IMS Risk Assessment _DRAFT_v3 1(Ori)

February 14, 2018 | Author: Razak Misban | Category: Access Control, Computer Network, Computer Virus, Email, Antivirus Software
Share Embed Donate


Short Description

Download IMS Risk Assessment _DRAFT_v3 1(Ori)...

Description

FPSSB/IMS/REC/RISK-001 Template Version: 1.0

RISK ASSESSMENT

Service Risk Owner

Service

Risk Register Sevice Component

Threats

Vulnerabilities

Risk Description

Risk Treatment Plan (A=Availability, C=Confidentiality, I=Integrity)

Impact / Severity (Score 1-5)

Probability/ Likelihood (Score 1-5)

Result of Risk (Total Score)

Risk ID

Control Annex

Current Control

Risk Treatment Treat

Staff shortage

Lack of commitment, resign, and unavailability

Unable to maintain certification,

A

5

1

5

Attend all SMS related meetings, workshops and training

Long leave (accident /illness)

Lack of back-up person to approve ITSM documents.

Delay,

I

3

1

3

Train backup

Staff shortage

Lack of knowledge, direction, experiences and commitment, resign

Unable to maintain certification ,

A

3

1

3

Perform regular monitoring by Project Sponsor and Consultant

Treat

Staff shortage

Lack of knowledge, experiences and commitment, resign

Unable to maintain certification,

A

5

1

5

Assign backup person

Treat

Long leave (accident /illness)

Lack of back-up person to maintain the process

Unable to maintain certification,

A

5

1

5

Assign backup person

Human error

Lack of knowledge and experience

Unable to maintain the process,

C,I

5

1

5

Attend workshop or training

Staff shortage

Lack of knowledge, experiences and commitment, resign

Unable to maintain the process,

A

5

2

10

Perform regular monitoring by SMR and DC. Attend SMS workshop or training

Treat

Long leave (accident /illness)

Lack of back-up person to maintain the process

Unable to maintain the process,

A

5

1

5

Assign Process Team Member

Treat

9

Perform regular monitoring by SMR and DC. Attend SMS workshop or training

Controls to be implemented

Target Risk Level

Progress update to Management Meeting

L

Project Sponsor Accept

Buddy System

L

Progress update to Project Sponsor. Service Management Representative

IT Service Management Team Document Controller

IT Governance

Process Champions & Team Members

Service Desk Agent CMDB IT Service Management Tools

wrongly assigning ticket Data loss, Data integrity

EDMS

System not accessible

Lack of knowledge and experiences

Cause delay for re-assigning ticket

Manually control for ERP & BA

Data corrupted, lost track of latest version Excel files.

Server failure, no backup performed regularly

System not accessible, data corrupted.

A A, I A, I

3 4 3

3 1 1

4 3

Backup, scattered files locations Maintain hardcopy

Treat

L

Use tool (ISO Portal)

L

Accept

Treat Treat Treat

Service Desk

System not accessible

Lack of maintenance

System not accessible.

A

5

2

10

Perform regular monitoring and maintenance.

Treat

ISO Documents

Loss of documents

Lack of documents maintenance

Unavailability of documents.

A

5

1

5

Perform regular checking and updating

Treat

ISO Records

Loss of records

Lack of records maintenance

Unavailability of records.

A

5

1

5

Perform regular checking and updating

Treat

Hardware (Network Equipments / Servers)

Hardware failure

Lack of maintenance

Network services are inaccessible.

A

3

2

5

Perform regular maintenance

Hardware (Network Equipments / Servers)

Hardware failure

Susceptibility to voltage variations

Network services are inaccessible.

A

3

2

5

Regular check by Network Team / OSS

Treat

Hardware (UPS)

Battery dry out

Lack of maintenance

Network services are inaccessible when there is no electricity.

A

3

2

5

Perform regular maintenance

Treat

Hardware (Structured Cabling)

Water leakage and pests attack

Lack of periodic building maintenance and pest control

Network is intermittent or inaccessible.

A

1

1

2

Regular check by FES

Network Administrator

System hacked

Lack of competent of monitoring day to day network activities and security of the systems

Poses a security threat

C, I, A

3

2

5

Software

Unauthorized access

Lack of maintenance and poor password management

Network services are inaccessible .

A

3

2

5

Perform regular maintenance

Treat

Router, ISDN Backup

IPVPN/IPVPN Value Failure

Lack of maintenance

Network services are inaccessible .

A

3

3

6

Perform regular maintenance

Treat

IT Service Management Documents

Transfer

Network

Managed IPVPN

L Use tool (ISO Portal)

Transfer

L Progress update to SMR and DC. Encourage for ITIL certification

L L

Progress update to SMR. Encourage for regular awareness Backup, centralized storage for Excel master files ISO Portal will took place EDMS in 2013

L L L

Monitor, check and reporting. Perform quarterly maintenance. Plan to change to a new system ITIL compliance regular update and review the documents

L L

regular update and review the records

L

Continous monitor, check and reporting. Engaged vendors for maintenance Periodic checks and updates by Network Team / OSS Monitor, check and reporting. Introduce IP-based UPS system Periodic updates by FES.

