๐๏ธ 1. Contextual Information
Before addressing a specific risk, it is essential to establish a clear understanding of its context.
๐๏ธ 2. Business Goals and Objectives (BGO)
๐๏ธ 3. Business Drivers for Security (BDS)
Business Drivers for Security (BDS) represent the key factors that influence and justify an organisation's approach to cybersecurity.
๐๏ธ 4. Applicable Policies
Policies serve as guiding principles that define expectations, responsibilities, and boundaries for managing cybersecurity risks effectively.
๐๏ธ 5. Related Risks
Understanding how risks interconnect is essential for building a comprehensive risk profile.
๐๏ธ 6. Involved Third Parties
Understanding the role of third parties is crucial for gaining a comprehensive view of external influences on a risk assessment demand.
๐๏ธ 7. Involved Systems
Understanding the systems involved in a risk assessment demand is essential for gaining a clear view of the technical and operational context.