Risk and Vulnerability
Risk and Vulnerability
Critical
Weak
information
backup
cannot be
management
referenced.
unauthorized
Weak
disclosure of
Storage
information
Confidential
Weak non
information
disclosure
can be
agreements
leaked
Accountabili
ty cannot be
Weak access
established
controls
in case of
theft of data
Lack of
awareness
Lack of
can lead to
clear desk
unauthorized
clear screen
disclosure of
practices
sensitive
information
Documents
Succeptible
could be
to fire
destroyed
Information
could be
Weak non
misused,
disclosure
stolen or
agreements
unintentiona
lly disclosed
Unplanned
outages,
Weak
system
Change
instability,
Management
and data
process
integrity
issues
System
vulnerabiliti
Weak
es,
Technical
compatibilit
review after
y issues, and
OS Changes
security
gaps
Exposure to
known
security
Weak patch
vulnerabiliti
management
es and
malware
attacks
Inconsistent
operations,
Weak
human
operating
errors, and
procedures
process
failures
Prolonged
system
Weak outages and
Incident delayed
Management response to
security
breaches
System
performance
Weak
degradation
capacity
and
planning
unexpected
process
service
disruptions
Weak user
access
management
Unauthorized access to sensitive systems and data
Persistent
security
Weak exposures
vulnerability and
management increased
risk of
breaches
Weak clock
synchronizat
ion
Audit trail inconsistencies and timestamp validation failures
Inability to
detect
Weak event security
monitoring incidents in
a timely
manner
Weak User
awareness
Increased susceptibility to social engineering and phishing attacks
Application
is not tested
after
operating
system
changes
Application failures, data corruption, and service disruptions
Single point
Used of
of failure
shared
leading to
hardware
service
/Hardware
unavailabilit
failure
y
Maker-
checker
restriction is
not enforced
on new
account
creation for
employees
Technical
vulnerabiliti
es are not
identified &
mitigated on
a regular
basis
Password is
Unauthorize
not changed
d access
after
may
termination/
continue
retirement/tr
even after
ansfer of
role
application
changes.
admin.
Retention
period for
audit logs is
not defined
Loss of evidence for incident investigations or audits.
Weak
passwords
Users are
could
not forced to
remain in
change their
use,
password on
increasing
first login
security
risks.
No second
factor
authetication
Increased likelihood of unauthorized access.
Third party
users are Confidential
granted data may be
unrestricted exposed or
access to misused.
Application
User session
is not timed
out after a
defined
period of
inactivity
Unattended sessions may lead to unauthorized access.