6.1.2 Information security risk assessment
Created by Maurice Pasman
Control details
Requirement | For copyright reasons, this space does not contain citations from the Standard. |
---|---|
Instruction | Write down the organization's method for risk analysis. Think:
|
Implementation | Our risk assessment process is based on SPRINT and is defined here: Risk assessment and treatment process. |
Check details
Owner | /wiki/spaces/DEMO/pages/5670182 |
---|---|
Frequency | Year |
Instruction | Is the risk assessment process still accurate? Are the risk levels in the identified risks according to the process? Is the implementation still accurate? Consult with management if needed. Report any findings below in the comments, or upload proof as attachment to this page. |
File | Modified |
---|
No files shared here yet.