Section 07

Risk Assessment Frameworks

Frameworks provide structured, repeatable processes for conducting risk assessments. This section covers the major frameworks in depth — their processes, outputs, strengths, and when to use each one. Use the decision tree at the end to select the right framework for your TRA engagement.

Framework Comparison

Framework Effort Main Output Best Regulatory Fit Tool Support
NIST 800-30 Medium Risk assessment report with semi-quantitative scores FISMA, FedRAMP, NIST CSF Medium (CSRC templates)
NIST RMF High Authorization to Operate (ATO) package FISMA, FedRAMP, DoD High (eMASS, OSCAL)
ISO 27005:2022 Medium Risk treatment plan aligned to ISO 27001 ISO 27001, GDPR, SOX Medium (GRC platforms)
OCTAVE Allegro Low-Medium Asset-centric risk profiles with worksheets General (any regulation) Low (worksheet-based)
CORAS Medium UML-based risk models and threat diagrams EU, safety-critical systems Low (CORAS tool, Eclipse)
TARA Medium Threat matrix with countermeasure mapping Defense, critical infrastructure Medium (MITRE tools)

NIST SP 800-30 Rev 1

The most widely referenced risk assessment guide for information systems. Defines a four-phase process with detailed guidance on threat source identification, vulnerability analysis, likelihood and impact determination.

NIST 800-30 Process

flowchart LR P["Prepare"] --> C["Conduct"] C --> COM["Communicate"] COM --> M["Maintain"] P --> P1["Define purpose & scope"] P --> P2["Identify assumptions & constraints"] P --> P3["Select risk model & approach"] C --> C1["Identify threat sources & events"] C --> C2["Identify vulnerabilities"] C --> C3["Determine likelihood"] C --> C4["Determine impact"] C --> C5["Determine risk"] style P fill:#ff8800,stroke:#000,color:#000 style C fill:#22d3ee,stroke:#000,color:#000 style COM fill:#a855f7,stroke:#000,color:#000 style M fill:#ec4899,stroke:#000,color:#000

Phase 1: Prepare

  • Purpose: Why the assessment is being conducted (new system, periodic review, incident response)
  • Scope: System boundaries, inherited controls, shared services
  • Assumptions: Threat environment, trust relationships, data sensitivity levels
  • Risk model: Qualitative (L/M/H), semi-quantitative (1-100), or quantitative (FAIR)
  • Sources: Identify information sources — architecture docs, prior assessments, CTI, scanning results

Phase 2: Conduct

Task 1: Identify Threat Sources. Categorize using NIST's taxonomy: adversarial (individuals, groups, nations), accidental (user errors), structural (equipment failure), environmental (natural disasters).

Task 2: Identify Threat Events. Map threat sources to specific threat events relevant to the system. Use ATT&CK and industry-specific catalogs from Section 03.

Task 3: Identify Vulnerabilities. Map conditions that could be exploited — technical vulnerabilities, process weaknesses, architectural gaps.

Task 4: Determine Likelihood. Assess based on threat source capability, intent, targeting, and vulnerability severity. Use the NIST likelihood scale (Very Low to Very High).

Task 5: Determine Impact & Risk. Combine likelihood and impact into a risk determination. Document in the risk assessment results table.

Phase 3: Communicate

Present results to decision-makers with risk-ranked findings, recommended responses, and a risk register. Tailor communication level to audience (technical team vs executives vs governance board).

Phase 4: Maintain

Monitor risk factors for changes, update the assessment when triggers occur (new threats, control changes, architectural updates, incidents). Define review cadence and change triggers.

NIST RMF (SP 800-37 Rev 2)

The Risk Management Framework is a comprehensive lifecycle approach for federal information systems. While 800-30 focuses on assessment, RMF covers the full lifecycle from categorization to continuous monitoring.

NIST RMF Lifecycle

flowchart LR PR["Prepare"] --> CA["Categorize\n(FIPS 199)"] CA --> SE["Select\nControls"] SE --> IM["Implement\nControls"] IM --> AS["Assess\nControls"] AS --> AU["Authorize\n(ATO)"] AU --> MO["Monitor\nContinuously"] MO --> CA style PR fill:#ff8800,stroke:#000,color:#000 style CA fill:#22d3ee,stroke:#000,color:#000 style SE fill:#a855f7,stroke:#000,color:#000 style IM fill:#ec4899,stroke:#000,color:#000 style AS fill:#ff8800,stroke:#000,color:#000 style AU fill:#22d3ee,stroke:#000,color:#000 style MO fill:#a855f7,stroke:#000,color:#000

RMF + OSCAL = Automation

The Open Security Controls Assessment Language (OSCAL) enables machine-readable RMF artifacts. System Security Plans, assessment results, and POA&Ms can all be expressed as structured JSON/XML and validated automatically — essential for continuous ATO (cATO) programs.

ISO 27005:2022

The 2022 revision of ISO 27005 aligns with ISO 27001:2022 and provides guidance for risk assessment within an Information Security Management System (ISMS). Key update: shifted from asset-based to event-based approach as the primary option.

