Skip to main content

EXAMPLE: Risk Library

J
Written by Joe Flores
Updated over 11 months ago

Type

Risk

Risk Description

Fraud

Fraud

The fraudulent actions of internal or external actors leading to unexpected financial, material, or reputational loss.

Fraud

Manipulation of information

The intentional manipulation of data to mislead information systems or internal/external actors.


Fraud

Falsification of records

The intentional manipulation of data in order to falsify organizational records.


Internal/External Threats

Sabotage

The intentional disruption of the organization's operations and/or intentional damage to organizational assets.

Internal/External Threats

Theft

The theft of organizational assets (mobile devices, laptops, documents, storage media, hardware, etc.) without permission. Theft may include the loss of confidential information as well as physical assets.

Internal/External Threats

Unauthorized sharing of information

The disclosure of information with unauthorized individuals or entities that results in the loss of confidential or proprietary information.

Internal/External Threats

Unauthorized physical access

Any individual accessing an organization's facilities without the proper authorization.


Internal/External Threats

Coercion, extortion, or corruption

The attempt to harm or otherwise disrupt the company resulting from employee being coerced, extorted, or corrupted.

Internal/External Threats

Absence of personnel

Key personnel and their competencies being unavailable. The absence of personnel could be due to many reasons, including approved absence from work or a worker's strike.

Internal/External Threats

Abuse of resources

The unauthorized use of organizational resources, including the use of memory, CPU cycles, or other non-physical IT resources.

Internal/External Threats

Anonymous proxies

The use of anonymous proxy tools to engage in illicit or improper behavior on organizational assets.


Internal/External Threats

Absence of cybersecurity roles and responsibilities

The lack of cybersecurity roles and responsibilities for the entire workforce, including third-party party stakeholders such as vendors and suppliers. These cybersecurity reporting structures and processes enable the organization to correctly respond to security incidents.

Internal/External Threats

Vulnerability management plan

The lack of an implemented vulnerability management plan. This may result in unknown and exploitable security gaps.

Internal/External Threats

Security event analysis

The failure to analyze potential or actual security events to identify exploitable attack vectors. This may result in damage to both organizational assets and information systems.

Internal/External Threats

Vulnerability testing and research

The failure to research or test for unaddressed vulnerabilities, resulting in exploitable attack vectors. This may result in damage to both organizational assets and information systems.

Data Loss

Loss of data via mobile applications

The loss of organizational data from using improperly configured mobile applications.


Data Loss

Loss of data via web applications

The loss of organizational data from using unauthorized web applications.


Data Loss

Loss of data via network

The loss of organizational data caused by unsecured network traffic.


Data Loss

Loss of data availability

The loss of data availability due to improper backup or availability zone configurations.


Data Loss

Loss of data via cloud

The loss of organizational data due to improper cloud controls or configurations.


Data Loss

Loss of data integrity via permissions

The loss of, or manipulation of, organizational data due to improperly configured permissions.


Data Loss

Infection of removable media

The improper use of removable media, such as thumb drives or removable hard drives, resulting in the spread of malware.

Data Loss

Role-based access control

The failure to implement role-based access control to critical systems. Access control should apply the principles of least privilege and of separation of duties to grant individuals only enough access to perform their duties.

Data Loss

Appropriate system authentication

The failure to implement single-factor or multi-factor authentication for users, devices, and other assets. Authentication methods should be appropriate to the risk of the transaction (i.e., with consideration to individuals’ security and privacy risks, and other organizational risks).

Data Loss

Data encryption

The interception of improperly secured information, in transmission or at rest, due to lack of appropriate encryption.

Data Loss

Unsecured Wi-Fi

The loss of organization data due to unsecured networks or rogue access points.


Third-party Risk

Damage to IT assets by third-parties

The threat of damage to IT assets by a third-party.


Third-party Risk

Security failure by third-parties

The threat of breach or damage to organizational assets by third-party vendors.


Third-party Risk

Damage due to penetration testing

Harm to information systems or organizational data due to improperly scoped or improperly executed penetration testing.

Natural Disaster

Natural disasters

The disruption of business processes related to the effects of natural disasters (e.g., earthquakes, floods, landslides, tsunamis, heavy rains, heavy snowfalls, heavy winds, etc.).

Natural Disaster

Fire

Damage or disruption of assets, people, or facilities due to fire caused by internal or external factors.


Natural Disaster

Pollution, dust, corrosion

Damage or disruption to IT assets, including hardware, due to pollution, dust, or corrosion.


Natural Disaster

Water

Damage or disruption to IT assets, including hardware, due to water.


Natural Disaster

Humidity

Damage or disruption to IT assets, including hardware, due to extreme humidity.


Natural Disaster

Extreme weather

Damage or disruption to IT assets, including hardware, due to extreme temperatures.


Did this answer your question?