Expert Advice Community

Guest

Asset, threat, vulnerability

  Quote
Guest
Guest user Created:   Jan 13, 2016 Last commented:   Jan 13, 2016

Asset, threat, vulnerability

0 0

Assign topic to the user

ISO 27001 DOCUMENTATION TOOLKIT

Step-by-step implementation for smaller companies.

ISO 27001 DOCUMENTATION TOOLKIT

Step-by-step implementation for smaller companies.

Guest
AntonioS Jan 13, 2016

Thanks for the reply! Just to make sure I understand, my risk identification would look like the following, with these broader organizational risks identified and repeated for each asset?
Asset Threat Vulnerability
Database Accidental-Privileged User Lack of Change Management
Database Accidental-Privileged User Lack of Security Incident Process
Database Adversarial-Insider Lack of HR Screening Process
Windows Server Accidental-Privileged User Lack of Change Management
Windows Server Accidental-Privileged User Lack of Security Incident Process
Windows Server Adversarial-Insider Lack of HR Screening Process
 

Answer:

Yes, you are in the right way, although from my point of view the threat “Adversarial-Insider” could be also related with the vulnerability “Lack of Information Security Awareness”. 
Finally, this free webinar can be interesting for you “The basics of risk assessment and treatment according to ISO 27001” : https://ad visera.com/27001academy/webinar/basics-risk-assessment-treatment-according-iso-27001-free-webinar-demand/

Quote
0 0

Comment as guest or Sign in

HTML tags are not allowed

Jan 12, 2016

Jan 12, 2016

Suggested Topics

Guest user Created:   May 19, 2019 ISO 27001 & 22301
Replies: 1
0 0

Performing risk assessment

Guest user Created:   Jun 23, 2022 ISO 27001 & 22301
Replies: 1
0 0

Additions to Conformio