Title: Software Process Improvement Overview
1OCTAVESM Participants Briefing
- Software Engineering Institute
- Carnegie Mellon University
- Pittsburgh, PA 15213
- Sponsored by the U.S. Department of Defense
2OCTAVESM
- Operationally Critical Threat, Asset, and
Vulnerability EvaluationSM - Operationally Critical threat, Asset, and
Vulnerability Evaluation and OCTAVE are service
marks of Carnegie Mellon University.
3Purpose of Briefing
- To explain the benefits of using the evaluation
- To describe the OCTAVE Method for self-directed
information security risk evaluations - To provide an overview of your roles in the
OCTAVE activities
4Benefits for Your Organization
- Identify information security risks that could
prevent you from achieving your mission. - Learn to manage information security risk
assessments. - Create a protection strategy designed to reduce
your highest priority information security risks. - Position your site for compliance with data
security requirements or regulations.
5Risk Management Regulations
- HIPAA Requirements
- periodic information security risk evaluations
- the organization
- assesses risks to information security
- takes steps to mitigate risks to an acceptable
level - maintains that level of risk
- Gramm-Leach-Bliley financial legislation that
became law in 1999 - assess data security risks
- have plans to address those risks
Health Insurance Portability and Accountability
Act
6Security Approaches
- Vulnerability Management (Reactive)
- Identify and fix vulnerabilities
- Risk Management (Proactive)
- Identify and manage risks
Reactive
Proactive
7Approaches for Evaluating Information Security
Risks
Interaction Required
8OCTAVE Process
Progressive Series of Workshops
Phase 1 OrganizationalView
Phase 3 Strategy and Plan Development
Planning
Phase 2 TechnologicalView
9Workshop Structure
- A team of site personnel facilitates the
workshops. - Contextual expertise is provided by your staff.
- Activities are driven by your staff.
- Decisions are made by your staff.
10Conducting OCTAVE
OCTAVE Process
time
- An interdisciplinary team of your personnel that
- facilitates the process and analyzes data
- business or mission-related staff
- information technology staff
11Phase 1 Workshops
Different views of Critical assets, Areas
of concern, Security requirements, Current
protection strategy practices, Organizational
vulnerabilities
Process 4 Create Threat Profiles
Process 3 (multiple) Identify Staff Knowledge
Consolidated information,Threats to critical
assets
12Phase 2 Workshops
Key components for critical assets
Vulnerabilities for key components
13Phase 3 Workshops
Risks to critical assets
Proposed protection strategy, plans, actions
(strategy review, revision, approval)
Approved protection strategy
14Outputs of OCTAVE
Protection Strategy
Organization
Mitigation Plan
Assets
Near-Term Actions
Action List
15Site Staffing Requirements -1
At least 11 workshops and briefings
- A interdisciplinary analysis team to analyze
information - information technology (IT)
- administrative
- functional
- Cross-section of personnel to participate in
workshops - senior managers
- operational area managers
- staff, including IT
- Additional personnel to assist the analysis team
as needed
2 workshops1 workshop1workshop
16Site Staffing Requirements -2
- All Participants Analysis Team
- Senior Managers Analysis Team
- Operational Area Managers Analysis Team
- Staff Analysis Team
-
- Analysis Team
- Participants Briefing
- Workshop Identify Senior Management Knowledge
- Workshop(s) Identify Operational Area Management
Knowledge - Workshop(s) Identify Staff Knowledge
- Workshop Create Threat Profiles
17Site Staffing Requirements -3
- Workshop Identify Key Components
- Vulnerability Evaluation and Workshop Evaluate
Selected Components - Workshop Conduct Risk Analysis
- Workshop Develop Protection Strategy
- (develop)(review, select, and approve)
- Results Briefing
- Analysis Team Selected IT Staff
- IT Staff Analysis Team
-
- Analysis Team Selected Staff
- Analysis Team Selected StaffSenior Managers
Analysis Team - All Participants Analysis Team
18Rules of Conduct
- Show up for your workshops or sessions on time.
- The analysis team will not attribute anything you
say to you please do the same for those in your
workshops. - Open communication is required for this to
succeed. - Work with the logistics coordinator if there are
any changes in your availability. - Please turn off pagers, beepers, and cell-phones
during the workshops!
19Next Steps
- The schedule
- Hold the first set of workshops
- senior managers
- operational area managers
- staff
- Questions?