Event-Based Approach (New Default)

  • • Starts from operational risk scenarios
  • • "What can go wrong?" perspective
  • • Maps events to business impact
  • • Better alignment with enterprise risk management
  • • More natural for stakeholder communication

Asset-Based Approach (Legacy)

  • • Starts from asset inventory
  • • Identifies threats per asset, then vulnerabilities
  • • More thorough for technical environments
  • • Better for detailed control mapping
  • • Can be combined with event-based approach

OCTAVE Allegro

OCTAVE Allegro (developed by CMU/SEI) is a lightweight, asset-centric approach designed for organizations without dedicated risk management teams. Uses structured worksheets.

octave-allegro-process.txt
text
OCTAVE Allegro — 8-Step Process
════════════════════════════════

Step 1: Establish Risk Measurement Criteria
  → Define impact areas: financial, reputation, productivity,
    safety, regulatory, customer
  → Set scoring scales (1-3 Low/Med/High per area)
  → Weight impact areas by organizational priority

Step 2: Develop Information Asset Profile
  → Identify critical information assets
  → Document: owner, custodians, security requirements
  → Define CIA requirements for each asset

Step 3: Identify Information Asset Containers
  → Where is the asset stored, transported, processed?
  → Technical containers: databases, file shares, apps
  → Physical containers: paper records, removable media
  → People containers: who has knowledge/access

Step 4: Identify Areas of Concern
  → Brainstorm threats to each container
  → Use structured scenarios: actor + motive + outcome
  → Cover: deliberate, accidental, system failure, natural

Step 5: Identify Threat Scenarios
  → Formalize concerns into detailed threat scenarios
  → Map each scenario to affected assets and containers
  → Document preconditions and attack paths

Step 6: Identify Risks
  → For each scenario: determine impact on each impact area
  → Calculate risk score = Likelihood × Impact
  → Document in risk register worksheet

Step 7: Analyze Risks
  → Rank risks by score across all scenarios
  → Identify risk clusters and patterns
  → Flag risks exceeding organizational risk criteria

Step 8: Select Mitigation Approach
  → For each significant risk: mitigate, transfer, accept, avoid
  → Document rationale for treatment decision
  → Define specific mitigation actions and owners
OCTAVE Allegro — 8-Step Process
════════════════════════════════

Step 1: Establish Risk Measurement Criteria
  → Define impact areas: financial, reputation, productivity,
    safety, regulatory, customer
  → Set scoring scales (1-3 Low/Med/High per area)
  → Weight impact areas by organizational priority

Step 2: Develop Information Asset Profile
  → Identify critical information assets
  → Document: owner, custodians, security requirements
  → Define CIA requirements for each asset

Step 3: Identify Information Asset Containers
  → Where is the asset stored, transported, processed?
  → Technical containers: databases, file shares, apps
  → Physical containers: paper records, removable media
  → People containers: who has knowledge/access

Step 4: Identify Areas of Concern
  → Brainstorm threats to each container
  → Use structured scenarios: actor + motive + outcome
  → Cover: deliberate, accidental, system failure, natural

Step 5: Identify Threat Scenarios
  → Formalize concerns into detailed threat scenarios
  → Map each scenario to affected assets and containers
  → Document preconditions and attack paths

Step 6: Identify Risks
  → For each scenario: determine impact on each impact area
  → Calculate risk score = Likelihood × Impact
  → Document in risk register worksheet

Step 7: Analyze Risks
  → Rank risks by score across all scenarios
  → Identify risk clusters and patterns
  → Flag risks exceeding organizational risk criteria

Step 8: Select Mitigation Approach
  → For each significant risk: mitigate, transfer, accept, avoid
  → Document rationale for treatment decision
  → Define specific mitigation actions and owners

CORAS & TARA

CORAS

Model-driven risk analysis using UML-style diagrams. Strong in safety-critical and embedded systems.

  • • Uses specialized UML diagrams for risk modeling
  • • Graphical threat and risk analysis
  • • Workshop-facilitated with structured diagramming
  • • Strong traceability from assets to threats to controls
  • • Popular in European automotive and aerospace
  • • Open-source CORAS tool (Eclipse-based)

TARA

MITRE's Threat Assessment & Remediation Analysis. Systematic countermeasure selection.

  • • Catalogs TTPs from MITRE ATT&CK
  • • Systematic countermeasure identification
  • • Cost-benefit analysis for each countermeasure
  • • Outputs a prioritized countermeasure list
  • • Used in defense and critical infrastructure
  • • Integrates with MITRE tooling ecosystem

Framework Selection Guide

Framework Selection Decision Tree

flowchart TD START["Start: What is your\nassessment context?"] --> FEDFederal/government system? FED -->|Yes| ATONeed ATO? ATO -->|Yes| RMF["→ NIST RMF"] ATO -->|No| N30["→ NIST 800-30"] FED -->|No| ISOISO 27001 certification? ISO -->|Yes| I27["→ ISO 27005:2022"] ISO -->|No| SIZEOrganization size? SIZE -->|Small/Medium| OCT["→ OCTAVE Allegro"] SIZE -->|Large| QUANTNeed quantitative risk output? QUANT -->|Yes| FAIR["→ FAIR\n(see Section 06)"] QUANT -->|No| SECTORSector? SECTOR -->|Defense/Critical Infra| TARA2["→ TARA"] SECTOR -->|Safety-critical/EU| COR["→ CORAS"] SECTOR -->|General| HYBRID["→ Hybrid\n(800-30 + FAIR)"] style RMF fill:#22d3ee,stroke:#000,color:#000 style N30 fill:#ff8800,stroke:#000,color:#000 style I27 fill:#a855f7,stroke:#000,color:#000 style OCT fill:#ec4899,stroke:#000,color:#000 style FAIR fill:#ff8800,stroke:#000,color:#000 style TARA2 fill:#22d3ee,stroke:#000,color:#000 style COR fill:#a855f7,stroke:#000,color:#000 style HYBRID fill:#ec4899,stroke:#000,color:#000

Section Summary

Key Takeaways

  • • NIST 800-30 is the most widely referenced — 4-phase process (Prepare/Conduct/Communicate/Maintain)
  • • NIST RMF is the full lifecycle for federal systems, producing ATO packages
  • • ISO 27005:2022 now favors event-based over asset-based approach
  • • OCTAVE Allegro is lightweight and worksheet-based — good for smaller teams
  • • Select frameworks based on regulatory context, org size, and required output

Next Steps