0% found this document useful (0 votes)
65 views4 pages

Information Risk Checklist

Uploaded by

Black man
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views4 pages

Information Risk Checklist

Uploaded by

Black man
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

[Company Name & Logo]

Information Risk Checklist

Identifying and managing risks

Version: [v1.0]

Prepared by
Name
Title

[dd/mm/yyyy]

1
Introduction

This check list was created for helping implementers in discovering, distributing, and
monitoring important information security risks. The risk is categorized into four primary
areas: compliance, confidentiality, integrity, and availability. This helps to make sure that all
these areas are properly managed and routinely assessed to keep them in line with ISO 27001
requirements.

1. Confidentiality Risks

Risk Description Responsible Person Review Date

☐ Unauthorized access to sensitive [Responsible Person] [dd/mm/yyyy]


employee data
☐ Data leakage from email phishing
attacks
☐ Insufficient encryption of sensitive
data
☐ Unauthorized external vendor access
☐ Data exposure due to misconfigured
cloud storage
☐ Insider threat leading to information
misuse

2
2. Integrity Risks

Risk Description Responsible Person Review Date

☐ Alteration of critical business data [Responsible Person] [dd/mm/yyyy]

☐ Malware affecting the integrity of files

☐ Unauthorized modification of system


configurations
☐ Data corruption from system failures
☐ Compromise of file integrity during
transfer
☐ Insider threat leading to information
misuse

Availability Risks

Risk Description Responsible Person Review Date

☐ Data loss due to hardware failure [Responsible Person] [dd/mm/yyyy]

☐ Denial of Service (DoS) attack


impacting services
☐ Unavailability due to cyber-attacks

☐ Power outage disrupting business


operations
☐ Network failure causing system
downtime
☐ Application crash affecting service
availability

3
Compliance Risks

Risk Description Responsible Person Review Date

☐ Failure to comply with data protection [Responsible Person] [dd/mm/yyyy]


laws (GDPR)

☐ Inadequate vendor management


compliance
☐ Lack of evidence for audit trails

☐ Non-compliance with industry-


specific regulations
☐ Incomplete documentation for
compliance audits
☐ Failure to comply with data protection
laws

 Risk Description: A brief explanation of the identified risk.

 Responsible Person: Individual or team responsible for managing this risk.

 Review Date: The last date this risk was reviewed.

You might also like