Cyber Security

Luke Hally

Risk assessment consulting report

June 19, 2023

Around the globe, car rental companies rely on technology for operating in an efficient and responsive manner. Here at RideWell we use a website and app for making and managing bookings which integrate into our back of house systems, which allows us to manage our fleet, manage customers and receive and make payments. These systems support our core business, which is car hire, and our fleet is special – our point of differentiation is that our fleet is all connected cars, with advanced safety and control features all underpinned by technology. So it follows that cyber risk is something we need to consider, and events around the world confirm this: a ransomware attack on Canadian Discount Car and Truck Rentals in Canada (Abrams, 2021); a report by IBM’s security team highlighting that connected cars are vulnerable to cyber attack (Kosowan, 2020); there are concerns that connected vehicles can be remotely controlled or stolen (Paganini, 2021); as well as attacks seeking to steal sensitive information about customers and staff (Hercher, 2017). This risk assessment is a first step towards protecting us from these threats.

Task

Following on from our recommendation to move to an advanced cyber risk monitoring regime and to adopt a qualitative approach to risk, senior management have requested a risk assessment consulting report comprising of:

  1. Perform a risk assessment, identifying the top 5 key assets to the organisation, then produce a risk register and treatment plan per ISO27001 standards. Summarise the process undertaken.
  2. Perform a Business Impact Analysis on the top 5 key assets and determine Recovery Time Objective (RTO)/Recovery Point Objectives (RPO), then roduce a continuity and disaster recovery guidance document that provides theoretical high level steps on how to respond to an outage for the top 5 key assets. Summarise the process.
  3. Deliver the assets processed in the above summaries.

1 Perform a risk assessment 

This section summarises the process to develop a risk register and treatment plan

Identify five key assets

The five key assets identified were:

  • Website/app
  • Backend systems
  • Cars themselves
  • Corporate data
  • Email functionality

The rationale for these assets is include in the Business Impact Assessment.

Produce a risk register 

Identify risks

We adopted the approach recommended in my recent presentation, where we focus on the business risks. This was done in workshops with the cyber fusion team and stakeholders from the relevant parts of the business. The cyber fusion team then identified risk sources and actors. Following the recommendation of my recent memo, we will be implementing a qualitative risk assessment methodology. As discussed in the memo, this requires likelihood, consequence and risk scales, and contextualising these to our business can help overcome subjectivity that is inherent in the qualitative approach.

Contextualise likelihood scale

Using the likelihood scale from ISO270005  A.1.1.2.2 (International Organization for Standardization, 2022b, p. 42), we then added statements to allow us to consider the likelihood in the context of RideWell, these are included in the risk matrix

Contextualise consequence scale

Using the consequence scale from ISO270005 A.1.1.2.1 (International Organization for Standardization, 2022b, pp. 41-42), we added statements to contextualise each consequence level, included in the risk register section.

Contextualise risk level scale

Using the risk evaluation scale from ISO27005 A.1.2 as a guide (International Organization for Standardization, 2022b, p. 46), we defined our risk scales as:

  • Very low (1 – 2) – acceptable as is
  • Low (3 – 4) – acceptable as is
  • Medium (5 – 9) – tolerable with mitigation measures placed in the medium to long term
  • High (10 – 16) – tolerable with mitigation measures placed in the short term
  • Very high (20 – 25) – unacceptable, the risk must be treated in the short term to reduce it or we need to avoid it

Create a risk matrix

These scales are now unambiguous with clearly defined levels which do not overlap and are described in objective language (International Organization for Standardization, 2022b, p. 43). This will help our qualitative approach to deliver less subjective and more consistent results because we are using RideWell’s experience, environment and appetite as a guide, not just relying on the assessors’ interpretation of the scales. This is included in the risk matrix section.

Produce a risk treatment plan 

Building on the risk register, the risk treatment plan requires planned treatments, risk owner, due dates and review dates.

Identify treatments

We have decided to implement controls for low risks as there is a potential for escalation from these to higher risk events. For each of the risk sources, treatments were identified in ISO270001 Appendix A, they were also supplemented with practical treatments identified by the cyber fusion team.

Identity risk owner

The risk owner will be responsible for ensuring that treatments are in place, these were identified for each treatment.

Treatment due date and review dates

The treatment due dates are informed by the risk severity and inserted into the register. Finally we agreed on a risk review date one month after the due date of the last treatment.

Populate the risk register

Included in the risk register section

2 Perform a Business Impact Assessment

Summary of BIA

Define business environment 

Due to this being our first BIA, the cyber fusion team has agreed to focus on our top five assets, gathering this information was covered in the risk assessment. We have focused on the tangible assets that are critical for our core business, this suits the risk management maturity of RideWell as we may become overwhelmed in trying to place values on intangibles such as reputation at this stage of our risk journey. 

Information gathering and analysis

For the purposes of our first BIA, the risk assessment has been used for our information and analysis.

Identify business mission

Our business mission is to hire the right car to the right person at the right time. To do this we need to have a channel for contact/booking (website); be able to process bookings (backend systems); have cars to hire out; use data to match customers to cars (corporate data); and be able to communicate with customers (email). Note that this BIA is applicable following the implementation of our risk treatment plan.

Calculate fundamental matrices

Using the information we have gathered, we identified our: Maximum Tolerable Downtime (MTD); Recovery Time Objective (RTO); and Recovery Point Objective (RPO).These are presented in: BIA Output

Disaster recovery guide 

As noted in our BIA, we have very low MTD across our assets, this is a function of our reliance on technology to scale and operate, the dynamic nature of our industry and relatively low staff count. We simply don’t have the people power to manually undertake tasks if any of our five assets are impacted for a period of days (specified in the BIA).