45% 45% 45% 10%

Manager alerts, evaluates and verifies new software updates. a) Not guarantee -base on best effort

45% 50%

a) Sign up SLA with Telekom (Max 2 days resolution) Managed VSAT

Managed CCTV surveillance

IDU, ODU, Router, Modem

VSAT Failure

Lack of maintenance

Network services are inaccessible

A

3

3

6

Perform regular maintenance

Transfer

Hardware a) Storage Server b) Camera

Storage server down and camera faulty.

Lack of maintenance

CCTV unable to operates

A

3

3

6

Perform regular maintenance

Treat

Network

Network failure

Lack of network maintenance

CCTV unable to operates

A

3

2

5

Regular check by Network Team

Treat

Electricity

Power failures.

Susceptibility to voltage variations

CCTV unable to operates

A

3

2

5

Regular check by FES

Treat

Lack of maintenance

Fail delivery of attendance data to server ( TMS and SAP) due to malfunction of Controller or Card reader

C, A

3

3

6

Perform preventive maintenance

Treat

50% b) NMS software to monitor a) Monitoring and maintenance checking on daily, monthly and yearly basis to ensure sustain of operation. b) Troubleshoot server c) Preventive maintainance (SLA) d) Disaster recovery e) Check network availability & performance f) Reset camera's power & network cable g) Repair or change camera

45%

Managed Network & Desktop Services

Hardware a) Server b) Controller c) Card reader

Malfunction Controller or Card reader.

Check network availability & performance

45%

Back up power must be on standby a) Preventive maintenance ( twice a year) to make sure all hardware and software in good condition b) Repair or change controler or controller's power & network cable c) Reset or change card reader

45%

45%

a) Check network availability & performance b) Check and reset communication converter c) Change communication converter (faulty)

Managed Door Access Security System Network

Network down.

Lack of network maintenance

Data stuck or pending at controller & not transferred to server. Thus causing data will not be updated with the latest data and no access report.

C, A

3

3

6

Regular check by Network Team

Treat

Electricity

Power failures.

Susceptibility to voltage variations

System will fail to function (i.e. door not secure) after battery backup runs out

C, A

3

3

6

Regular check by Network Team / FES

Treat

45%

Back up power must be on standby

45%

a) Sign Maintenance aggreement with vendors Core switches failures Managed LAN

Lack of network maintenance

Network services are inaccessible

A

3

2

5

Regular check by Network Team

Treat

Core Switch, Access Switch System being hacked and information stolen by hackers Unauthorized access

Misconfiguration

1. Virus Attack 2. Antivirus installed cannot communicate with server (not connected to Felda network)

1. Antivirus software not updated agent corrupted 3. No scanning for external device ie pen drive 4. Stand alone / streamyx

C, I, A

Program error

To many unauthorized software/application installed in the user's place

3

3

6

Regular check by Network Team

Treat

2. Antivirus

b) Used Network management system(NMS) software to monitor daily activity a) Implement Intrusion Prenvention System (IPS) b) System penetration test

45%

45%

1. Execute with Symantec Endpoint installation to FGC. 2. Install new updates/ set user pc or notebook unmanaged (live update from internet).

C, I, A

1. to make sure only authorized software approve by management installed at user’s PC 2. to ensure Symantec Gateway always filter incoming email and eliminate the spam.

PC Windows OS / Software (MS-Office ) C, I, A

3. Blue Coat Implementation Field Services

Hardware Services & Support Email Program

To ensure Symantec Gateway always filter incoming email and eliminate the spam.

Spam A 1. PC not properly shutdown 2.Old Hardware

Basis Asset Management

PC Hardware

HDD failure

Printer

Printer error / Cannot print

1.Missing Driver 2. Printer cable loose

2. 3. install

1. Preventive maintenance

A

User Authorisation and Administration Asset Rental No redundancy for Genset at Wisma Felda Generator Set

UPS Data Centre

1. propose file server backup to keep at external device UPS at critical PC. 4. Preventive Maintenance

C, A

All equipments in computer room will be down after about 30 mins

More than one UPS module breakdown at same When any one UPS module fail, same servers have to be shut time ( currently 3X30KVA ) down.

A

1.To ensure that FESSB to maintain and test the genset periodically 2. To move Data Centre to different location

A

1. To replace UPS battery every year. 2. To get new UPS for back-up 3. To prepare a listing of less critical servers

A

To have in place a real time online disaster recovery plan

Data Centre Managament SKB IBM i570 machine SKB IBM DR i570 machine Air cond

SKB system not available or compromise

Felda group business operation interrupted

SKB system not available or compromise

Cannot provide business continuity in the event of a disaster.

unexpected downtime

3 out of 4 units is very old (more than 10 years)

Hardware failure Managed Enterprise Services E-mail

Server

To develop SOP -'backup process'

A

1. to sign maintenance contract 2.Monthly service

A Email services inaccessible.

