Expert Advice Community

Guest

Filling in the risk assessment table

  Quote
Guest
Guest user Created:   Jan 08, 2019 Last commented:   Jan 08, 2019

Filling in the risk assessment table

We are working on 07.1_Appendix_1_Risk_Assessment_Table_Integrated_EN.xlsx . Under the THREATs, we have a whole long list of possible ones. Do we need to repeat all the threats for each Asset?
0 0

Assign topic to the user

ISO 27001 RISK ASSESSMENT TABLE

Implement risk register using catalogues of vulnerabilities and threats.

ISO 27001 RISK ASSESSMENT TABLE

Implement risk register using catalogues of vulnerabilities and threats.

Expert
Rhand Leal Jan 08, 2019

Answer:

The lists of threats and vulnerabilities provided in the Risk Assessment Table template are to be used only as guidance during the assessment process, so you do not have to repeat all of them for each asset, only the ones which are relevant to each asset.

By the way, included in the toolkit you bought you have access to a video tutorial that can help you to fill in the Risk Assessment Table, using real data as examples.

Quote
0 0

Comment as guest or Sign in

HTML tags are not allowed

Jan 08, 2019

Jan 08, 2019