risk based vs capability based

risk based vs capability based

Tons of ideas for articles in the queue but I want back and looked at unfinished draft. This was perhaps the oldest - started December 2022.

The subject probably has some saying "what" or "agree - a lot used to thinking of security in terms of risk management go with "heresy". Later are probably not regular readers of my articles.

Kinetic warfare does not define defense in terms of managing risk like cyberspace does. While managing risk is a support role - it is not the primary.

Risk-based engineering to me is not systems engineering - and not the way to achieve an emergent property like security, or even cybersecurity (not the same!). The need is capability - and assurance in achieving it (and assurance is not "minimize the risk to acceptable" as some think).

Instead of ‘risk-based’ engineering that

  • Chases vulnerabilities (of which there will always be more to find in a complex system)
  • Does not apply SE requirements analysis principles to ‘cybersecurity’ requirements; accepting a lack of ‘good enough’ from the mission/business owners
  • Fails to engineer a system with a defense capability that can defeat the adversary despite being a system fraught with vulnerabilities
  • Fails to cause the pressure needed for at least some highly trustworthy IT in order to have an effective defense
  • Forces ‘system security’ to forever be a stovepipe because this risk-based engineering is so different from capability-based as to not ‘fit in’ with SE for other types of requirements.

?

We need capability-based engineering that:

  • Fits into the SE processes
  • Readily relate SE concepts, principles, and processes.
  • Applies good SE requirements analysis, aiming for requirements that clearly express the capability to be achieved with definition of good enough given the operational environment And capabilities include what is needed for active cyberspace defense
  • Expects the mission/business owner to make the risk-management/assurance-of-success decisions
  • Expects these decisions to be inculcated into the requirements to the SE; enabling the SE to then engineer to these requirements
  • Proactively pushes back against unachievable or non-actionable requirements


We need to get past risk management frameworks driving the engineering, as well as get past defining architectures and designs then analyzing them to figure countermeasures to embed into the architecture and design - often referred to as "baking in security" - as the means to "secure". We need to stop thinking of securing the architecture, securing the design, securing the implementation and think in terms of developing a secure architecture, secure design, and secure system. "Securing" makes for a more complicated system and risks a game of "whac-a-mole" - each plugging of a hole leading to another hole or two.

Looking at the notes I had for this article in draft form - appears Gary Stoneburner deserves some thanks for help with the thinking on this.

Unless otherwise stated, all views expressed are mine and don’t necessarily reflect those of my employer or MITRE sponsors

?

Avi Shaked

Thinking systems, designing systems

5 个月

Agreed. This is exactly why we introduced operations-informed (and not risk-informed) playbooks. https://doi.org/10.1016/j.cose.2023.103454 Specifically, Figure 2 highlights the importance of operations, and I hope this will underpin additional research.

回复
Francesco ?? Chiarini

Defending high value targets against disruptive cyber attacks - SABSA TOGAF CEH GCED GRTP ISO27k ISO22k EnCase CISM CGEIT Lean MoR

5 个月

The bullet points under “risk-based” engineering do not resonate at all, these sound like bad practice in general but not something any good risk management framework or team would go after. SE is easily pluggable into RMF under the condition that there is a strong cyber resilience culture in the organization. Calin Gheorghiu Perry Young for any thoughts.

回复

要查看或添加评论,请登录

Mark W.的更多文章

  • RIF Incoming

    RIF Incoming

    My company is preparing for its first broad Reduction in Force (RIF) in a generation - though there have been targeted…

    5 条评论
  • The New Triad?

    The New Triad?

    Unless otherwise stated, all views expressed are mine and don’t necessarily reflect those of my employer or MITRE…

    3 条评论
  • Confusion: Social Security

    Confusion: Social Security

    Last time I did an article on confusion around the chaos of financial aspects, with intent in time to get back it with…

    1 条评论
  • Red Tape

    Red Tape

    Reading through Senator Roger Wicker's Restoring Freedom's Forge this week, the quote of Admiral Hyman Rickover at the…

    5 条评论
  • Confusion

    Confusion

    For a second post, and maybe the immediate next few, I thought I would talk to the confusion around income generation…

    2 条评论
  • Ron Ross

    Ron Ross

    With Ron Ross' announced retirement this past week (Post | Ron Ross' Retirement), I thought I'd take some time to talk…

    4 条评论
  • Embracing Opportunity for Change

    Embracing Opportunity for Change

    My current company allows easy transitions to part time - and I've just ended the second week of it. I do see this as a…

    5 条评论
  • Evidence-Based Assurance

    Evidence-Based Assurance

    Some readers may have heard Michael McEvilley and/or I speak to evidence-based assurance. I forget when we even started…

    1 条评论
  • Visiting McNamara's Fallacy and Folly

    Visiting McNamara's Fallacy and Folly

    Talking about a pivot - I was about one thing on data/evidence fallacies with things security/resilience, and in…

    2 条评论
  • "Security" or Pseudo-Science

    "Security" or Pseudo-Science

    David Slater is a great follow. Safety and Security are closer related than most realize - much of what Michael…

    8 条评论

社区洞察

其他会员也浏览了