A

3

1

3

Hardware monitoring and sign hardware maintenance contract

Power failure

Susceptibility to voltage variations

Email services inaccessible.

A

3

2

6

Maintain Datacenter UPS

Network failure

Lack of network maintenance

Email services inaccessible.

A

3

3

9

Perform regular monitoring and maintenance

Treat Transfer Treat

Hardware monitoring and sign hardware maintenance contract Periodic checks and updates Datacenter UPS Monitor, check and reporting. Perform monthly maintenance

L L L

FPSSB/IMS/REC/RISK-001 Template Version: 1.0

RISK ASSESSMENT System Development / Implementation

System Maintenance & Support

Program errors(Logic & formula)

Wrong reports produced, Competent programmer

Reports

A

3

2

6

Only Authorised person has access right only Change request (CR) should be established for any programs change.

Treat

1.Data not key in timely 2.Program errors(Logic & formula)

End user could not perfom daily task in appropriate manner

System errors and not functioning as usual.

A

3

2

6

Change request (CR) should be established for any programs change.

Treat

Lack of latest technology update

Reports could be produced in timely manner due to delay in posting.

1.User acceptance test(UAT) and training shall be conducted and sign off by user.One of the scope of project implementation. 2.Unauthorized change to the program ( abapers & programmer) 3.Send abapers/programmer to attend training

M

L

Consultation Service

Business Application (IT Services New Request)

Integration Service

Hardware • Software • System interfaces • Data and information • People • System mission

System or program is inaccessible

1 Program errors(Logic & formula) 2 Communication line not stable 3.Data corrupted

Wrong reports produced, Competent programmer

1. Application will not functioning 2. System will be slow

Rely on Vendor

Lack of support from Vendor

Creating the risk of delivery disruption or failure

1. Web Application Server Stop Functioning 2. Storage Full

1. Patches not up to date 2.Not well monitored

1. Application will not functioning

Program errors(Logic & formula)

Wrong reports produced, Competent programmer

Impact on Cmp/unit Business Operation

Lack of monitoring by the Server Team

1.Security and control of access to system. 2.Misuse Information

A

3

2

6

Transfer

C,I

3

2

6

1. Moniter by Server Team 2. Replace the file or repare the file that has been corrupted 3. re-Register DLL 4.Antivirus update

A

3

2

6

Developers need to ensure their software meets the highest standards for quality from vendor

1. Treat 2.Replace 3.Treat 4.Treat

FPSSB will make sure all user who use the system get enough training before they can start using the application.

L

1. Monitor the condition of the server 2. Replace the file or repare the file that has been corrupted 3. re-Register DLL 4. Monitor Antivirus update

M

User acceptance test(UAT) and training shall be conducted and sign off by user.One of the scope of project implementation.

M

Perform daily health check/monitoring the condition of the server

M

Send Abapers to Abap Training.

M

Always monitor the condition of the servers.

M

3rd Party Outsourcing

Entreprise Content Management

Transfer

A,C,I

5

3

15

1. Monitored by Server Team 2.Monitored by Functional Team

A

5

3

15

Syatem Landscape (Dev,QAS,Prd)

Unable to retrieve latest data from SAP/RML

C,I

5

3

15

Restart service ASAP when connectivity is restored

Unauthorized personnel misuse the confidential information

Security access control (authorization)

C,I

5

3

15

Authorization matrix

Threat

To strengten on authorization

M

1.Network Failure 2.Databases corrupted 3.EIS Server Failure

Lack of monitoring by the Network/Server Team

Impact on daily business operation and company's profit.

A,C,I

5

3

15

1. Monitored by server team 2. Restart server 3.System monitoring by BA team. 4. Train and expose new staff

Threat

To suggest the best method of commnucation line

M

IIS stop functioning

Lack of monitoring by the Server Team

Application will not fuctioning.

C, I

5

3

15

Only Server Team are able to direct access & look into the server.

Always monitor the condition of the servers.

M

1. IIS stop functioning 2. Data corrupted 3. DLL Library not well function 4. Virus

1. Not well monitor 2. Not proper stop the program (during process in progress running. 3.Related to the OS 4. Antivirus not up to date or is not function

1. Application will not functioning 2. System will be slow

1. Monitor the condition of the server 2. Replace the file or repare the file that has been corrupted 3. re-Register DLL 4. Monitor Antivirus update

M

1. Web Application Server Stop Functioning 2. Scanner Problem 3. Storage Full

1. Patches not up to date 2.Not well monitored

1. Application will not functioning

Perform daily health check/monitoring the condition of the server

M

Rely on Vendor

Lack of support from Vendor

To choose preferred vendor by technical evaluation.

