system security needs classification

I am working on a way to classify our systems (everything that is reacheable through ip) on how bad it would be and how possible it is, that someone would get unauthorized access using exploits.

I do this to determine how deep and how often I am going to check them with vulnaribility scanners like OpenVAS.

So far I have the following criteria:

  • Are there any plaintext credentials on the affected system or files which can be decrypted easily to get access to other systems?
  • Do users on the affected system have special rights to connect and authenticate to other systems?
  • Is there any personal-related data on the system?
  • Does the loss of the system affect other systems which rely on it too?
  • Is it costly in time or money to replace the system if an attacker destroys it or makes it useless (Software)?
  • Is it a productive or just a demo/test system?
  • Is only a sole department concerned with the temporal loss of the system or multiple ones?
  • Does the affected department rely invariably on the system or is it possibly to maintain operability over a short time without the system?
  • Does the configuration and software on the system change often, so it´s more likely that misconfigurations happen or new vulnerabilities get patched into the system?
  • Is it a physical system or a virtual machine?

I would appreciate if someone has a point or two to add or if theres already a standard for classifying systems that way.

Continue reading system security needs classification