An Overview of Risk Management Framework (RMF)

文章推薦指數: 80 %
投票人數:10人

The risk management framework is a six-step process created to engineer the best possible data security processes for institutions. The ... ITServiceManagement ProjectManagement AgileMethodology QualityManagement ITSecurityGovernance DevOps More ProfessionalDevelopment TopTens Search WEBINARS INFOARTICLES Signin Welcome!Logintoyouraccount yourusername yourpassword Forgotyourpassword?Gethelp PrivacyPolicy Passwordrecovery Recoveryourpassword youremail Apasswordwillbee-mailedtoyou. InvensisLearningBlog Advertisement ITServiceManagement ProjectManagement AgileMethodology QualityManagement ITSecurityGovernance DevOps More ProfessionalDevelopment TopTens HomeITSecurityandGovernanceAnOverviewofRiskManagementFramework(RMF) ITSecurityandGovernance Variousinstitutionsacrossindustrieshaverealizedtheimportanceofmanagingorganizationalrisk.Itisconsideredtobeaveryimportantelementinthecompany’ssecuritysystem.69%ofexecutivesarestillnotsureoftheirexistingriskmanagementpoliciesandpractices.Theydonotknowifthepoliciestheyhaveinplacewillbeenoughtomeetfutureneedsinmitigatingrisk. Ariskmanagementframeworkcreatesaneffectivemeanstohelpcompaniesselecttherequiredsecuritycontrolswhicharedeemednecessarytoprotecttheorganization,itsteammembers,aswellasalloperationsandassetsoftheorganization. WhatisRiskManagementFramework? Theriskmanagementframeworkisasix-stepprocesscreatedtoengineerthebestpossibledatasecurityprocessesforinstitutions.Theframeworkalsohelpsinformulatingthebestpracticesandproceduresforthecompanyforriskmanagement. Theframeworkisdesignedtoaccessallthelayersoftheorganization,understandthegoalsofeachproject,andmonitoralloperatingsystemstoidentifyandanalyzeanypossiblerisks.Itisintegratedwithsoftwareintheorganization.Ariskmanagementframeworkisusedtoprovidekeysecurityinformationtobusinessessotheycancreatesuccessfulriskmanagementandmitigationstrategies. Theprocessinvolvessixstepssothatcompaniescancompletealltheprojectstheyundertakeinasecure,compliant,andcost-effectivemannerthroughouttheirlifespan.Itisacost-savingmeasureaswellbecauseriskmanagementplatformsusethedatatheyhavecollectedfrompastprojectstocreatepredictionsandfutureanalysesfortheirprojects.Theseinsightsareextremelyvaluablebecausetheyhelpinavoidingrisksandputtingriskmitigationprocessesbeforehand. The6RiskManagementFramework(RMF)Steps RiskManagementFramework(RMF) Steps Herearethesixstepsinvolvedincreatingariskmanagementframework. Step1:CategorizationofInformationSystem  Beforecreatingaframework,theITsystemgetsassignedasecurityrole.Thisiscreatedbasedontheproject’smissionaswellasthebusinessobjectivesitaimstoachieve.Thisrolehastobeconsistentwiththeorganization’sexistingriskmanagementstrategy. Thisstepcreatesafoundationfortheframeworkanditsdocumentationofallprocessesaswellasitssecurityplan.Theriskmanagementsystemhastofirstcategorizetheinformationsystemaswellasdocumenttheresultsfromitscategorization. Afterthisisdone,oneneedstoputallthespecificdetailsinthesystemsuchasthesystemboundary.Organizationsalsocreateanidentificationofthesystem’ssecurityprofessionals.Administrativedetailsaswellasothertechnicaldetailsarethenadded. Thethirdaspectofthisstepistomakesurethattheriskmanagementframeworkisimplementedacrossallthenecessarydepartmentsintheoffice.Thisisusuallydonewithaprogrammanagementofficetohelpinmonitoringallorganizationalsystems. Step2:SelectionofSecurityControls  62%oforganizationshaveexperiencedwhatcanbecategorizedasacriticalriskeventinthepastthreeyears,accordingtoastudydonein2018.Thismeansthatsecuritycontrolsforanyorganizationhavebecomemoreimportantthanever. Anysecuritycontrolsthatareundertakenforaprojectortheoverallhealthoftheorganizationneedtobeapproved.Thesecontrolsareselectedbyemployeesintheuppermanagementanddevelopmentdepartments.Thecommoncontrolsalsohaveadditionalhybridcontrolsandsystem-specificcontrolsinplacetoimproveperformance.  