Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions

Application risk assessment methodology

Posted on 2013-12-07
Last Modified: 2013-12-22

What's your favourite application risk assessment framework / methodology which takes care of following four points:

1. Risks on application's underlying assets ( servers, firewalls, other infrastructural elements)
2. Logical risks - previleges, role based access controls, SoD etc
3. Compliance - Licensing, CALs
4. Executive dashboard with graphical risk rating across the above 3 categories.

Pls advise!
Question by:fahim
LVL 62

Expert Comment

ID: 39704939
You have to contact Microsoft regarding Licensing

For other parts you can identify improvements with price tag and loss multiplied by the chance of damage to happen... Easy, maybe no need to bugger the managers...
LVL 63

Expert Comment

ID: 39704998
Microsoft had a security compliance manager and MSAT that looks at baseline checks and risk assessment aspect.



Likewise Microsoft has the security lifecycle chain for secure code validation and  assessment on code state. Check out the  threat modelling tool and CAT.NET static code tool


If you will to see it collectively, you would be looking at GRC (governance,  risk and compliance) assessment. Rsa Archer is one candidate that match baseline from nist too. The key is the log  from various log source and questionaire build in to help make a fruitful assessment.

The attack surface analyser and MBSA tool are another few that Microsoft provide as well.

LVL 25

Assisted Solution

madunix earned 200 total points
ID: 39717265
Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.


Author Comment

ID: 39720850
Thanks everyone.

Maybe I didn't communicate the needs properly. I see most of the answers are directing me towards tool that help reaching the final deliverable in various forms.

I am considering the framework of working with on four points I mentioned in my initial query so that I do not leave out any areas un-covered.

Has anyone previously had experience of using a structured methodology for such application risk assessment?
LVL 62

Expert Comment

ID: 39720903
1, is called environmental conditions. All sorts of insurance companies can insure them offering free advice on how to improve.
2. It is called misconfiguration (all the above posts deal with that)
3. Licencing business is to be settled with microsoft. With compliance it is usually understood complicance with law and industry standards, not commercial requirements.
4. There is no telling how environmental conditions may get you.
It may be +50C with thermal shutdown everywhere, or toilet leaking etc - how do you visualize it?No idea, you can describe that 1/10 of days conditioner is broke and 1/30 of days temperature outside us critical, so 1/300 is the chance of them meating and turning into business impact, this is not measurable up or down.
For misconfiguration (wild guess -admin makes mistake every 100 lines of typing) - double check by other person usually brings that to no mistakes...

Next - if you underasses some risk may not be covered enough, if you over-assess your company may pay too much to cover insignificant risk
LVL 63

Accepted Solution

btan earned 300 total points
ID: 39720977
1. Risks on application's underlying assets ( servers, firewalls, other infrastructural elements)
2. Logical risks - previleges, role based access controls, SoD etc

> This is the standard risk assessment approach e.g. risk = threat * vulnerability (qualitative) or risk = asset value * exposure rate (quantitative). ISACA Risk IT framework will be of interest.

3. Compliance - Licensing, CALs

> This is part of GRC assessment, but focusing on compliance, the first thing to note is what is the baseline for the systems - simply what is needed and must have Vs what is provisioned and deployed as of current state. They should be the baseline requirement in your project req during the deisgn and user requirement survey. Licensing has variation such as volume (site based) or client based...but it is really hard to equate licensing to compliance as it is more of project or system requirement.

4. Executive dashboard with graphical risk rating across the above 3 categories.

> That is the GRC dashboard typically. GRC refers to “a capability to reliably achieve objectives (governance & performance) while addressing uncertainty (risk management) and acting with integrity (compliance)”.
I see ValIT framework augmenting and OCEG is a no-profit community taking GRC as primary focus hence they do have rich resource on it

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How do we balance the user experience (UX) with reasonable security measures? It can be done, if you keep these fundamentals in mind.
February 24, 2017 — On February 23, Travis Ormandy, a vulnerability researcher at Google, reported on Twitter (https://twitter.com/taviso/status/834900838837411840) that massive stores of data have been leaked by CloudFlare, a company that provide…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question