Industrial Internet Security Framework v 1.0 | Page 27

Security Framework 5: Managing Risk 5 MANAGING RISK Maintaining business value requires safeguarding the business investment in Industrial Internet of Things (IIoT) systems and protecting their operations from risk. Risk, the effect of uncertainty on objectives, takes into consideration the likelihood of an event occurring along with the impact of that event were it to occur. Elements of security risk that address the likelihood of an event occurring include threats and threat actors that may attempt to exploit vulnerabilities in the system unless countermeasures are deployed to mitigate the risk. Threats may be inadvertent (from hazards) or intentional (from attackers). Several elements of risk define the impact of an event, including the value of the asset (for example, the replacement cost of equipment or the revenue loss from equipment downtime), reputation damage, potential liability concerns, and physical and safety consequences of misoperating physical processes. As it is not feasible to eliminate all risk from a system, we must manage risk so security investments are balanced against the effect of undesirable outcomes. This balancing must be grounded in a realistic assessment of the threats, the risks they pose and how they might prevent the system from fulfilling its intended functions. Costs must be evaluated and a rational selection of implementation choices made to deliver an acceptable return on investment. It is possible to proceed with no security, and accept all the risk. It is also possible to spend exorbitant sums on security to the point that it no longer justifies the security gains. To manage risks, the organization should evaluate them, decide which parts of a security program in which to invest, deploy and periodically reevaluate both risks and the effectiveness of the program. Security risk can be addressed in a variety of ways: Risk avoidance seeks to eliminate the risk entirely to avoid all exposure. Often, complete risk avoidance can only be achieved by removal of the functionality causing the risk. Risk mitigation implements compensating measures to reduce the impact of unavoidable threat. Mitigation is the most applicable strategy when risk avoidance cannot be achieved. It is implemented with a systematic approach to software security, audit and patch management. Risk transferal transfers risk to a third-party. Most commonly this is in the form of insurance, where the risk is accepted by the third-party in return for payment. Transferring risk is a common technique for high-impact, low-frequency incidents that have unacceptably high mitigation costs. Risk transfer may also be achieved by passing the costs on to customers, or as an aspect of outsourcing. Risk acceptance does not reduce the risk; it simply means one accepts it. This strategy is usually applied when the cost of the mitigation exceeds the cost of an adverse incident, should such an incident occur. Residual risk is the risk that remains after all countermeasures have been implemented. When all known vulnerabilities are removed, there are still unknown ones. Risk may remain due to incorrect assumptions about system security or trusted personnel. Residual risk must be tracked to prioritize additional security operations, justify the security choices made and determine when IIC:PUB:G4:V1.0:PB:20160926 - 27 -