L

Rely on Vendor

Lack of support from Vendor

Wrongly transport. Wrongly configuration

Left out transport number. New staff doing config. Staff left out some steps to config.

SAP ECC 6.0/ SAP Customized – Enhancement Management

Misconcept

SAP ECC 6.0/ SAP Customized – Program Change Management

Misconcept

ABAP

Treat

Threat

Plantation Applications Lost connectivity to SAP/AS400 servers Weighbridge & Mill Applications

Enterprise Transport Management

Website & Portal Business Application (Existing Application System)

Server /Internet Service down, Hardware Technology Integration Solution (TIS) • Software • System interfaces • Data and information • People • System mission

Transfer

Transfer

C,I

5

3

15

1. Moniter by Server Team 2. Replace the file or repare the file that has been corrupted 3. re-Register DLL 4.Antivirus update

C,I

5

3

15

1. Monitored by Server Team 2.Monitored by Functional Team

Creating the risk of delivery disruption or failure

A

3

3

9

Developers need to ensure their software meets the highest standards for quality from vendor

Transfer

Creating the risk of delivery disruption or failure

A

3

3

9

Developers need to ensure their software meets the highest standards for quality from vendor

Transfer

If configuration wrongly transport or done, PRD might have problem especially when its involved with daily routine like printing invoice, check, delivery process and etc.

A,C,I

3

1

3

Testing in QAS before transport to PRD.

Trreat

Requirement from user are not clearly configure and analyse.

If requirement from user not clear and functional misconcept on user demand the enhancement not being accepted by user eventhough confirmation with user has been done.

A,C,I

4

4

16

User acceptance testing.

Treat

Meeting user to gather the requirement clearly and get the user confirmation on the user request.

M

Requirement from user are not clearly configure and analyse.

If requirement from user not clear and functional misconcept on user demand the enhancement not being accepted by user eventhough confirmation with user has been done.

A,C,I

4

4

16

User acceptance testing.

Treat

Meeting user to gather the requirement clearly and get the user confirmation on the user request.

M

1. Treat 2.Replace 3.Treat 4.Treat

New Dimension Product (NDP)

Others Applications

3rd Parties Applications

SAP ECC 6.0/ SAP Customized – Configuration Management

ERP Consulting

To choose preferred vendor by technical evaluation. L Re-config or re-transport if the should have any problem. Testing again at QAS before transport to PRD.

L

Monitor, check and reporting.

SAP ECC 6.0/ SAP Customized – ESS integration with SAP ECC6 system SAP ECC 6.0/ SAP Customized – MSS integration with SAP ECC6 system

Treat

System not accessible

Server failure, no backup performed regularly

System not accessible.

C,I

5

1

5

Perform regular monitoring and maintenance.

Treat

L Monitor, check and reporting.

SAP PRD SAP QAS SAP DEV ESS, MSS Non SAP Application

System not accessible

Server failure, no backup performed regularly

System not accessible.

Most probably for schedule job to integrate between Non-SAP and SAP system.

Whenever the schedule job fail to perform then need to do manually t interface the information and data from the nonSAP system such WBS.

C,I

5

1

5

Perform regular monitoring and maintenance.

Treat

L Monitor, check and reporting.

SAP ECC 6.0/ SAP Customized – Integration between other systems with SAP ECC6.0 (Non-SAP)

Integration system down. System cannot be access. Power failure.

Lack of trainer. Trainer not ready for training.

Trigger for crash course training or whenever there are certain period that staff is leave.

Staff still not competent to give training especially for new staff. No staff to provide training as number of staff is insufficient to fulfill two services which are for system support and training.

A,C,I

5

1

5

Perform regular monitoring and maintenance.

Treat

L

Junior trainer need to undergo relevant training to build up competency skills to conduct training. A

1

1

1

Senior will replace trainer and junior will join the training.

Treat

L

Training

Late creation or double creation.

Data duplicate as key in data entry in SAP without checking If detail of master data is not completely provided, buffer time first. Missing details to ease the creation. New staff don't know will increase as need to gather the info from user and fulfill th procedure. any other relevant data.

A,C,I

1

1

1

Do verfication with user. Confirm all the relevant details.

Treat

Checking the master table before do the new creation of master data. Checking all relevant info are sufficient to create the new master data.Make sure every staff understand and follow the SOP

L

Treat

During peak time server need to provide the most usage at practical speeds.

M

Create/Maintain Master Data Slow speed at peak time. System support

Administration

Daily routine cannot be carried out eg, print cheque, invoice, delivery process, etc.

Sometimes at peak times(closing) some process is not up to expectation.

A,C,I

5

5

25

Ensure server run at the most availability.

