11.01.2017 Views

A Technical History of the SEI

ihQTwP

ihQTwP

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Managing Operational Resilience<br />

The Challenge: Delivering Essential Services in <strong>the</strong> Presence <strong>of</strong> Stress and<br />

Disruption<br />

Beginning in <strong>the</strong> late 1990s, <strong>the</strong> DoD faced a set <strong>of</strong><br />

problems shared with organizations in every sector—<br />

U.S. federal government agencies, defense and commercial<br />

industry, and academia—arising from increasingly<br />

complex business and operational environments. Most<br />

organizations continue to be constantly bombarded with<br />

conditions and events that introduce stress and uncertainty<br />

that may disrupt effective operation. Stress related<br />

to operational resilience—<strong>the</strong> ability <strong>of</strong> an organization<br />

to achieve its mission even under degraded circumstances—can<br />

come from many sources, including risks<br />

and threats resulting from technology advances and <strong>the</strong><br />

increasing globalization <strong>of</strong> organizations and <strong>the</strong>ir supply<br />

chains.<br />

All <strong>the</strong>se demands conspire to force organizations to rethink<br />

how <strong>the</strong>y perform operational risk management<br />

and how <strong>the</strong>y address <strong>the</strong> resilience <strong>of</strong> high-value business<br />

services and processes. The traditional, and typically<br />

compartmentalized, disciplines <strong>of</strong> security, operational<br />

continuity, and information technology (IT)<br />

operations must be expanded to provide protection and<br />

continuity strategies for high-value services and supporting<br />

assets that are commensurate with <strong>the</strong>se new operating<br />

complexities.<br />

A Solution: Convergence <strong>of</strong> Operational<br />

Risk Disciplines That Accelerated <strong>the</strong><br />

<strong>SEI</strong>’s Ability to Tackle Resilience<br />

In 1999, <strong>the</strong> <strong>SEI</strong> released <strong>the</strong> Operationally Critical<br />

Threat, Asset, and Vulnerability Evaluation (OCTAVE)<br />

method for information security risk management.<br />

The View from O<strong>the</strong>rs<br />

Our comprehensive analysis <strong>of</strong><br />

business resilience management<br />

models identified CERT-RMM as<br />

<strong>the</strong> most promising model for use<br />

within our enterprise due to promoting<br />

convergence, modeling <strong>the</strong><br />

needs <strong>of</strong> a large enterprise, considering<br />

risks for both protecting<br />

and sustaining assets, and its focus<br />

on measuring and institutionalizing<br />

resilience processes.<br />

– Nader Mehravari, former<br />

director <strong>of</strong> Corporate<br />

Business Resiliency<br />

Strategic Initiative,<br />

Lockheed Martin Corp.<br />

[Caralli 2010, Ch. 7]<br />

CERT-RMM helps us define <strong>the</strong><br />

processes by which we conduct incident<br />

responses for security incidents,<br />

including how we interact<br />

with <strong>the</strong> o<strong>the</strong>r business units and<br />

<strong>the</strong> CISO’s [chief information security<br />

<strong>of</strong>ficer’s] <strong>of</strong>fice for <strong>the</strong> recovery<br />

<strong>of</strong> evidence and continuity<br />

<strong>of</strong> operations. [Joch 2013]<br />

OCTAVE provided a new way to look at information security risk from an operational perspective<br />

and asserted that operational (business) people are in <strong>the</strong> best position to identify and analyze<br />

security risk. This effectively repositioned IT’s role in security risk assessment and placed <strong>the</strong> responsibility<br />

closer to <strong>the</strong> operations activity in <strong>the</strong> organization [Alberts 1999].<br />

In October 2003, a group <strong>of</strong> 20 IT and security pr<strong>of</strong>essionals from defense organizations, <strong>the</strong> financial<br />

services sector, IT, and security services met at <strong>the</strong> <strong>SEI</strong> to begin building an executivelevel<br />

community <strong>of</strong> practice for IT operations and security. The desired outcome was to better<br />

capture and articulate <strong>the</strong> relevant bodies <strong>of</strong> knowledge that enable and accelerate IT operational<br />

CMU/<strong>SEI</strong>-2016-SR-027 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY 124<br />

Distribution Statement A: Approved for Public Release; Distribution is Unlimited.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!