Thesesecuritycontrolsareallthehardware,software,andtechnicalprocessesthatareconsiderednecessarytofulfillthebasiccompliancerequirementsintheproject.Theseassurancerequirementsarealsoapartoftheriskassessmentstrategy.Thecontrolsneedtobemonitoredregularlyandthemeanstodososhouldbeundertakeninthisstep. Step3:ImplementationofSecurityControls  Thisstepinvolvesimplementingthesecuritycontrolsthathavebeenselectedinthepreviousstep.Oncethesecontrolshavebeenputtouse,theyneedtobemonitoredtounderstandwhetherornottheyhaveachievedtheminimumassuranceandcompliancerequirementsthatwereset.  Thisstepselectsalltherightwaysinwhichtheinformationsystemisbeingusedalongwithallthemethodologiesofsecurityengineering.Implementingtherightsecuritycontrolsfortheorganizationisnecessarytomitigateriskappropriately. Theorganizationswhichexperiencedthecriticalriskeventsawthatthebiggestandthemostsignificantconsequencestheyhadtodealwith(risksthatproducedlargeorsevereimpact)wereinthefollowingcategories: Employeeproductivitywasaffectedby62% Operationalefficiencysuchasdisruptioninsystemsandprocessesandsoonwasat59% Employeesafetywasaffectedby29% Competitivedifferentiationwasreducedby29% Thebrandandreputationoftheorganizationswerehitbyanaverageof28% Thisiswhythesuccessfulimplementationofariskmanagementframeworkisnecessary.Ithelpsmaintaintheoverallhealthoftheorganization,upholdsemployeesafety,andthebrandreputationtothepublic. Step4:AssessmentofSecurityControls  Onceallthesecuritycontrolsareinplaceandtheassuranceandcompliancerequirementshavebeenmet,anindependentassessorisinvitedtotheorganizationtoreviewandapprovethesecontrols.  Thereviewerwilltrytofindanydiscrepanciesinthesecuritycontrols.Incaseanyweaknessesordeficienciesarefound,theorganizationwillremedytheerrorsandthencontinuetodocumentthesecurityplanaccordingly. Step5:AuthorizationofInformationSystem Afteralltheassessmentprocesseshavebeencompleted,theorganizationneedstopresentapackageforauthorizationthatwilltakecareofalltheriskassessmentsandriskdeterminationforthebusiness.Thepersoninchargeofthisprocesswillsubmittheauthorizationdecisiontoallrequiredstakeholders. Step6:MonitoringAllSecurityControls Thefinalstepintheprocessofcreatingariskmanagementframeworkiscontinuous.Theorganizationneedstomonitorallthesecuritycontrolsregularlyandefficiently.Theyalsoneedtokeepalltheupdatesinmindbasedonanychangestothesystemortheenvironment. Thesecuritystatusoftheriskmanagementframeworkneedstobeupdatedregularlyaswell.Thereportsaremadeandsentoutperiodicallytofindoutifanyweaknessesneedtobetakencareof. ChecklistForCreatingaRobustRiskManagementFramework  Thegivenchecklistcanbeusedasastep-by-stepguidethatcomeswithcreatinganeffectiveriskmanagementprogram.Theseareasshouldbeconsideredapriority. Effectiveriskmanagementgovernance Theboardmembersareresponsibleforthematerialimpactofanyrisk,regardlessofwhereitiscaused.Thisiswhyallemployeesandtheboardmembersneedtomonitorhoweffectivethecompany’sriskmanagementprocessis.Theyneedtodosotoensurethatitisimplementedacrossalllevelsanddepartmentsofthecompany. Internalauditorsareusedtoconfirmingthattheboardhasfullknowledgeofthematerialriskstothecompany.Theserisksalsoneedtobedisclosedtoshareholderswithproofthattheyarebeingmitigated. Performancemanagementandgoalmanagement