IT Risk Assessment Policy
This document explains the Company’s Risk Assessment policies and procedures. This policy empowers the Information Security Officer (ISO) or Data Protection Office (DPO) to perform periodic information security risk assessments (RAs) for the purpose of determining areas of vulnerability, and to initiate appropriate remediation.
RAs may be conducted on any Entity within the Company or any outside Entity that has signed a Third Party Agreement with the Company.
RAs may be conducted on any information system to include: applications, servers, and networks, and any process or procedure by which these systems are administered and/or maintained.
Authority and Enforcement
The Company’s Information Security Officer (ISO) is responsible for the development and oversight of these policies and standards.
The ISO works in conjunction with management, the Information Technology (IT) department and others for development, monitoring and enforcement of these policies and standards.
The execution, development and implementation of remediation programs are the joint responsibility of the IT department and the department responsible for the systems area being assessed.
Employees are expected to cooperate fully with any RA being conducted on systems for which they are held accountable.
Employees are further expected to work with the IT Risk Assessment Team in the development of a remediation plan.
The Risk Assessment Management process defines steps that need to be taken to assess and remediate each security threat found during assessments. It needs to be be documented and implemented each time a few threat is discovered (for instance 0 day threat in third party). RA’s may be conducted on any information system to include: applications, servers, and networks, and any process or procedure by which these systems are administered and/or maintained.
Each time a threat is discovered, a document must be drafted and documented the following steps must be followed:
- Identify the source of threat
- Describe existing controls
- Assess the possible consequence, likelihood, and select the risk rating
- Provide recommendations
- Schedule remediation and responsibility
- Verify remediations in stage and production environments.
Any employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment.
Any employee aware of any violation of this policy is required to report it to their supervisor or other authorized representative.