Team LiB   Previous Section   Next Section

B.2 Asset Profile Worksheets

Use the worksheets in this section to document the analysis results during processes 4 through 8A for each critical asset. Collectively, these worksheets are called an asset profile; you should develop one asset profile for each critical asset.

The worksheets in this section generally appear in the order in which they are used. Any exceptions are specifically noted in the instructions for a section. The following asset profile worksheets are presented in this section:

  • Process 4

    - Critical Asset Information

    - Security Requirements

    - Threat Profile

  • Process 5

    - System(s) of Interest

    - Key Classes of Components

    - Infrastructure Components to Examine

  • Process 6

    - Technological Vulnerability Summary

    - Actions and Recommendations

  • Process 7

    - Risk Impact Descriptions

    - Risk Evaluation Criteria

  • Process 8

    - Risk Mitigation Plans

B.2.1 Critical Asset Information

Instructions
Process 4 Activity: Select Critical Assets (Section 6.3)
Purpose To document information pertaining to the selection of a critical asset
Instructions

Record the following information for the critical asset on the Critical Asset Information Worksheet:

  • The name of the asset and your rationale for selecting it

  • A brief description of the critical asset, including who controls it, who is responsible for it, who uses it, and how it is used

Critical Asset Information Worksheet
Asset
Rationale for selection as a critical asset
Brief description

B.2.2 Security Requirements

Instructions
Process 4 Activity: Refine Security Requirements for Critical Assets (Section 6.4)
Purpose To refine security requirements for the critical asset
Instructions
  1. Review any security requirements and areas of concern for the critical asset that were identified during processes 1 to 3. Also review any areas of concern.

 
  1. Document the security requirements for the critical asset in the third column of the Security Requirements Worksheet. Use the following questions as prompts:

    • Confidentiality

      - Is this asset proprietary or sensitive?

      - Does it contain personal information?

      - Should it be inaccessible to anyone who is not authorized to see it?

      - If the answer to any of these questions is yes, define the specific confidentiality requirement in the third column of the following table.

    • Integrity

      - Are authenticity, accuracy, and completeness important to this asset? If yes, define the specific integrity in the third column of the following table.

    • Availability

      - Is accessibility of the asset important? If yes, define the specific availability requirement in the third column of the following table.

    • Other

      - Are there any other security-related requirements that are important to this asset? If so, define them in the third column of the following table.

 
  1. Determine the most important security requirement by examining trade-offs among the security requirements. Consider what would happen if confidentiality, integrity, or availability of the asset were violated. Document the most important security requirement in the "priority" column of the Security Requirements Worksheet.

Security Requirements Worksheet
Security Requirement Type Priority Specific Requirement
Confidentiality    
Integrity    
Availability    
Other    

B.2.3 Process 4: Threat Profile for Critical Asset

NOTE: You do not complete the entire worksheet during one activity. First complete the threat profile for the critical asset (all fields in the Threat Profile Worksheet with the exception of the impact field). Record impact values on the Threat Profile Worksheet after evaluating impacts in Section B.2.11.

Instructions
Process 4 Activity: Identify Threats to Critical Assets (Section 6.5)
Purpose To identify the range of threats that affect the critical assets, creating a threat profile for the critical asset
Instructions
  1. Review the security requirements (Section B.2.2) and critical asset information (Section B.2.1). Also review any areas of concern for the critical asset identified during processes 1 to 3.

 
  1. Answer the following question: Which branches correspond to an expressed area of concern? Mark these branches on the appropriate tree.

 
  1. Review the remaining, unmarked branches (gaps) for threats that were not identified by the participants during processes 1 to 3. Consider the following questions:

    • For which of the remaining branches is there a more than negligible possibility of a threat to the asset? Mark these branches on the tree.

    • For which of the remaining branches is there a negligible possibility or no possibility at all of a threat to the asset? Do not mark these branches.

 
  1. Record notes to clarify threats as appropriate (i.e., branches that do not map to an existing area of concern).

 
  1. A blank tree entitled "Other Problems (cont.)" is provided for you to record any unique threat actors not addressed in the threat profile. Complete the tree for any unique threats that apply to the critical asset.

Threat Profile Worksheet: Human Actors Using Network Access

graphics/bfig01.gif

Threat Profile Worksheet: Human Actors Using Physical Access

graphics/bfig02.gif

Threat Profile Worksheet: System Problems

graphics/bfig03.gif

Threat Profile Worksheet: Other Problems

graphics/bfig04.gif

B.2.4 Process 5: System(s) of Interest

Instructions
Process 5 Activity: Identify Key Classes of Components (Section 7.2)
Purpose To identify the system most associated with the critical asset
Instructions

Review the threat tree for human actors using network access in Section B.2.4. Use the following questions to guide your selection of the system(s) of interest.

