RA-3: Risk Assessment
From NIST's SP800-53:
a. Conduct a risk assessment, including: 1. Identifying threats to and vulnerabilities in the system; 2. Determining the likelihood and magnitude of harm from unauthorized access, use, disclosure, disruption, modification, or destruction of the system, the information it processes, stores, or transmits, and any related information; and 3. Determining the likelihood and impact of adverse effects on individuals arising from the processing of personally identifiable information; b. Integrate risk assessment results and risk management decisions from the organization and mission or business process perspectives with system-level risk assessments; c. Document risk assessment results in [Selection: security and privacy plans; risk assessment report; [Assignment: organization-defined document]]; d. Review risk assessment results [Assignment: organization-defined frequency]; e. Disseminate risk assessment results to [Assignment: organization-defined personnel or roles]; and f. Update the risk assessment [Assignment: organization-defined frequency] or when there are significant changes to the system, its environment of operation, or other conditions that may impact the security or privacy state of the system.
Cyber Threat Graph Context
Explore how this control relates to the wider threat graph
SP800-53 Control Mapped to NIST Cyber Security Framework
Generated from NISTs SP800-53/CSF Crosswalk mappings.
Control ID | Description |
---|---|
ID.SC-2 | Suppliers and third party partners of information systems, components, and services are identified, prioritized, and assessed using a cyber supply chain risk assessment process |
ID.RA-5 | Threats, vulnerabilities, likelihoods, and impacts are used to determine risk |
DE.AE-4 | Impact of events is determined |
ID.RA-3 | Threats, both internal and external, are identified and documented |
ID.RA-1 | Asset vulnerabilities are identified and documented |
PR.IP-12 | A vulnerability management plan is developed and implemented |
ID.RA-4 | Potential business impacts and likelihoods are identified |
RS.MI-3 | Newly identified vulnerabilities are mitigated or documented as accepted risks |