Instant 27001 demo environment

6.1.2 Information security risk assessment

Control details

Requirement

The organization shall define and apply an information security risk assessment process that:

a) establishes and maintains information security risk criteria that include:

   1) the risk acceptance criteria; and

   2) criteria for performing information security risk assessments;

b) ensures that repeated information security risk assessments produce consistent, valid and comparable results;

c) identifies the information security risks:

   1) apply the information security risk assessment process to identify risks associated with the loss of confidentiality, integrity and availability for information within the scope of the information security management system; and

   2) identify the risk owners;

d) analyses the information security risks:

   1) assess the potential consequences that would result if the risks identified in 6.1.2 c) 1) were to materialize;

   2) assess the realistic likelihood of the occurrence of the risks identified in 6.1.2 c) 1); and

   3) determine the levels of risk;

e) evaluates the information security risks:

   1) compare the results of risk analysis with the risk criteria established in 6.1.2 a); and

   2) prioritize the analysed risks for risk treatment.

The organization shall retain documented information about the information security risk assessment process.

Instruction

Write down the organization's method for risk analysis.

Think:

  1. How often/when is the risk analysis executed?
  2. Who will be performing the risk analysis?
  3. What metrics will be used?
  4. When is a risk required to be mitigated and when can it be accepted?
  5. Who will own the risk?
  6. Who can accept a risk?
Implementation

Our risk assessment process is defined here: Risk assessment and treatment process.

The metrics are defined in Risk matrix.


Check details

OwnerRisk manager
FrequencyYear
Instruction

Is the risk assessment process still accurate? Are the risk levels in the identified risks according to the process?

Is the implementation still accurate? Consult with management if needed. Report any findings below in the comments, or upload proof as attachment to this page.


  File Modified
No files shared here yet.