ISMS Policies

Risk Management Procedure

1. Objective

To ensure proper risk assessment is carried out for all the Information and information processing assets at Integra. The procedure outlines the steps to be taken for conducting and assessing the risks associated with various assets including but not limited to process, equipment or people assets of Integra and provides a framework for mitigating them.

2. Scope

This is applicable to all Information covering risk identification, planning, and mitigation & tracking assets across the organization at Integra.

3. Reference

Standards: ISO 27001:2022 Information Security Management System

4. Definition

To identify all the elements of ISMS of Integra that has a business impact. At this point of time, the following elements (classification of information assets) have been identified as critical.

To define a risk assessment methodology for Integra and criteria for risk acceptance and acceptable level of risks based on applying appropriate business information security through appropriate selection of controls of ISO 27001:2022 international standards for ISMS and in line with Integra ISMS policies.

5. General Principles

5.1 Overview

Integra has performed a risk assessment exercise to ensure that the information security risks faced are comprehensively identified and to adopt appropriate risk management strategies for mitigation. This risk assessment shall consider business impact and consequences that may arise owing to loss of confidentiality, integrity and availability of information or information processing facilities.

The risk assessment shall consider the organization’s assets, viz., IT hardware and software, information on paper or in electronic format, personnel, office equipment’s, communication and utility services, etc.; the applicable threats to these assets and vulnerabilities that could be exploited to compromise these assets.

5.2 Risk Assessment

Risk assessment involves the following steps

  • Organization Context
    •  Please refer to ISMS Manual regarding the organization context including responsibilities of internal and external parties
  • Define process interaction chart
    • Risk management is part of the responsibilities of management and an integral part of all organization processes, including strategic planning and all project and change management processes.
    • The organization process should be declared in state of workflow / interaction chart that explains the details of activity performed to execute organization objectives. Context of the organization should be clearly drafted into workflow.
    • The interaction chart can be prepared separately for each business processes and its deliverables for effective evaluation of risk assessment.
  • Identification of assets within the scope of ISMS and the owners / custodians / users of these assets, both internal and external people, process, and assets.
    • Integra will prepare department-wise asset inventory. It will designate groups of assets, which act together to provide a particular function as ‘services.’ The service owner will be responsible for the delivery of the service, including the functioning of the assets, which it provides.
  • Identify the value of grouped asset taking into account the loss of confidentiality, loss of integrity, and loss of availability.
  • Identification of threats for each grouped asset
  • Listing down existing preventive measures in place to counter the identified threat.
  • Identification of vulnerabilities that can be exploited by the identified threat.
  • Establish a factor of the probability of occurrence that the vulnerability can be exploited by the identified threat.
  • Assess the business impact upon the organization that might result should this probability occur, taking into account the consequences of a loss of confidentiality, integrity or availability of the asset.
  • Arrive at a risk value which will take into account the asset’s value, the probability of occurrence that the vulnerability is exploited, and business impact should this threat materialize.
  • Assess the realistic likelihood of security failure by identifying the chance of detection.
  • Calculate risk priority number to estimate risk level based on risk value and chance of detection. The risk priority number can help determine whether the risks are acceptable or require treatment using the criteria for accepting risks established.
  • Preparation of risk treatment plan.
  • Identify the proposed residual risks that will be left once the planned risk treatment is implemented.

5.3 Risk Assessment Frequency and Triggers

A routine risk assessment shall be performed on an annual basis covering Integra as a whole.

Non-routine risk assessments shall also be performed based on the following trigger events:

  • Addition of new equipment, servers and applications.
  • Major changes to operations and its associated applications or network and security architecture.
  • Additions / emergence of new threats or vulnerabilities due to changes in the environment.
  • Change in third party access to Integra information and/or premises.
  • The scope of non-routine risk assessments would be specific to cover potential risks that may arise due to the trigger event. Use of vulnerability assessment tool is recommended for all IT infrastructure operations.

5.4 Building the Asset Inventory with Asset Values

a) Asset Identification

All assets in Integra will be identified for every department.

