Risk treatment
Assign topic to the user
Is there any sample threat and vulnerabilities database that can be used for contractual agreement, outsourcing, SLA and regulatory requirement.
Answer: Our Risk Treatment Plan does not have drop-down menu for threats and vulnerabilities because this is part of the risk assessment and is covered in the Risk Assessment Table. As our video tutorial shows, you should simply copy the unacceptable risks (with all the assets, threats and vulnerabilities) from the Risk Assessment Table and paste them into the Risk Treatment Table.
In the Risk Assessment Table you'll find a list of of threats and vulnerabilities related to outsourcing, SLAs and regulatory requirements: e.g., breach of contractual relations, breach of legislation, unauthorized access to facilities allowed and unclearly defined rules for access control.
Comment as guest or Sign in
Apr 04, 2017