SPRING DISCOUNT
Get 30% off on toolkits, course exams, and Conformio yearly plans.
Limited-time offer – ends April 25, 2024
Use promo code:
SPRING30

Expert Advice Community

Guest

Analyzing threats

  Quote
Guest
Guest user Created:   Feb 29, 2016 Last commented:   Feb 29, 2016

Analyzing threats

I wanted to ask you about something that had made the risk assessment process a bit hard. The problem is that sometimes I am not totally clear as far as when to stop analyzing threats for a given asset. As an example of the problem, let's say I have a web based application that is hosted in a physical server. When I brainstorm on the web application threats, sometimes I feel that I cross the line and think about server issues - e.g. (a) physical server crash, (b) non-authorized access to the web server software (l mean to the Apache or IIS server software). Should e.g.'s (a) and (b) above be handled as part of the server threats and not the web application? Should the threats to the web application be limited to web application threats such as denial of service, elevation of privilege, sql injection and the like?
0 0

Assign topic to the user

ISO 27001 DOCUMENTATION TOOLKIT

Step-by-step implementation for smaller companies.

ISO 27001 DOCUMENTATION TOOLKIT

Step-by-step implementation for smaller companies.

Guest
Antonio Jose Segovia Feb 29, 2016

Answer:
From my point of view, in your case there are 3 different assets: the web application (asset of type software), the physical server (asset of type hardware), and the information that has the web application (asset of type information).

The threat (a) that you have identified is related to the asset physical server, and the threat (b) is related to web application, and there are others threats related to the web application like denial of service, elevation of privilege, SQL injection, etc. But the other assets also have more threats, that you need to identify.

So, the classification of assets is very important to identify each threat to each asset, this article can help you to identify assets based on a classification “How to handle Asset register (Asset inventory) according to ISO 27001” : https://advisera.com/27001academy/knowledgebase/how-to-handle-asset-register-asset-inventory-according-to-iso-27001/

And for the identification of threats for each assets, you simply need a catalogue of threats/vulnerabilities, so this article can be also interesting for you “Catalogue of threats & vulnerabilities” : https://advisera.com/27001academy/knowledgebase/threats-vulnerabilities/

And this article about how to match assets, threats and vulnerabilities can be also interesting for you “ISO 27001 risk assessment: How to match assets, threats and vulnerabilities” : https://advisera.com/27001academy/knowledgebase/iso-27001-risk-assessment-how-to-match-assets-threats-and-vulnerabilities/

Finally, in our online course you can also find more information about the identification of assets and threats “ISO 27001:2013 Foundations Course” : https://advisera.com/training/iso-27001-foundations-course/

Quote
0 0
Guest
remedina Feb 29, 2016

I am happy and appreciate that you have posted my question. Your response provides a structured approach to risk assessment process. I have pretty much followed that approach so far, thanks to having used your products and trainings. My fundamental doubt, however, remains a bit unclear. Let me re-establish my doubt using an example on your article titled: "How to match assets, threats and vulnerabilities" On that article, for the asset of Digital Information, the following threat and vulnerability had been identified - threat: disk failure; vulnerability: there is no backup of the document. I would had identified that threat as well, but my doubts are: a) Shouldn't that threat be listed under the physical server asset? (that is what I called "crossing the line" on my original questions; (b) Is it ok to have that threat be listed under two different assets?

Keep up the good work you guys do!

Regards,

Ricardo

Quote
0 0
Expert
Dejan Kosutic Mar 01, 2016

Ricardo, ISO 27001 does not prescribe how you should combine assets, threats and vulnerabilities, which means you have to use a system that makes most sense for your situation.

In my view, if there are little risks related to a particular server, then you can view the server as a single asset where hardware, software and data are combined; if there are numerous risks that are related to this server, in such case you can view separately those three assets.

Quote
0 0

Comment as guest or Sign in

HTML tags are not allowed

Feb 29, 2016

Feb 29, 2016

Suggested Topics