Building ( Computer Lab, Server Room) - Rent

Not enough space / space less for staff/server

Ask to Shift location/ Too many user training at one time (not enough lab)/Staff Growth.

a. additional rented space. - Technical staffs transfer to City 1 rooms transfer to Anjung

Telephone/Fax

Breakdown of Communication with customer

Telephone and fax system breakdown.

Upgrade Red Tone System

Receptionist/ Telephonist

No answer call (15-25 calls) will effect the company reputation.

EL / MC & Notice 24 Hours

Standby staff to perform the task

Staff SAP

Improper Job Handover / specialist

1. 24 Hours Notice 2. Senior/certified staff resign

a. Ensure support staff has equivalent knowledge and skill (increase competency). b. Document all activities and project. c. work with Prodata's subsidiaries

Management

Job handover/ specialist

24 Hours Notice

Successor plan inplace & submitted to FHB

Internal Staff Transfer

Unauthorise access (ID SAP, restricted area)

Confidential document/information might be stolen by unauthorized person

1. Staff to conduct handover job 2. Fill in HR007 form (Inter Deparmental Staff Transfer Form)

Replacement staff.

- Project

HR & Admin

Human Resource

Temporary Access Card

1. Admin shall reminds the respective Head of Unit on 1. The staff (Security) change without the written approval. 2. Admin did not raise request to extend the expired access card.

All

the expiry of the access card. 2. If necessary, Head of Unit shall fill-up HR05 Form to extend the access card.

Documentation

Unauthorize access to documentation

Lack of proper place to store the documents

Documents may not be accessible efficiently.

Documentation

Unable to performs tasks efficient

Lack of proper documentation and policies in place

New staff may find it difficult to understand and perform the daily operation work.

Administrative

Number of risks by Matrix Number of Risks in High Risk Zone Number of Risks in Moderate Risk Zone Number of Risks in Low Risk Zone Total Number of Risks

Personnel

Human errors

Lack of training or incompetent staff

Insufficient training / knowledge / experiences in managing the tasks.

Personnel

Operation degraded

High-rate of turn-over

Unable to provide excellent services.

12 39 10 61

Request proper room to store documentation.

A, C, I

3

1

3

Regular updates of documents and knowledge base

Treat

A

3

1

3

Regular update SOP

Treat

Centralize and integrate SOP into online knowledge base with backup.

Treat

Email on ad hoc basis when discover any issue and the possible solution. Updating internal knowledge base.

A, C, I

4

2

8

Knowledge sharing when discover any issue

A

4

4

16

Existing team member to take over the job until the new replacement is in place

Transfer

Discussion with HR for Staff Retention Program

L L L M

RISK ASSESSMENT

MOHAMMAD ZAMRIL ISMAIL IT GOVERNANCE

ALI MUSTAFA GENERAL MANAGER

1 Mar 2013

1 Mar 2013

FPSSB/IMS/REC/RISK-001 Template Version: 1.0

Service Risk Owner

Service System Development / Implementation

System Maintenance & Support Consultation Service

Business Application (IT Services New Request)

Integration Service

3rd Party Outsourcing

Entreprise Content Management

ABAP Plantation Applications

Weighbridge & Mill Applications

Enterprise Transport Management

Website & Portal Business Application (Existing Application System)

Technology Integration Solution (TIS)

Business Application (Existing Application System)

New Dimension Product (NDP)

Others Applications

3rd Parties Applications

Service Sevice Component

Threats

Program errors(Logic & formula)

1.Data not key in timely 2.Program errors(Logic & formula)

Lack of latest technology update Hardware • Software • System interfaces • Data and information • People • System mission

1 Program errors(Logic & formula) 2 Communication line not stable 3.Data corrupted

Rely on Vendor

1. Web Application Server Stop Functioning 2. Storage Full

Program errors(Logic & formula)

Lost connectivity to SAP/AS400 servers

1.Security and control of access to system. 2.Misuse Information 1.Network Failure 2.Databases corrupted 3.EIS Server Failure Server /Internet Service down, Hardware • Software • System interfaces • Data and information • People • System mission

IIS stop functioning 1. IIS stop functioning 2. Data corrupted 3. DLL Library not well function 4. Virus

• Software • System interfaces • Data and information • People • System mission 1. Web Application Server Stop Functioning 2. Scanner Problem 3. Storage Full

Rely on Vendor

Rely on Vendor

Risk Register Vulnerabilities

Risk Description

Wrong reports produced, Competent programmer

Reports

End user could not perfom daily task in appropriate manner

System errors and not functioning as usual.

Reports could be produced in timely manner due to delay in posting.

