterprise level risks (see 5.1), unit level risks (see 5.3), or system level risk (see 5.2) in order to determine if risks are inherited from a central issue, system, or concern or whether the risk is singular to a particular unit or team or system. â
Risk Impact Analysis - Each risk will be assigned an impact level associated with the realization of a risk that must be calculated qualitatively and optionally may also be measured via quantitative estimation. Risk impact assignment must be done in concert with any key stakeholders or subject matter experts who have an understanding of business processes or adverse events associated with particular types of risks.
Risk Likelihood Analysis - â Each risk must be assigned a likelihood value associated with the estimated potential for a risk to be realized in the course of a year (annualized rate of occurrence). â Risk likelihood assignment must be done in concert with any relevant key stakeholders or subject matter experts who have in depth understanding of threats that may lead to realization of risks.
12. Risk Evaluation
The goal of the risk evaluation phase is to determine if legal, contractual, or policy requirements mandate certain treatment options related to identified risks. Legal and Compliance Review Identified risks will be reviewed by the Information Security team in consultation with the CTOâs core team to determine their relevancy to any existing organisational contractual or legal requirements. If these obligations exist, then the terms of this agreement will be conveyed to the risk owner for awareness.
13. Risk Treatment
Risk Treatment The objective of risk treatment processes is to ensure that all risks are managed by an appropriate individual or group in an informed manner and that risk treatment decisions are executed. â Risk Treatment Plans All Severity 1-5 must undergo review and have a plan established for how risk is to be treated. In some instances, risk treatment plans may include a combination of options. It is important to note that acceptance of risk is an acceptable plan when approved by the risk owners
Risk Treatment Option
Description
Accept
If risk rating is determined to be acceptable based on the cost of realizing a risk or addressing it, then the decision can be made by risk owners (as describe below in the table) to accept the risk and not take additional actions.
Reduce
If risk rating is determined to be undesirable, then control measures can be implemented to lower the likelihood and/or impact of the risk
Transfer/Sharing
If risk rating is determined to be undesirable, then risk may be evaluated
for transferring or sharing components of this risk with a third party (for example cyber security insurance)
Avoid
If risk rating is determined to be unacceptable in comparison to the cost of realizing a risk, addressing a risk, or the overall value of process, service, or area, then the decision can be made by an CTO core team to discontinue the issue that originates the risk.
In case of an identified risk is of Severity 1 or 2. The root cause investigation has to be carried out by the team whose unit where the risk was identified.
In case of identification, a COE (Correction of Error) might have to be submitted by the team lead in case the Information Security Team demands.
In case of Risk Treatment the following are the risk owners and the time-frame to report the same.
Risk Rating
Risk Owner
Time Frame to report
Severity 1
CEO, CTO core team, Oncall
As soon as possible
Severity 2
CTO core team, Oncall
As soon as possible
Severity 3
Information Security Team
Within 24 hours
Severity 4
Information Security Team
Within 48 hours
Severity 5
Information Security Support Team
Within 7 working days
14. Definitions
Risk - In the content of Information Security, risk is the exposure to potential reduction of Confidentiality, Integrity, and Availability of information assets such as information systems, data, user credentials, and other computing resources.
Risk Owner - In the context of this standard, the risk owner is the group or role within the organisation who has the authority and accountability for selection of appropriate risk treatment
Risk Assessment - âThe overall process of risk identification, risk analysis and risk evaluation.
Risk Impacts - âAdverse outcomes that result when risks are realized.
Risk Rating - The magnitude of a risk, expressed in terms of the combination of impact potential and their likelihood.
Risk Management - The coordination of activities to direct and control an organization with regard to risk
Correction of Error (COE) - âThe report to be submitted by the team lead where Severity 1 and 2 risk were identified.
RED Data - âThe data dealt in uExcelerate and all its services, which are critical and highly confidential, for further elaboration on the data classification in uExcelerate refer to the Data Classification Policy in the Information Security Policy Handbook.
Last updated
Was this helpful?