Identify all IT assets (hardware, software, data, personnel).
Categorize all IT assets by value and sensitivity.
List down potential threats, from natural disasters to cyberattacks.
4
Vulnerability Assessment
Exploit weaknesses in systems, processes, and controls. The related security vulnerabilities relate to OS setting hardening, weak password, password security issue, web security setting, internet & service etc.
5
Risk Analysis & Prioritization
Evaluate the likelihood and impact (financial, operational, reputational) of threats exploiting vulnerabilities, using existing controls to determine risk levels.
Apply security measures (technical, administrative, physical) to reduce identified risks.
Continuously track risks and update the assessment regularly.