  • Which system(s) is most closely linked to the critical asset? In which system(s) is the critical asset stored and processed?

  • Where outside the system of interest do critical information assets move? Backup system? Off-site storage? Other?

  • Based on the critical asset, which system(s) would be the target of a threat actor acting deliberately?

Record the system(s) of interest for the critical asset on the System(s) of Interest Worksheet.

System(s) of Interest Worksheet
 

B.2.5 Process 5: Key Classes of Components

Instructions
Process 5 Activity: Identify Key Classes of Components (Section 7.2)
Purpose To identify key classes of components associated with the critical asset
Instructions
  1. Consider key classes of components that are part of or related to the system of interest. Use the following questions to guide your selection of the key classes of components.

    • Which types of components are part of the system of interest? Consider servers, networking components, security components, desktop workstations, home machines, laptops, storage devices, wireless components, and others.

    • Which types of components are related to the system of interest? From which types of hosts can the system of interest be legitimately accessed? Desktop machines? Home machines? Laptops? Cellular phones? Handheld devices? Others?

    • How could threat actors access the system of interest? Via the Internet? Via the internal network? Shared external networks? Wireless devices? Others?

    • Which types of components could a threat actor use to access the system of interest? Which could serve as intermediate access points? Consider physical and network access to servers, networking components, security components, desktop workstations, home machines, laptops, storage devices, wireless components, and others.

    • What other systems could a threat actor use to access the system of interest?

    • Based on your answers to the above questions, which classes of components could be part of the threat scenarios?

Based on the answers to the questions, decide which key classes of components could be part of the threat scenarios. Mark an x in the box by each applicable class on the Key Components Worksheet.

 
  1. Record your rationale for selecting each key class on the Key Components Worksheet.

Key Components Worksheet
Class of Component Rationale for Selection
Servers  
Networking components  
Security components  
Desktop workstations  
Home computers  
Laptops  
Storage devices  
Wireless components  

Others (list)

_________________________

_________________________

_________________________

_________________________

 

B.2.6 Process 5: Infrastructure Components to Examine

Instructions
Process 5 Activity: Identify Infrastructure Components to Examine (Section 7.3)
Purpose To select specific components from each key class to evaluate for technology vulnerabilities
Instructions
  1. From the key classes of components documented on the Key Components Worksheet, select specific components from each key class to evaluate for technology vulnerabilities. Use the following questions to guide your selection of infrastructure components.

    • Is the infrastructure component typical of its class?

    • How accessible is the infrastructure component? Is it "owned" by another organization? Is it a home machine?

    • How critical is the infrastructure component to business operations? Will you be interrupting business operations when you evaluate the component?

    • Will special permission or scheduling be required to evaluate the component?

Record the selected components, including their IP addresses and host/DNS names, on the Infrastructure Components to Examine Worksheet.

 
  1. Record the rationale for selecting each infrastructure component on the Infrastructure Components to Examine Worksheet.

 
  1. Record the approach for evaluating each infrastructure component on the Infrastructure Components to Examine Worksheet. The approach should include the following information:

    • Who will perform the evaluation (e.g., IT staff, external experts)

    • The selected tools (e.g., software, checklists, scripts)

Infrastructure Components to Examine Worksheet
Class of Component Selected Component/ IP Addresses/Host Names Rationale Approach
System of interest      
Systems/servers      
Networking components      
Security components      
Desktop workstations      
Home computers      
Laptops      
Storage devices      
Wireless components      
Others      

B.2.7 Process 6: Summarize Technology Vulnerabilities

Instructions
Process 6 Activity: Review Technology Vulnerabilities and Summarize Results (Section 8.3)
Purpose To document a summary of the technology vulnerability evaluation
Instructions
  1. For each evaluated component, review the proposed summary of the vulnerability evaluation. All analysis team members must understand

    • The types of vulnerabilities found and when they need to be addressed

    • The potential effect on the critical assets

    • How the technology vulnerabilities could be addressed (applying a patch, hardening a component, etc.)

Make any necessary changes to the preliminary summary, and record the results on the Technology Vulnerabilities Summary Worksheet. (You can record the information after the workshop.) The vulnerability summary contains the following information for each component that was evaluated:

  • The number of vulnerabilities to fix immediately (high-severity vulnerabilities)

  • The number of vulnerabilities to fix soon (medium-severity vulnerabilities)

  • The number of vulnerabilities to fix later (low-severity vulnerabilities)

 
  1. Perform a gap analysis of the threat profile that you created during process 4. Turn to Section B.2.3, process 4: Threat Profile for Critical Asset.

    Reexamine the unmarked branches of the threat three for human actors using network access. Consider the following question: Do the technology vulnerabilities associated with the critical asset's key infrastructure components indicate that there is a more than negligible possibility of any additional threats to the asset?

