Material Weakness vs Material Risk vs Material Threat vs Material Incident
Tom Cornelius
Senior Partner at ComplianceForge | Founder & Contributor at Secure Controls Framework (SCF)
Controls are the nexus of a cybersecurity and data privacy program, so it is vitally important to understand how cybersecurity and data privacy controls should be viewed from a high-level risk management perspective. This brings up the concept of "cybersecurity materiality" as it pertains to the governance of an organization's cybersecurity and data privacy controls.
With the recent?statement on public company cybersecurity disclosures ?by the US Security and Exchange Commission (SEC), the concept of cybersecurity materiality has taken on an enhanced sense of importance. The new SEC requirements affect publicly traded companies in two (2) ways:
It is important to understand that the concept of #materiality expands?beyond the realm of publicly traded companies. The concept of materiality is important to understand the health of a cybersecurity and data privacy program, where?a material weakness crosses an organization's risk threshold by making an actual difference to the organization, where systems, applications, services, personnel, the organization or third-parties are or may be exposed to an unacceptable level of risk.
The SEC's usage of materiality is intended for external, third-party consumption (e.g., investors) to ensure informed decisions are made. The definitions in this article pertaining to cybersecurity materiality are intended for internal cybersecurity and data privacy governance practices. This intended usage is meant to mature risk management practices by providing context, as compared to generally-hollow risk management statements that act more as guidelines than requirements. Cybersecurity materiality determinations are meant to act as a guard rail for risk management decisions.
Defining Cybersecurity Materiality
Specific to cybersecurity and data privacy, the Secure Controls Framework (SCF) defines a?material weakness ?as:?
A deficiency, or a combination of deficiencies, in an organization's cybersecurity and/or data protection controls (across its supply chain) where it is probable that reasonable threats will not be prevented or detected in a timely manner that directly, or indirectly, affects assurance that the organization can adhere to its stated risk tolerance.
Defining The Criteria To Be Material
In cybersecurity compliance, words have meaning. Therefore, it is important to understand the nuances with the terminology, since material weakness, material risk and material threat are not synonymous. However, since the SEC, Generally Accepted Accounting Principles (GAAP) and International Financial Reporting Standards (IFRS) lack specificity in defining the criteria for materiality, organizations have leeway to define it on their own. The lack of authoritative definition for materiality is not unique, since the concept of?risk appetite, risk tolerance and risk threshold ?also suffer from nebulous definitions at many organization.
For an item to be considered material, the control deficiency, risk, threat or incident (singular or a combination) generally must meet one or more of the following criteria where the potential financial impact is:
For a real world example, in most cases a fine associated with a serious infringement of EU GDPR would not be considered material, since it would likely not meet the criteria listed above for revenue, unless the fine exceeded pre-tax profit, total equity or total assets criteria:
Material Weakness vs Material Risk vs Material Threat vs Material Incident
Material Weakness: A material weakness is a deficiency, or a combination of deficiencies, in an organization's cybersecurity and/or data privacy controls (across its supply chain) where it is probable that reasonable threats will not be prevented or detected in a timely manner that directly, or indirectly, affects assurance that the organization can adhere to its stated risk tolerance.
Material Risk: A risk is a situation where (1) someone or something valued is exposed to danger, harm or loss (noun); or (2) to expose someone or something valued to danger, harm or loss (verb).
Material Threat: A threat is (1) a person or thing likely to cause damage or danger (noun); or (2) to indicate impending damage or danger (verb).
领英推荐
Material Incident: An incident is an occurrence that actually or potentially (1) jeopardizes the Confidentiality, Integrity, Availability or Safety (CIAS) of a system, application, service or the data that it processes, stores and/or transmits; or (2) constitutes a violation or imminent threat of violation of an organization's policies, procedures or acceptable use practices.
Aligning Risk Appetite, Risk Tolerance & Risk Thresholds With Cybersecurity Materiality
In the context of that definition of?cybersecurity materiality, it is important to baseline the understanding risk management terminology. According to the PMBOK? Guide:
From a hierarchical perspective:
What is important to keep at the forefront of risk management considerations is the material nature of risk, as it pertains to the organization. Risks that have a material impact include, but are not limited to:
Use Cases For Cybersecurity Materiality
Use cases for how cybersecurity materiality can benefit cybersecurity and privacy practitioners include, but are not limited to:
Assessing Controls To Determine Material Weaknesses
Assurance is defined as the grounds for confidence that the set of intended security and privacy controls in a system, application or service are effective in their application. Since assurance is relative to a specific set of controls, defects in those controls affect the underlying confidence in the ability of those controls to operate as intended to produce the stated results. Fundamentally, assurance identifies the level of confidence that a stakeholder has that an objective is achieved, that takes into consideration the risks associated with non-conformity (e.g., non-compliance) and the anticipated costs necessary to demonstrate conformity with the specified controls.
When organizations go through some form of certification process, it undergoes a conformity assessment (e.g., ISO 27001, CMMC, SOC 2, PCI DSS, RMF, etc.). Conformity assessments are designed to assure that a particular product, service, or system meets a given level of quality or safety. Instead of a 100% pass criteria, conformity assessments rely on the concept of assurance to establish a risk-based threshold to determine if the intent of the objective(s) has been achieved.
About The Author
If you have any questions about this, please feel free to reach out. Tom Cornelius is the Senior Partner at?ComplianceForge , an industry leader in cybersecurity and privacy documentation. He is also the founder of the?Secure Controls Framework ?(SCF), a not-for-profit initiative to help companies identify and manage their cybersecurity and privacy requirements.
Best-selling author of zero books | Keynote speaker at my family's dinner table
1 年Reading through this in light of the new SEC guidance, I have to think that most companies employing a basic "Low / Medium / High" stoplight risk management program are going to have a large amount of trouble defining what is material. How do you determine if a potential risk outcome is material if you don't have quantitative metrics behind the risk analysis? "A material weakness will be identified as part of a gap assessment, audit or assessment as a finding due to one or more control deficiencies." To the same point, how will a third-party, performing a gap assessment, define material weakness? It is one thing to look at a set of controls from a standard or framework and make an educated determination as to if the organization is implementing them appropriately, but now will the third-party also have to make a materiality determination?
CEO, Defense Cybersecurity Group (DCG), FBI Infragard SME on Cyberwarfare and Deputy Sector Lead, Defense Industrial Base
1 年Thanks, Tom for the write-up on this. Very timely. Is there a source for your potential materiality financial impact? I suspect there is but I just wanted it for my reference if there was one. I like the way you put that.