Risk Management in DoD Security Programs
Risk Management in DoD Security Programs
Student Guide
Welcome to Risk Management for DoD Security Programs. The goal of this course is to
provide security professionals with a risk management process that incorporates five
steps: asset assessment, threat assessment, vulnerability assessment, risk assessment,
and countermeasure determination.
Practical Application
A corresponding job aid (Risk Management – Tables, Charts & Worksheets) is
available in the course resources link which provides examples of each of the tables,
charts and worksheets that are referenced in the courseware and are an integral part of
the risk management process. This job aid can be used as quick reference material or
as a starting point in your own risk management analysis.
Introduction
Rapid changes in the political, social, economic, and technological arenas have caused
protection to become more complex, while resources for security have become more
restricted. The risk management process provides a systematic approach for acquiring
and analyzing the information necessary to protect assets and allocate security
resources.
To meet today’s security challenges; the national-level security policy initiatives endorse
a holistic risk management approach which provides a level of balance that will
accomplish the following:
• Realistically match security to the threat
• Effectively allocate limited resources
• Provide necessary security at an affordable price
Page 1 of 21
Risk Management for DoD Security Programs
Student Guide
During the analysis process values are assigned corresponding to the impact of asset
loss, threats, and vulnerabilities, and then a resulting risk value is calculated.
The final step in the process is to make a risk management decision. This decision
involves analyzing the outcomes from each step (typically using a numerical rating
and/or linguistic value) and analyzing the information as a whole to determine the most
appropriate countermeasure options for each asset.
Page 2 of 21
Risk Management for DoD Security Programs
Student Guide
Each category is broken into multiple levels to assist with capturing details about each
asset. Each level within the categories is then used during the asset analysis. Asset
analysis studies are done at a Level I, II, III, and IV, or deeper as necessary. (See job
aid for an example of the Asset Category Table.)
Identify Assets
A variety of resources, including reports, databases and equipment documentation,
assist in determining significant assets. However, the best information is attained
through a series of interviews with knowledgeable personnel or subject matter experts
(SMEs), including the following:
• Customer
• Program/Facility Manager
• Chief of Operations
• Chief of Security
Research available resources or use the SME interview technique to identify undesirable
events. The following questions can help guide you:
• What undesirable events have happened in the past?
• What undesirable events regarding a particular asset concern the asset owner?
• What undesirable events have happened to similar assets?
Measure Impacts
Once undesirable events for each asset are identified, the next step is to measure the
impact of such an occurrence. Consider the consequences for each asset that is lost,
harmed, or otherwise adversely affected. Again research resources and interview SMEs
to gain the needed information. Use the following questions as a guide:
• Could significant damage to national security or loss/injury to human life occur as
a result of this event?
• Could ongoing operations be seriously impaired or halted?
Page 3 of 21
Risk Management for DoD Security Programs
Student Guide
• Could costly equipment or facilities be damaged or lost?
At this stage of the risk management process, populate the first two columns of the
worksheet with the following elements:
• Asset name
• Undesirable event description and impact or potential loss from the undesirable
event
Notice that the worksheet contains empty columns. These columns will be completed as
you progress through the remaining steps of the risk management process. (Upon
completion of the asset assessment step, the first four columns of the worksheet will be
completed.) (See job aid for a Risk Assessment Worksheet)
• Critical (C) - A critical rating indicates that compromise to the targeted assets
would have grave consequences resulting in loss of life, serious injury, or
mission failure.
• High (H) - A high rating indicates that a compromise to assets would have
serious consequences resulting in loss of classified or highly sensitive data or
equipment/facilities that could impair operations affecting national interest for an
indefinite period of time.
• Medium (M) - A medium rating indicates that a compromise to the assets would
have moderate consequences resulting in loss of sensitive information, sensitive
Page 4 of 21
Risk Management for DoD Security Programs
Student Guide
data or costly equipment/property that would impair operations affecting national
interests for a limited time period.
• Low (L) - A low rating indicates that little or no impact on human life or the
continuation of operations affecting national security or national interests would
result.
Further differentiate each asset by indicating high, medium, and low within each
assigned value.
Linguistic values, or verbal terms, are less precise than numerical ratings. In addition, it
will be more difficult later on in the risk management process to determine which
combinations of ratings equal various risk ratings. Therefore, linguistic values are
assigned a numerical rating to determine the degree of an asset within each linguistic
category. The numerical rating scale ranges from 1 to 100. Additionally, the numeric
scale allows for more effective ranking of valued assets within a given range.
