ROI der IT-Sicherheit

New Qualitative Model Helps Measure Security Risk Reduction

Von Phebe Waterfield

Step 2: Identify controls

List the controls that you have used to mitigate the risks identified in Step 1.

A control is any action you have taken to prevent risks. This includes policies, procedures and technical controls. These are the controls for our small network example:

This network has three primary controls for ensuring integrity and availability (firewalls, anti-virus and network access control), and three primary controls for maintaining confidentiality and accountability (encryption, application access control and policy).

Step 3: Identify vulnerabilities

List the vulnerabilities of the current controls. A vulnerability is anything that reduces the effectiveness of a control or otherwise increases the likelihood of the risks occurring. Vulnerability can result from controls that are not configured correctly, controls that cannot be verified as effective, and missing controls.

In our example, these vulnerabilities underscore real-world problems with controls, such as:

Zur Startseite