Hereteamleadersneedtodividedifferentcorporateobjectivesandimplementthemintounitcontributions.Afterthisisdone,theyneedtoidentifythedifferentprocessesusedforachievingbusinessgoalsineachdepartmentorproject.Thesegoalsneedtobemadevisibletomanagersthatareinvolvedintheseprocesses.Oncethisisdonethereneedstobealinkformbetweenallthecontributingprocessesandthegoals. Consistentriskidentificationandprioritization Thenextstepisassessingrisks.Theseassessmentsneedtoaddressmorethanjusthigh-impactrisks.Alleffectiveassessmentsdelveintodifferenteventsofrisktodiscovertheirrootcause.Todothiseffectively,theassessmentsneedtoberegularlyconductedandbasedoncommonnumericalscalesacrossdifferentdepartments. Actionablerisktolerances Companiesneedtounderstandtheirriskappetitethentakestepsforcreatingactionablerisktolerance.Thiscanhelpwithcreatingaguideformakingstrategicdecisionstomanagerisks.Risktoleranceactsasatechniquetomonitorperformancegoalsandotherriskmetrics. Centralizedriskmonitoringandcontrolactivities Justcreatingprocessestoidentifyrisksandthenmakingappropriateresponsesforthemisnotenough.Animportantstepthatriskmanagersoftenmissismonitoring.Thisisusedtogaugetheeffectivenessofthecontrolsplacedonmitigatingrisks.Todososuccessfully,thefollowingneedstobeconsidered: Spendlesstimeonrisksthatarelosingtheirimpactbyregularlyadjustingriskassessments  Identifyareaswherecontrolscanbesharedtoincreaseorganizationalefficiencyandreducetesting Prioritizerisksandactivitiesbasedonprocessesthatshouldbemonitored Regularlymonitorvariousbusinessmetricsbylookingfornewandconcerningtrendsthatcouldhaveanimpactontheorganization Forward-lookingriskandgoalreportingandcommunication Boardswillneedsufficientevidenceofthepositiveinfluenceoftheriskmanagementprogramtocontinueputtingresourcesintoitforthecompany.Riskmanagersshouldhaveananswertohowmanyriskswereidentifiedwhichcanbeconcerningtothebusinessobjectivesanddifferenttrendsthatwerespottedthatvalidatetheeffectivenessofaprogram. LeadershipCommitmentToBuildingRisk-ManagementCulture Ariskmanagementframeworkwillonlyworksuccessfullyifitisintegratedintotheorganization’sculture,whichcanonlystartfromthetop.Theriskmanagementframeworkneedstobedesignedandfilteredthroughalldepartmentsandalllevelsoftheorganization.Businessleadersneedtostepintomakethishappenfortheircompany.  Teamleadersandbusinessleadersneedtoworktogethertoaligntheirbusinessobjectiveswithdifferentriskmanagementinitiativesinthecompany.Resourcesneedtobeadequatelyallocatedsothattheriskmanagementstrategycanbeproperlyimplemented,monitored,andimprovedovertime. CreatingAnUnderstandingOfHowRiskManagementFitsWithinAnOrganization Riskmanagementpracticeswillgoonduringthecompany’slifetimeacrossalldepartments.Alotoforganizationsimplementriskmanagementactivitieswithoutcreatingastructuredframeworktosupportandimproveit,whichisnotgoodforthehealthofthecompany.  Riskmanagementprocessesneedtobeusedtopromotebetterdecision-makingacrossthecompanyandalsoidentifyandaddressalltheriskstothecompanybycreatingplanstosupportthesame.Aframeworkactslikeaprocessthatisputinplacetodriveactionandsupportsspreadinginformationaboutriskstoallpartsoftheorganization. Ariskmanagementframeworkisengagingandprovidesthechancefororganizationstoforecastandpreventanycriticaleventsinthefuture.Thebestriskmanagementstrategycomeswithaframeworkthatfitsperfectlywithacompany’sorganizationalinfrastructureandimplementsitselfseamlessly. BuildinganOrganizationalInfrastructurethatsupportsRiskManagementInitiatives Varyingorganizationalrolesandresponsibilitiesneedtobeestablishedforasuccessfulriskmanagementprocess.Theresponsibilityfordecision-makingneedstobeassignedandresourcesneedtobeallocatedtosupportthedifferentriskmanagementinitiativesofthecompany.  