Skip to main content

Breaking the Risk Chain

Finding the solution to break the Risk chain

For Risk Mitigation the “Risk chain” needs to be broken in a cost-effective way. Risk chain components are required to be mapped with different Security layers i.e., Infrastructure, Equipment, Application, Processes, and Manpower to determine the optimal Security solution. Once a company starts mapping Security layers against Risk chain components, it will likely be possible to identify several measures that can be enhanced. It is important to involve Security as early in the planning process as possible. The best time to involve Security is in design phase where the 'Infrastructure', link (+) of 'asset', 'vulnerability' and 'weakness' can be broken or at least weaken.

Examples include :
While designing factory layout, keep separation between core operational area(s) and areas where external vehicles/personnel are required to come.
While designing the building Security, keep the visitor lobby outside core areas.
While laying hydrocarbon pipelines along the road, construct drains between roads and pipelines and/or keep low risk pipelines near the road.
Ensure adequate Standoff distance.
Implement a “Green belt” (an area void of other building and people) away from perimeter as a security buffer.
Plan Gates to include a screening point, a denial/rejection lane, adequate illumination.

There may be other additional examples and all are best implemented during the initial designing stage using the concept known as Crime Prevention Through Environmental Design (CPTED). In addition to minimizing risk(s) using intelligent CPTED design may also help reduce manpower for Security enforcement. The majority the Security measures are implemented in breaking the link (+) between Adversary and Weakness i.e. Access Control wherein Adversary is kept away from the vulnerable assets, whereas this is not the most cost-effective way of not designed properly. As shown below a simple matrix can help identify the most cost-effective way to properly design physical and technical security interfaces.
 

Implementation of Security measures' (layers) dependents upon balancing three parameters –
  1. How much risk to mitigate? Or what is Organization’s Risk appetite? Please remember 100% Risk mitigation is not cost-effectively practical.
  2. How much cost can be allocated to Security? Implementing cost-effective Security helps meets Management expectations to spend as little as necessary to achieve an acceptable residual level of Risk.
  3. How much inconvenience to the user or customer is acceptable? How much will additional Security increase inconvenience?
Ideal Security provides an acceptable level of residual risk at lowest possible cost and minimum inconvenience to the users. The struggle for Security Manager is to find the optimum balance.
 
In next blog, each Security layer will be further examined and discussed in detail with implementation in isolation or in combination of multiple layers providing defense in depth.

Comments

  1. An insightful note on fundamentals of Risk Management. Looking forward for the next series.

    ReplyDelete
  2. Insightful... Looking forward to upcoming blogs

    ReplyDelete
  3. Thanks for sharing knowledge indepth .. Looking forward for more blogs ..

    ReplyDelete
  4. Yes very true ..from enterprise wide risk mitigation ...Very few organisations consult security SMEs before the planing stage and then do nudging with faults caling for many change management practices apart unwanted cost and delagacy challenges within ..... Sandeep Moitra .

    ReplyDelete
  5. Well elucidated Author. Thanks for sharing. Looking forward to the next Blog.
    Bhuv

    ReplyDelete
  6. Risk is inevitable, if organisations do not realise to include Security at Planning & Designing stage. Its high time when Engineers, Startegists, & Visionories also involve Security SMEs to get the best.

    ReplyDelete
  7. Great blog.. nicely brought out the building blocks of Security. 👍

    ReplyDelete
  8. Valuable inputs, if the said planning if considered during initial stage of establishment of infrastructure, it will be well planned and safe in terms of security and safety aspect for any plant / organisation. Looking forward for the further blog.

    ReplyDelete
  9. Its really Helpful to have a greater vision in the part of Physical security

    ReplyDelete
  10. Great blog and well written blog for this topic thanks for sharing this info I find this info very useful for myself in my PGDM course which I am pursuing in finance form distance learning center.

    ReplyDelete

Post a Comment

Popular posts from this blog

The Master Plan - achieving end state

Master plan is the ‘end state’ Security Manager wants to reach with respect to all desired improvements & upgrades are complete/full-filled, Security is best-in class, best-fit and “perfect” in today’s risk scenarios. The definition of "best-fit Security" is very simple, which is sufficient and logical to balance all credible risks (its a myth). <Overview - how to get visibility of Security Master Plan> But as we know risks are dynamic, changing with time, reshaping and threat-actors are innovating & instituting new ways to attack, therefore “Master Plan” cannot be static. Reaching perfection is a mirage, achieving or completing master plan will never appear possible. Adversary, the bad guy will always find new path to breach, one time made & achieved master plan cannot prevent such innovated risks. So the queries arises, why we need a master plan? how to make it? How to manage master plan? The blog aimed to explain the experience of drafting, practice imp...

The Five Layers

There are five important layers in Security for risk mitigation (refer last Blogs on Risk Chain and Finding Solution to Break the Risk Chain). Implementation of these layers is generally in combination of each other. Correct balancing the implementation of layers at appropriate risk chain link and at right timings will result into Cost-effective and Optimum Security, which every management is looking for. But to have this achieved it is important to understand the components within these five layers. It is also important to note that while you are changing any layer, other layers will be affected. Therefore, change management is not one time activity, need to observe the impact in long term. The five layers includes ‘Infrastructure’, ‘Equipment’, ‘Application’, ‘Process’ and ‘Human Resource’. We will go in detail of each layer, understand the components and interconnections between the layers. All layers together should be seen like an engine, wherein each layer is individual gear, sho...

Speaking Risk

Earlier blogs on Risk Chain and Security tools gave understanding on Risk components and risk treatment (five layers of Security). Even after implementation of Security measures, ‘Risk will exist’. The fact which Security Manager and Management must accept. There are many reasons for existence of Risk even after treatment. 1. 100% risk mitigation is not possible. This is one of the facts Security Manager and especially Management must accept. Known risk but not treated may be due to lower probability or practically not possible to treat due to cost of treatment or risk is low impact-low probable. This is known as ‘Risk Appetite’ of the organization. So, the condition here is, risk still exists but in knowledge. 2. Risk Treatment is not done properly – this is where Security manager or management have not measured the risk properly or not given proper treatment. Risk not estimated or missed in assessment is possible when adequate preparation in Risk assessment is not done – old risk...