IT Risk Management Use Case Design
This topic explains the IT Risk Management Use Case Design.
On this page
Architecture Diagram
The following diagram shows the relationships between the applications in the IT Risk Management use case.
Download the source file of the diagram here: IT Risk Management Architecture Diagram
Applications and Questionnaires
Application/Questionnaire |
Description |
---|---|
Risk Project |
The Risk Project application functions as a repository where you can perform directed bottom up risk assessments across multiple domains, such as a new product and service, a new venture or business process, or mergers and acquisitions. Through the Risk Project application, you can:
|
Threat Intelligence |
The Threat Intelligence application collects threat advisory reports or security updates from a variety of sources. The intelligence could be provided via a pre-built feed from Verisign iDefense. Intelligence can also be input manually by the security function to document transactional threats (such as ongoing social engineering or phishing attacks) or inherent business threats based on threat assessments, analysis or other internal processes. Consolidating and tying this data back to your enterprise assets and business processes enables a comprehensive view of the threat's severity, impact and any required remediation needs. Through the Threat Intelligence application, you can:
|
Threat Project |
The Threat Project application enables the security function to manage the operational activities of the threat program through project management and an integrated threat assessment methodology. The Threat Project application provides security analysts with a consistent methodology to identify threats, analyze associated risks, and manage risk treatment efforts in 1 consolidated system. Through the Threat Project application, you can: Manage the process of performing threat assessments from scoping through to treatment. Support singular input (1 participant) or multiple inputs (multiple participants) for threat identification. Manage threat-related projects through a lifecycle of:Project staffing and scoping.Threat assessment, aggregated scoring, and multiple assessment support.Threat analysis and evaluation.Risk treatment, including remediation plans and exception requests. |
Threat Assessment |
The Threat Assessment questionnaire serves as a consistent method to identify potential threat actors, vulnerabilities, and/or threat scenarios as part of a Threat Project. The input into the questionnaire is typically provided by business representatives, technology owners, and business process constituents. The questionnaire is not intended to be a complete threat assessment but rather an inquiry into the common threat scenarios that can affect specific assets. Through the discussion facilitated by the Threat Assessment, the security analyst can query the business owners about the possible scenarios that could result in a business impact and identify countermeasures as necessary. |
Risk Assessment |
This Risk Assessment is a general risk assessment containing multiple domains of questions. The risk assessment includes a domain scoring model as well as an overall risk heat map. The Risk Questions within the domains are split into 2 sections - a likelihood and an impact section. Risk Indicator questions are used to calculate the likelihood portion of the domain. and are Yes/No questions. For each wrong answer, the likelihood of risks within that domain increase. Risk Scale questions are used to calculate the impact portion of the domain. These questions are scored on a 1 - 10 scale to calculate a business impact score. The higher the average of the scaled answers, the higher the impact score. Calculations within the individual domains are based on the individual questions. Adding or removing questions to each domain will require an adjustment to the scoring system within the questionnaire. |
Application Assessment |
The Application Assessment questionnaire contains 64 questions focused on overall controls for applications, including general controls, application development, access control, monitoring and response, recovery and business continuity, regulatory compliance, and operations management. |
Device Assessment |
The Device Assessment questionnaire contains 67 questions that cover general device (IT platform) controls. Some of the topics covered include inventory classification, user accounts, passwords, system configuration, and operations management. The questionnaire is technology-agnostic and based on general controls. Technology-specific controls, such as Windows configuration items, are not included in this questionnaire. |
Information Asset Assessment |
The Information Asset Assessment questionnaire contains 44 questions that target Information Assets and provide an assessment against legal, regulatory, and security requirements for information assets. This questionnaire also covers general information protection and security, information ownership, classification, personal information, retention, breaches, and business continuity. |
Question Library |
The Question Library application stores assessment questions that you can reference and copy into a questionnaire. Each question is stored as an individual record, and each record contains information including the question and answer text as well as information necessary to display and score the question. Depending on the solution that you have licensed, the Question Library contains a large set of pre-built questions by default. In addition, you can add new questions and store them in the Question Library. |
Applications |
The Applications application stores all software applications used by the organization to perform business operations. You can view how an application is used, the people that use it, and the devices on which the application is installed. You can also track the business impact, customer impact, and licensing details, and associate it with other aspects of the enterprise infrastructure. Note: The Applications application is included in the Enterprise Catalog package. |
Risks (formerly Risk Register) |
The Risks application serves as the corporate controlled instantiation of risks used by the entire organization. It allows users to capture data for an instance of a risk from any given risk statement. Risks are associated to processes, objectives, applications, facilities, key risk indicators, financial losses, and controls. Quantitative risks serve as an aggregation point for underlying Risk Events and are separately assigned to quantitative hierarchies for aggregation. |
Risk Statements |
The Risk Statements application functions as a repository where you can store general information on enterprise risks and provide information for completing Risks records. |
Risk Generator |
The Risk Generator application allows Risk Managers to automatically generate Risks records, based on selected Risk Statements and targets. For example, if you selected 2 Risk Statements and targeted 3 Product and Services records, the system would generate 6 Risks records. If you have licensed a use case that contains Metrics and Metrics Library, the feed also generates metrics for each generated risk, based on the Metrics Library records tied to the selected Risk Statements. |