    Mark any additional branches on the appropriate trees in Section B.2.3.

Technology Vulnerabilities Summary Worksheet
Class Selected Component/IP Address/Host Name Vulnerability Summary
     
     
     
     
     
     
     

B.2.8 Process 6: Record Action Items

Instructions
Process 6 Activity: Review Technology Vulnerabilities and Summarize Results (Section 8.3)
Purpose To document any immediate or short-term actions or recommendations resulting from the technology vulnerability evaluation

Instructions

Review the vulnerability summary that you documented in Section B.2.7. Record any immediate or short-term actions or recommendations on the Actions and Recommendations for Addressing Technology Vulnerabilities Worksheet.

Actions and recommendations are typically related to the technology vulnerabilities that were identified and the steps the organization needs to take to address those vulnerabilities.

Actions and Recommendations for Addressing Technology Vulnerabilities
 
 
 
 
 

B.2.9 Process 7: Risk Impact Descriptions

NOTE: Do not complete the entire worksheet during one activity. First complete the create narrative description of the potential impacts on the organization (the "Impact Description" field in the Impacts on the Organization Worksheet). Record impact values on the Impacts on the Organization Worksheet after evaluating impacts in Section B.2.11.

Instructions
Process 7 Activity: Identify the Impact of Threats to Critical Assets (Section 9.2)
Purpose To create narrative descriptions of impacts on the organization based on threat outcomes
Instructions

Potential impacts on your organization resulting from threats to your critical assets are generated according to threat outcome. Note that the second column in the Impacts on the Organization Worksheet contains questions to guide your creation of impact descriptions.

Record descriptions of the impacts on the organization for each outcome on the Impacts on the Organization Worksheet.

In general, the impact(s) on an organization for a given outcome will be the same regardless of the branch of the threat tree leading to that outcome. However, if there is a unique impact for a specific threat tree branch, note it in the description.

Impacts on the Organization
Outcome Consider Impact Descriptions Values
Disclosure
  • How could the organization's reputation be affected if this asset were disclosed?

  • How could customer confidence be affected if this asset were disclosed?

  • How could the health of customers be affected if this asset were disclosed?

  • How could employee productivity be affected if this asset were disclosed?

  • How could other users of this asset be affected if this asset were disclosed?

  • What fines or legal penalties could be imposed as a result of disclosure of this asset?

  • What lawsuits could be filed against the organization if this asset were disclosed?

  • How could the organization be affected financially if this asset were disclosed?

  • What other impacts could occur if this asset were disclosed (for example, ethical considerations, other legal/financial impacts)?

   
Modification
  • How could the organization's reputation be affected if this asset were modified?

  • How could customer confidence be affected if this asset were modified?

  • How could the health of customers be affected if this asset were modified?

  • How could employee productivity be affected if this asset were modified?

  • How would other users of this asset be affected if this asset were modified?

  • What fines or legal penalties could be imposed if this asset were modified?

  • What lawsuits could be filed against the organization if this asset were modified?

  • How could the organization be affected financially if this asset were modified?

  • What other impacts could occur if this asset were modified (for example, ethical considerations, other legal/financial impacts)?

   
Destruction/Loss
  • How could the organization's reputation be affected if this asset were destroyed, lost, or unavailable?

  • How could customer confidence be affected if this asset were destroyed, lost, or unavailable?

  • How could the health of customers be affected if this asset were destroyed, lost, or unavailable?

  • How could employee productivity be affected if this asset were destroyed, lost, or unavailable?

  • How would other users of this asset be affected if this asset were destroyed, lost, or unavailable?

  • What fines or legal penalties could be imposed as a result of destruction, loss, or unavailability of this asset?

  • What lawsuits could be filed against the organization if this asset were destroyed, lost, or unavailable?

  • How could the organization be affected financially if this asset were destroyed, lost, or unavailable?

  • What other impacts could occur if this asset were destroyed, lost, or unavailable (for example, ethical considerations, other legal/financial impacts)?

   
Interruption
  • How could the organization's reputation be affected if access to this asset were unavailable?

  • How could customer confidence be affected if access to this asset were unavailable?

  • How could the health of customers be affected if access to this asset were unavailable?

  • How could employee productivity be affected if access to this asset were unavailable?

  • How would other users of this asset be affected if access to this asset were unavailable?

  • What fines or legal penalties could be imposed as a result of unavailability of this asset?

  • What lawsuits could be filed against the organization if access to this asset were unavailable?

  • How could the organization be affected financially if access to this asset were unavailable?

  • What other impacts could occur if access to this asset were unavailable (for example, ethical considerations, other legal/financial impacts)?

