Chap 8
Chap 8
• Insight into where your most valuable IT assets resides — Some data stores, machines and other IT
assets are more important than others. Since what IT assets you have and their value can change over time,
it’s important to repeat the risk assessment process regularly.
• Understanding of risk — By identifying and analyzing the potential threats to your business, you can
focus first on the risks that have the highest potential impact and the highest probability.
• Vulnerability identification and remediation — A gap-focused IT risk assessment methodology can help
you identify and close vulnerabilities that threat actors can take advantage of. Examples include unpatched
software, overly permissive access policies and unencrypted data.
BENEFITS OF SECURITY RISK
ASSESSMENTS
• Cost mitigation — Undertaking a security risk assessment not only safeguards your business from the
high cost of a data breach, but it also enables prudent use of budget for security initiatives that deliver the
most value.
• Regulatory compliance — Regular security risk assessments can help organizations comply with the
data security requirements of mandates such as HIPAA, PCI DSS, SOX and GDPR, and thereby avoid
costly fines and other penalties.
• Improved customer trust — Demonstrating a commitment to security can increase customer trust, which
can lead to improved client retention.
• Informed decision making — The detailed insight provided by a cybersecurity risk assessment will
facilitate better decision-making regarding security, infrastructure and personnel investments.
STEPS IN A SECURITY RISK ASSESSMENT
• Analyze the controls that are in place to reduce the probability that a threat will
exploit a vulnerability. Examples of technical controls include encryption, intrusion
detection systems, and multifactor authentication (MFA). Non-technical controls
include security policies, administrative procedures, and physical or environmental
protections.
• Both technical and non-technical controls can be subdivided into preventive or
detective categories. Preventive controls, such as encryption and MFA, are designed
to thwart attacks. Detective controls, like audit trails and intrusion detection
systems, are utilized to identify threats that have either transpired or are currently
unfolding.
STEP 5. DETERMINE THE LIKELIHOOD OF
AN INCIDENT
• Using the risk level as a basis, determine the actions needed to mitigate the
risk. Here are some general guidelines for each level of risk:
• Clause 6.1.2 of the Standard sets out the requirements of the information security risk assessment process.
Organisations must:
• Establish and maintain specific information security risk criteria;
• Ensure that repeated risk assessments “produce consistent, valid and comparable results”;
• Identify “risks associated with the loss of confidentiality, integrity and availability for information within the
scope of the information security management system” and identify the owners of those risks; and
• Analyse and evaluate information security risks, according to the criteria established earlier.
• It is essential that organisations “retain documented information about the information security risk assessment
process” so that they can demonstrate that they comply with these requirements.
• They will also need to follow several steps – and create relevant documentation – as part of the information security
risk treatment process.
IT GOVERNANCE CYBER RISK
ASSESSMENT SERVICE
• Identifying the assets that require protection.
• Identifying relevant threats and weaknesses.
• Identifying exploitable vulnerabilities.
• Assessing the level of threat posed by threat agents.
• Determining the business impacts of risks being realised.
• Producing a security risk assessment.
• Advising on a risk acceptance threshold or level of acceptance.
• Advising on suitable control implementation.
WHO IS THE CYBER RISK ASSESSMENT
SERVICE FOR?