Contacts |
The Contacts application serves as a central repository for contact information, is utilized across multiple areas of Archer, and contains information that is often leveraged by other use cases. Updates to a profile record within this application automatically propagate in any records with displayed contact information. Note: The Contacts application is included in the Enterprise Catalog package. |
Business Processes |
The Business Processes application captures the base data for a given process. A process may be assigned to a particular business unit or shared across multiple business units. A business process may also be referenced to one or multiple products or services. The application enables you to track the business processes personnel, criticality, recovery time objective (RTO) and ITIL category, and associate it with other aspects of the enterprise infrastructure. Note: The Business Processes application is included in the Enterprise Catalog package. |
Control Procedures |
The Control Procedures application serves as a central repository for instances of control procedures, baselines and activities that are mapped to corporate Primary Controls, establishing the foundation for enterprise-wide risk monitoring and compliance measurement. Control Procedures are categorized into two types: Technical and Process. Based on the selected type, different pieces of information are captured and different testing options are made available. Note: The Control Procedures application is included in the Enterprise Catalog package. |
Devices |
The Devices application serves as a central repository for knowledge, such as criticality, about IT devices and which applications they support. You can manage devices to ensure that they are protected according to management expectations. The application is also associated with other aspects of the enterprise infrastructure. Note: The Devices application is included in the Enterprise Catalog package. |
Information Assets |
The Information Assets application allows you to manage a repository of information assets, such as credit card data, financial forecasts, employee Social Security numbers, and trademarks. Use this application to perform online assessments to determine information classification ratings and required retention periods. Link information assets to the business processes they support, the applications where they are managed, and the facilities where they are housed. Note: The Information Assets application is included in the Enterprise Catalog package. |
Facilities |
The Facilities application maintains a listing of all organizational facilities, such as data centers and branches. You can document and review all information associated with a specific facility, such as contact personnel, location information, and technologies associated with the location. Note: The Facilities application is included in the Enterprise Catalog package. |
Storage Devices |
The Storage Devices application serves as a central repository for storage devices used within the infrastructure. Note: The Storage Devices application is included in the Enterprise Catalog package. |
Technologies |
The Technologies application provides a searchable and extensible repository of technology version information that can be leveraged to relate devices of like technology. Devices can be identified and grouped using 1 of the 3 tiered hierarchical values lists detailed:
Users can filter technologies that have been company approved and view reports detailing known vulnerabilities threatening their technologies. Note: The Technologies application is included in the Enterprise Catalog package. |
Access roles and record permissions
Access Role |
Description |
---|---|
CM: Admin |
Provides use case administrator with access to the following applications:
This role includes create, read, update, and delete access. |
CM: Executives |
Provides appropriate access level to all the applications listed in CM: Admin for the executive team. This role includes read-only access. |
CM: Manager |
Provides appropriate access level to all the applications listed in CM: Admin for management stakeholders. This role includes create, read, and update access. |
CM: Owner |
Provides appropriate access level to all the applications listed in CM: Admin to business process owners. This role includes create, read, and update access. |
RM: Admin |
Provides use case administrator with access to the following applications:
This role includes create, read, update, and delete access. |
RM: Executives |
Provides appropriate access level to all the applications listed in RM: Admin for the executive team. This role includes read-only access. |
RM: Manager |
Provides appropriate access level to all the applications listed in RM: Admin for management stakeholders. This role includes create, read, and update access. |
RM: Owner |
Provides appropriate access level to all the applications listed in RM: Admin to business process owners. This role includes create, read, and update access. |
RM: Read Only |
Provides read-only access to all the applications listed in RM: Admin. |
ITSVP: Admin |
Provides the use case administrator with create, read, update, and delete access rights to the following applications:
|
ITSVP: Analysts |
Provides analysts with the appropriate access level to applications listed in the ITSVP: Admin role. This role includes create, read, update, and delete access. |
ITSVP: Business Management |
Provides read-only access to applications listed in the ITSVP: Admin role to the appropriate line of business. |
ITSVP: Executive Management |
Provides read-only access to applications listed in the ITSVP: Admin role to the executive team. |
ITSVP: Operations |
Provides appropriate access level to all the applications listed in the ITSVP: Admin role to operators. |
ITSVP: Read Only |
Provides read-only access to applications listed in the ITSVP: Admin role. |
Note: For detailed, page-level access rights, see the Data Dictionary.
For a complete list of application record permission fields, including which user/groups fields populate the fields and where the fields inherit permissions from, see the Data Dictionary.
Dashboards
Dashboard |
Description |
---|---|
IT Risk Management |
This new dashboard is intended for those for the high-level IT Risk Manager persona. |
Note: For detailed iView information, see the Data Dictionary.
Data Feeds
Data Feeds | Description |
---|---|
Risk Generator |
Targets the Risk Generator application and allows users to create Risks records based on their selections for Risk Statements and impacted targets (for example, business units or facilities). For example, if you selected 2 Risk Statements and targeted 3 Facilities records, the system would generate 6 Risks records. If you have licensed a use case that contains Metrics and Metrics Library, the feed also generates metrics for each generated risk, based on the Metrics Library records tied to the selected Risk Statements. |
Risk Generator Clear Flag |
Runs following the Risk Generator feed and resets the Create Individual Risks Flag from the Risk Generator from Ready to Not Ready. |