RA-01 Risk Assessment Policy And Procedures

Risk Assessment

Low Moderate High Privacy

Description

The organization develops, disseminates, and periodically reviews/updates: (i) a formal, documented risk assessment policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls.\n

Supplemental Guidance

The risk assessment policy and procedures are consistent with applicable laws, Executive Orders, directives, policies, regulations, standards, and guidance. The risk assessment policy can be included as part of the general information security policy for the organization. Risk assessment procedures can be developed for the security program in general, and for a particular information system, when required. NIST Special Publications 800-30 provides guidance on the assessment of risk. NIST Special Publication 800-12 provides guidance on security policies and procedures.\n

Changes from Rev 4

Title changed from 'Risk Assessment Policy and Procedures' Requires the selection (one or more) of organization-level; mission/business process-level; system-level risk assessment policies Adds text requiring consistency with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines Requires the designation of a specific official to manage the development, documentation, and dissemination of the risk assessment policy and procedures New parameters require update to policy and procedures as a result of specified events in addition to specified frequency Discussion amplifies the need for policy and procedures for risk management, and to help provide security and privacy assurance

Enhancements

(0) None.\n

Compliance Mappings

ISO 27001:2022

5.1(a)5.25.2(a)5.2(b)5.2(c)5.2(d)5.2(e)5.2(f)5.2(g)6.16.1.16.1.1(a)6.1.1(b)6.1.1(c)6.1.1(d)6.1.1(e)(1)6.1.1(e)(2)6.1.26.1.2(a)6.1.2(a)(1)6.1.2(a)(2)6.1.2(b)6.1.2(c)6.1.2(c)(1)6.1.2(c)(2)6.1.2(d)6.1.2(d)(1)6.1.2(d)(2)6.1.2(d)(3)6.1.2(e)6.1.2(e)(1)6.1.2(e)(2)7.57.5.17.5.1(a)7.5.1(b)7.5.27.5.2(a)7.5.2(b)7.5.2(c)7.5.37.5.3(a)7.5.3(b)7.5.3(c)7.5.3(d)7.5.3(e)7.5.3(f)8.2

ISO 27002:2022

5.15.377.5

COBIT 2019

APO01.09APO02.02APO12.01APO12.02APO12.03APO12.04APO12.05APO12.06APO13.03EDM01.01EDM01.03EDM03.01EDM03.02EDM03.03EDM05.01

CIS Controls v8

16.6

NIST CSF 2.0

GVGV.OVGV.OV-01GV.OV-02GV.OV-03GV.POGV.PO-01GV.PO-02GV.RMGV.RM-01GV.RM-03GV.RM-04GV.RM-06GV.RR-01GV.SCGV.SC-01GV.SC-03GV.SC-05GV.SC-09IDID.IMID.RAPRPR.IR

SOC 2 TSC

A1.2-POF1CC1.2-POF1CC1.4-POF1CC2.2-POF1CC2.2-POF7CC3.1CC3.2-POF1CC3.2-POF3CC3.2-POF5CC3.4-POF1CC3.4-POF2CC3.4-POF3CC3.4-POF4CC3.4-POF5CC4.1CC5.1CC5.3CC5.3-POF1CC5.3-POF6CC7.2-POF1CC9.1P1.1-POF5

ISO 17799 (legacy)

4.115.1.1

COBIT 4.1 (legacy)

PO9.1PC5