CERT Coordination Center
HomeSite IndexSearchContactFrequently Asked Questions
Incidents, Quick fixes, and VulnerabilitiesSecurity Practices and EvaluationsSurvivability Research and AnalysisTraining and Education

 



OCTAVESM Method Frequently Asked Questions (FAQ) 1.   What is the OCTAVE approach?
2.   How is OCTAVE different from other security assessments?
3.   Who needs an OCTAVE? How do I know if I need one in my organization?
4.   How long does it take and how much does it cost to do an OCTAVE?
5.   How can I properly scope an initial OCTAVE effort?
6.   Is there a recommended analysis team composition that would enhance the effectiveness and efficiency of the OCTAVE effort?
7.   How easy is it to tailor the OCTAVE Method?
8.   Is it possible to abuse/misuse the OCTAVE Method?
9.   What types of assets does the OCTAVE Method address?
10.  What kinds of tools are available for the OCTAVE Method?
11.  How does the OCTAVE Method incorporate probability?
12.  Can I use OCTAVE effectively if my primary technology platform is a mainframe or mid-range (AS/400, etc.) computer?
13.  What are the restrictions on using OCTAVE, and can it be licensed?
14.  What does my organization do after OCTAVE is done?

 


  1. What is the OCTAVE approach?
    The Operationally Critical Threat, Asset, and Vulnerability EvaluationSM (OCTAVESM) approach is a systematic way for an organization to address its information security risks, sorting through the complex web of organizational and technological issues.

    At the core of the approach is the concept of self-direction, where the organization manages and directs the information security risk evaluation. The OCTAVE approach uses a small, interdisciplinary team of an organization's personnel, the analysis team, to lead the process. This team includes people from the business units and information technology (IT). Information security is the responsibility of everyone in the organization, not just the IT department. People from the business units know what information is important to complete their tasks as well as how they access and use the information. The information technology staff understands issues related to computing infrastructure configuration as well as what is needed to keep it running. These perspectives are important in understanding the global, organizational view of information security risk.

    The OCTAVE approach, shown in the diagram below, includes a set of criteria that defines the requirements for a comprehensive, self-directed information security risk evaluation, and a set of methods consistent with the criteria. The OCTAVE Method, available now, was built with larger organizations in mind. A second method, OCTAVE-SSM will focus on smaller organizations. These two methods will provide the end points of a continuum of various methods aimed at different sizes and types of organizations. We expect many of these other methods to be developed by other organizations, using the criteria as basic requirements.

    OCTAVE 
Criteria

  2. How is OCTAVE different from other security assessments?
    There are several types of security assessments currently being performed. The most common are technical vulnerability assessments, information system audits, and security risk assessments. These are described below.

       

    1. Vulnerability Assessment
      A vulnerability assessment is a systematic, usually tool-driven, examination of an organization's technology base, policies, and procedures. It includes a complete analysis of the security of an internal computing infrastructure and its vulnerability to internal and external attacks. These assessments generally

       

      • use standards for specific IT security activities
      • assess the entire computing infrastructure
      • use (sometimes proprietary) software tools to analyze the system infrastructure
      • analyze the detected technological vulnerabilities and may include recommended steps to address those vulnerabilities

       

    2. Information Systems Audit
      Information systems audits are independent appraisals of a company's internal controls to assure management, regulatory authorities, and company shareholders that information is accurate and valid. Audits typically use industry-specific process models, benchmarks, standards of due care, or established best practices. They look at both financial and operational performance. An audit may also be based on proprietary business process risk control and analysis methods and tools. Audits are usually performed by licensed auditors and have legal implications and liabilities.

       

    3. Security Risk Assessment
      A security risk assessment (which can be done by an internal or external group) expands upon the vulnerability assessment to look at the security-related risks within a company, including internal and external sources of risk as well as electronic-based and people-based risks. These assessments

       

      • examine the corporate practices to identify strengths and weaknesses
      • examine the IT infrastructure to determine technological vulnerabilities
      • focus on different parts of the technology infrastructure such as mainframe systems, distributed systems, networks and communications, policy, and physical security
      • help decision makers examine trade-offs to select cost-effective countermeasures

    The OCTAVE approach is a variation of the third type. It focuses first on identifying what information assets are critical to the businesses success and operations and then uses that information to set the scope of the rest of the evaluation.

