What is cybersecurity risk management?
Cybersecurity risk management is the process of identifying, analyzing, prioritizing, and mitigating potential risks to an organization’s information systems and data. An important part of cybersecurity risk management is continuously monitoring the status of known risks and identifying and categorizing new risks.
Cybersecurity risk management covers a wide range of threats, including:
- Cybercriminal syndicates
- Business continuity disruption
- Data leaks
- Human error
- Loss of data
- Malicious insiders
- Nation-state sponsored attacks
- Natural disasters
- Privileged insiders
- Storage misconfiguration
- Third-party vendor vulnerabilities
- Users who accidentally download malware or fall for a social engineering scheme (e.g., phishing)
Cybersecurity risk management is primarily conducted through risk assessments that consider variables and assign risk scores, ranking them from high to low. Organizations have varying tolerance for risk; decisions about how to handle different levels of risk are based on the organization’s risk appetite.
Often simply considered a compliance requirement, cybersecurity risk management improves overall security and enables cyber resilience. It also facilitates the monitoring and measurement of an organization’s security posture, helping to identify vulnerabilities. Ultimately, a cybersecurity risk management strategy helps organizations cost-effectively and efficiently manage uncertainty.
The cybersecurity risk management process
Organizations typically follow five steps in the cybersecurity risk management process. Although specifics vary, these five cybersecurity risk management steps are applicable to most organizations.
- Create an asset inventory
An effective cybersecurity risk management program requires that organizations have a complete inventory of cyber assets that must be protected. This includes all the applications, services, and devices that are business-critical and that support mission-critical processes.
- Identify threats and vulnerabilities
After identifying digital assets, the next step is to understand the threats and vulnerabilities related to them. Once the asset inventory has been completed, the risks facing each asset need to be cataloged. This can include everything from viruses and hacks to lax policies and unpatched solutions. The objective is to understand security vulnerabilities and the threats that might exploit them.
- Conduct a risk analysis
As part of this step, every asset (e.g., software, laptop, server, point-of-sale machine, mobile device) is evaluated and assigned a risk level. This risk score is based on its exposure to risk, the likelihood of being targeted, and the impact of an incident that targets a particular asset. This is a key part of cybersecurity risk management, as this risk score will direct how the asset is handled.
- Control risks
Identifying solutions to support the cybersecurity risk management program includes defining processes and technologies to eliminate or mitigate the risks. Steps that can help assess solutions include:
Find security tools and best practices to address the root causes of risks.
Determine what unavoidable risks can be tolerated if they fall into established risk acceptance criteria.
Avoid risk completely by eliminating or changing the activities and systems and updating affected processes to perform without them.
Minimize risks by spreading them across other parties, such as purchasing insurance policies or outsourcing high-risk functions or systems.
- Review controls
A successful cybersecurity risk management program depends on the effective implementation of solutions to monitor progress and efficacy continuously.
Developing a plan for cybersecurity risk management
Effectively executing cybersecurity risk management requires all functions to operate with clearly defined roles and specific responsibilities that are well-documented. Key components of a cybersecurity risk management plan include the following.
Identify cybersecurity risks
To identify risk, the enterprise begins by understanding the threats, vulnerabilities, and adverse results that occur if they are exploited. Finding signs of threats and vulnerabilities helps identify specific risks and allows security teams to take proactive action.
Many organizations use security assessments to identify risks and guide their cybersecurity risk management activities.
Create a repeatable risk assessment process
Cybersecurity risk management requires understanding, managing, controlling, and mitigating potential threats. A repeatable process is absolutely necessary. Questions to consider when creating a process for cybersecurity risk management include:
- Are there any priorities or constraints that could impact the cybersecurity risk management program?
- How and where is data stored?
- How is data accessed internally and externally by people and machines?
- How long is data stored?
- What data is collected?
- What is the scope of the cybersecurity risk management program?
- What risk model will be used for risk analysis?
- What systems are used for data protection?
- Who is ultimately responsible for the cybersecurity risk management program?
Define the cybersecurity risk management strategy
Elements to include when defining a cybersecurity risk management strategy are:
- Mapping should be used to discover all assets and understand the scale and scope of the attack surface. This map is also used to direct monitoring activities.
- Monitoring tracks all activity across assets to detect usual behavior that could be an indicator of a potential threat. Data collected as part of monitoring should be used to translate identified threats into targeted responses.
- Mitigation should include automated actions to neutralize and eliminate identified threats. Mitigation efforts related to cybersecurity risk management should be integrated with other security initiatives.
- Management processes should be in place to ensure smooth and efficient operations as well as direct the collection and analysis of cybersecurity risk management data.
Cybersecurity risk management frameworks
These cybersecurity risk management frameworks were developed by standards bodies and government agencies. They provide guidance on how to identify and follow up on risks.
The ISO/IEC 27001:2013 was created by the International Organization for Standardization (ISO) in partnership with the International Electrotechnical Commission (IEC). It provides guidance for cybersecurity risk management related to information systems.
Highlights of the ISO/IEC 27001:2013 framework include:
- Establishing and maintaining information security risk criteria
- Ensuring that repeated risk assessments produce “consistent, valid, and comparable results”
- Identifying risks associated with the loss of confidentiality, integrity, and availability of information within the scope of the information security management system
- Identifying the owners of identified risks
- Analyzing and evaluating information security risks according to the established criteria
NIST Cybersecurity Framework Version 2.0
The National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) provides a comprehensive set of best practices that can be used to standardize cybersecurity risk management. It includes recommended security actions across five critical security functions. The five foundational elements are:
- Identify—Find and assess cybersecurity risks to systems, assets, data, and resources.
