Key Service Activities
- Data gathering (based on interviews and documentation)
- Identify key personnel
- Identify and collect key documentation
- Based on the data gathered, the analyst performs:
- Asset Group Analysis
- Asset group mission factor weighting classification
- Asset group sensitivity classification based on Confidentiality, Integrity, and Availability
- Threat Analysis
- Threat mapping
- Probability analysis
- Impact analysis
- Risk assignment
- Control Analysis
- Control mapping
- Implementation analysis
- Risk Analysis
- Reporting
- Report Briefing
- Asset Group Analysis
Risk Assessment Result
The Risk Assessment results are provided in an extensive report containing:
- Project overview
- Risk assessment methodology
- Executive summary
- Detailed risk analysis by asset group
- Control group summary
- Information security policy analysis
- Recommended action plan
- Appendix
Automation
Automation of the risk management process includes:
- Asset group analysis – Identifies core assets and assigns a level of critical to each asset in the areas of CIA
- Threat analysis – Identifies all relevant threats, evaluates each threat to determine which assets are affected, then assigns a level of critical to each asset in the areas of CIA
- Control analysis – Identifies safeguards that can be used to protect each asset, assigns values to each control in terms of how it protects against specified threats
- Risk assessment reporting – Automatically associates and calculates data to produce a detailed risk assessment report