What do you use for Risk Management?
-
Hit 'Enter' and pray.
Just kidding. No software or product used, just a list of things i can think of that might cause problems. DIdnt even know such products existed, going to look at this. -
Yeah, certainly nothing formal.
-
@scottalanmiller said in What do you use for Risk Management?:
Nothing formal. Not sure that I know anyone that is doing formal processes for that.
Really? It's pretty much the only way to go anymore. How are you going to know which servers have which risks otherwise? Not to mention that not all risks or vulnerabilities can be fixed due to certain circumstances. Upgrading Java or doing an OS patch could break a business critical application.
Exceptions and reasons why certain vulnerabilities can't be fixed should be documented. For example if you hacked because you are unable to patch a certain application due to vendor requirements, it's documented and you are CYA
-
It is especially necessary if you gave many different data custodians. There needs to be a central repository.
-
@IRJ said in What do you use for Risk Management?:
@scottalanmiller said in What do you use for Risk Management?:
Nothing formal. Not sure that I know anyone that is doing formal processes for that.
Really? It's pretty much the only way to go anymore. How are you going to know which servers have which risks otherwise? Not to mention that not all risks or vulnerabilities can be fixed due to certain circumstances. Upgrading Java or doing an OS patch could break a business critical application.
Exceptions and reasons why certain vulnerabilities can't be fixed should be documented. For example if you hacked because you are unable to patch a certain application due to vendor requirements, it's documented and you are CYA
SMB, management doesn't analyze risk.
-
@scottalanmiller said in What do you use for Risk Management?:
@IRJ said in What do you use for Risk Management?:
@scottalanmiller said in What do you use for Risk Management?:
Nothing formal. Not sure that I know anyone that is doing formal processes for that.
Really? It's pretty much the only way to go anymore. How are you going to know which servers have which risks otherwise? Not to mention that not all risks or vulnerabilities can be fixed due to certain circumstances. Upgrading Java or doing an OS patch could break a business critical application.
Exceptions and reasons why certain vulnerabilities can't be fixed should be documented. For example if you hacked because you are unable to patch a certain application due to vendor requirements, it's documented and you are CYA
SMB, management doesn't analyze risk.
I could still see it as a good tool for IT to document any vulns they cannot fix and associated emails with the vendor that prove you've done your due diligence.
-
Not a bad idea, will have to check out some software for it.
-
I love this idea and will keep it in the bag for future reference.
I just wish people will document anything around here. I can't even get them to use a helpdesk system, which they purchased. Not even the IT department. Therefore, this is clearly more of a management issue than it is an IT issue that I cannot get around. Sorry. Rant over.
-
Right now, risk managament is mostly utilized in enterprise space, because enterprise sees value in things that SMB usually don't. Not to mention that in SMB, executives are rarely trained in IT. Generally in SMB even the CIO doesn't have the high level training to understand the process.
-
@scottalanmiller said in What do you use for Risk Management?:
Not a bad idea, will have to check out some software for it.
-
@IRJ said in What do you use for Risk Management?:
@scottalanmiller said in What do you use for Risk Management?:
Not a bad idea, will have to check out some software for it.
We actually helped with the CentOS documentation. As one of our corporate requirements is to use CentOS or RHEL for all linux installations. Previously, SimpleRisk was only supported on Ubuntu.
-
@IRJ wow those add ons are not cheap. just reading names they each do not seem like they are worth that cost.
Their basic hosted cost would be more cost effective for many years.
-
@JaredBusch said in What do you use for Risk Management?:
@IRJ wow those add ons are not cheap. just reading names they each do not seem like they are worth that cost.
Their basic hosted cost would be more cost effective for many years.
Holy cow, is that annually or one-time cost?
-
@NerdyDad said in What do you use for Risk Management?:
@JaredBusch said in What do you use for Risk Management?:
@IRJ wow those add ons are not cheap. just reading names they each do not seem like they are worth that cost.
Their basic hosted cost would be more cost effective for many years.
Holy cow, is that annually or one-time cost?
Annually.
-
Is it just me, or are they charging for encryption functionality, which can be setup on your installation when you INSTALL . . . $2k Annually for that is a complete ripoff.
SimpleRisk Encrypted Database Extra Sensitive text is encrypted with a long, random, password prior to being inserted into the SimpleRisk database preventing anyone from being able to view or modify the data without using the SimpleRisk application directly.
-
@JaredBusch said in What do you use for Risk Management?:
@IRJ wow those add ons are not cheap. just reading names they each do not seem like they are worth that cost.
Their basic hosted cost would be more cost effective for many years.
Unfortunately, some of them are necessary for us. Like LDAP integration, email notifications, and team based separation. These are required for me to create proper workflows in an enterprise size environment. There are potentially hundreds of users I need to involve for different pieces of this system.
-
@DustinB3403 said in What do you use for Risk Management?:
Is it just me, or are they charging for encryption functionality, which can be setup on your installation when you INSTALL . . . $2k Annually for that is a complete ripoff.
SimpleRisk Encrypted Database Extra Sensitive text is encrypted with a long, random, password prior to being inserted into the SimpleRisk database preventing anyone from being able to view or modify the data without using the SimpleRisk application directly.
No, you have no idea what you are talking about. This is not disk enryption. This is encryption of the data in the database itself.
-
@JaredBusch said in What do you use for Risk Management?:
@IRJ wow those add ons are not cheap. just reading names they each do not seem like they are worth that cost.
Their basic hosted cost would be more cost effective for many years.
I agree that the hosted version is much better pricewise and of course that is what is pushed by SimpleRisk. However, it's kind of scary having all your vulnerabilities on your network managed off site by a small company.
-
@IRJ said in What do you use for Risk Management?:
@JaredBusch said in What do you use for Risk Management?:
@IRJ wow those add ons are not cheap. just reading names they each do not seem like they are worth that cost.
Their basic hosted cost would be more cost effective for many years.
I agree that the hosted version is much better pricewise and of course that is what is pushed by SimpleRisk. However, it's kind of scary having all your vulnerabilities on your network managed off site by a small company.
I totally get that too. I have done software development. I get that it is not cheap. But those prices are just out of line.
-
@JaredBusch said in What do you use for Risk Management?:
@DustinB3403 said in What do you use for Risk Management?:
Is it just me, or are they charging for encryption functionality, which can be setup on your installation when you INSTALL . . . $2k Annually for that is a complete ripoff.
SimpleRisk Encrypted Database Extra Sensitive text is encrypted with a long, random, password prior to being inserted into the SimpleRisk database preventing anyone from being able to view or modify the data without using the SimpleRisk application directly.
No, you have no idea what you are talking about. This is not disk enryption. This is encryption of the data in the database itself.
But why not encrypt the entire system, why encrypt the individual records of the database?