  3. Who needs an OCTAVE? How do I know if I need one in my organization?
    Any organization that uses information assets, especially electronic information, to meet its business goals and objectives should consider reviewing how that information needs to be protected. Consider using the OCTAVE Method if

     

    • you have always relied on your IT department or service provider to provide security in isolation, without working with them to identify what needs to be protected and how
    • you have never done any kind of security assessment, or have looked only at your computing systems in previous security assessments
    • you want to improve your security practices across the entire organization
    • you are required by law or regulation to do security risk evaluations and management
    • you are a large (300 or more employees) organization

    We are developing another OCTAVE-consistent method for smaller organizations (expected release is December 2002); but for now, you may be able to tailor or scale down the OCTAVE Method. If your organization is smaller than 300 employees, you should download Volumes 1 and 2 of the OCTAVE Method Implementation Guide from the CERT/CC web site http://www.cert.org/octave/omig.html. They will give you a better idea of the scope and extent of the OCTAVE Method. You should then discuss with your managers or senior managers the need for this type of evaluation and decide if you want to do a limited pilot effort or a full evaluation.

  4. How long does it take and how much does it cost to do an OCTAVE?
    The OCTAVE Method is a series of at least 12 workshops, most of which are a half day or full day long. The length of time it takes depends on several factors, primarily

     

    • the scope of the evaluation – how many operational areas you look at and how many critical assets you carry forward through the evaluation
    • how much time the analysis team can devote to these workshops – a team that can work full time on the evaluation will finish sooner than one that can only devote one day a week
    • how long it takes to conduct the technology vulnerability assessment in OCTAVE Process 6 – running tools can take quite some time, particularly if permissions and scheduling are complex
    • the degree of organizational change required to prepare for the evaluation – getting senior management sponsorship, training the analysis team, and scheduling workshops can take quite a while to accomplish in some situations, particularly if the prevalent assumption is that security is an IT-only problem

    The absolute shortest amount of time to conduct the OCTAVE Method is 2 to 3 weeks, but scheduling often drives it to at least 6 weeks. Some organizations have had difficulty with scheduling and preliminary activities and have taken more than 6 months. The degree of tailoring you do to the method can also affect the length of time. For example, one customer added an extensive policy and regulation research activity to the front end that took several weeks to complete.

    Cost is a generally related to time – time for the analysis team to do its work and the time of other participants. OCTAVE Method Implementation Guide, Volume 2, pages PG-8 and PG-12, (see http://www.cert.org/octave/omig.html) has several detailed tables identifying the expected time for different types of participants. This is a good starting place for estimating costs. You also need to consider the cost of training (if you want it), and you may need to consider purchasing vulnerability assessment tools or contracting someone to run the tools. Finally, the results of the OCTAVE Method are a protection strategy aimed at improving the organization, and mitigation plans for the information security risks that you identified. Implementing these plans also has costs associated with it. If extensive organizational change is called for, then implementation could take a year or more, resulting in a higher cost than implementing more limited changes.

    Note: Other implementations of the OCTAVE approach require different amounts of time.

  5. How can I properly scope an initial OCTAVE effort?
    "Scoping" the use of the OCTAVE Method primarily refers to selecting the operational areas to investigate, but it includes tailoring as well. The general guidance is to select the IT department and at least three areas representing a broad spectrum of the organization. The non-IT areas should reflect the primary operational or business functions as well as the important support functions (for example, Finance and Accounting). Business areas are usually the "owners" of information systems, processes, and data, rather than the technical areas where these information assets are supported. The IT areas tend to be the "custodians" of these assets. Regardless of which areas are chosen, keep in mind that the evaluation concentrates on your organization's critical assets, and both business and technical personnel are needed in order to identify risks and develop appropriate protection strategies.

    Other factors can guide the selection of scope, including size, complexity, geographic locations, and limitation in sponsorship by senior management. In very large or complex organizations, an initial pilot of the OCTAVE Method may be aimed at a specific functional level, with subsequent evaluations performed on other major departments. In structurally deep organizations, evaluations could be started at a lower layer and expand upward, or begin near the top and filter down.

    Geographic considerations may cause you to perform the OCTAVE Method in parallel at multiple sites, integrating the results later to find common risks and strategies. Where senior management sponsorship is weak or non-existent, you may want to start with a small evaluation in one department or one group, work on one asset, and use the results to build sponsorship.

    You may also find hints in other activities already being performed in your organization. For example, if a risk management function has been implemented across an organization, it may yield several areas with high risk that should be further examined by performing the OCTAVE Method. Other activities, such as recently performed audits, may indicate important areas where the OCTAVE Method could provide additional information on risk and mitigation strategies.

    The scope of the OCTAVE effort is unique to each organization. Additional guidance on determining scope for your implementation of the OCTAVE Method is provided in the OCTAVE Method Implementation Guide, Volume 2 "Preliminary Activities," in the section named "Select Operational Areas to Participate in OCTAVE." The "Tailoring guidelines" section also provides some tips.

