Skip to main content

https://mojdigital.blog.gov.uk/2015/10/08/risky-business-managing-security-risks-to-digital-services/

Risky business: managing security risks to digital services

Posted by: , Posted on: - Categories: Agile, Development, Digital skills, Intranet and staff tools

How we're changing the way we protect our digital services from security risks.

If you’re involved in delivering digital services, you should be thinking about managing security risks, like online attacks or criminals getting hold of personal data.

At the same time, you’ll need to ensure that the service is performing well and is good value for money.

Managing these risks should be an integral part of creating and running a service. This will be the case if you’re a product manager, technical architect, security analyst or designer.

http://www.gettyimages.co.uk/detail/news-photo/researcher-inspecting-for-computer-viruses-at-hauri-inc-the-news-photo/164222042

Traditional security risk management

A lot of the traditional tools used in risk management, such as Information Assurance Standards 1 and 2 (IS1 & 2), aren't designed for agile methods.

Traditional tools take a static view of a system. They analyse risk at a major delivery milestone, try to specify every risk beforehand, and can make the process overly complex through reams of documentation. Perhaps worst of all, they suggest that risk can be managed by simply following a step-by-step process.

We need to keep the knowledge behind these tools and techniques, but adapt them to more agile ways of working.

We’ve explored some solutions with CESG Digital, and come up with some principles for managing security risks on agile software projects.

5 principles of agile security risk management

We believe that agile risk management should be simple, inclusive, varied, creative and continuous.

1. Simple

While some risk management techniques can be complex, and require expert knowledge, the process for managing risk must be simple.

Information security image
Locking down those zeros and ones with five new principles

One of the most important steps in managing risk is getting the senior information risk officer or information asset owner to decide on what risks they are willing to accept.

People in these roles are usually senior leaders who are responsible for a large and complex services and organisations. They can only make effective decisions about risk if the general process is clear and simple.

A summary of the risk information for a typical digital service should be:

  • short – eg fitting onto a single sheet of paper
  • easy to understand
  • available at all times

The summary should make sense even if you don't know all about the domain or system beforehand.

This summary can include links to details on related risks (eg on software components, hosting providers and networks), risk management techniques, mitigated risks and the system or service.

2. Inclusive

The overall process should be owned by a non-specialist in risk management, with specialists helping where their expertise is needed.

It should be easy for a delivery or product manager to go through the overall process.

Everyone involved in delivery should feel able to contribute by introducing new techniques based on their skills and knowledge.

3. Varied

We should use a combination of techniques rather than a monolithic approach.

Different risks are best identified by a variety of methods, including:

Technique How it works
Anti-personas Fictional individuals who wish to attack or undermine a service can be used alongside more conventional personas, combining design thinking with risk management.
Mis-use cases User stories where mis-use of the service is being considered rather than normal use.
Five-whys A problem-solving technique which can be used following an incident to learn better ways to mitigate risk.
Ethical hacking Breaking into systems to find any weaknesses that could be exploited by unethical hackers.
Static code analysis Used to spot common weaknesses in web applications.
Automated vulnerability scanning Ensures that basic configuration mistakes do not result in opportunities for attackers.
Attack trees A methodical approach to identify possible attack scenarios on a system.
Quick checklists Designed for their effectiveness, not their completeness, and used at the most appropriate times (eg delivery milestones), after each user story.

4. Creative

Risk management should be seen as a creative activity because it's about trying to predict the future, and anticipate what could go wrong.

We should still use formal and rigorous techniques, but must also adapt creative approaches such as anti-personas or misuse cases.

5. Continuous

Risk management can no longer be considered a periodic or, worse still, one-off activity.

Agile delivery means that services change frequently, and new risks can be both introduced and mitigated as a service evolves.

As a result, we will need to constantly update the information on risks gathered using the techniques above.

This should be managed like source code: it should be version-controlled and editable by a group of people.

http://www.gettyimages.co.uk/detail/news-photo/symbol-of-a-secure-website-https-on-a-computer-screen-on-news-photo/453603754

What’s next...

We will be working with our delivery teams, information assurance partners and other security experts to ensure we manage security risks in all these ways.

We’d love to know what you think. Have you adapted security risk management so that it works better with an agile approach? Or would you like to work with us to improve the process?

Like this blog? Keep posted: sign up for email alerts.

Sharing and comments

Share this page

2 comments

  1. Comment by Tom Wynne-Morgan posted on

    Great work Dave

    Reply
  2. Comment by Mike Boyd, Lead Accreditor, MoJ posted on

    This is a helpful summary which is also a good opportunity to note the differences between assurance /accreditation for traditional (‘legacy’) systems and Digital systems. Digital systems generally deliver a single defined function or range of functions to support a business aim, and so the technology, threats and risks can be clearly defined. Development through sprints allows vulnerabilities and mitigations to be readily identified, tried, and tested (and repeated) with focus and frequency. It also allows greater flexibility and choice in the assurance approach. This provides much greater assurance to the business owner. Our experience in MoJ has been that assurance of any resulting changes to existing systems with complex designs which may interface with new digital systems can still require protracted change, IA analysis, and assurance which is, of necessity, on a slower track. That work is often described as being attributable to the Digital project which, of course, it’s not.

    Reply

Leave a comment

We only ask for your email address so we know you're a real person

By submitting a comment you understand it may be published on this public website. Please read our privacy notice to see how the GOV.UK blogging platform handles your information.