© 2022 All Rights Reserved
© 2022 All Rights Reserved
RISK ASSESSMENT
METHODOLOGY
Version 3.0
Table of Contents
Reference documents
Definitions
Risk assessment
The process
System Characterization
Asset identification
Threat identification
Vulnerability identification
Control Analysis
Risk Mitigation
Assign Responsibility
Work plan
Reporting
Risk assessment are applied to the entire scope of all assets which are used within the
organization or which could have an impact on information security within the company.
Users of this document are all employees of Coralogix who take part in risk assessment.
Reference documents
● HIPAA
● PCI-DSS
● Information Security Policy
● Risk assessment
Definitions
Risk assessment
The process
Risk assessment is implemented through the Risk Assessment Table. The CISO coordinates the
risk assessment process, asset owners perform identification of threats and vulnerabilities, and
risk owners perform the assessment of impacts and likelihood.
System Characterization
Define the scope of the effort by identifying where ePHI and credit card information is received,
processed or transmitted.
Asset identification
Each asset may be identified to an asset owner who will then be responsible for adequately
protecting the asset. The asset may also be assigned an asset value based on its importance
and criticality.
Threat identification
Identification of all threat assets in the scope – i.e. of all assets that may affect confidentiality,
integrity, and availability of PII/ePHI and credit card information in the organization. Assets may
include documents in paper or electronic form, applications, and databases, people, IT
equipment, infrastructure, and external services\outsourced processes. When identifying assets,
it is also necessary to identify their owners – the person or organizational unit responsible for
each asset.
Vulnerability identification
Identify all vulnerabilities associated with each asset. A vulnerability is a weakness that can be
exploited by a threat and may originate from technology, the organization, the environment, or a
business process. In a risk assessment, all vulnerabilities should be considered. Every asset may
The table below shows the category and characteristics for risk assessment
Category Characteristics
● Vulnerability description
Vulnerabilities
● Level of Vulnerability
Control Analysis
Document and assess the effectiveness of technical and non-technical security controls that
have been or will be implemented by the Coralogix to reduce the likelihood of a threat source
exploiting a system vulnerability.
After the assessment of impacts, it is necessary to assess the likelihood of occurrence of such a
risk, i.e. the probability that a threat will exploit the vulnerability of the respective asset:
1 Existing security controls are strong and have so far provided an adequate level
Low
of protection. No new incidents are expected in the future.
2 Existing security controls are moderate and have mostly provide an adequate
Medium
level of protection. New incidents are possible, but not highly likely.
High 3 Existing security controls are low or ineffective. Such incidents have a high
likelihood of occurring in the future.
By entering the values of impact and likelihood into the Risk Assessment Table, the level of risk
is calculated automatically by adding up the two values. Existing security controls are to be
entered in the last column of the Risk Assessment Table.
Risk Mitigation
Work plan
The work plan is based on the Risk Assessment, by copying all risks identified as unacceptable
from the Risk Assessment. The CISO will conduct the work plan. One or more treatment options
must be selected for risks valued 4, 6 and 9:
The treatment of risks related to outsourced processes must be addressed through the
contracts with responsible third parties, as specified in Supplier Security Policy.
In the case of option 1 (selection of security controls), it is necessary to assess the new value of
impact and likelihood in the work plan, in order to evaluate the effectiveness of planned
controls.
On behalf of the risk owners, top management will accept all residual risks through the
Statement of Applicability.
The CISO will reduce and treat the risks from the risk assessment in the work. On behalf of the
risk owners, CEO will approve the Work plan.
CISO will monitor the progress of implementation of the work plan and report the results to the
CEO.
Only CEO can grant other employees access to any of the above mentioned documents.
The owner of this document is the CISO who must check and, if necessary, update the
document at least once a year, before the regular review of existing risk assessment.
When evaluating the effectiveness and adequacy of this document, the following criteria need
to be considered:
● The number of incidents which occurred, but were not included in risk assessment.
● The number of risks which were not treated adequately.
● The number of errors in the risk assessment process because of unclear definition of
roles and responsibilities.