System or program is inaccessible

Wrong reports produced, Competent programmer

1. Application will not functioning 2. System will be slow

Lack of support from Vendor

Creating the risk of delivery disruption or failure

1. Patches not up to date 2.Not well monitored

1. Application will not functioning

Wrong reports produced, Competent programmer

Impact on Cmp/unit Business Operation

Lack of monitoring by the Server Team

Unable to retrieve latest data from SAP/RML

Unauthorized personnel misuse the confidential information

Security access control (authorization)

Lack of monitoring by the Network/Server Team

Impact on daily business operation and company's profit.

Lack of monitoring by the Server Team

Application will not fuctioning.

1. Not well monitor 2. Not proper stop the program (during process in progress running. 3.Related to the OS 4. Antivirus not up to date or is not function

1. Application will not functioning 2. System will be slow

1. Patches not up to date 2.Not well monitored

1. Application will not functioning

Lack of support from Vendor

Creating the risk of delivery disruption or failure

Lack of support from Vendor

Creating the risk of delivery disruption or failure

Risk Register (A=Availability, C=Confidentiality, I=Integrity)

Impact / Severity (Score 1-5)

Probability/ Likelihood (Score 1-5)

Result of Risk (Total Score)

A

3

2

6

A

3

2

6

A

3

2

6

C,I

3

2

6

A

3

2

6

A,C,I

5

3

15

A

5

3

15

C,I

5

3

15

C,I

5

3

15

A,C,I

5

3

15

C, I

5

3

15

C,I

5

3

15

C,I

5

3

15

A

3

3

9

A

3

3

9

Risk Treatment Plan Risk ID

Current Control

Risk Treatment

Only Authorised person has access right only Change request (CR) should be established for any programs change.

Treat

Change request (CR) should be established for any programs change.

Treat

Transfer

1. Moniter by Server Team 2. Replace the file or repare the file that has been corrupted 3. re-Register DLL 4.Antivirus update

Developers need to ensure their software meets the highest standards for quality from vendor

1. Treat 2.Replace 3.Treat 4.Treat

Transfer

1. Monitored by Server Team 2.Monitored by Functional Team

Treat

Syatem Landscape (Dev,QAS,Prd)

Restart service ASAP when connectivity is restored

Threat

Transfer

Authorization matrix

Threat

1. Monitored by server team 2. Restart server 3.System monitoring by BA team. 4. Train and expose new staff

Threat

Only Server Team are able to direct access & look into the server. 1. Moniter by Server Team 2. Replace the file or repare the file that has been corrupted 3. re-Register DLL 4.Antivirus update

Transfer 1. Treat 2.Replace 3.Treat 4.Treat

1. Monitored by Server Team 2.Monitored by Functional Team

Treat

Developers need to ensure their software meets the highest standards for quality from vendor

Transfer

Developers need to ensure their software meets the highest standards for quality from vendor

Transfer

k Treatment Plan Controls to be implemented

1.User acceptance test(UAT) and training shall be conducted and sign off by user.One of the scope of project implementation. 2.Unauthorized change to the program ( abapers & programmer) 3.Send abapers/programmer to attend training

Target Risk Level

M

FPSSB will make sure all user who use the system get enough training before they can start using the application.

1. Monitor the condition of the server 2. Replace the file or repare the file that has been corrupted 3. re-Register DLL 4. Monitor Antivirus update

M

User acceptance test(UAT) and training shall be conducted and sign off by user.One of the scope of project implementation.

M

Perform daily health check/monitoring the condition of the server

L

Send Abapers to Abap Training.

M

Always monitor the condition of the servers.

M

To strengten on authorization

L

To suggest the best method of commnucation line

L

Always monitor the condition of the servers.

M

1. Monitor the condition of the server 2. Replace the file or repare the file that has been corrupted 3. re-Register DLL 4. Monitor Antivirus update

M

Perform daily health check/monitoring the condition of the server

L

To choose preferred vendor by technical evaluation.

L

To choose preferred vendor by technical evaluation. L

Service Risk Owner

Service SAP ECC 6.0/ SAP Customized – Configuration Management

SAP ECC 6.0/ SAP Customized – Enhancement Management

SAP ECC 6.0/ SAP Customized – Program Change Management

SAP ECC 6.0/ SAP Customized – ESS integration with SAP ECC6 system

ERP Consulting

SAP ECC 6.0/ SAP Customized – MSS integration with SAP ECC6 system SAP ECC 6.0/ SAP Customized – Integration between other systems with SAP ECC6.0 (Non-SAP)

Training

Create/Maintain Master Data

System support

Service Sevice Component

Threats

Wrongly transport. Wrongly configuration

Misconcept

Misconcept

System not accessible

SAP PRD SAP QAS SAP DEV ESS, MSS Non SAP Application

System not accessible

Integration system down. System cannot be access. Power failure.

Lack of trainer. Trainer not ready for training.

Late creation or double creation.

Slow speed at peak time.

Risk Register Vulnerabilities

Risk Description

Left out transport number. New staff doing config. Staff left out some steps to config.

