ISMS-FORM-06-3 Scenario-Based RAT Tool
ISMS-FORM-06-3 Scenario-Based RAT Tool
Assessment and
Treatment Tool
ISMS-FORM-06-3
Implementation Guidance
This document should be used to perform a risk assessment, including assessing the expected effects of
treatments.
Design
This spreadsheet has been designed using CertiKit's colour scheme. To choose a different table colour scheme,
click in the table, select the Table Design menu tab and choose a different style. The same applies to the drop-
down menu "slicers" at the top of the screen. Click in one slicer, then hold down the Shift key and click on the rest,
one by one. This will select them all. Then click on the Slicer menu tab and choose a different style. You can also
create your own table and slicer styles using your own colour scheme to reflect your organization's branding.
General guidance
The key objective of the risk assessment is to ensure that all of the serious risks that need treatment are identified
so that something can be done about them. Be careful not to make your risk assessment too large or complicated
as much of the impact will be lost and it will be difficult to repeat at a later date. This tool is intended to be used to
assess the effects of the proposed treatments also, so that the level of residual risk can be shown.
As well as the ISO27001 Annex A reference controls, an additional set of controls from the ISO27017 and ISO27018
codes of practice is included here. These controls are generally only relevant if your organization is a cloud service
provider and has decided to adopt these codes of practice in addition to ISO27001.
If you need to select more than one control for a specific risk simply list all of the controls in the same cell by
copying and pasting them from the Reference Controls tab.
A summary of the type of risk that each Annex A control is intended to address is included to aid understanding
and help in identifying risks. This may also be useful when completing your Statement of Applicability.
Review frequency
It is a good idea to revisit this risk assessment on a regular basis and to ensure that new risks that occur are
identified and assessed.
Licence terms
This document is licensed on and subject to the standard licence terms of CertiKit, available on request, or by
download from our website. All other rights are reserved. Unless you have purchased this product you only have
an evaluation licence. If this product was purchased, a full licence is granted to the person identified as the
licensee in the relevant purchase order. The standard licence terms include special terms relating to any third
party copyright included in this document.
Disclaimer
Please Note: Your use of and reliance on this document template is at your sole risk. Document templates are
intended to be used as a starting point only from which you will create your own document and to which you will
apply all reasonable quality checks before use.
Therefore please note that it is your responsibility to ensure that the content of any document you create that is
based on our templates is correct and appropriate for your needs and complies with relevant laws in your country.
You should take all reasonable and proper legal and other professional advice before using this document.
CertiKit makes no claims, promises, or guarantees about the accuracy, completeness, or adequacy of our
document templates, assumes no duty of care to any person with respect its document templates or their
contents, and expressly excludes and disclaims liability for any cost, expense, loss or damage suffered or incurred
in reliance on our document templates, or in expectation of our document templates meeting your needs,
including (without limitation) as a result of misstatements, errors and omissions in their contents.
Assessment Details
Risk Assessors [Name and title of person(s) carrying out the risk assessment]
Risk Assessment Participants [Names and titles of people contributing to the risk assessment]
If the shape was modified in If the shape was modified in an If the shape was modified in If the shape was modified in If the shape was modified in If the shape was modified in an
an earlier version of Excel, or earlier version of Excel, or if an earlier version of Excel, or an earlier version of Excel, or an earlier version of Excel, or earlier version of Excel, or if
Scenario-Based Risk Assessment and Treatment Tool if the workbook was saved in the workbook was saved in if the workbook was saved in if the workbook was saved in if the workbook was saved in the workbook was saved in
Excel 2007 or earlier, the Excel 2007 or earlier, the slicer Excel 2007 or earlier, the Excel 2007 or earlier, the Excel 2007 or earlier, the slicer Excel 2007 or earlier, the slicer
Start with the risks that are felt to have the highest likelihood and impact slicer can't be used. can't be used. slicer can't be used. slicer can't be used. can't be used. can't be used.
combination first.