For example, all personnel are important, but key project scientists may be ranked
higher than a security guard. Thus, a scientist may be valued as critical and assigned a
value of 90 yet a security guard may also be valued as critical but assigned a lower
value of 60.
When assigning ratings, be sure that the value assigned is based on the asset owner’s
perspective. In many cases an asset may be important to an asset manager, agency, or
department, but may only have minor importance to the U.S. Government, which
ultimately owns the asset and pays for its security. Basing ratings on the asset
manager’s perspective could result in asset overprotection at the expense of other more
critical assets.
Page 5 of 21
Risk Management for DoD Security Programs
Student Guide
Risk Assessment Worksheet
The first step in assessing threats is identifying an asset’s adversaries and threats.
There are many types of threats, some which are perpetrated by people or
organizations, which are usually referred to as adversaries, while others are accidents or
due to natural phenomenon and are not considered adversaries.
A threat is any indication, circumstance, or event with the potential to cause the loss of,
or damage to an asset. Threat may also be defined as the intention and capability of an
adversary to undertake detrimental actions against an asset owner’s interests.
Page 6 of 21
Risk Management for DoD Security Programs
Student Guide
• Foreign Industrial Espionage: Foreign industrial espionage is espionage
conducted by a foreign government or a foreign company with direct assistance
of a foreign government against a private U.S. company for the purpose of
obtaining commercial secrets.
• Foreign Intelligence Entity: Foreign Intelligence Entities are organizations that
are part of a foreign government and engage in intelligence activities.
• Natural disaster: Natural disasters are phenomena that occur in nature that
have the potential to damage assets or interrupt activities and operations.
Examples include: floods, lightning, tornadoes, volcanic eruptions, etc.
After identifying the adversaries, the next step is to analyze threat data to understand the
adversaries’ profile, specifically their intent.
Analyze Intent
Intent refers to an adversary’s intended plans that may pose a threat to an asset.
Analyzing intent requires an understanding of the adversary’s perspective. Research
resources, or use the SME interview technique to identify intent. The following questions
can help guide you:
• What are the adversaries’ goals?
• To what degree are the adversaries motivated to achieve those goals?
• How will exploiting or harming U.S. assets bring the adversaries closer to their
goals?
• What level of risk are the adversaries likely to accept?
• Are the adversaries willing to risk getting caught?
• What might the adversaries lose if caught exploiting or harming U.S. assets?
• Are there other methods for adversaries to obtain their goals?
• Will the adversaries choose one of those methods?
Group the identified adversaries into categories to help in the analysis and organization
of your assessment. The following categories are examples:
• Individuals - common criminals, insiders, and disturbed individuals
• Groups & Organizations - terrorists, corporate competitors, narco-traffickers
• Governments - foreign intelligence entities, foreign militaries, state-sponsored
entities
After you have grouped the adversaries, create an Intent Assessment Chart to analyze
and summarize the data. A “yes” or “no” response is required for the following:
• Knowledge of an asset
• Need
• Each adversary’s demonstrated interest level
Based on the number of “yes” responses, assign a high, medium, or low intent level for
each adversary. Typically, three “yes” responses equate to a high intent level, two “yes”
responses translate to a medium, and one “yes” response indicates a low overall intent
level.
Page 7 of 21
Risk Management for DoD Security Programs
Student Guide
Intent Assessment Chart
Adversary Intent
Insider, Knowledge of Need Demonstrated Overall Intent
Terrorist, FIE, Asset Interest Level
Criminal
Adversary 1 Yes Yes Yes High
Adversary 2 Yes Yes No Medium
Adversary 3 Yes No No Low
Determine Capability
After assessing an adversary’s intent, determine the capability level to carry out an
undesirable event.
When researching an adversary’s capabilities, remember that the adversary may use a
combination of overt or covert methods/activities to collect information to target an
asset. These methods/activities include the following:
• SIGINT (Signals Intelligence) is comprised of communications and the electronic
and telemetry collection of information in the non-visible portion of the
electromagnetic spectrum.
• HUMINT (Human Intelligence) is intelligence derived from people through
interviews, elicitation, or reports originating from people.
Page 8 of 21
Risk Management for DoD Security Programs
Student Guide
• Stockpiling classified or proprietary documents outside cleared
area
Page 9 of 21
Risk Management for DoD Security Programs
Student Guide
Determine History
After assessing an adversary’s intent and capability, determine an adversary’s history of
carrying out undesirable events.
