Data breaches continue to be a significant risk factor that must be considered in your organization’s risk analysis. There were nearly 1,500 reported data breaches in 2019 accounting form more than 160 million sensitive records exposed. A data breach risk Template with sample verbiage is provided to help you analyze, document, and communicate your organization’s risks.
This is the second in a series of articles to cover risk areas (e.g., compliance, breach, availability). If you read the previous article, the Goal and Process sections are identical. The Template section has been updated for the data breach risk.
Goal
Although there are many great resources that can help you complete a risk analysis (such as ISO31000 and NIST), there are limited resources on examples on how to put together your risk report. The template below provides a starting point with verbiage for you to edit for your organization's requirements.
Process
- Determine scope - What data and what data owners are handled by your organization. Please note that even if you do not retain the data, you are still subject to the regulations. See section labelled "Scope: Data Assets".
- Review each sub-risk to uncover your vulnerabilities. Consider the various threat actors See Sub-risks Section for Risk A - Risk F.
- Determine the risk ranking. See Risk Ranking Section.
- Complete the template
Finally, remember to complete risk assessments throughout the year when there is a significant change planned for the technical, physical or administrative environment.
TEMPLATE WITH SAMPLE VERBIAGE
Risk Description
- The
organization is exposed to financial, reputational, business, and legal
consequences due to a confirmed incident in which protected data has been
accessed and/or disclosed in an unauthorized fashion.
- A
significant breach may result in multimillion-dollar fines, greater
regulatory oversight, terminated carrier contracts, loss of consumer
confidence, brand erosion, reduced revenue, a shift in focus from business
growth to remediation.
- A breach that
is caused by a lack of basic security controls would only exacerbate these
poor outcomes.
Context
- Highlight the most egregious risks found during your analysis
- Provide statistics and illustrations of challenges your organization faced throughout the year. For example, compared to last year there was an x% increase in accidental forward of data to the wrong entity.
- Add case studies from other organizations in your space that experienced a data breach that caused significant impact. For example: Company Z was breached and lost x records. The root cause was xxxxx, which is a security capability that is not mature at our organization.
Risk Ranking
- Likelihood - Low, Medium, High. Select one.
- Typically compliance risks vary where some are more likely such as inconsistent use of controls and less likely that there are no policies. Provide examples of different likelhood events.
- Impact - Low, Medium, high. Select one.
An example of a lower impact incident is: If an employee inadvertently emails protected data to the wrong customer or business. Although this incident is lower impact, it is not inconsequential:
- Most business partners require reporting of such incidents. This will likely lead to in-depth review of the organization's cyber and privacy program.
- Sometimes the customer who received data inappropriately will report the event to the government or social media.
- Most business partners require reporting of such incidents. This will likely lead to in-depth review of the organization's cyber and privacy program.
Threat Actors
The
threat actors to consider are listed below.
T1. Unaware insider including BPO
T2. Malicious insider including BPO
T3. Cybercriminal
T4. Property thief
T5. Industry spy
T6. Nation state
Sub-Risks
Examples:
- Moving of data to less secure zone given the data's categorization including inappropriate use of personal accounts is likely since poor access controls and no DLP.
- Forwarding data to the wrong recipient is likely when poor manual procedures exist.
- A configuration or other human error where data is posted without authentication controls. Department shared drives often have poor access controls.
Sub-Risk B. Viewing data when not necessary for job role or current activity
Examples:
- Employees look up records of family and friends.
- Production data is used in non-production environments.
Sub-Risk C. Stolen electronic data
Examples:
- Limited deployment of basic security controls.
Sub-Risk D. Stolen / lost portable devices containing electronic data
Examples:
- Laptop is stolen from employee’s vehicle that was not properly encrypted
- Disposal of decommissioned hardware does not follow required standards.
Sub-Risk E. Stolen / lost paper documents
Examples:
- Paper documents are not recycled securely
- Paper documents are left unsecured on desk or file cabinet.
Sub-Risk F. Accidental leakage of verbal conversations
Examples:
- A malicious roommate of a remote employee overhears credit card information and uses it to commit fraud
- A malicious employee (without a need to know) overhears a conversation and protected data
Scope: Data Assets
The asset list below covers typical assets handled by organizations. Delete those not applicable to your organization. See Risk Template: Compliance post for more details about regulations referenced below; specifically types of data and organizations covered.
Asset 1: High value client data e.g., SSN, Medicare, credit card, other financial account data, other government ID
Regulations: Basic state breach regulations. GDPR, NY Cyber, NAIC states, CCPA.
If credit card data, then PCI.
Asset 2: Employee / contractor tax data
Regulations: Basic state breach regulations. GDPR, NY Cyber, NAIC states,
Asset 3: Client health data
Regulations: HIPAA/HITECH for health providers and insurers, GDPR, NY Cyber, NAIC states, CCPA
Asset 4: 3rd party marketing data
Regulations: GDPR, NY Cyber, NAIC states, CCPA, Business partners who provided contractual agreements
Asset 5: Other personal data
Regulations: GDPR, NY Cyber, CCPA, business partners
Asset 6: Contract details
Regulations: Business Partners
Asset 7: Material nonpublic information that could be used to inform stock trades.
Regulations: U.S. Security and Exchange Commission Rules
No comments:
Post a Comment