Expert Advice Community

Guest

Identifying threats and vulnerabilities

  Quote
Guest
Guest user Created:   Aug 24, 2017 Last commented:   Aug 24, 2017

Identifying threats and vulnerabilities

When we are preparing Risk assessment, that time which one do we consider first or talk about first threat or vulnerability as per the article threat comes first but I want to understand technically which comes first
0 0

Assign topic to the user

ISO 27001 DOCUMENTATION TOOLKIT

Step-by-step implementation for smaller companies.

ISO 27001 DOCUMENTATION TOOLKIT

Step-by-step implementation for smaller companies.

Expert
Rhand Leal Aug 24, 2017

Answer: I'm assuming you are talking about the article "ISO 27001 risk assessment: How to match assets, threats and vulnerabilities" (https://advisera.com/27001academy/knowledgebase/iso-27001-risk-assessment-how-to-match-assets-threats-and-vulnerabilities/). That said, technically there is no difference if you start first with identifying threats or vulnerabilities (this choice is basically upon which element you know best considering your context). However, in operational terms, the best approach is to identify the vulnerabilities first, since they are easier to be confirmed (assets and controls that may have them are under your management). In case of threats, specially those external to your organization, not always you will have enough information to confirm if they are applicable.

This material will also help you regarding threats and vulnerabilities:
- Book ISO 27001 Risk Management in Plain English https://advisera.com/books/iso-27001-annex-controls-plain-english/

Quote
0 0

Comment as guest or Sign in

HTML tags are not allowed

Aug 24, 2017

Aug 24, 2017

Suggested Topics

Guest post Created:   Jan 12, 2016 ISO 27001 & 22301
Replies: 0
0 0

ISO 27005 or ISO 31000

Guest user Created:   Feb 16, 2022 ISO 27001 & 22301
Replies: 1
0 0

ISO 27001/Conformio questions

Guest user Created:   Jun 23, 2020 ISO 27001 & 22301
Replies: 1
0 0

ISO 27001 implementation