The CISO Perspective by Simon Butt

The CISO Perspective by Simon Butt

Author:Simon Butt
Language: eng
Format: epub
ISBN: 9781787784468
Publisher: ITG


One of the best descriptions of an organizationally appropriate risk assessment approach is in the International Standard, ISO/IEC 27001:2022 (Information security, cybersecurity and privacy protection – Information security management systems – Requirements).15

What does ISO/IEC 27001:2022 have to say about risk assessment?

ISO/IEC 27001:2022 (ISO 27001) is an internationally recognized information security standard that provides management and technical compliance requirements against which organizations and professionals can be certified. ISO 27001 guides organizations to establish, implement, maintain, and improve an ISMS that assures the confidentiality, integrity, availability, and privacy of information. ISO 27001 comprises two major sections: the management system requirements defined in paragraphs 4 through 10, and the security controls defined in Annex A of the Standard. While organizations have the right to select only the controls applicable to their operations from Annex A, excluding any of the requirements defined in paragraphs 4 through 10 is unacceptable if an organization claims compliance with ISO 27001.

To be compliant with ISO 27001, an organization must demonstrate the establishment and use of a risk assessment methodology that is suited to the business considering information security as well as legal and regulatory requirements. Clauses 6.1.2 and 6.1.3 of ISO 27001 define the necessary and critical elements of a risk assessment methodology.

The risk assessment approach must also define the criteria for accepting risks and identifying acceptable levels of risk. The Standard also provides the framework for conducting risk assessments, risk analysis, and risk treatment, leading to the selection of the proper security controls from Annex A.

The necessary steps within a risk assessment framework include the following:

1. Identifying the organization’s assets and the owners of the assets. This is all about knowing what you need to protect within the scope of the ISMS and who is responsible.

2. Calculating the impacts or AVs that a loss of confidentiality, integrity, and/or availability of the assets may have on the organization.

3. Identifying the threats and TL to the assets.

4. Identifying the vulnerabilities that are most likely paired with each threat to determine the VE.

5. A risk score can now be calculated for each asset and its threat and vulnerability pairs.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Whisky: Malt Whiskies of Scotland (Collins Little Books) by dominic roskrow(52665)
What's Done in Darkness by Kayla Perrin(26274)
Shot Through the Heart: DI Grace Fisher 2 by Isabelle Grey(18805)
Shot Through the Heart by Mercy Celeste(18686)
The Fifty Shades Trilogy & Grey by E L James(18574)
The Subtle Art of Not Giving a F*ck by Mark Manson(13899)
The 3rd Cycle of the Betrayed Series Collection: Extremely Controversial Historical Thrillers (Betrayed Series Boxed set) by McCray Carolyn(13841)
Stepbrother Stories 2 - 21 Taboo Story Collection (Brother Sister Stepbrother Stepsister Taboo Pseudo Incest Family Virgin Creampie Pregnant Forced Pregnancy Breeding) by Roxi Harding(12767)
Scorched Earth by Nick Kyme(12509)
Drei Generationen auf dem Jakobsweg by Stein Pia(10738)
Suna by Ziefle Pia(10671)
Scythe by Neal Shusterman(10020)
International Relations from the Global South; Worlds of Difference; First Edition by Arlene B. Tickner & Karen Smith(9279)
Successful Proposal Strategies for Small Businesses: Using Knowledge Management ot Win Govenment, Private Sector, and International Contracts 3rd Edition by Robert Frey(9095)
This is Going to Hurt by Adam Kay(8727)
Dirty Filthy Fix: A Fixed Trilogy Novella by Laurelin Paige(7338)
How to Make Love to a Negro Without Getting Tired by Dany LaFerrière(6746)
He Loves Me...KNOT by RC Boldt(6629)
Unleashing the Power of UX Analytics: Proven techniques and strategies for uncovering user insights [Team-IRA] [True PDF] by Jeff Hendrickson(6292)
Interdimensional Brothel by F4U(6086)