CRAMM

CRAMM (CCTA Risk Analysis and Management Method) is a risk management methodology, currently on its fifth version, CRAMM Version 5.0.

History

CRAMM was created in 1987 by the Central Computer and Telecommunications Agency (CCTA), now renamed into Cabinet Office, of the United Kingdom government.

Methodology

CRAMM comprises three stages, each supported by objective questionnaires and guidelines. The first two stages identify and analyze the risks to the system. The third stage recommends how these risks should be managed.

The three stages of CRAMM are as follows:

Stage 1

The establishment of the objectives for security by:

  • Defining the boundary for the study for Risk Assessment
  • Identifying and valuing the physical assets that form part of the system;
  • Determining the 'value' of the data held by interviewing users about the potential business impacts that could arise from unavailability, destruction, disclosure or modification;
  • Identifying and valuing the software assets that form part of the system.

Stage 2

The assessment of the risks to the proposed system and the requirements for security by:

  • Identifying and assessing the type and level of threats that may affect the system;
  • Assessing the extent of the system's vulnerabilities to the identified threats;
  • Combining threat and vulnerability assessments with asset values to calculate measures of risks.

Stage 3

Identification and selection of countermeasures that are commensurate with the measures of risks calculated in Stage 2.

CRAMM contains a very large countermeasure library consisting of over 3,000 detailed countermeasures organised into over seventy logical groupings.

Deployment

CRAMM is in use by NATO, the Dutch armed forces, and corporations working actively on security, like Unisys.

CRAMM is offered in English and Dutch versions.

gollark: Error correction coding, simple.
gollark: When I say "radio waves" I mean "EHF microwaves".
gollark: I think a laser would be easier to focus.
gollark: Warning: do not stick sensitive items, body parts, or honestly literally anything in the gap.
gollark: Or, for short distances, boost the voltage dangerously high and it can just *arc* across the gap!

References

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.