11.01.2017 Views

A Technical History of the SEI

ihQTwP

ihQTwP

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Continuous Risk Management training course. The guidebook and associated course enabled program<br />

managers and risk managers to learn how to manage risks more effectively.<br />

In 1997, <strong>the</strong> <strong>SEI</strong> began to broaden its s<strong>of</strong>tware risk management approach to o<strong>the</strong>r s<strong>of</strong>tware-related<br />

areas including cybersecurity. When <strong>the</strong> Army wanted a risk management approach tailored<br />

to acquisition programs, this work became <strong>the</strong> foundation for guidance in implementing <strong>the</strong> risk<br />

management process area <strong>of</strong> <strong>the</strong> S<strong>of</strong>tware Acquisition CMM. The COTS Usage Risk Evaluation<br />

(CURE) and <strong>the</strong> Architecture Trade<strong>of</strong>f Analysis Method (ATAM), which focused on COTS products<br />

and s<strong>of</strong>tware system architecture, respectively, were variations on <strong>the</strong> original risk assessment<br />

(SRE). Risk was incorporated into CMMI in 2000 as a practice area (RSKM) in CMMI<br />

V1.02.<br />

Risk management was also a focus in <strong>the</strong> ongoing research<br />

into cybersecurity by <strong>the</strong> CERT Coordination<br />

Center (CERT/CC). In 1997, <strong>the</strong> Information Security<br />

Evaluation (ISE), a variation <strong>of</strong> <strong>the</strong> SRE, was used to<br />

identify vulnerabilities in operational, networked information<br />

technology systems. In 1998, CERT researchers<br />

began developing a new approach for managing cybersecurity<br />

risks within an organization based on <strong>the</strong> principles<br />

<strong>of</strong> CRM and ISE. This research and <strong>the</strong> Defense<br />

Health Information Assurance Program (DHIAP) 22 were<br />

<strong>the</strong> driving forces for developing <strong>the</strong> Operationally Critical<br />

Threat, Asset, and Vulnerability Evaluation<br />

(OCTAVE) [Alberts 2003]. The goal was to develop a<br />

self-directed risk assessment as part <strong>of</strong> <strong>the</strong> DoD effort to<br />

comply with <strong>the</strong> data security requirements defined by<br />

<strong>the</strong> Health Insurance Portability and Accountability Act<br />

(HIPAA) <strong>of</strong> 1996. DHIAP transitioned OCTAVE to <strong>the</strong><br />

Air Force and Army in 2001, using <strong>the</strong> <strong>SEI</strong> OCTAVE<br />

training. OCTAVE continues to be a widely used information<br />

security risk assessment method.<br />

The View from O<strong>the</strong>rs<br />

I think <strong>the</strong> biggest contribution<br />

was to bring awareness to <strong>the</strong> subject<br />

[<strong>of</strong> s<strong>of</strong>tware risk management],<br />

help legitimize it as a program/project<br />

management<br />

concern, and gave a process for<br />

operationalizing it in a useful way.<br />

– Robert Charette, founder <strong>of</strong><br />

ITABHI Corporation and<br />

Chairman <strong>of</strong> <strong>the</strong> <strong>SEI</strong> Risk<br />

Program Advisory Board<br />

A Navy Program Manager stated<br />

in <strong>the</strong> late 1990s that all <strong>of</strong> his investment<br />

in <strong>the</strong> <strong>SEI</strong> Risk Program<br />

had paid <strong>of</strong>f with <strong>the</strong> identification<br />

and mitigation <strong>of</strong> a single catastrophic<br />

risk.<br />

By 2005, s<strong>of</strong>tware acquisition and development programs<br />

were becoming more distributed in nature, <strong>of</strong>ten comprising multiple geographically distributed<br />

organizations. Traditional risk approaches did not readily scale to <strong>the</strong>se networked, highly<br />

complex program environments. In 2006, <strong>the</strong> <strong>SEI</strong> began research into managing risks in interactively<br />

complex s<strong>of</strong>tware-reliant systems. This led to new methods for assessing risk and success<br />

factors in complex networked systems (e.g., Mission (Risk) Diagnostic [Alberts 2008, 2009,<br />

2012]) and a focus on using key drivers <strong>of</strong> success to produce a systemic view <strong>of</strong> program risk<br />

22 DHIAP was a small consortium <strong>of</strong> organizations, including <strong>the</strong> <strong>SEI</strong> and <strong>the</strong> Advanced Technology<br />

Institute (ATI) <strong>of</strong> <strong>the</strong> South Carolina Research Authority (SCRA), overseen by a group from <strong>the</strong> Telemedicine<br />

Advanced Technology Research Center (TATRC) from Fort Detrick, Maryland.<br />

CMU/<strong>SEI</strong>-2016-SR-027 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY 141<br />

Distribution Statement A: Approved for Public Release; Distribution is Unlimited.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!