If configuration wrongly transport or done, PRD might have problem especially when its involved with daily routine like printing invoice, check, delivery process and etc.

Requirement from user are not clearly configure and analyse.

If requirement from user not clear and functional misconcept on user demand the enhancement not being accepted by user eventhough confirmation with user has been done.

Requirement from user are not clearly configure and analyse.

If requirement from user not clear and functional misconcept on user demand the enhancement not being accepted by user eventhough confirmation with user has been done.

Server failure, no backup performed regularly

System not accessible.

Server failure, no backup performed regularly

System not accessible.

Most probably for schedule job to integrate between Non-SAP and SAP system.

Whenever the schedule job fail to perform then need to do manually t interface the information and data from the nonSAP system such WBS.

Trigger for crash course training or whenever there are certain period that staff is leave.

Staff still not competent to give training especially for new staff. No staff to provide training as number of staff is insufficient to fulfill two services which are for system support and training.

Data duplicate as key in data entry in SAP without checking If detail of master data is not completely provided, buffer time first. Missing details to ease the creation. New staff don't know will increase as need to gather the info from user and fulfill th procedure. any other relevant data.

Daily routine cannot be carried out eg, print cheque, invoice, delivery process, etc.

Sometimes at peak times(closing) some process is not up to expectation.

Risk Register (A=Availability, C=Confidentiality, I=Integrity)

A,C,I

A,C,I

A,C,I

C,I

C,I

A,C,I

A

A,C,I

A,C,I

Impact / Severity (Score 1-5)

Probability/ Likelihood (Score 1-5)

Result of Risk (Total Score)

Risk Treatment Plan Risk ID

Current Control

Risk Treatment

Testing in QAS before transport to PRD.

Trreat

User acceptance testing.

Treat

User acceptance testing.

Treat

Perform regular monitoring and maintenance.

Treat

Perform regular monitoring and maintenance.

Treat

Perform regular monitoring and maintenance.

Treat

Senior will replace trainer and junior will join the training.

Treat

Do verfication with user. Confirm all the relevant details.

Treat

Ensure server run at the most availability.

Treat

k Treatment Plan Controls to be implemented Re-config or re-transport if the should have any problem. Testing again at QAS before transport to PRD.

Target Risk Level

L

Meeting user to gather the requirement clearly and get the user confirmation on the user request.

L

Meeting user to gather the requirement clearly and get the user confirmation on the user request.

L

Monitor, check and reporting. L Monitor, check and reporting. L Monitor, check and reporting. L

Junior trainer need to undergo relevant training to build up competency skills to conduct training. L

Checking the master table before do the new creation of master data. Checking all relevant info are sufficient to create the new master data.Make sure every staff understand and follow the SOP

L

During peak time server need to provide the most usage at practical speeds.

L

Service Risk Owner

Service

Rental Service

Managed Enterprise Services

E-mail

Service Sevice Component

Threats

Lost of data due to hardware failure

PC , Notebook, Server Uncontrolled viruses attack / intrusion

Server

Hardware failure Power failure Network failure

Software

Spam

Software

Unauthorized access

Software

E-mail missing

Software

Phishing

Software (Webmail)

Apache and Dovecot not running

Risk Register Vulnerabilities

Risk Description a) Not properly shutdown

b) Old Hardware

Lack of maintenance

Lack of patch updates

PC, Notebook, Server harvested by viruses, spammer and may affected other PC, Notebook or server within the VLAN

Email services inaccessible. Susceptibility to voltage variations

Email services inaccessible.

Lack of network maintenance

Email services inaccessible.

Published email address

Email addresses harvested by spammer.

Lack of patch updates and poor password management

Email server is compromised.

Misconfiguration

Important emails are lost.

Lack of server maintenance and user awareness

Email accounts are compromised and server being black listed by external mail servers.

Lack of monitoring mechanism

Webmail service is inaccessible.

Risk Register (A=Availability, C=Confidentiality, I=Integrity)

C, A

A

A A A C C A C, I A

Impact / Severity (Score 1-5)

Probability/ Likelihood (Score 1-5)

Result of Risk (Total Score)

Risk Treatment Plan Risk ID

Current Control

Risk Treatment

Perform preventive maintenance

Treat

Perform preventive maintenance

Treat

Perform regular maintenance

Treat

Regular check by FES

Transfer

Perform regular monitoring and maintenance

Treat

Perform regular maintenance

Treat

Perform regular monitoring and maintenance

Treat

Perform regular monitoring and maintenance

Treat

Perform regular monitoring

Treat

Inform end user regularly

Treat

k Treatment Plan Controls to be implemented a) Propose file server for data backup (PC , Notebook) b) Establish Data Recovery Center (DRC) for non SAP c) Execute preventive maintenance

Target Risk Level

L

a) Update main antivirus with the latest virus pattern. b) Conduct Awareness to users regarding virus threat and prevention, scan thumb drive before opening file. c) Configure individual PC, notebook for scheduled scanning.

