Expert Advice Community

Guest

Project risk assessment

  Quote
Guest
Guest user Created:   Mar 09, 2017 Last commented:   Mar 09, 2017

Project risk assessment

I need to prepare a checklist for project risk assessment. This is related all within company projects. Project types can be software development, infrastructure revamping, any new product, hardware, software, new application for instance, skype for business etc. Business will involve me since beginning so I can properly assess the risk and propose controls accordingly.
0 0

Assign topic to the user

ISO 27001 DOCUMENTATION TOOLKIT

Step-by-step implementation for smaller companies.

ISO 27001 DOCUMENTATION TOOLKIT

Step-by-step implementation for smaller companies.

Expert
Rhand Leal Mar 09, 2017

I would appreciate if you can share your experience or assist me in developing the checklist which covers all aspect as far as security is concerned.

Answer: Before prepare the checklist, the first thing you have to do is define your risk assessment methodology, so you can have all the rules and orientations defined about, for example, how to assess a risk, what are the risk assessment criteria and what is an unacceptable risk.

Since you bought our ISO 27001 toolkit, in the document "Risk Assessment Table" you will find sheets called "Categories", "Vulnerabilities" and "Threats", which lists possible assets, vulnerabilities and threats you can use as base for built a chec klist.

Additionally, in the video tutorials that came with your toolkit, you can see examples of how to fill out all the data for Risk assessment and Risk treatment. This information also will give you insights to built your checklists.

Quote
0 0
Guest
waqar123 Mar 09, 2017

Thanks for your response. To make it more clear, can you elaborate it by taking an example of SKYPE for business project. What will be our approach to make a checklist for accessing the risk of the whole project. Appreciate your response.

Quote
0 0
Guest
waqar123 Mar 09, 2017

Regarding methodology we will go for qualitative.

Quote
0 0
Expert
Rhand Leal Mar 11, 2017

Ok, you have defined qualitative assessment as you methodology, but what about your risk assessment criteria? What is important for you? What would be an unacceptable risk?

Considering your Skype example, confidentiality for sure would be a concern, and for this criteria, considering the categories, threats and vulnerabilities in the Risk Assessment Table, possible risk to be considered could be:

- Low user management capability (Skype users may add or talk about project information with people outside the project)
- Privacy concerns regarding the license for using Skype
- Information typed on Skype is not under control of the organization
- The protocols used by Skype do not allow organizations monitoring tools to verify data traffic, and this can be used both to send information out or to let attacks in through skype channel
- Conversations can be recorded without one part being aware of

These are some risk examples a skilled information security practitioner can rise. By considering the view of the people involved in the qualitative assessment they now would evalua te these risks considering probability and impact (the most common criteria uses to define risk value), and compare the results with the value for an unacceptable risk, which you have to define at the beginning, along with the methodology.

Since you bought our ISO 27001 Documentation Toolkit, I suggest you to fill the Risk Assessment and Risk Treatment methodology template first, so you can have in mind all the elements you need to properly assess the risks for your projects.

Quote
0 0
Guest
waqar123 Mar 11, 2017

Quite clear now. Appreciate your response. Thanks.

Quote
0 1

Comment as guest or Sign in

HTML tags are not allowed

Mar 09, 2017

Mar 11, 2017