Assets will include information on paper, information in electronic media, devices that generate /hold / process / transmit information, and people information.

Assets will be designated at a grouped level that acts together to provide a particular function or serve similar utility. All ass ets will be listed in the “Asset Inventory,” identified with an asset identifier, location where available, its owner, custodian and its users.

b) Asset Categorization

Following guideline is adopted for categorizing / identifying the asset’s type / categorization for grouping similar assets:

  • Information: Databases and data files, contracts and agreements, system documentation, research information, user manuals, training material, operational or support procedures, business continuity and disaster recovery plans, fallback arrangements, audit trails and logs, and archived information.
  • Software: Application software, operating system software, development tools and utilities.
  • Physical/Hardware: Computer equipment, communication equipment and devices, removable media, data cables, power cables.
  • Services/Application: Computing and communication services, general utilities such as air conditioning, lighting, heating, power, etc.
  • People: Skills, qualification and experience
  • Intangibles: Company reputation, recognition & organizational image.
  • External Processes: Outsourced process of the company such as transportation, housekeeping, background verification, etc.
  • External People: People or resource who are not on the rolls of the company but managed by third party to whom process is outsourced such as contract personnel, outsourced vendor employees deployed at the facility, etc.
  • External Assets: Computing and communication services, general utilities such as Rented Laptops/Servers, Vendor assets located at the facility.

c) Valuing the Assets

Following are the parameters considered for an asset’s valuation:

  • Confidentiality, i.e., how confidential is the information required, loss of which can lead to financial or non-financial impact.
  • Integrity, i.e., how accurate or correct is the information required, loss of which can lead to a financial or non-financial impact.
  • Availability, i.e., importance of it being available when required, loss of which can lead to a financial or non-financial impact.

Confidentiality: The property that information is not made available or disclosed to unauthorized individuals, entities, or processes.

Integrity: The property of safeguarding the accuracy and completeness of assets.

Availability: The property of being accessible and usable upon demand by an authorized entity.

For computing the asset value, all the elements of the 3 parameters need to be taken into account, by giving some form of equal weightage.

                                       Value of (C + I + A)

Hence, Asset Value = ------------------------------- rounded off to nearest 0.

                                                      3

The minimum value an asset can have is 1 and maximum asset value will be 3.

5.5 Risk Assessment and Risk Treatment Process

a) Identifying the “Threats”

The first step in carrying out a risk assessment is to identify the applicable threats to the asset. These will be the inherent risk that the asset will possess. The threat identification shall depend on the asset’s inherent physical property, its location within the facility, the operations where it is used in Integra, its dependence on technology and maybe other external factors.

b)Identifying the “Existing Preventive Measures”

Against each identified threat, there may be one or more preventive measures that are in place to counter the envisaged threat.

The existing preventive measures will demonstrate the extent of controls that is currently in place and help in realistically viewing the other vulnerabilities that the threat can exploit.

These existing preventive measures are basically the ISMS Controls that are in place.

c) Identifying the “Vulnerabilities”

Vulnerabilities are the weaknesses that could be exploited by a threat leading to a compromise of confidentiality, integrity and/or availability of an asset. Vulnerabilities are a factor of applicable threats and the existing controls in place to protect the asset. As part of this phase, existing and planned security controls should be identified to ensure that vulnerability assessment and risk treatment consider the current and planned controls.

d) The “Probability of Occurrence”

Determine the possibility of the weakness that can be exploited by a threat. Following probability

considerations may be given:

  • Threat Frequency: How often the threat may occur, based on statistics and experience.
  • Measure of deliberate threats: Motivation, capabilities perceived and necessary, resources available to possible attackers and the perception of attractiveness and vulnerability of the assets for the possible attacker.
  • Measure of accidental threats: Geographical location of the premises and factors that could influence human errors and equipment malfunctions.

e) Identify the “Impact”

Determine the extent of damage that can happen should the threat materialize. The impact could

be on (but not limited to):

