Security Policy: Difference between revisions
		
		
		
		Jump to navigation
		Jump to search
		
| Line 98: | Line 98: | ||
| # Establishes and maintains information security risk criteria that include: | # Establishes and maintains information security risk criteria that include: | ||
| :(a) the risk acceptance criteria; and | ::(a) the risk acceptance criteria; and | ||
| :(b) criteria for performing information security risk assessments; | ::(b) criteria for performing information security risk assessments; | ||
| # Ensures that repeated information security risk assessments produce consistent, valid and comparable results; | # Ensures that repeated information security risk assessments produce consistent, valid and comparable results; | ||
| # Identifies the information security risks: | # Identifies the information security risks: | ||
| :(a) apply the information security risk assessment process to identify risks associated with the loss of confidentiality, integrity and availability for information within the scope of the information security management system; and | ::(a) apply the information security risk assessment process to identify risks associated with the loss of confidentiality, integrity and availability for information within the scope of the information security management system; and | ||
| :(b) identify the risk owners; | ::(b) identify the risk owners; | ||
| # Analyses the information security risks: | # Analyses the information security risks: | ||
| :(a) assess the potential consequences that would result if the risks identified were to materialize; | ::(a) assess the potential consequences that would result if the risks identified were to materialize; | ||
| :(b) assess the realistic likelihood of the occurrence of the risks identified; and | ::(b) assess the realistic likelihood of the occurrence of the risks identified; and | ||
| :(c)determine the levels of risk; | ::(c)determine the levels of risk; | ||
| # Evaluates the information security risks: | # Evaluates the information security risks: | ||
| :(a) compare the results of risk analysis with the risk criteria established; and | ::(a) compare the results of risk analysis with the risk criteria established; and | ||
| :(b) prioritize the analysed risks for risk treatment. | ::(b) prioritize the analysed risks for risk treatment. | ||
| The organization shall retain documented information about the information security risk assessment process. | The organization shall retain documented information about the information security risk assessment process. | ||