A risk assessment process that meets the requirements of ISO 27001:2013 should have five steps:
Establish a risk management framework: These are the rules governing how you intend to identify risks, to whom you will assign risk ownership, how the risks impact the confidentiality, integrity and availability of the information and the method of calculating the estimated impact and likelihood of the risk occurring. A formal risk assessment methodology needs to address four issues and should be approved by top management:
- Baseline security criteria
- Risk scale
- Risk appetite
- Scenario- or asset-based risk assessment
Identify risks: Identifying the risks that can affect the confidentiality, integrity and availability of information is the most time-consuming part of the risk assessment process. GRC Solutions recommends following an asset-based risk assessment process. Developing a list of information assets is a good place to start. It will be easiest to work from an existing list of information assets that includes hard copies of information, electronic files, removable media, mobile devices and intangibles, such as intellectual property.
Analyse risks: Identify the threats and vulnerabilities that apply to each asset. For instance, the threat could be ‘theft of mobile device’, and the vulnerability could be ‘lack of formal policy for mobile devices’. Assign impact and likelihood values based on your risk criteria.
Evaluate risks: You need to weigh each risk against your predetermined levels of acceptable risk and prioritise which risks need to be addressed in which order.
Select risk treatment options: There are four suggested ways to treat risks:
- ‘Avoid’ the risk by eliminating it.
- ‘Modify’ the risk by applying security controls.
- ‘Share’ the risk to a third party (through insurance or outsourced).
- ‘Retain’ the risk (if the risk falls within established risk acceptance criteria).