Skip to content Skip to sidebar Skip to footer

How Can You Conduct a Risk Analysis and Security Survey to Protect Your Assets?

One of the core principles of ISO 27001 is that the information security measures you adopt must be relevant to the threats your organisation faces.

Every business is unique – in its structure, the types of information it processes and the way it operates – and so its approach to data protection must reflect that.

That ways conducting a risk assessment to determine where your weaknesses are, how probable it is that those weaknesses will be exploited and the touch each ane volition cause.

You can perform this cess in one of two ways, either by focusing on assets (the information and locations that may be breached) or scenarios (the circumstances that can issue in a breach).

Most organisations lean towards nugget-based assessments, which is what we will exist looking at in this web log.

Where to starting time with an asset-based gamble assessment

The showtime step is to produce an nugget register – i.e. a listing of hardware, software, devices and databases on which sensitive information is stored.

You lot can do this past interviewing nugget owners. They are the private or entity responsible for controlling the production, development, maintenance, use and security of an information nugget.

Although ISO 27001 places a stiff emphasis on the 'risk owner', which pushes run a risk responsibility to a higher level within the arrangement, the asset owner is the logical starting signal when compiling an asset register.

Run a risk assessment and touch on determination

In one case the asset register has been produced, the next step is to place potential threats and vulnerabilities that could pose risks to those assets. A vulnerability is a weakness that tin can be exploited by one or more threats.

In one case threats and vulnerabilities have been identified, the risks should be analysed to found the damage that they tin cause. This needs to consider how the confidentiality, integrity and availability of information can exist afflicted by each risk.

Scoring risks

A cardinal part of the hazard cess involves scoring risks based on the likelihood that they volition occur and the damage they will cause.

You should also consider the business, legal, contractual and regulatory implications of risks, including the cost of replacing the asset, the potential loss of income, fines and reputational harm.

Once yous've scored your risks, you can determine whether they pose a significant plenty threat to be addressed. The all-time way to exercise this is through a chance matrix, which is a visual assistance for assessing the likelihood and affect of each adventure.

The risk matrix provides a simple mechanism for determining whether risks should be addressed.

Risk management

ISO 27005 – another standard in the series dealing specifically with risk management – offers a structured, systematic and rigorous process for analysing risks and creating the hazard handling plan.

As with ISO 27001, there isn't a specific, prescribed arroyo to take a chance management. This is because organisations have their ain challenges and must tackle them in a way that suits them.

However, it does include four options for the way you tin care for each risk. You tin can:

  • Modify the gamble by implementing a command to reduce the likelihood of information technology occurring

For example, you might address the risk of a work-issued laptop beingness stolen by creating a policy that instructs employees to keep devices with them and to store them safely.

  • Avert the risk by ceasing whatever activeness that creates information technology

This response is appropriate if the risk is too big to manage with a security control.

For example, if you're non willing to accept whatsoever chances of a laptop being stolen, you might choose to ban employees from using them off-site.

This selection will make things less convenient for your employees simply will drastically better your security posture.

  • Share the take chances with a tertiary party

At that place are two ways you can practise this: by outsourcing the security efforts to another arrangement or by purchasing cyber insurance to ensure y'all have the funds to respond accordingly in the result of a disaster.

Neither choice is ideal, considering you are ultimately responsible for your arrangement'due south security. Nonetheless, they might be the best solutions if you lack the resources to tackle the adventure.

  • Retain the risk

This means that your organization accepts the risk and believes that the cost of treating it is greater than the damage that it would cause.


The method y'all choose depends on your circumstances. Avoiding the risk is the most constructive fashion of preventing a security incident, but doing so will probably exist expensive if not impossible.

For case, many risks are introduced into an organisation by human being fault, and you won't often be able to remove the human element from the equation.

Getting started with your risk assessment

Our whitepaper5 critical steps to successful ISO 27001 take a chance assessments contains an in-depth explanation of everything you need to consummate the risk assessment process.

It provides essential guidance on:

  • How to determine the optimum risk calibration and so you can determine the impact and likelihood of risks;
  • How to systematically go virtually identifying, evaluating and analysing risks without losing your heed;
  • The baseline security criteria you must establish for a successful ISO 27001 implementation.
Download your copy

A version of this blog was originally published on the one November 2018.

vinsondoperat.blogspot.com

Source: https://www.vigilantsoftware.co.uk/blog/conducting-an-asset-based-risk-assessment-in-iso-270012013

Post a Comment for "How Can You Conduct a Risk Analysis and Security Survey to Protect Your Assets?"