CRAMM
This article needs additional citations for verification. (September 2022) |
CRAMM (CCTA Risk Analysis and Management Method) is a risk management methodology, currently on its fifth version, CRAMM Version 5.0.
History
CRAMM was created in 1987 by the Central Computer and Telecommunications Agency (CCTA), now renamed into Cabinet Office, of the United Kingdom government.
Methodology
CRAMM comprises three stages, each supported by objective questionnaires and guidelines. The first two stages identify and analyze the risks to the system. The third stage recommends how these risks should be managed.
The three stages of CRAMM are as follows:
Stage 1
The establishment of the objectives for security by:
- Defining the boundary for the study for Risk Assessment
- Identifying and valuing the physical assets that form part of the system;
- Determining the 'value' of the data held by interviewing users about the potential business impacts that could arise from unavailability, destruction, disclosure or modification;
- Identifying and valuing the software assets that form part of the system.
Stage 2
The assessment of the risks to the proposed system and the requirements for security by:
- Identifying and assessing the type and level of threats that may affect the system;
- Assessing the extent of the system's vulnerabilities to the identified threats;
- Combining threat and vulnerability assessments with asset values to calculate measures of risks.
Stage 3
Identification and selection of countermeasures that are commensurate with the measures of risks calculated in Stage 2.
CRAMM contains a very large countermeasure library consisting of over 3,000 detailed countermeasures organised into over seventy logical groupings.
Deployment
CRAMM is in use by NATO, the Dutch armed forces, and corporations working actively on security, like Unisys.
CRAMM is offered in English and Dutch versions.