Blog | G5 Cyber Security

ISO 27001 Risk Assessment: A Business Process Approach

TL;DR

This guide shows you how to do a risk assessment for ISO 27001 using your business processes. It’s about finding what could go wrong, how bad it would be, and what you can do about it – all linked to the things your company actually *does*.

Step-by-step Guide

  1. Identify Your Business Processes:
  • Asset Identification:
  • Threat Identification:
  • Vulnerability Identification:
  • Likelihood Assessment:
  • Impact Assessment:
  • Risk Calculation:
  • Risk Treatment:
  • Document Your Findings:
  • Review and Update:
  • Exit mobile version