Identification of risks caused by third parties
Assign topic to the user
Answer: The most common threats are loss of data, unauthorized access to the data, loss of availability, etc. The most common vulnerabilities are lack of backup, lack of access control, lack of alternative providers, etc.
Here you'll find a short list of threats and vulnerabilities: https://advisera.com/27001academy/knowledgebase/threats-vulnerabilities/
And here is a case study that might interest you: ISO 27001 Case study for data centers: An interview with Goran Djoreski https://advisera.com/27001academy/blog/2013/10/29/iso-27001-case-study-for-data-centers-an-interview-with-goran-djoreski/
Comment as guest or Sign in
Nov 02, 2016