Risk Assessment & Treatment Methodology
Risk Assessment & Treatment Methodology
Risk Assessment & Treatment Methodology
XYZ LIMITED
Version: PGL/RA/01
Change history
Date Version Created by Description of change
Click here to buy toolkit now
Table of contents
1. PURPOSE, SCOPE AND USERS................................................................................................................... 4
4 RISK ASSESSMENT
4.1.1. The process ................................................................................................................................... 6
4.1.2. Assets, vulnerabilities and threats ................................................................................................ 6
4.1.3. Determining the risk owners ......................................................................................................... 7
4.1.4. Consequences and likelihood ........................................................................................................ 7
4.2. RISK ACCEPTANCE CRITERIA........................................................................................................................... 8
4.3. RISK TREATMENT ........................................................................................................................................ 8
4.4. REGULAR REVIEWS OF RISK ASSESSMENT AND RISK TREATMENT ............................................................................ 9
4.5. APPROVAL OF RISK TREATMENT PLAN ......................................................................................................... 9
4.6. REPORTING ............................................................................................................................................... 9
7. APPENDICES ........................................................................................................................................... 10
Click here to buy toolkit now
2. Reference documents
• ISO 18788 standard,
• Security Operations Management Policy
XYZ LIMITED is committed to identifying, assessing, evaluating and treating our strategic,
tactical and operational risks that can prevent us from achieving our organizational
objectives.
• Identify and manage significant risks, including those associated with operating
conditions, emergency situations, accidents and potential undesirable and disruptive
events;
• Identify and manage significant human rights risks, in order to reduce or mitigate the
severity of the impacts of the organization’s security operations;
• Evaluate existing risk management practices and procedures, including those
associated with, subcontracting activities;
• Evaluate previous emergency situations and accidents, as well as previous measures
taken to prevent and respond to undesirable and disruptive events.
Signed:
MANAGING DIRCTOR.
Click here to buy toolkit now
Users of this document are all employees of XYZ LIMITED who take part in risk assessment and risk
treatment.
Risk assessment is implemented through the Risk Assessment Table. The risk assessment process is
coordinated by QMS Team, identification of threats and vulnerabilities is performed by risk
assessment team.
9. The first step in risk assessment is the identification of all assets in the QMS scope –
Internal environmental issues, External environment issues, Needs and expectations of interested
parties, Subcontractors/External providers, Processes, Services, Customer satisfaction, Change
management
It is also necessary to identify their makers – the person or organizational unit responsible for
creating the risk and also the takers. Persons responsible for taking the risk.
The next step is to identify all threats and vulnerabilities associated with each asset. Threats and
vulnerabilities are identified using the catalogues included in the Risk Assessment Table. Every asset
may be associated with several threats, and every threat may be associated with several
vulnerabilities.
XYZ LTD High
For each risk, a risk owner has to be identified – the person or organizational unit treating each risk.
This person may or may not be the same as the risk taker or maker.
Once risk owners have been identified, it is necessary to assess consequences for each combination
of threats and vulnerabilities for an individual asset if such a risk materializes:
Severe
5 Severe service Impact causes more than 2 DAYS delay, Complete
consequence
service deviation from specific. service loss > 1 million naira.
After the assessment of consequences, it is necessary to assess the likelihood of occurrence of such a
risk, i.e. the probability that a threat will exploit the vulnerability of the respective asset:
Low
1 Highly unlikely
likelihood
Moderate
3 Unlikely
likelihood
High
5 Likely
likelihood
After the assessment of consequences and likelihood of occurrence, it is necessary to assess the
effectiveness of current controls in addressing the probability that a threat will exploit the
vulnerability of the respective asset:
Available
but not 3 Controls available but not really effective
reliable
By entering the values of consequence, likelihood of occurrence and current controls into the Risk
Assessment Table, the level of risk is calculated automatically by multiplying the three values.
Existing security controls are to be entered in the last column of the Risk Assessment Table.
Vulnerabilities and control deficiencies reveal opportunities for improvement which, are discovered
during risk assessment, significant risks and opportunities form the basis of risk treatment plans
One or more treatment options must be selected for risks valued 75 - 125:
The selection of options is implemented through the Risk Treatment Table. Usually, option 1 is
selected: selection of one or more controls. When several controls are selected for a risk, then
additional rows are inserted into the table immediately below the row specifying the risk.
The treatment of risks related to outsourced processes must be addressed through the contracts
with responsible third parties.
In the case of option 1 (selection of controls), it is necessary to assess the new value of consequence
and likelihood in the Risk Treatment Table, in order to evaluate the effectiveness of planned controls.
Risk owners must review existing risks and update the Risk Assessment Table and Risk Treatment
Table in line with newly identified risks. The review is conducted as the need arises in the case of
significant organizational changes, significant change in technology, change of business objectives,
changes in the business environment, etc.
QMS Team will prepare the Risk treatment plan in which the implementation of controls will be
planned. On behalf of the risk owners, Managing Director will approve the Risk treatment plan and
accept all residual risks on behalf of the risk owners.
4.6. Reporting
QMS Team will document the results of risk assessment and risk treatment, and all of the subsequent
reviews, in the Risk Assessment and Treatment Report.
QMS Team will monitor the progress of implementation of the Risk treatment plan and report the
results to Managing Director.
Risk Treatment [job title]'s [job title of the Only [job title] has the Data is
Table (electronic computer owner of the right to make entries stored
form – Excel Risk Treatment into and changes to the permanently.
document) Table] Risk Treatment Table.
Risk Assessment [job title]'s [job title of the The Report is prepared The Report is
and Treatment computer owner of the in read-only PDF format stored for a
Report (electronic Report] period of 3
form – PDF years
format)
Risk treatment [job title]'s [job title of the Only [job title] has the Older
plan (electronic computer person right to make entries versions of
form – Word responsible for into and changes to the Risk
document) the Risk Risk treatment plan treatment
treatment plan] plan are
stored for a
period of 3
years
Only document/record holder can grant other employees access to any of the above mentioned
documents.
The owner of this document is Management of XYZ LIMITED, who must check and, if necessary,
update the document as the need arises.
When evaluating the effectiveness and adequacy of this document, the following criteria need to be
considered:
• the number of incidents which occurred, but were not included in risk assessment
• the number of risks which were not treated adequately
• the number of errors in the risk assessment and risk treatment process because of unclear
definition of roles and responsibilities
7. Appendices
• Appendix 1: Form – Risk Assessment Table
• Appendix 2: Form – Risk Treatment Table
• Appendix 3: Form – Risk Assessment and Treatment Report
MANAGING DIRECTOR
ANDREW UTAH
_________________________
SIGNATURE
Risk Assessment and Risk Treatment Methodology Version 01 [13/4/17 Page 10 of 10