  6. Is there a recommended analysis team composition that would enhance the effectiveness and efficiency of the OCTAVE effort?
    There are many factors to consider when forming the analysis team that will conduct the OCTAVE Method. First, there is size – 3 to 5 members. Second, there are skills – especially the basic skills, such as good facilitation, communication, analytical, and problem-solving skills. However, attention to other factors can contribute to developing an effective analysis team.

    It's important to note that analysis team members do not have to be drawn entirely from the areas under evaluation. Analysis team members need to adequately represent, and have knowledge of, the business and IT perspectives of the organization. Balancing these perspectives is fundamental to successfully using the OCTAVE Method in your organization. For example, an analysis team composed entirely of technical personnel may result in an inclination to discuss and solve current technical issues, distracting from the asset and risk-focused nature of the process. A team with no technical members may miss the significance of some of the more technical findings and will need help when reaching the more technology-focused processes.

    Ultimately, successful completion of the OCTAVE Method depends on the analysis team's ability to identify risks and assess their impact on your organization. However, the team needs to draw on other resources of your organization to fulfill this task. Technical resources should be drawn into the analysis activities whenever their expertise is needed. In addition, other personnel in your organization, such as people who are knowledgeable about the critical assets, may be helpful in specific activities such as evaluating risks or developing protection strategies.

    Additional guidance on developing your analysis team is provided in the OCTAVE Method Implementation Guide, Volume 2 "Preliminary Activities," in the section named "Select Analysis Team Members."

  7. How easy is it to tailor the OCTAVE Method?
    The OCTAVE Method is highly configurable to the needs of the organization being evaluated and its domain.

    There are many aspects to tailoring, which are discussed throughout the OCTAVE Method Implementation Guide but are concentrated in Volume 2, "Tailoring Guidance." You can tailor both the overall process and the smaller pieces, such as the templates and the catalog of practices. The only constraint on tailoring is the OCTAVE criteria, which defines the requirements for the OCTAVE approach. These requirements include the principles, attributes, and outputs that must be produced for an evaluation to be considered an OCTAVE-consistent method. This still leaves an extremely wide range of tailoring.

    One aid to tailoring can be found in the table on pages PT-9 through PT-12 of Volume 2 in the OCTAVE Method Implementation Guide. This table defines some of the tailoring options and the data dependencies that exist between OCTAVE processes. This, along with the OCTAVE Method data flow in Volume 16, can help you avoid eliminating or incorrectly moving a critical activity or piece of data. If you change the catalog of practices, you need to update the surveys used in Processes 1 to 3, taking into consideration the appropriateness of each practice to the level of the organization.

    In addition to Volume 2 guidance, both general and specific tailoring information can be found in Volumes 3 to 11 of the Guide. Along with other artifacts, these volumes contain the core process guides for the evaluation process. In each process volume, a set of activities describes how to complete individual steps in the process. Included with almost all of these activities are detailed process and tailoring guidance.

    However, before you tailor the method, we recommend you try it as is, or close to it, to fully understand what happens and how the data is used at each step of the way. Otherwise, it is all too easy to overlook or dismiss a seemingly minor step that has significant impact later in the process.

  8. Is it possible to abuse/misuse the OCTAVE Method?
    It is always possible to misuse any methodology. Whether that "misuse" results in useless data or in different data depends on what you do. At the core of the OCTAVE approach are principles and characteristics that any tailored variation of the OCTAVE Method should adhere to. These are documented in the OCTAVE criteria [3]. The broad range of tailoring allowed by the criteria can result in an endless variety of methods. It is possible, however, to go beyond the criteria, at which point you are no longer consistent with the OCTAVE approach.

    The most likely "misuses" of the OCTAVE approach that are likely to occur are violations of the following properties [3]:

     

    • Self-direction
    • Asset-driven concentration
    • Operational focus
    • Strategic and tactical risk incorporation

    Methods that are not consistent with the OCTAVE approach include these:

     

    • Non-informational security risk analysis/assessment – assessment of the information technology infrastructure and development of protection strategies without consideration of the information assets you are actually trying to protect; for example, skipping Phase 1 of the OCTAVE Method (knowledge elicitation and threat profiles).
    • Non-risk focused assessment – an assessment that does not look at risks to critical assets or determine the potential impact of threats to the organization; for example, skipping Processes 4 and 7 of the OCTAVE Method (threat and risk profiles).
    • Consulting that does not include any decision making by the customer – an assessment in which the consultant collects and analyzes all the data and presents a final strategy and plan to the customer; in other words, lack of customer participation on the analysis team or in of Processes 4 to 8A.

