03 - Risk Assessment V 2.0
03 - Risk Assessment V 2.0
Overview
Risk Management Life Cycle
IT Risk Identification
Compensating controls
• Address a gap or weakness in the
controls
• Inability to enact a more desirable
control
- i.e., additional monitoring, dual
control
Control Gap
Audits
Penetration Tests, Vulnerability
Assessments
Observation
Incident reports
User feedback
Logs
Vendor reports
Audit
Emerging risk
Changes in risk
- New threats
- Newly discovered vulnerabilities
- Bypass of controls
- Erosion of control effectiveness
Likelihood of risk levels exceeding KPIs
Gap Assessment
Quantitative Risk
• Monetary value of risk
Qualitative Risk
• Scenario-based
• Range of risk levels
- Very Low, Low, moderate, High, Very
High
Qualitative vs Quantitative
Probability
Low Medium High
High Medium High High
Impact
Reflects managements’
Proactive
priorities
Secure communications
- Confidentiality
- Integrity
- Authentication
Transport Layer Security (TLS/SSL)
IPsec
SDLC (Software Development Life Cycle)
Awareness affects:
• Culture
• Ethics
• Direction and guidance
Risk Ownership