   

B.2.10 Process 7: Risk Evaluation Criteria Worksheet

Instructions
Process 7 Activity: Create Risk Evaluation Criteria (Section 9.3)
Purpose To develop criteria to evaluate the impact descriptions that you created in Section B.2.9
Instructions

For each area of impact, define specific measures that define high, medium, and low risks for your organization. Use the following questions to guide your creation of impact values:

  • What defines a "high" impact on the organization?

  • What defines a "medium" impact on the organization?

  • What defines a "low" impact on the organization?

Record the criteria on the Evaluation Criteria Worksheet.

Note: You can use the evaluation criteria in Appendix A (Section 4) as an example. If you use the example as a guide, make sure that you modify it appropriately to make it meaningful and specific to you and your organization.

Evaluation Criteria
Impact Area High Medium Low
Reputation/customer confidence      
Life/health of customers      
Productivity      
Fines/legal penalties      
Financial      
Other      

B.2.11 Process 7: Risk Profile Worksheet

NOTE: The tables and diagrams associated with the threat profiles and impact values already exist in this appendix. Only the instructions for completing them are listed here. See Section B.2.7 for threat profiles and Section B.2.9 for impact values.

Instructions
Process 7 Activity: Evaluate the Impact of Threats to Critical Assets (Section 9.4)
Purpose To evaluate the impact descriptions in Section B.2.9 against the evaluation criteria in Section B.2.10
Instructions
  1. Evaluate the impact descriptions in Section B.2.9 against the evaluation criteria in Section B.2.10. Record the impact values for each impact description in the "Values" column on the Impacts on the Organization Worksheet (Section B.2.9).

 
  1. Also record the impact values in the "Impact" column of the Threat Profile Worksheet (Section B.2.3). If more than one value is associated with any outcome, record all of them in the "Impact" column. For example, if disclosure has three statements describing the impact on the organization, one with a value of "high" and two with values of "medium," record "medium, high" in the "Impact" column.

B.2.12 Process 8: Risk Mitigation Plans

Instructions
Process 8 Activity: Create Risk Mitigation Plans (Section 10.5)
Purpose To identify actions, or countermeasures, designed to counter the threats to the critical asset
Instructions
  1. Decide whether to accept or mitigate the risks to each critical asset. Typically, when you decide whether to accept or mitigate a risk, you base your decision on whether you want to take action to counteract the underlying threat. Make sure that you record your decisions on the Threat Profile Worksheet in Section B.2.3.

    Note that you must make a decision for each risk in the risk profile, which includes the following categories:

    • Human actors using network access

    • Human actors using physical access

    • System problems

    • Other problems

 
  1. For each risk that you decide to mitigate, create risk mitigation plans for the critical asset by selecting mitigation actions, or countermeasures, designed to counter the threats to the critical assets. Make sure that you review the survey results and contextual security practice information from processes 1 to 3 before creating mitigation plans.

    Use the following questions to guide your creation of risk mitigation plans:

    • What actions could you take to recognize or detect this threat type as it is occurring?

    • What actions could you take to resist or prevent this threat type from occurring?

    • What actions could you take to recover from this threat type if it occurs?

    • What other actions could you take to address this threat type?

    • How will you test or verify that this mitigation plan works and is effective?

Mitigation Plan for Human Actors Using Network Access
Questions Actions

What actions could you take to recognize or detect this threat type as it is occurring?

What actions could you take to resist or prevent this threat type from occurring?

What actions could you take to recover from this threat type if it occurs?

What other actions could you take to address this threat type?

How will you test or verify that this mitigation plan works and is effective?

Consider administrative, physical, and technical actions that you could take.

Mitigation Plan for Human Actors Using Physical Access
Questions Actions

What actions could you take to recognize or detect this threat type as it is occurring?

What actions could you take to resist or prevent this threat type from occurring?

What actions could you take to recover from this threat type if it occurs?

What other actions could you take to address this threat type?

How will you test or verify that this mitigation plan works and is effective?

Consider administrative, physical, and technicalactions that you could take.

Mitigation Plan for System Problems
Questions Actions

What actions could you take to recognize or detect this threat type as it is occurring?

What actions could you take to resist or prevent this threat type from occurring?

What actions could you take to recover from this threat type if it occurs?

What other actions could you take to address this threat type?

How will you test or verify that this mitigation plan works and is effective?

Consider administrative, physical, and technicalactions that you could take.

Mitigation Plan for Other Problems
Questions Actions

What actions could you take to recognize or detect this threat type as it is occurring?

What actions could you take to resist or prevent this threat type from occurring?

What actions could you take to recover from this threat type if it occurs?

What other actions could you take to address this threat type?

How will you test or verify that this mitigation plan works and is effective?

Consider administrative, physical, and technicalactions that you could take.

    Team LiB   Previous Section   Next Section