    We do know that some components of the OCTAVE Method could be used in other security-related processes and methods. When you do this, you are not using the OCTAVE Method (and cannot call it that); but you are using pieces of the OCTAVE Method, and the usual copyright restrictions apply. The results you get may still be useful to you.

  9. What types of assets does the OCTAVE Method address?
    In the OCTAVE Method, an asset is defined as something of value to an organization. In general, information technology assets are the combination of logical and physical assets that can be grouped into the following categories:

     

    • information – documented (paper or electronic) data or intellectual property used to meet the mission of an organization.
    • systems – systems that process and store information. Systems are a combination of information, software, and hardware.
    • software – software applications and services (operating systems, database applications, networking software, office applications, etc.) that process, store, or transmit information.
    • hardware – information technology physical devices (workstations, servers, etc.). Normally, hardware assets focus solely on the replacement costs for physical devices.
    • people – the people in an organization who possess unique skills, knowledge, and experience that are difficult to replace.

    Each asset category is linked to information in some way. In the OCTAVE Method, a common pitfall is identifying assets that have no direct relation to information or information technology. For example, people might identify a business process, or they might focus on a piece of physical equipment or facility that has no link to the organization's computing infrastructure (for example, the building that houses the organization). Or people might be tempted to identify intangible assets such as reputation. You identify information-related assets during Processes 1-3. During Process 7, you link these assets to other types of organizational assets (such as facilities or reputation) when you create and evaluate risk profiles. Each risk in a risk profile provides a link between an information-related asset and other types of organizational assets, such as reputation, business processes, productivity, facilities, etc.

    A second pitfall is identifying assets that are too general in nature. For example, people often say, "Our systems and our people are our two most important assets." To which systems and which people are they referring? How do those assets relate to information security? You need to focus on information-related assets and be as specific as possible. You can find additional information about asset identification in the following sections of the OCTAVE Method Implementation Guide:

     

    • Volume 3, Activity A1.1 (pages G1-8 to G1-11)
    • Volume 4, Activity A2.1 (pages G2-8 to G21-11)
    • Volume 5, Activity A3.1 (pages G3-8 to G3-11)
  10. What kinds of tools are available for the OCTAVE Method?
    The current range of tools supporting OCTAVE Method delivery, designed or developed by the Software Engineering Institute, is limited. Other organizations pursuing licensing of the OCTAVE Method are expected to automate the method and provide other types of tools, such as databases. For now, since the organization itself is the ultimate driver and beneficiary of the OCTAVE Method, we suggest that your organization make use of its own tools and techniques in order to facilitate, schedule, analyze, and document the asset-based risk assessment process.

    To help recognize and employ the tools you may already have at your disposal, we suggest searching for tools capable of

     

    1. Facilitating the OCTAVE Method – supporting the logistics and data collection activities. Some suggestions are

       

      • Project management tools (resource enumeration, timelines, Gantt / PERT Charts, etc.)
      • Schedule software for personnel and resources (rooms, equipment, supplies, etc.)
      • Artifacts collection and preservation software (spreadsheet, database, groupware applications)

       

    2. Enabling analysis and presentation of results. Some suggestions are

       

      • Word processing and presentation software
      • System analysis and development software (flow chart, CASE, dataflow diagrams)
      • Decision support software and structures for the information collected (data collection/mining, expert systems, management information systems, decision support systems, etc.)
  11. How does the OCTAVE Method incorporate probability?
    Probability is not explicitly defined in the OCTAVE Method. The analysis approach that we have incorporated into the OCTAVE Method is derived from a technique called scenario planning. During Process 4, you create threat profiles for critical assets. You then discard scenarios with a negligible likelihood of occurring or that do not apply, and you move forward scenarios that you believe have a non-negligible likelihood of occurring. When you do this, you are implicitly evaluating the probability using the binary values of negligible (1) and non-negligible (0).

    During Process 7, you expand threat profiles into risk profiles by identifying potential impacts on the organization for each threat scenario – risk scenarios for each critical asset. During Process 8, you form a protection strategy that best addresses the range of risk scenarios that your organization faces. As you do this, you assume that the probability for all risk scenarios is equally likely. This technique to addresses the following issues

     

    • There is a general lack of data about many types of threats. Scenario-based analysis does not require analysis teams to forecast probabilities without sufficient threat data.
    • Many traditional techniques for information security risk analysis do not adequately address extreme events (low-probability, very high-impact events). Scenario-based analysis enables analysis teams to address extreme or catastrophic events.