- Protect—Evaluate existing cybersecurity procedures and processes to ensure adequate protection for the organization’s assets.
- Detect—The Detect element defines, develops, and implements the appropriate cybersecurity activities to identify threats and vulnerabilities quickly.
- Respond—This element guides an organization’s assessment of its plan to respond to a cyberattack or identify a threat.
- Recover—The Recover element helps organizations evaluate their cybersecurity policies to ensure they have plans to recover and repair the damage caused by a cyberattack.
Center for Internet Security (CIS) Version 8 Controls
CIS Controls are actions that facilitate cybersecurity risk management. The CIS provides specific, actionable tactics for cybersecurity risk management, such as:
- Inventory and control of enterprise assets and software
- Data protection
- Secure configuration of enterprise assets and software
- Account management
- Access control management
- Continuous vulnerability management
- Audit log management
- Email and web browser protections
- Malware defenses
- Data backup and recovery
- Network infrastructure management
- Network monitoring and defense
- Security awareness and skills training
- Service provider management
- Application software security
- Response management
- Penetration testing
National Cyber Security Centre (NCSC)
The NCSC includes ten steps that support cybersecurity risk management initiatives:
- Risk management
- Engagement and training
- Asset management
- Architecture and configuration
- Vulnerability management
- Identity and access management
- Data security
- Logging and monitoring
- Incident management
- Supply chain security
PCI DSS (Payment Card Industry Data Security Standard)
PCI DSS is used by organizations that accept card payments; it provides guidelines that can be applied to cybersecurity risk management. PCI DSS is comprised of 12 requirements:
- Install and maintain a firewall configuration to protect cardholder data.
- Do not use vendor-supplied defaults for system passwords and other security parameters.
- Protect stored cardholder data.
- Encrypt transmission of cardholder data across open, public networks.
- Use and regularly update anti-virus software or programs.
- Develop and maintain secure systems and applications.
- Restrict access to cardholder data by business need-to-know.
- Assign a unique ID to each person with computer access.
- Restrict physical access to cardholder data.
- Track and monitor all access to network resources and cardholder data.
- Regularly test security systems and processes.
- Maintain a policy that addresses information security for all personnel.
Department of Defense (DoD) Risk Management Framework (DoD RMF)
The DoD RMF provides guidelines that DoD agencies use for cybersecurity risk management. DoD RMF identifies five key categories:
- Risk assessment and measurement
- Risk governance
- Risk identification
- Risk mitigation
- Risk monitoring and reporting
The DoD RMF also provides six steps for cybersecurity risk management:
- Categorize information systems.
- Select security controls.
- Implement security controls.
- Assess security controls.
- Authorize information systems.
- Monitor security controls.
Factor Analysis of Information Risk (FAIR) Framework
The FAIR framework helps organizations measure, analyze, and understand information risks. This supports cybersecurity risk management by detailing steps that are broken into four groups:
- Stage 1—identify the scope of the cybersecurity risk management program (i.e., what assets are potentially at risk)
- Stage 2—assess the frequency of potential losses and threats
- Stage 3—estimate the probable loss
- Stage 4—identify and articulate the risks
Cybersecurity risk management best practices
- Build a cybersecurity risk management culture.
- Emphasize speed when risk is identified to minimize the potential impact of vulnerabilities.
- Employ the 3-2-1 rule for backups (i.e., have at least three copies of data stored; store two of them on different media, and store one of them offsite).
- Ensure every employee is aware of potential risks, particularly social engineering attacks, by conducting regular training.
- Facilitate remediation using cybersecurity risk information, such as trends over time, potential impact, the likelihood of an incident, and when the risk may materialize (i.e., short-term, medium-term, long-term).
- Implement a cybersecurity framework, such as the NIST Cybersecurity Framework or ISO/IEC 27001:2013.
- Incorporate cybersecurity into the enterprise risk management program.
- Keep systems and software updated and install patches regularly.
- Meet compliance requirements by including third parties, fourth parties, and vendors in cybersecurity risk management.
- Perform continuous, adaptive, and actionable risk assessments.
- Reduce attack surfaces (e.g., physical attack surface, digital attack surfaces, social engineering attack surface).
- Require strong passwords, following these established guidelines:
- Passwords should contain at least 8 characters and include alphanumeric characters.
- Passwords should not contain any personal information.
- Passwords should be unique and never used before.
- Passwords should not have any correctly spelled words.
- Share information about cybersecurity risks about which the organization is worried.
- Use encryption to protect data and backups.
Benefits of cybersecurity risk management
Many benefits accompany the implementation of a cybersecurity risk management program, including:
- Enhancing IT support
- Improving visibility
- Increasing employees’ awareness about the importance of security
- Making more informed decisions that take cybersecurity into account
- Meet compliance requirements
- Prevent revenue loss due to downtime and operational disruptions
- Proactively protect systems and data
- Protect and maintain business reputation
- Provide ongoing monitoring, identification, and mitigation of pervasive threats
- Reduce vulnerabilities
Effective cybersecurity risk management
In the digital age, there is no time to rest when it comes to risk. Threats abound and are perpetually changing to elude security systems.
An effective cybersecurity risk management program must run continuously. Even when changes are required, systems and processes must continue running while the program is updated to address evolving threats.
Cybersecurity risk management is challenging, but worth the effort. It keeps organizations at least one step ahead of adversaries and accidents and provides many other benefits; beyond security improvements, organizations that invest in cybersecurity risk management see operational and financial benefits.
You might also be interested in:
Take control of your cloud platform.
Learn more about SailPoint Identity Security.