Expert Advice Community

Guest

SOP for threats and vulnerability assessment

  Quote
Guest
Guest user Created:   Nov 07, 2016 Last commented:   Nov 07, 2016

SOP for threats and vulnerability assessment

Could you kindly guide from where can I get the SOP (Standard operating procedure) for Threats and Vulnerability Assessment.
0 0

Assign topic to the user

ISO 27001 RISK ASSESSMENT AND RISK TREATMENT METHODOLOGY

Define main rules for risk assessment and treatment.

ISO 27001 RISK ASSESSMENT AND RISK TREATMENT METHODOLOGY

Define main rules for risk assessment and treatment.

Expert
Dejan Kosutic Nov 07, 2016

Answer: In ISO 27001 implementation, the procedure for implementing threats and vulnerabilities assessment (together with the rest of risk assessment) is usually written in the Risk assessment methodology - you can see a sample here: https://advisera.com/27001academy/documentation/Risk-Assessment-and-Risk-Treatment-Methodology/

You'll find these articles also useful:
- How to write ISO 27001 risk assessment methodology https://advisera.com/27001academy/knowledgebase/write-iso-27001-risk-assessment-methodology/
- ISO 27001 risk assessment: How to match assets, threats and vulnerabilities https://advisera.com/27001academy/knowledgebase/iso-27001-risk-assessment-how-to-match-assets-threats-and-vulnerabilities/

Quote
0 0

Comment as guest or Sign in

HTML tags are not allowed

Nov 07, 2016

Nov 07, 2016