Page 10 of 21
Risk Management for DoD Security Programs
Student Guide
You have made a chart for each of the steps in the threat assessment process (intent,
capability, and history). Using those three charts, create a new chart, the Threat
Assessment Summary Chart to summarize and analyze all the information.
The Threat Assessment Summary Chart contains a column to list the adversary and a
rating of the adversary’s intent, capability, and history. The intent and capability columns
are populated with a high, medium, or low rating and the history column is populated
with a “yes” or “no” response (whether there is a history or not of attacking an asset).
This chart assists with keeping track of individual adversaries.
After determining the overall threat level, create a second chart, the Threat Level
Decision Matrix. This chart assigns a “yes” or “no” rating for each adversary’s intent,
capability, and history.
Once completed, a threat level is assigned based on the number of “yes” ratings. The
greater the number of “yes” ratings, the higher the threat level. The threat level is the
relative rating based on the best available information. To determine the relative degree
of threat, rating criteria has been developed to ensure consistent threat rating levels.
The Threat Level Decision Matrix requires assigning a level of critical (C), high (H),
medium (M), or low (L) for each asset’s threat/adversary(s).
For example,
Page 11 of 21
Risk Management for DoD Security Programs
Student Guide
After determining the threat levels, map them back to the assets and their associated
impacts. For example, hackers may be identified as being adversaries with a specific
threat level. The adversary is then mapped to computer assets but probably not to other
assets.
The last step is to assign a numerical rating to determine the degree of each threat or
the likelihood that an adversary will launch an attack. The numerical rating scale ranges
between .01 and 1.00. This range provides the opportunity to weigh the threats with
some being assigned a higher numerical value than others even though they are within
the same degree of threat category.
Page 12 of 21
Risk Management for DoD Security Programs
Student Guide
Vulnerability Areas
Five general areas are open to potential asset vulnerabilities:
• Human
• Operational
• Information
• Facility
• Equipment
Page 13 of 21
Risk Management for DoD Security Programs
Student Guide
• Press exposure of sensitive information represents a potential vulnerability. For
example, an activity with poor entry control procedures may be susceptible to
loss/theft of property and may have implanted listening devices.
Page 14 of 21
Risk Management for DoD Security Programs
Student Guide
signals and obtain the information that was being processed on the electronic
equipment.
• Equipment tampering in which equipment is modified to permit collection of
information by an adversary. For example, modifications to a reproduction machine
might enable image storage of everything copied.
• Remote activation/operation that allows modifications or programming permitting
an adversary to remotely activate and/or operate equipment.
Vulnerability Assessment
View each asset as if you were the adversary. Study the asset and ask the questions:
• “If I were adversary “x”, I would break into this facility by…”
• “If I wanted to physically harm person “x” in this facility, I would…”
This questioning process should be used on each asset for every adversary.
For example, security guards almost always recognize vulnerabilities from past
experiences or careful evaluation of their surroundings. Likewise, computer system
administrators and program managers are likely to be aware of vulnerabilities in their
systems through a variety of experiences, professional publications, conferences, and
contacts.
Additional sources that can assist with gathering vulnerability information include the
following:
• Personnel who work at the “site”
• Existing site surveys
• Engineering drawings and blueprints
• Maps
• Security planning documents
• Surveys and audits
• Incident reports
Regressive Analysis
Asset vulnerabilities may already have some type of security countermeasure in place.
The best method to analyze these asset vulnerabilities is through regressive analysis.
Regressive analysis requires analyzing the asset in an unprotected state first and then
analyzing the asset in conjunction with current countermeasures.
Page 15 of 21
Risk Management for DoD Security Programs
Student Guide
2. Reevaluate the asset’s vulnerabilities taking into consideration the efficacy of the
existing countermeasures.
3. Identify the asset’s vulnerability differences between the unprotected and
protected assessments.
4. Identify the ineffective countermeasures.
5. Identify and characterize the specific vulnerabilities that still exist, given the
current countermeasures.
Classify Countermeasures
Countermeasures are classified according to their implementation requirements. Some
countermeasures are procedural in nature, others involve equipment/devices, and still
others involve personnel usage.
To determine the vulnerability level for a given asset, each of the following questions
must be answered with a “yes” or “no”:
• Is the asset made vulnerable by a single (as opposed to multiple) weakness in
the security system?
• Does the nature of the vulnerability make it difficult to exploit?
• Do multiple effective layers of security countermeasures lessen an asset’s
vulnerability?
