Risk for each threat scenario is determined based on two attributes: IMPACT to the business, and LIKELIHOOD of the threat scenario taking place. The rating for each of these attributes were objectively determined based on the guidelines in the sub-sections below.
Impact
The impact of a threat scenario is the effect it would have on the business in terms of 3 factors: reputational damage, affected users, and financial damage. These are measured as follows:
Reputational Damage
- None
- Minimum: Negative article on local news – Very limited number of people will care about this – Limited potential for customer loss.
- Moderate: Negative article on regional news – Might lose some customers and not able to easily attract new customers.
- High: Negative article on national/international news – Tarnish the brand permanently – Lose most customers, very difficult to attract any new customers. World ending situation including fines, contractual breach, lawsuits, etc.
Affected Users
- No affected users
- Single user can be exploited at a time
- Some users of the system or application are impacted
- Majority of users impacted
Financial Damage (this is specific per company)
- None
- Hundreds
- Thousands
- Millions
Likelihood
The likelihood that a threat scenario would take place is based on 3 factors: reproducibility, exploitability, and discoverability. These are measured as follows:
Reproducibility
Number of conditions that need to be true where the outcome of those conditions is not in control of the attacker or is random.
- Too many factors involved or quite a few conditions need to take place
- More than one factor is required for the attack to be successful (e.g. user must be logged on + not be security aware)
- Only one factor is required for the attack to be successful (e.g. victim/attacker must be logged on)
- No factors are required to be true that are random or not under the control of the attacker
Exploitability
This is about the required skills and expertise.
- Next to impossible: Even with direct knowledge of the vulnerability we do not see a viable path for exploitation (Only Neo could hack this)
- Advanced techniques required: Custom tooling and advanced skills (DEFCON Presenter)
- Moderate techniques required: Custom tooling and moderate skills (Average Bug Bounty Participant)
- Trivial: Just a web browser or basic/publicly-available tools (Script Kiddie)
Discoverability
- Very hard or impossible to discover even given access to source code and privilege access to running systems
- Inside knowledge or access to application internals are required to discover the issue
- Advanced tools and techniques are required to discover the issue.
- Details of faults like this are already in the public domain and can be easily discovered using a search engine. Weakness can be easily discovered by most computer users. The information is visible in the web browser address bar or in a form.