  1. Resources, productivity, safety & health
  2. Business operation, loss of business opportunity / customer
  3. Company reputation / image, customer confidence
  4. Financial, fines & legal penalties

The higher the impact, the more concern it may be for the business managers.

f) The “Risk Value”

Risk is a function of asset’s value, the value of probability and the value of impact. Following algorithm will be applied to arrive at the measure of risk, viz,

Risk Value = Asset Value x Probability of Occurrence x Impact

The resulting risk value will be in a range of 1 as lowest and 27 as highest

Establish the “Chance of Detection”

Risks, particularly the high risks, need to be controlled. But every risk treatment needs to be balanced with a cost factor. Before the business managers embark on considering risks for treatment, the possibility of risk materializing and the ease of getting detected need to be considered, in order to prioritize the risk treatment.

Risk Priority Number (RPN)

This is an indicator for prioritization/ranking of risks that takes into account the risk value and its chance of detection. i.e.

RPN = Risk Value x Chance of Detection 

In this risk assessment, the range of RPN is from 1 to 80. The range is exponential,

emphasizing the higher risks.

g) Determining Risk Treatment

Risks to an asset can be treated in one of the three ways:

  • Mitigate – by applying controls to reduce risks
  • Avoid – by not allowing actions that would cause risks to occur
  • Transfer – by shifting the liability of loss to other parties, e.g., insurer, supplier

Where none of the above can be applied, i.e., risks cannot be mitigated or avoided or transferred, or where the costs involved in treating the risk is higher than the asset’s business value, such risks shall be knowingly accepted, provided they clearly satisfy the organization’s procedure and criteria for risk acceptance.

Risk treatment procedures may follow the matrix described in Table-A below that represents a general guideline for risk treatment only. Business management should take appropriate decisions on risk treatment and/or risk acceptance

Table-A: Matrix for determining period for Risk Treatment / Mitigation

h)Preparing the Risk Treatment Plan

Information gathered during the risk assessment and the associated plan for risk treatment measures should be used as input in deciding Integra’s security strategy. A formal risk treatment plan should be prepared based on the priority of risks.

Following should be considered when preparing a risk treatment plan:

  • RTP Number: A unique risk treatment plan number for reference purposes
  • Risk Mitigation / Treatment Plan: what action should be done to mitigate or treat the identified risk? There may be one or more treatment / mitigation action to each RTP Number.
  • Proposed Date of Completion: A tentative indicator by when the actions identified for risk mitigation / treatment should get completed. The maximum proposed date will be as per matrix defined in Table-A as per RPN value. However, there could be some quick-win actions that can have proposed dates much before the maximum tolerable period proposed by the matrix.
  • Apply Controls: determine the ISO 27001:2022 control/s that will be applicable to the identified action plan for mitigating / treating the risk.
  • Responsibility: identify who will have ownership to ensure timely action taken.

i) Residual Risk

After the risk treatment plan (RTP) is prepared, the residual risk is calculated. This is to determine the risk that will remain when the RTP will be done and will require a management approval prior to initiate implementing.

In order to compute the Residual Risk value, the new values after RTP for Probability, Impact, and Chance of Detection need to be determined.

Steps for computing residual risk:

  1. New Risk Value = Asset Value x New Probability of Occurrence Value x New Impact Value
  2. Residual Risk = New Risk Value x New Chance of Detection Value
  1. In case the value of residual risk exceeds the acceptable risk levels after RTP implemented, the same may be taken up in subsequent risk assessment with management’s approval. Such decisions may be put up as a remark.

j) Risk Acceptable Criteria:

As per management guidance, risk acceptable limit shall be RPN 1 to 80. Such risk shall not require having initial treatment. However, due to implementation of best practices, initial control can be implemented. All other risk falls above RPN 20 shall be treated with appropriate mitigation controls.

There are few risks which are not having initial / final treatment to reduce risk under acceptable limit. In such case, management shall review the actual risk and its possible mitigation plan to be implemented. If no such mitigation plans available, management has rights to accept on it.