Chapter 5. Conducting A Risk Assessment

Effectively running and managing an ISMS requires the system to be based upon a solid risk assessment and subsequent risk management disciplines. This means you need to have a formal process in place to identify and rate the different types of information security risks that exist against your information assets in terms of their impact and the likelihood of occurrence.

Once you have identified all the appropriate information security management risks, you need to put in place a formal process to assess and manage those risks. It is important that this process is one that you can repeat at regular periods in order to re-evaluate the risks.

Before we conduct a risk assessment, we need to understand what we ...

Get ISO27001 in a Windows® Environment: The best practice handbook for a Microsoft® Windows® environment, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.