    The analysis technique incorporated into the OCTAVE Method is strategic in nature and is based on accepted security practices. We designed it this way to compensate for the lack of data about many types of threats and to handle extreme and catastrophic events. A binary form of probability is used during Process 4 to establish the range of risk scenarios to carry forward in the evaluation. After that, all probabilities are assumed to be equally likely. This technique avoids the potential of skewed results based on subjective probability estimates. It also forces an organization to form a protection strategy that best addresses the range of risks that it faces. Some organizations might prefer analysis techniques based on probability or might be required to use probability because of regulations. In these cases, you can tailor the OCTAVE Method to incorporate probability.

  12. Can I use the OCTAVE effectively if my primary technology platform is a mainframe or mid-range (AS/400, etc.) computer?
    Many organizations have mainframe or mid-range platforms integrated into their distributed processing. For example, many mainframes or enterprise servers are assigned an Internet Protocol (IP) address so that they can be addressed over a distributed network. The OCTAVE Method does not exclude risks that are present at the mainframe and mid-range hardware platforms. The asset-based focus of the OCTAVE Method places more importance on the information asset than the platform on which it resides. The platform, or key component, of an information asset is important in Processes 5 and 6, in which the current state of vulnerabilities is determined. Mainframe and mid-range servers may be one of these key components for which vulnerabilities must be identified.

    However, vulnerability scanning tools for these platforms are scarce. Network scanning tools can provide information about the network to which the mainframe or mid-range hardware is connected, but they do not tell you much about vulnerabilities at this platform. As a result, if you have mainframe or mid-range servers as key components, you may want to have a conversation with your mainframe or mid-range support personnel (such as system programmers or administrators) to identify and understand any vulnerabilities that may exist in these platforms.

  13. What are the restrictions on using OCTAVE and can it be licensed?
    There are two aspects to consider – internal use and external use. There are no restrictions on internal use. You may use the OCTAVE Method inside your organization in whatever manner works for you. We expect that you will tailor the process and artifacts to meet your own needs and that you will reproduce whatever materials are needed to use the OCTAVE Method. That's what the CD-ROM is for. The internal "license" is purchased when you buy the OCTAVE Method Implementation Guide.

    External use – facilitating or delivering an evaluation to another customer – is regulated by SEI licensing. We do recognize that there are organizations who want additional help running this evaluation, who may not want to spend the resources setting up analysis teams, or who feel they are too lacking in the right knowledge and skills to do this on their own. The SEI will license other organizations to provide these services. There are several forms of licensing, differing in cost and the benefits to the licensee. For more information, check www.cert.org/octave/licensing.html. To discuss getting a license, send email to octave-licensing@sei.cmu.edu.

  14. What does my organization do after OCTAVE is done?
    The OCTAVE Method produces three results: a protection strategy for your organization, mitigation plans for the risks to critical assets, and short-term action items. After conducting the OCTAVE Method, you might consider

     

    • implementing the strategy, plans, and actions – implement the needed security practices (for example, routine vulnerability scans or periodic user refresher training)
    • monitoring progress and report issues to an appropriate individual or group
    • adjusting the strategy and plans as needed to correct for deviations or actions that do not produce the desired results
    • watching for new risks or assets that are you believe are critical enough that they need to be dealt with
    • considering whether to expand your evaluation to additional important assets or other operational areas – this depends on how you scoped the initial evaluation
    • considering when to re-evaluate your organization

    Evaluations can be done periodically, every 1-3 years, or on an as-needed basis due to some specific event (such as a major change or replacement of critical systems). The items listed above are accomplished in-between evaluations.

[top]

 


Sources Referenced in this FAQ
  1. Alberts, C., Dorofee, A. "Volume 1: Introduction." OCTAVE Method Implementation Guide V2.0. Software Engineering Institute, June 2001. Page I-4. Available online; see http://www.cert.org/octave/omig.html.
  2. Alberts, C., Dorofee, A. "Volume 2: Preliminary Activities." OCTAVE Method Implementation Guide V2.0. Software Engineering Institute, June 2001. Pages PT-1-PT-12. Available online; see http://www.cert.org/octave/omig.html.
  3. Alberts, C., Dorofee, A. OCTAVE Criteria: Version 2.0. (Technical report CMU/SEI-01-TR-016) Software Engineering Institute, December 2001. Available online; see http://www.cert.org/octave/.

 

 


Copyright 2002 Carnegie Mellon University

CERT and CERT Coordination Center are registered in the U.S. Patent & Trademark Office.
Operationally Critical Threat, Asset, and Vulnerability Evaluation, OCTAVE, and OCTAVE-S are service marks of Carnegie Mellon University.

Disclaimers and copyright information

Last updated May 23, 2002