it risk assessment template

2
IT Risk Assessment Templates NIST-SP 800:30 Risk Management Guide for IT Sy No Step Description 1 Sy st em Characterization Define the scope of the effort. In this step, the boundaries of the IT system are identified, along with the resources and the information that constitute the system. 2 Threat Ident ificat ion Iden tify the pote ntial thre at-sources and compile a threat statement listing potential threat-sources that are applicable to the IT system being evaluated. 3 Vul nerability Identification Develop a list of system vulnerabilities (flaws or weaknesses) that could be exploited by the potential threat-sources. 4 Control Analysis an al yze the controls that have be en implemented, or are planned for implementation, by the organization to minimize or eliminate the likelihood (or probability) of a threat’s exercising a system vulnerability. 5 Li kel ihood Determination An overall likelihood rating that indicates the probability that a potential vulnerability may be exercised within the construct of the associated threat environment, 6 Impact An al ysi s The a dv er se impa ct re su lti ng fr om a successful threat exercise of a vulnerability. 7 Ris k Deter mina tion the lev el o f ri sk t o th e I T sy stem. 8 Control Recommendations Reduce the level of risk to the IT system and its data to an acceptable level. 9 Results Documentation A risk assessment report is a management report that helps senior management, the mission owners, make decisions on policy, procedural, budget, and system operational and management changes.

Upload: gidugu

Post on 07-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: It Risk Assessment Template

8/3/2019 It Risk Assessment Template

http://slidepdf.com/reader/full/it-risk-assessment-template 1/2

IT Risk Assessment TemplatesNIST-SP 800:30 Risk Management Guide for IT Sy

No Step Description

1 System

Characterization

Define the scope of the effort. In this step, the

boundaries of the IT system are identified,

along with the resources and the information

that constitute the system.

2 Threat Identification Identify the potential threat-sources and

compile a threat statement listing potential

threat-sources that are applicable to the IT

system being evaluated.

3 Vulnerability

Identification

Develop a list of system vulnerabilities (flaws

or weaknesses) that could be exploited by

the potential threat-sources.

4 Control Analysis analyze the controls that have beenimplemented, or are planned for

implementation, by the organization to

minimize or eliminate the likelihood (or

probability) of a threat’s exercising a system

vulnerability.

5 Likelihood

Determination

An overall likelihood rating that indicates the

probability that a potential vulnerability

may be exercised within the construct of the

associated threat environment,

6 Impact Analysis The adverse impact resulting from

a successful threat exercise of a vulnerability.

7 Risk Determination the level of risk to the IT system.8 Control

Recommendations

Reduce the level of risk to the IT system and

its data to an acceptable level.

9 Results

Documentation

A risk assessment report is a management

report that helps senior management, the

mission

owners, make decisions on policy,

procedural, budget, and system operational

and management

changes.

Page 2: It Risk Assessment Template

8/3/2019 It Risk Assessment Template

http://slidepdf.com/reader/full/it-risk-assessment-template 2/2

stems

Output Status Notes

Characterization of the IT system

assessed, a good picture of the IT

system environment, and delineation of

system boundary

A threat statement containing a list of

threat-sources that could exploit system

vulnerabilities

A list of the system vulnerabilities

(observations) that could be exercised

by the potential threat sources

List of current or planned controls usedfor the IT system to mitigate the

likelihood of a vulnerability’s being

exercised and reduce the impact of such

an adverse event

Likelihood rating

Magnitude of impact (High, Medium, or

Low)

Risk Level (High, Medium, or Low)Recommendation of control(s) and

alternative solutions to mitigate risk

Risk assessment report that describes

the threats and vulnerabilities,

measures the risk, and provides

recommendations for control

implementation