1. EachPod
EachPod

Risk Assessment - What to Assess

Author
Dr. Bill Souza
Published
Tue 28 Jun 2022
Episode Link
None

Send us a text

These 3 steps you can take to perform a risk assessment:

  1. Identify and document the scope and assets to be assessed. I suggest starting with your critical assets.
  2. Identify and collect your assessment data.
    1. Vulnerability scan (including applications)
    2. Minimum security baseline scan
    3. Access management at the OS and application levels
    4. Standard exceptions against your scoped systems
    5. Security information and event management (SIEM) logging and alerting
  3. Analyze and report
    The most important part is the analysis, since quantitative data alone may not provide the correct information.

========

Training: https://www.execcybered.com/iso27001foundationcourse

Linkedin: https://www.linkedin.com/company/exceccybered/

Twitter: https://twitter.com/DrBillSouza

Instagram: https://www.instagram.com/drbillsouza/

Author: Dr. Bill Souza | Jun 28, 2022 

Share to: