Risk Assessment Methodology
Risk Assessment Methodology
METHODOLOGY
Version 4.0
Version Control
Annual
2.0 BDO 30/05/2020
Review
Shiran Annual
3.0 18/01/2022
Wolfman Review
Shiran Annual
4.0 Oded David 17/01/2023
Wolfman Review
Table of Contents
Table of Contents
Reference documents
Definitions
Risk assessment
The process
System Characterization
Asset identification
Threat identification
Vulnerability identification
Risk Mitigation
Assign Responsibility
Work plan
Reporting
Risk assessment are applied to the entire scope of all assets which are used within the
organization or which could have an impact on information security within the company.
Coraogix will perform a yearly risk analysis, which will provide an accurate and thorough
assessment of the potential risks and vulnerabilities to the confidentiality, integrity and
availability of PII/ePHI and credit card information.
Reference documents
● HIPAA
● PCI-DSS
● Information Security Policy
● Risk assessment
Definitions
● HIPAA - HIPAA (Health Insurance Portability and Accountability Act of 1996) is United
States legislation that provides data privacy and security provisions for safeguarding
medical information.
● PCI-DSS - The Payment Card Industry Data Security Standard is an information security
standard for organizations that handle branded credit cards from the major card
schemes.
● PHI - Protected Health Information, including demographic information collected from
an individual and created or received by a health provider, health plan, employer or
health care clearinghouse that relates to the past, present, or future physical or mental
health or condition of any individual; the provision of health care to an individual; or the
past, present, or future payment for the provision of health care to an individual, and that
identifies an individual or there is a reasonable basis to believe the information can be
used to identify the individual and that is transmitted or maintained by electronic media
or any other form or medium.
○ ePHI - Electronic protected health information is protected health information
(PHI) that is produced, saved, transferred or received in an electronic form.
System Characterization
Define the scope of the effort by identifying where ePHI and credit card information is received,
processed or transmitted.
Asset identification
Assets could be anything of value to an organization. In the context of PCI DSS, assets include
the people, processes, and technologies that are involved in the processing, storage,
transmission, and protection of subjects.
Each asset may be identified to an asset owner who will then be responsible for adequately
protecting the asset. The asset may also be assigned an asset value based on its importance
and criticality.
Threat identification
Identification of all threat assets in the scope – i.e. of all assets that may affect confidentiality,
integrity, and availability of PII/ePHI and credit card information in the organization. Assets may
include documents in paper or electronic form, applications, and databases, people, IT
equipment, infrastructure, and external services\outsourced processes. When identifying assets,
it is also necessary to identify their owners – the person or organizational unit responsible for
each asset.
The table below shows the category and characteristics for risk assessment
Category Characteristics
● Vulnerability description
Vulnerabilities
● Level of Vulnerability
Control Analysis
Document and assess the effectiveness of technical and non-technical security controls that
have been or will be implemented by the Coralogix to reduce the likelihood of a threat source
exploiting a system vulnerability.
After the assessment of impacts, it is necessary to assess the likelihood of occurrence of such a
risk, i.e. the probability that a threat will exploit the vulnerability of the respective asset:
By entering the values of impact and likelihood into the Risk Assessment Table, the level of risk
is calculated automatically by adding up the two values. Existing security controls are to be
entered in the last column of the Risk Assessment Table.
Risk Mitigation
Risk mitigation involves prioritizing, evaluating and implementing the appropriate risk reducing
security controls recommended from the risk assessment process to ensure the confidentiality,
integrity and availability of PII/ePHI and credit card information. Determination of appropriate
security controls to reduce risk is dependent upon the risk tolerance of the covered entity
consistent with its goals and mission. Consistency of risk mitigation methods among
departments and over time is helpful and encouraged and while there are a variety of methods
suitable for HIPAA risk mitigation. Coralogix will implement measures to reduce computer risks
Assign Responsibility
Identify the individual(s) or team with the skills necessary to implement each of the specific
security controls listed in the previous step and assign their responsibilities. Identify the
equipment, training and other resources (e.g. time, equipment, and budget) needed for the
successful implementation of security controls.
Work plan
The work plan is based on the Risk Assessment, by copying all risks identified as unacceptable
from the Risk Assessment. The CISO will conduct the work plan. One or more treatment options
must be selected for risks valued 4, 6 and 9:
The treatment of risks related to outsourced processes must be addressed through the
contracts with responsible third parties, as specified in Supplier Security Policy.
In the case of option 1 (selection of security controls), it is necessary to assess the new value of
impact and likelihood in the work plan, in order to evaluate the effectiveness of planned
controls.
On behalf of the risk owners, top management will accept all residual risks through the
Statement of Applicability.
The CISO will reduce and treat the risks from the risk assessment in the work. On behalf of the
risk owners, CEO will approve the Work plan.
Reporting
CISO will document the results of risk assessment and work plan, and all of the subsequent
reviews, in the Risk Assessment and Work plan.
CISO will monitor the progress of implementation of the work plan and report the results to the
CEO.
Risk
The Report is The Report is
Assessment
prepared in stored for a
and Work plan CISO CISO
read-only PDF period of 3
(electronic
format. years.
form)
Only CEO can grant other employees access to any of the above mentioned documents.
The owner of this document is the CISO who must check and, if necessary, update the
document at least once a year, before the regular review of existing risk assessment.
● The number of incidents which occurred, but were not included in risk assessment.
● The number of risks which were not treated adequately.
● The number of errors in the risk assessment process because of unclear definition of
roles and responsibilities.