Due to this, our focus in continuity and disaster recovery is on contingency, getting our systems back to operational, however there will be some business continuity activities. This recovery guidance is applicable after we have implemented the recommended treatments in our risk treatment plan, and was created to align with ISO22313 Security and resilience — Business continuity management systems — Guidance on the use, particularly sections: 8.4.4.8 Resumption of prioritized activities, 8.4.4.9 ICT systems and 8.4.5 Recovery. This is presented in the Disaster recovery guide.

3 Deliver assets produced

Risk matrix

Risk Matrix
CONSEQUENSESSeverity5 – Catastrophic4 – Critical3 – Serious2 – Significant1 – Minor
Website/appUnavailable or unable to accept bookings for more than 3 daysUnavailable or unable to accept bookings  for up to 3 days OR functionality modified Unavailable or unable to accept bookings for up to 1 day Unavailable or unable to accept bookings for up to 3 hours OR content modified.Momentary disruption to availability or ability to accept bookings.
backend systems for taking bookingsUnavailable or unable to process operational requirements for more than 3 daysUnavailable or unable to process operational requirements for up to 3 days.Unavailable or unable to process operational requirements for up to 1 dayUnavailable or unable to process operational requirements for up to 3 hours.Momentary disruption to availability or ability to undertake tasks.
Cars Accident resulting in death OR fleet wide  vehicle operation affected Accident resulting in injury or theft of vehicle OR fleet wide vehicle non-operational systems/data affectedCustomer data stolen from synced vehicle OR single vehicle operation affected Single vehicle non-operational systems/data affectedEvidence of access in logs but no changes to vehicle systems/data.
Corporate dataSufficient PII leaked for: identity theft to be performed; or physical acquisition undertakenData leaked that can be used for further targeting eg: name and email or telephone numberData leaked that can associate customers or suppliers with DriveWellAnonymised data leaked. Could be used in an inference attack on customers or suppliers.Data accessed but no personal data, IP or financial data accessed or stolen.
Email unavailableUnable to send email for over 3 daysUnable to send email for up to 3 daysUnable to receive email for up to 1 dayUnable to send email for up to 1 dayMomentary disruption
LIKELIHOOD5 – Almost certainHappens to us oftenVery highVery highHighHighMedium
4 – Very likelyHas occurred to us, probably will againVery highHighHighMediumLow
3 – LikelyHas occurred to us, may againHighHighMediumMediumLow
2 – Rather unlikelyHas not occurred to us, but mayHighMediumMediumLowVery low
1 – UnlikelyNo known incidents in our industryMediumLowLowVery lowVery low

Risk register

Below is a screenshot of our risk register and treatment plan.

BIA Output

AssetReasonRiskRecovery Point Objective (RPO)
Recovery Time Objective (RTO)Maximum Tolerable Downtime (MTD)
Website/appIf our website is down for more than one day, we will begin to suffer financially and have concerns for our reputation. After 1 week of website downtime we would have trouble recovering due to the financial impact.Website unavailable, website hackedLast code base change (stored in GIT). 1 day. 3 days. 
Backend systemsIf our backend systems are down for over a day we would have difficulty in continuing to operate. After 1 week of backend system downtime we would have trouble recovering due to the financial impact and backlog of processing would lead to further lost income.Backend unavailable, backend hackedLast code change, backups taken after each.1 day. 3 days. 
Cars If we could not hire our cars for 1 day, we will begin to suffer financially and have concerns for our reputation. After one week of not being able to hire out cars we would be in a difficult situation.Cars hacked and control lost/shutdown/data stolenLast firmware update. Similar to our website, the cars are relatively static when it comes to software requirements.1 day. 1 week.
Corporate dataIf our data is unavailable we cannot place customers with cars. Our website and backend systems will also become non-operational. Without our data systems, neither our website or backend systems can functionData breach1 day. These systems include bookings and enquiries, we operate in a dynamic environment where these can change by the minute. One day to the last backup is the most we can realistically catch up on with our small team.3 hours. 1 day. 
Email Not applicable following our risk treatment planEmail unavailableWe can now tolerate email being down.NANA

Disaster recovery guide

AssetContinuityRecovery
Website/appLoad ‘maintenance’ page informing customers that we are having technical difficulties and to contact us via email or one of our social channels
Spin up a new instance of our websiteTest new instancePoint DNS to new instanceUndertake detection, analysis, containment, eradication and recovery on original instance, report lessons learned.
Backend systemsLoad a message onto our website notifying visitors that we are experiencing technical issues and to try again in 30 minutes.If the disruption lasts longer than one hour, update the message to notify them that they may experience a delay using our services – if they need a car today or tomorrow then email us.Spin up a new instance of our backend systemsTest new instancePoint DNS to new instanceUndertake detection, analysis, containment, eradication and recovery on original instance, report lessons learned.
Cars themselvesPart of our SLA with our supplier of cars is that in the event of a cyber incident, their response team will be on hand to handle the incident. We have a limited availability of emergency vehicles from our supplier, this can cover 70% of our baseline business with a staff requirement 24 hours a day.Contact supplier response teamProvide assistance as needed to response team Report lessons learned.
Corporate dataLoad a message onto our website notifying visitors that we are experiencing technical issues and to try again in 30 minutes.If the disruption lasts longer than one hour, update the message to notify them that they may experience a delay using our services – if they need a car today or tomorrow then email us.Restore backupsAssess requirements under privacy act if any.
Email functionalityNANA

Recent posts