Security Policy: Difference between revisions
		
		
		
		Jump to navigation
		Jump to search
		
| Line 96: | Line 96: | ||
| The organization shall define and apply an information security risk assessment process that:   | The organization shall define and apply an information security risk assessment process that:   | ||
| * Establishes and maintains information security risk criteria that include:   | * Establishes and maintains information security risk criteria that include: | ||
|            (a) the risk acceptance criteria; and   |            (a) the risk acceptance criteria; and | ||
|            (b) criteria for performing information security risk assessments; |            (b) criteria for performing information security risk assessments; | ||
| * Ensures that repeated information security risk assessments produce consistent, valid and comparable results; | * Ensures that repeated information security risk assessments produce consistent, valid and comparable results; | ||
| * Identifies the information security risks:   | * Identifies the information security risks:   | ||
|            (a) apply the information security risk assessment process to identify risks associated with the loss of confidentiality, integrity and availability for information within the scope of the information security management system; and   |            (a) apply the information security risk assessment process to identify risks associated with the loss of confidentiality, integrity and availability for information within the scope of the information security management system; and | ||
|            (b) identify the risk owners; |            (b) identify the risk owners; | ||
| * Analyses the information security risks:   | * Analyses the information security risks:   | ||