Once an asset’s vulnerabilities are determined, assign and chart a vulnerability rating of
critical (C), high (H), medium (M), or low (L) for each asset.
Page 16 of 21
Risk Management for DoD Security Programs
Student Guide
Finally, assign and chart a numerical rating to determine the degree of each asset’s
vulnerability. The numerical rating scale ranges between .01 and 1.00. This range
provides the opportunity to allow a weighted evaluation of the threats within the same
degree of threat category. After assigning the vulnerability rating, enter it into the
numerical rating (vulnerability) column of the worksheet.
Risk assessment combines and analyzes the first three assessments (asset, threat, and
vulnerability) to provide an overall picture of potential risks to an asset or group of
assets. Using this information, you will be able to calculate an asset’s risk rating and
assign the asset a risk level.
Risk Factors
Generally, the extent of an asset’s risk is determined by how much the following risk
factors overlap: assets, threats and vulnerabilities. For example, if the rating level for all
factors is critical, then the risk level would be at its highest. However, if any of the factors
have a lower rating level, then the level of risk would diminish based on the lower rating
of each factor.
The three risk factors are incorporated into a formula to determine and assign a more
precise risk rating:
Page 17 of 21
Risk Management for DoD Security Programs
Student Guide
“Impact” represents the consequence of the asset loss to the asset owner.
The “Threat x Vulnerability” value represents the probability of the undesirable event
occurring.
Information in the impact, threat, and vulnerability assessment columns from the Risk
Assessment Worksheet is used in the risk formula to calculate the risk rating.
Convert the numerical risk rating back to a linguistic scale using critical (C), high (H),
medium (M), or low (L) and record the information. This linguistic conversion allows for
categorizing the risk rating into layman’s terms for briefing to management/command.
Countermeasure Analysis
The Countermeasure Analysis Chart is an important tool in determining appropriate
countermeasures for mitigating an asset’s vulnerabilities. All the information acquired to
this point in the risk management process will be used in conducting a countermeasure
analysis and completing the chart.
Page 18 of 21
Risk Management for DoD Security Programs
Student Guide
Countermeasure Analysis Chart
Written procedures are the least expensive to implement with the costs rising for
equipment and manpower.
Page 19 of 21
Risk Management for DoD Security Programs
Student Guide
Cost Benefit Analysis
Once you identify countermeasures and associated costs, compare the costs of each
option with the benefits by answering the following questions:
How does asset value compare to proposed cost of protection?
How does the option mitigate the risk?
To what degree does the option delay, deter, detect, defend, or destroy?
Which option provides the best protection at the lowest cost?
Countermeasure Options
Upon completion of the cost benefit analysis, prioritize the countermeasure options by:
• Identifying countermeasures
• Selecting a reasonable number of countermeasure options
• Determining how each option affects the overall risk level
• Calculating the cost of each option
• Ensuring you address the maximum number of undesirable events with the
various options you recommend
Countermeasure Analysis
Summarize and record all the information onto the Countermeasure Analysis Chart for
each option chosen. The chart requires that you do the following:
• Specify each event (column 1)
• Enter the rating from the Risk Assessment Worksheet (column 2)
• Enter the rating and identify the specific vulnerability from the Risk Assessment
Worksheet (column 3)
• Identify the countermeasure selected on the Countermeasure Worksheet #1
(column 4)
• Enter the cost (column 5)
• Enter the new vulnerability level rating resulting from the new countermeasure
implementation (column 6)
• Calculate and enter the new risk level (R = I x [T x V]) resulting from the new
vulnerability level of column 6 (column 7)
• Total the cost of the proposed countermeasure
The bottom row provides the total cost for all countermeasures and shows from/to risk
data.
Page 20 of 21
Risk Management for DoD Security Programs
Student Guide
Countermeasure Analysis Chart
Countermeasure Options
Many security professionals are not in a position to obligate funds for countermeasures
and must receive approval from a decision maker. In most situations, they will be asked
to provide comparison information for several different options. Factors influencing
decision makers are the following:
• Asset value
• Current exposure to loss/harm
• Protective measure availability
• Fund availability
• Mandatory security requirements
Normally, the security professional would make three recommendations to the decision
maker:
• Best possible case, money no object
• Sensible recommendation, good security for the money
• Minimum need to meet the requirements
Now that you have completed this course, you should have the tools and knowledge
necessary to identify and apply the five steps of the risk management process in the
development of a risk assessment.
Page 21 of 21