Expert Advice Community

Guest

ISO27001 Risk Register

  Quote
Guest
Guest post Created:   Jan 12, 2016

ISO27001 Risk Register

We have received this Question : "I’m preparing the risk register.Let take asset as "firewall" Threat as Hackers and there would be lot of vulnerabilities associated with this threat (Improper access rights, Misconfiguration, lack of rule base audit...etc) But i have seen risk registers with one threat and they write only one vulnerability. Please provide your inputs regarding this query." Answer: Risks are better expressed in terms of scenarios « this happens to that element under these circumstances and causes this level of damage ».    Each asset can have several threats that in their turn have several vulnerabilities. So we recommand, for a comprehensive risk registry to have one line per vulnerability and one group of vulnerabilities per threat. If a register only shows one threat or vulnerability for each asset, it’s probably because the risk manager has, after analysis, only kept ‘the worst case’. An auditor should accept all what you included in your risk registry, but you will have to explain what you did to come to this registry and how you di dit. It’ s ‘your’ security that counts, not the way how the auditor thinks it is. Note : The ‘Asset-Threat-Vulnerability’ method is only one possible approach for risk analysis.
0 0

Assign topic to the user

ISO 27001 DOCUMENTATION TOOLKIT

Step-by-step implementation for smaller companies.

ISO 27001 DOCUMENTATION TOOLKIT

Step-by-step implementation for smaller companies.

Comment as guest or Sign in

HTML tags are not allowed

Jan 12, 2016

Jan 12, 2016

Suggested Topics

Guest user Created:   Oct 07, 2022 ISO 27001 & 22301
Replies: 1
0 0

Documentation request

Guest user Created:   May 30, 2022 ISO 27001 & 22301
Replies: 3
0 0

Risk assessment question