10.security Risk Assessment
10.security Risk Assessment
10.security Risk Assessment
• Identify assets (e.g., network, servers, applications, data centers, tools, etc.)
within the organization.
• Create risk profiles for each asset.
• Understand what data is stored, transmitted, and generated by these assets.
• Assess asset criticality regarding business operations. This includes the
overall impact to revenue, reputation, and the likelihood of a firm’s
exploitation.
• Measure the risk ranking for assets and prioritize them for assessment.
• Apply mitigating controls for each asset based on assessment results.