L

Monitor, check and reporting. Perform quarterly maintenance

L

Periodic checks and updates by FES Monitor, check and reporting. Perform monthly maintenance

L L

Monitor, check and reporting. Perform quarterly maintenance.

M

Monitor, check and reporting. Perform daily maintenance

M

Monitor, check and reporting.Perform daily maintenance

L

Monitor, check and reporting. Perform daily maintenance.

M

Mass mail to end user once in a month.

L

Service Risk Owner

Service

Network

Managed IPVPN Managed VSAT

Managed CCTV surveillance Managed Communication & Data Security

Managed Door Access Security System

Managed LAN

Managed LAN

Service Sevice Component

Threats

Hardware (Network Equipments / Servers)

Hardware failure

Hardware (Network Equipments / Servers)

Hardware failure

Hardware (UPS)

Battery dry out

Hardware (Structured Cabling)

Water leakage and pests attack

Network Administrator

System hacked

Software

Unauthorized access

Router, ISDN Backup

IPVPN/IPVPN Value Failure

IDU, ODU, Router, Modem

VSAT Failure

Hardware a) Storage Server b) Camera

Storage server down and camera faulty.

Network

Network failure

Electricity

Power failures.

Hardware a) Server b) Controller c) Card reader

Malfunction Controller or Card reader.

Network

Network down.

Electricity

Power failures.

Core switches failures Core Switch, Access Switch

Core Switch, Access Switch Unauthorized access

Risk Register Vulnerabilities

Risk Description

Lack of maintenance

Network services are inaccessible.

Susceptibility to voltage variations

Network services are inaccessible.

Lack of maintenance

Network services are inaccessible when there is no electricity.

Lack of periodic building maintenance and pest control

Network is intermittent or inaccessible.

Lack of competent of monitoring day to day network activities and security of the systems

Poses a security threat

Lack of maintenance and poor password management

Network services are inaccessible .

Lack of maintenance

Network services are inaccessible .

Lack of maintenance

Network services are inaccessible

Lack of maintenance

CCTV unable to operates

Lack of network maintenance

CCTV unable to operates

Susceptibility to voltage variations

CCTV unable to operates

Lack of maintenance

Fail delivery of attendance data to server ( TMS and SAP) due to malfunction of Controller or Card reader

Lack of network maintenance

Data stuck or pending at controller & not transferred to server. Thus causing data will not be updated with the latest data and no access report.

Susceptibility to voltage variations

System will fail to function (i.e. door not secure) after battery backup runs out

Lack of network maintenance

Network services are inaccessible

System being hacked and information stolen by hackers Misconfiguration

Risk Register (A=Availability, C=Confidentiality, I=Integrity)

A A A A C, I, A A A A

A

A A

C, A

C, A

C, A

A

Impact / Severity (Score 1-5)

Probability/ Likelihood (Score 1-5)

Result of Risk (Total Score)

C, I, A

Risk Treatment Plan Risk ID

Current Control

Perform regular maintenance

Risk Treatment

Transfer

Regular check by Network Team / OSS

Treat

Perform regular maintenance

Treat

Regular check by FES

Transfer

Perform regular maintenance

Treat

Perform regular maintenance

Treat

Perform regular maintenance

Transfer

Perform regular maintenance

Treat

Regular check by Network Team

Treat

Regular check by FES

Treat

Perform preventive maintenance

Treat

Regular check by Network Team

Treat

Regular check by Network Team / FES

Treat

Regular check by Network Team

Treat

Regular check by Network Team

Treat

k Treatment Plan Controls to be implemented Continous monitor, check and reporting. Engaged vendors for maintenance Periodic checks and updates by Network Team / OSS Monitor, check and reporting. Introduce IP-based UPS system Periodic updates by FES.

Manager alerts, evaluates and verifies new software updates. a) Not guarantee -base on best effort

Target Risk Level

L L L L

L L

a) Sign up SLA with Telekom (Max 2 days resolution) L b) NMS software to monitor a) Monitoring and maintenance checking on daily, monthly and yearly basis to ensure sustain of operation. b) Troubleshoot server c) Preventive maintainance (SLA) d) Disaster recovery e) Check network availability & performance f) Reset camera's power & network cable g) Repair or change camera

Check network availability & performance Back up power must be on standby a) Preventive maintenance ( twice a year) to make sure all hardware and software in good condition b) Repair or change controler or controller's power & network cable c) Reset or change card reader

L

L L

L

a) Check network availability & performance b) Check and reset communication converter c) Change communication converter (faulty) L

Back up power must be on standby

L

a) Sign Maintenance aggreement with vendors b) Used Network management system(NMS) software to monitor daily activity

L

a) Implement Intrusion Prenvention System (IPS) b) System penetration test

M

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF