CIS RAM (Risk Assessment Management)

CIS RAM conforms to and supplements established information security risk assessment standards and methods, such as ISO 270051, NIST Special Publications 800-302, and Risk Information Technology (IT)3.

CIS RAM Principles and Practices

Principles
1 Risk analysis must consider the interests of all parties that may be harmed by the risk.
2 Risks must be reduced to a level that would not require a remedy to any party.
3 Safeguards must not be more burdensome than the risks they protect against.

Practices
1 Risk analysis considers the likelihood that threats could create magnitudes of impact.
2 Tolerance thresholds are stated in plain language and are applied to each factor in a
risk analysis.
3 Impact and likelihood scores have a qualitative component that concisely states the concerns
of interested parties, authorities, and the assessing organization.
4 Impact and likelihood scores are derived by a quantitative calculation that permits
comparability among all evaluated risks, safeguards, and against risk acceptance criteria.
5 Impact definitions ensure that the magnitude of harm to one party is equated with the
magnitude of harm to others.
6 Impact definitions should have an explicit boundary between those magnitudes that would be
acceptable to all parties and those that would not be.
7 Impact definitions address; the organization’s mission or utility to explain why the organization
and others engage risk, the organization’s self-interested objectives, and the organization’s
obligations to protect others from harm.
8 Risk analysis relies on a standard of care to analyze current controls and
recommended safeguards.
9 Risk is analyzed by subject matter experts who use evidence to evaluate risks and safeguards.
10 Risk assessments cannot evaluate all foreseeable risks. Therefore, risk assessments re-occur
to identify and address more risks over time.


Prodigy 13 Newsletter

Sign up for our monthly newsletter for business leaders on minimizing cybersecurity risk.

Related Articles

Security

SAML explained

SAML explained in plain English: https://www.onelogin.com/learn/saml SAML is an acronym used to describe the Security Assertion Markup Language (SAML). Its primary role in online security is

Read More
Security

Threat Hunting – Practical Guide

Resource: https://www.threathunting.net/files/hunt-evil-practical-guide-threat-hunting.pdf To begin, let’s clarify what threat hunting is: Threat hunting is the human-driven, proactive and iterative search through networks, endpoints, or datasets in

Read More