RA-01 Risk Assessment Policy And Procedures

Risk Assessment

Low Moderate High Privacy

Description

The organization develops, disseminates, and periodically reviews/updates: (i) a formal, documented risk assessment policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls.

Supplemental Guidance

The risk assessment policy and procedures are consistent with applicable laws, Executive Orders, directives, policies, regulations, standards, and guidance. The risk assessment policy can be included as part of the general information security policy for the organization. Risk assessment procedures can be developed for the security program in general, and for a particular information system, when required. NIST Special Publications 800-30 provides guidance on the assessment of risk. NIST Special Publication 800-12 provides guidance on security policies and procedures.

Changes from Rev 4

Title changed from 'Risk Assessment Policy and Procedures' Requires the selection (one or more) of organization-level; mission/business process-level; system-level risk assessment policies Adds text requiring consistency with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines Requires the designation of a specific official to manage the development, documentation, and dissemination of the risk assessment policy and procedures New parameters require update to policy and procedures as a result of specified events in addition to specified frequency Discussion amplifies the need for policy and procedures for risk management, and to help provide security and privacy assurance

Enhancements

(0) None.

Compliance Mappings

ISO 27001:2022

6.1A.5.1

ISO 27002:2022

5.1

COBIT 2019

APO12APO13EDM03

NIST CSF 2.0

GV.RM-01GV.RM-06

SOC 2 TSC

A1.2-POF1CC1.2-POF1CC1.4-POF1CC2.2-POF1CC2.2-POF7CC3.1CC3.2-POF1CC3.4-POF1CC3.4-POF2CC3.4-POF3CC4.1CC5.1CC5.3CC5.3-POF1CC5.3-POF6CC7.2-POF1CC9.1P1.1-POF5

PCI DSS v4.0.1

12.1

CSA CCM v4

GRC-02TVM-01

CSA AICM v1

GRC-02GRC-09GRC-11TVM-01

ISO 42001:2023

A.5.2

IEC 62443

2-1 4.3

NIS2 Directive

Art. 21(2)(a)

MAS TRM

4

ANSSI

Hygiene.2Hygiene.41RGS.1.3SecNumCloud.6.1

FINMA Circular 2023/1

IV.A(23)IV.B.a(48)IV.B.c(54)

OSFI B-13

B-13.1.3

EU GDPR

Art.24(1)Art.32(1)Art.35(1)

EU DORA

Art.6(1)Art.6(2)

BIO2

5.1

RBI CSF

ITGRCA.22ITGRCA.25

FISC Security Guidelines

FISC.O1

LGPD + BCB 4893

BCB.Art.2BCB.Art.3-SuppLGPD.Art.37-38LGPD.Art.50LGPD.BCB.Integration

HKMA TM-E-1

TME1.2.3TME1.2.5

DNB Good Practice

DNB.1.1DNB.1.2DNB.4.1

SAMA CSF

1.21.8

NCA ECC

1-31-5

UAE IA

T2T3

CBB TM

TM-2TM-4

Qatar NIA

GVRM

CBUAE

CR-2

CBE CSF

CRM-1

SA JS2

JS2-5JS2-6.2

CBN CSF

Part2.1

BoG CISD

CISD-IIICISD-ISMS

POPIA

s19

BoM CTRM

1.42.1

IOSCO Cyber Resilience

GOV-1GOV-3ID-3PFMI-3

BCBS 239

Principle 1

CPMI-IOSCO PFMI

PFMI.P2PFMI.P3

FFIEC IS

I.BII.AII.BII.C.1

NYDFS 500

500.2500.3500.4500.9

HIPAA Security Rule

§164.308(a)(1)(i)§164.308(a)(1)(ii)(A)§164.316(a)

ECB CROE

CROE.2.2.1

EBA ICT Guidelines

3.13.3.13.3.33.4.1

SEBI CSCRF

GV.RMID.RA

BOT Cyber Resilience

Ch1.2

CMMC 2.0

RA

10 CFR 73.54

RG5.71-C-PL

DOE C2M2 v2.1

RISK

API 1164

Sec 4

AWIA

Sec 2013(a)

IAEA NSS 17-T

Sec 4

ISAE 3402

Clause 1Clause 3

Solvency II

Art.41(3)Art.44(1)Art.44(2)DR.260DR.266EIOPA-ICT-4.2

Lloyd's Minimum Standards

MS10.1MS10.2MS8.2

NAIC Insurance Data Security

44A4C

FCA SYSC 13

SYSC 13.1-2SYSC 13.5.3

HITRUST CSF v11

00.b03.a04.a

FDA 21 CFR Part 11

§11.2

FDA Cybersecurity Guidance

SPDF-2

ISO 27799

5.1

NHS DSPT

NDG-9.1

MiCA

Art.34(5)Art.35(1)Art.54(1)Art.62(1)Art.62(7)Art.111(1)

Basel SCO60

SCO60.1SCO60.3SCO60.4SCO60.5SCO60.50

BSSC Standards

TIS-01GSP-02GSP-10

SEC Custody (Digital Assets)

SEC-CD-01SEC-CD-09SEC-CD-17SEC-CD-18SEC-CD-19

ISO 17799 (legacy)

4.115.1.1

COBIT 4.1 (legacy)

PO9.1PC5