ISMS-FORM-06-1 Asset-Based Risk Tool

Page 1


Please note: This sample shows only a small part of the complete Asset-Based Risk Tool.

Not all columns are shown in the table below.

Not

all rows are shown in the table below.

ISO/IEC27001 Annex A Reference Controls

Thefollowinglistofreferencecontrolsisusedwithintheriskassessmentworksheets.

A.5Organizationalcontrols

A.5.1Policiesforinformationsecurity [e.g.SEC3,SEC14,SEC20]

A.5.2Informationsecurityrolesandresponsibilities

A.5.3Segregationofduties

A.5.4Managementresponsibilities

A.5.5Contactwithauthorities

A.5.6Contactwithspecialinterestgroups

A.5.7Threatintelligence

A.5.8Informationsecurityinprojectmanagement

A.5.9Inventoryofinformationandotherassociatedassets

A.5.10Acceptableuseofinformationandotherassociatedassets

A.5.11Returnofassets

A.5.12Classificationofinformation

A.5.13Labellingofinformation

A.5.14Informationtransfer

A.5.15Accesscontrol

A.5.16Identitymanagement

A.5.17Authenticationinformation

A.5.18Accessrights

A.5.19Informationsecurityinsupplierrelationships

A.5.20Addressinginformationsecuritywithinsupplieragreements

A.5.21ManaginginformationsecurityintheICTsupplychain

A.5.22Monitoring,reviewandchangemanagementofsupplierservices

A.5.23Informationsecurityforuseofcloudservices

A.5.24Informationsecurityincidentmanagementplanningandpreparation

A.5.25Assessmentanddecisiononinformationsecurityevents

A.5.26Responsetoinformationsecurityincidents

A.5.27Learningfrominformationsecurityincidents

A.5.28Collectionofevidence

A.5.29Informationsecurityduringdisruption

A.5.30ICTreadinessforbusinesscontinuity

A.5.31Legal,statutory,regulatoryandcontractualrequirements

A.5.32Intellectualpropertyrights

A.5.33Protectionofrecords

A.5.34PrivacyandprotectionofPII

A.5.35Independentreviewofinformationsecurity

A.5.36Compliancewithpolicies,rulesandstandardsforinformationsecurity

A.5.37Documentedoperatingprocedures

Not all rows are shown in the table below.

Asset | Threat | Vulnerability | Risk Type | Control Examples

The followinglistshows alistof assets, with associated threats and vulnerabilities, risk type and the Annex A controls thatmightbe used to treatthem. You may use this table to help to identify relevantrisks foryourorganization and to define where the controls fromAnnex A of ISO/IEC27001are applicable.

1 Organization Itis notclearwhatthe organization's rules are formanaging information security. Employees and others aren'taware of whatthey should be doingto protectthe organization

Policies eitherdon'texistordon'tcoverthe required areas Availability

2 Organization New threats have emerged thatneed to be addressed in policies Policies are outof date, do notreflectthe organization's business or technical setup

3 Organization Itis notclearwho should be doingwhatwith respectto information security

4 Business activities An individual is able to performall of the steps required to performasensitive business process. Checks are insufficientto preventaccidental amendmentordestruction of data

5 Organization The organization is unaware of theirlegal orregulatory responsibilities and may break the law withoutrealisingit

6 Business activities The organization lacks up to date knowledge of information security issues such as currentthreats, new controls and other relevantinformation

7 Organization Information gathered and created duringprojects is not adequately protected

8 Information Dataheld on mobile devices is prone to loss ortheftof the device, orunauthorised access

9 Physical/Site A teleworkingsite does notmeetthe information security standards ensured atmain locations and datais exposed to loss ortheft

10 Business activities Itis notclearwho does whatwith respectto cloud security and one party (e.g. cloud service customer) is underthe impression thatthe other(e.g. cloud service provider) is monitoringa particularaspect

Roles and responsibilities forinformation security have notbeen clearly defined

Processes have notbeen designed to limitthe scope fordeliberate or accidental actions

No contactis in place with bodies who may impose requirements on ourorganisation

No budgetis currently available forattendance atconferences, seminars and trainingevents

Projectdocumentstores are setup ad hocand often outside of more formal access controls

No guidance is given to employees abouthow to protecttheirmobile devices

Teleworkingarrangements are informal and no checkingis done of the environmentin place

Confidentiality, Integrity and Availability

Confidentiality

Confidentiality, Integrity and Availability

Confidentiality and Availability

Confidentiality, Integrity and Availability

Confidentiality

Confidentiality

Confidentiality

No splitof responsibilities is agreed as partof the cloud take-on service Availability

A.5.1Policies forinformation security

A.5.1Policies forinformation security

A.5.2Information security roles and responsibilities

A.5.3Segregation of duties

A.5.5Contactwith authorities

A.5.6Contactwith special interestgroups

A.5.8Information security in projectmanagement

A.8.1Userendpointdevices

A.6.7Remote working

A.5.23Information security for use of cloud services

Not all rows are shown in the table below.