Onceallresponsibilitiesareclearlydefined,companiescanshifttheirfocusoncreatingaconsistentprocessacrosstheorganization.Riskmanagementstrategiesshouldalsoinclude enterprise-widetrainingprograms andvariouscross-functionalriskmanagementteams.Wheneveritisnecessary,organizationsshouldalsocalldifferentriskmanagementexpertstoevaluatetheprocessesandmakethemmoreeffective. Conclusion Organizationshavecometorealizethatenterpriseriskmanagementisanongoinganditerativeprocess.Developingandimplementingastrategyjustonceisnotenoughanymore.Theriskstoanycompanycontinuetoevolvebasedonmanychangesintechnology,thephysicalandeconomicclimate,andmore.Thisiswhycompaniesalwaysneedtobepreparedtohandleanyrisksthatmaycome.  Thethreeriskmanagementframeworksarethemostwidelyusedonesbycompaniesacrosstheworld.Toimplementthesestrategies,monitorthem,andimproveuponthemregularlyrequiressomeamountofexpertise.ThisiswhytherearemanyIT Securitycertificationcoursesandtrainingprogramsavailablesothatemployeesatanyorganizationcanbetrainedappropriatelytounderstandandmanagetheriskstotheircompany. COBIT5Assessor CRISC COBIT5Foundation COBIT5Implementation CGEIT RELATEDARTICLESMOREFROMAUTHOR TheEvolutionofCOBIT2019fromCOBIT5 CybersecurityFrameworkTutorial COBIT5FrameworkTutorial LEAVEAREPLYCancelreply Pleaseenteryourcomment! Pleaseenteryournamehere Youhaveenteredanincorrectemailaddress! Pleaseenteryouremailaddresshere Savemyname,email,andwebsiteinthisbrowserforthenexttimeIcomment. Followusforregularupdates 14,647 Likes 419 Followers 34,300 Subscribers 2,170Followers RecentPosts IntroductiontoProjectManagementInformationSystem March2,2022 AllAboutProjectManagement January25,2022 TopBenefitsofTakingVacationsForITProfessionals January11,2022 HowWorkingOvertimeCanAffectYourWorkEfficiency? January11,2022 HowSixSigmaDeliversValuetotheCustomers? January11,2022 SubscribeToUs Subscribetoournewsletterandstayupdated! RelatedArticles AnOverviewofITILServiceLifecycleModules October13,2021 ACompleteOverviewofSupplierManagementinITIL September17,2021 KeyITILConceptsThatOneShouldKnow January4,2021 EverythingtoknowaboutAgileinSoftwareDevelopment August25,2020 ITILContinualServiceImprovementAnd7-StepImprovementProcess June4,2021 POPULARCOURSES ProjectManagementFundamentals PMPCertification CertifiedScrumMaster CertifiedScrumProductOwner AgileScrumMaster ITIL4Foundation LeanSixSigmaGreenBelt DevOpsFoundation CAPMCertification Sitemap POPULARPOSTSedit5PhasesofProjectManagementLifeCycleYouNeedtoKnowAugust26,2019edit7RulesofEffectiveCommunicationwithExamplesJuly13,2015editTheImportanceofProjectManagementAugust2,2019 POPULARCATEGORIESProjectManagement200AgileMethodology109ITServiceManagement101QualityManagement93ITSecurityandGovernance58DevOps51ProfessionalDevelopment23TopTens17 ABOUTUSDisclaimerPMI®,PMP®,CAPM®,PMI-ACP®,PMBOK®andthePMIRegisteredEducationProviderlogoareregisteredmarksoftheProjectManagementInstitute.Inc.ITIL®isaregisteredtrademarkofAXELOSLimited,usedunderpermissionofAXELOSLimitedPRINCE2®isaregisteredtrademarkofAXELOSLimited,usedunderpermissionofAXELOSLimitedPRINCE2Agile®isaregisteredtrademarkofAXELOSLimited,usedunderpermissionofAXELOSLimitedAgileSHIFT®isaregisteredtrademarkofAXELOSLimited,usedunderpermissionofAXELOSLimitedTheSwirllogoTMisatrademarkofAXELOSLimited,usedunderpermissionofAXELOSLimited.AllrightsreservedDevOpsFoundation®isregisterdmarkoftheDevOpsinstituteCOBIT®isatrademarkofISACA®registeredintheUnitedStatesandothercountriesCSM,A-CSM,CSPO,A-CSPO,andCALareregisteredtrademarksofScrumAllianceInvensisLearningisanAccreditedTrainingProviderofEXINforalltheircertificationcoursesandexams ©2021InvensisInc.FOLLOWUS ©2021InvensisInc. Gotomobileversion



請為這篇文章評分?