Solved

Application risk assessment methodology

Posted on 2013-12-07
6
504 Views
Last Modified: 2013-12-22
Hi

What's your favourite application risk assessment framework / methodology which takes care of following four points:

1. Risks on application's underlying assets ( servers, firewalls, other infrastructural elements)
2. Logical risks - previleges, role based access controls, SoD etc
3. Compliance - Licensing, CALs
4. Executive dashboard with graphical risk rating across the above 3 categories.

Pls advise!
0
Comment
Question by:fahim
6 Comments
 
LVL 62

Expert Comment

by:gheist
ID: 39704939
You have to contact Microsoft regarding Licensing

For other parts you can identify improvements with price tag and loss multiplied by the chance of damage to happen... Easy, maybe no need to bugger the managers...
0
 
LVL 62

Expert Comment

by:btan
ID: 39704998
Microsoft had a security compliance manager and MSAT that looks at baseline checks and risk assessment aspect.

http://technet.microsoft.com/en-us/library/cc677002.aspx

http://www.microsoft.com/en-us/download/details.aspx?id=12273

Likewise Microsoft has the security lifecycle chain for secure code validation and  assessment on code state. Check out the  threat modelling tool and CAT.NET static code tool

http://www.microsoft.com/security/sdl/default.aspx

If you will to see it collectively, you would be looking at GRC (governance,  risk and compliance) assessment. Rsa Archer is one candidate that match baseline from nist too. The key is the log  from various log source and questionaire build in to help make a fruitful assessment.

The attack surface analyser and MBSA tool are another few that Microsoft provide as well.

http://www.microsoft.com/en-us/download/details.aspx?id=24487
0
 
LVL 25

Assisted Solution

by:madunix
madunix earned 200 total points
ID: 39717265
0
Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

 

Author Comment

by:fahim
ID: 39720850
Thanks everyone.

Maybe I didn't communicate the needs properly. I see most of the answers are directing me towards tool that help reaching the final deliverable in various forms.

I am considering the framework of working with on four points I mentioned in my initial query so that I do not leave out any areas un-covered.

Has anyone previously had experience of using a structured methodology for such application risk assessment?
0
 
LVL 62

Expert Comment

by:gheist
ID: 39720903
1, is called environmental conditions. All sorts of insurance companies can insure them offering free advice on how to improve.
2. It is called misconfiguration (all the above posts deal with that)
3. Licencing business is to be settled with microsoft. With compliance it is usually understood complicance with law and industry standards, not commercial requirements.
4. There is no telling how environmental conditions may get you.
It may be +50C with thermal shutdown everywhere, or toilet leaking etc - how do you visualize it?No idea, you can describe that 1/10 of days conditioner is broke and 1/30 of days temperature outside us critical, so 1/300 is the chance of them meating and turning into business impact, this is not measurable up or down.
For misconfiguration (wild guess -admin makes mistake every 100 lines of typing) - double check by other person usually brings that to no mistakes...

Next - if you underasses some risk may not be covered enough, if you over-assess your company may pay too much to cover insignificant risk
0
 
LVL 62

Accepted Solution

by:
btan earned 300 total points
ID: 39720977
1. Risks on application's underlying assets ( servers, firewalls, other infrastructural elements)
2. Logical risks - previleges, role based access controls, SoD etc

> This is the standard risk assessment approach e.g. risk = threat * vulnerability (qualitative) or risk = asset value * exposure rate (quantitative). ISACA Risk IT framework will be of interest.
http://www.isaca.org/Knowledge-Center/Research/ResearchDeliverables/Pages/The-Risk-IT-Framework.aspx 

3. Compliance - Licensing, CALs

> This is part of GRC assessment, but focusing on compliance, the first thing to note is what is the baseline for the systems - simply what is needed and must have Vs what is provisioned and deployed as of current state. They should be the baseline requirement in your project req during the deisgn and user requirement survey. Licensing has variation such as volume (site based) or client based...but it is really hard to equate licensing to compliance as it is more of project or system requirement.

4. Executive dashboard with graphical risk rating across the above 3 categories.

> That is the GRC dashboard typically. GRC refers to “a capability to reliably achieve objectives (governance & performance) while addressing uncertainty (risk management) and acting with integrity (compliance)”.
I see ValIT framework augmenting and OCEG is a no-profit community taking GRC as primary focus hence they do have rich resource on it
http://www.isaca.org/Knowledge-Center/Val-IT-IT-Value-Delivery-/Pages/Val-IT1.aspx
http://www.oceg.org/resource-collections/
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The 21st century solution to antiquated pagers.
As a business owner, there are many things that keep you up at night. Profit margins, employee retention, human resource protocols, whether your product or service will remain competitive. When you own or manage a technology company that operates la…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question