ExamplesofAssets

Thefollowingisaninitiallistoftypicalassetsthatmaybeuseasguidanceforyourriskassessment.

Note:informationassetsshouldbecapturedinmoredetailintheInformationAssetInventory.

Businessactivities

Business-criticalactivities

Supportingactivities

Compliance

Information Cloudcustomerdata Personallyidentifiableinformation(PII) Non-PII

Corporate Budgets

Salesforecasts

Corporateplans

Corporatepolicies

SalesandMarketing Customerrecords-names,addresses,contacts

Customercreditcardinformation

Customerbankdetailse.g.DirectDebits

Websiteinformation

Customerpreferencesandpurchasehistory

Customercorrespondenceandcomplaints

HumanResources

Employeerecords -address,DOB,insurancenumbers

Employeeexpenseclaims

Payrollinformation,includingbankdetails

Trainingrecords

Recruitmentinformation

Securityclearance/checkinformation

Employeecomplaints/disciplinaryrecords

Sickness/occupationalhealthrecords

Employmentcontracts

Finance Accountingrecords-invoices,bills,accounts

Buying

Businessaccountbankingdetails

Suppliercontactdetails

Buyingplans

Commercialterms

Legal Suppliercontracts

Customercontracts

Propertyleases

Creditagreements

Insurancepolicies

Operations

Documentsheldonbehalfofcustomers

Productspecificationsandbillsofmaterials

Processandproceduraldocumentation

IntellectualPropertyspecifictotheorganisation

Resourceplans

AuditandCompliance Internalauditrecords

Externalauditreports

Riskassessments

Examplesof Threats

The followingisastandardlistof typical threatsthatmaybe use asguidance foryourriskassessment. THREATCATEGORY

Human Maliciousoutsider

Maliciousinsider

Lossof keypersonnel

Humanerror

Accidental loss

Natural Fire

Flood

Severe weather

Earthquake

Lightning

Technical Hardware failure

Software failure

Virus/Maliciouscode

Physical Sabotage

Theft

Arson

Environmental Hazardouswaste

Powerfailure

Gassupplyfailure

Operational Processerror

Crime scene

Someone launchesadenial of service attackonyourcloud service platform

Anemployee ortrustedthirdpartyaccessescardholderdatain anunauthorisedmannerfrominside yournetwork

One ormore people withkeyskillsorknowledge are unavailable perhapsdue toextendedsickness

Anemployee accidentallydeletescardholderdata

Amanagerlosesamemorystickwithcardholderdataonit

Yourdatacentre burnsdowndue toanelectrical fault

The nearbyriverbreaksitsbanksandyourmainoffice is severelyflooded

Non-one cangetintothe office due tothe weather

The areaof yourmaindatacentre isaffectedbyanearth tremorthatdamagesall yourservers

All yourserversare friedbyalightningstrike onthe data centre building

Akeyphysical serverhasaprocessorfailure

Yourfinancial systemprocessesinvoicesincorrectlydue toa bug

Avirusspreadsthroughoutyournetworkpreventingaccessto your(andyourcustomers') data

Adisgruntledex-employee takesanaxe toyourserverroom

Youcome inonMondaymorningtofindsome important driveshave beenstolen

Someone withagrudge againstyourorganisationstartsafire duringthe night

Alorrycarryinghazardouswaste hasanaccidentoutside your office

The sub-stationsupplyingyourareahasameltdown

There isasuspectedleakandall suppliesare turnedoff

Yournewdatatransferprocedure doesn'tcaterforunexpected circumstancesandcardholderdataislostorsenttothe wrong destination

Acrime happensinornearyouroffice andthe areaissealed off bypolice

Likelihood

This table should be used to decide upon the most appropriate likelihood for a particular threat.

LIKELIHOOD DESCRIPTION SUMMARY

1 Improbable Has never happened before and there is no reason to think it is any more likely now

2 Unlikely There is a possibility that it could happen, but it probably won't

3 Likely On balance, the risk is more likely to happen than not

4 Very Likely It would be a surprise if the risk did not occur either based on past frequency or current circumstances

5 Almost certain Either already happens regularly or there is some reason to believe it is virtually imminent

Impact

This table should be used as guidance to help to decide upon the correct impact rating for a particular threat.

ISO/IEC27001Asset-basedriskassessmentandtreatmenttooldashboard Torefreshchartdataontheriskdashboard,clickon“RefreshAll”ontheDataribbon.

Pre-treatmentassessment

Numberofpre-treatmentrisks

Post-treatmentassessment

Numberofpost-treatmentrisks

Classificationofrisklevel

Pre-treatmentrisklevelsbyriskowner

Numberofrisksbyrisklevelpreandposttreatment Risksbytreatmentoptionchosen

Riskprofilediagram

Thechartbelowshowstheratingschemeusedtodeterminerisklevelbasedonacombinationoflikelihoodandimpact. Thechartsbelowshowthespreadofriskseveritiesbeforeandafterrisktreatment.

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.