1 Select… Select… Select… Calculated Calculated Select… Select… Select… Select… Calculated Calculated
2 Select… Select… Select… Calculated Calculated Select… Select… Select… Select… Calculated Calculated
3 Select… Select… Select… Calculated Calculated Select… Select… Select… Select… Calculated Calculated
4 Select… Select… Select… Calculated Calculated Select… Select… Select… Select… Calculated Calculated
5 Select… Select… Select… Calculated Calculated Select… Select… Select… Select… Calculated Calculated
6 Select… Select… Select… Calculated Calculated Select… Select… Select… Select… Calculated Calculated
7 Select… Select… Select… Calculated Calculated Select… Select… Select… Select… Calculated Calculated
8 Select… Select… Select… Calculated Calculated Select… Select… Select… Select… Calculated Calculated
9 Select… Select… Select… Calculated Calculated Select… Select… Select… Select… Calculated Calculated
10 Select… Select… Select… Calculated Calculated Select… Select… Select… Select… Calculated Calculated
11 Select… Select… Select… Calculated Calculated Select… Select… Select… Select… Calculated Calculated
12 Select… Select… Select… Calculated Calculated Select… Select… Select… Select… Calculated Calculated
13 Select… Select… Select… Calculated Calculated Select… Select… Select… Select… Calculated Calculated
14 Select… Select… Select… Calculated Calculated Select… Select… Select… Select… Calculated Calculated
15 Select… Select… Select… Calculated Calculated Select… Select… Select… Select… Calculated Calculated
16 Select… Select… Select… Calculated Calculated Select… Select… Select… Select… Calculated Calculated
17 Select… Select… Select… Calculated Calculated Select… Select… Select… Select… Calculated Calculated
18 Select… Select… Select… Calculated Calculated Select… Select… Select… Select… Calculated Calculated
19 Select… Select… Select… Calculated Calculated Select… Select… Select… Select… Calculated Calculated
20 Select… Select… Select… Calculated Calculated Select… Select… Select… Select… Calculated Calculated
REF
CLD.6.3 Relationship between cloud service customer and cloud service provider
CLD.6.3.1 Shared roles and responsibilities within a cloud computing environment
CLD.9.5 Access control of cloud service customer data in shared virtual environment
CLD.9.5.1 Segregation in virtual computing environments
CLD.9.5.2 Virtual machine hardening
A.10 Cryptography
A.10.1 Cryptographic controls
A.10.1.1 Policy on the use of cryptographic controls
A.10.1.2 Key management
A.11.2 Equipment
A.11.2.1 Equipment siting and protection
A.11.2.2 Supporting utilities
A.11.2.3 Cabling security
A.11.2.4 Equipment maintenance
A.11.2.5 Removal of assets
A.11.2.6 Security of equipment and assets off-premises
A.11.2.7 Secure disposal or reuse of equipment
A.11.2.8 Unattended user equipment
A.11.2.9 Clear desk and clear screen policy
A.12.3 Backup
A.12.3.1 Information backup
A.18 Compliance
A.18.1 Compliance with legal and contractual requirements
A.18.1.1 Identification of applicable legislation and contractual requirements
A.18.1.2 Intellectual property rights
A.18.1.3 Protection of records
A.18.1.4 Privacy and protection of personally identifiable information
A.18.1.5 Regulation of cryptographic controls
A.9 Accountability
A.9.1 Notification of a data breach involving PII
A.9.2 Retention period for administrative security policies and guidelines
A.9.3 PII return, transfer and disposal
1 It is not clear what the organization's rules are for managing information security. Employees and A.5.1.1 Policies for information security
others aren't aware of what they should be doing to protect the organization
2 Policies are out of date, do not reflect the organization's business or technical setup. New threats have A.5.1.2 Review of the policies for information security
emerged that need to be addressed in policies
3 It is not clear who should be doing what with respect to information security A.6.1.1 Information security roles and responsibilities
4 An individual is able to commit fraud because they are able to perform all of the steps required to A.6.1.2 Segregation of duties
enable the fraud. Checks are insufficient to prevent accidental amendment or destruction of data
5 The organization is unaware of their legal or regulatory responsibilities and may break the law without A.6.1.3 Contact with authorities
realising it
6 The organization lacks up to date knowledge of information security issues such as current threats, new A.6.1.4 Contact with special interest groups
controls and other relevant information
7 Information gathered and created during projects is not adequately protected A.6.1.5 Information security in project management
8 Data held on mobile devices is compromised through loss or theft of the device, or unauthorised access A.6.2.1 Mobile device policy
9 A teleworking site does not meet the information security standards ensured at main locations and data A.6.2.2 Teleworking
is exposed to loss or theft
10 It is not clear who does what with respect to cloud security and so data is compromised because one CLD.6.3.1 Shared roles and responsibilities within a cloud
party (e.g. cloud service customer) was under the impression that the other (e.g. cloud service provider) computing environment
was monitoring a particular aspect
14 Employees and contractors are not aware of information security policies and and are unable to spot A.7.2.2 Information security awareness, education and
potential breaches training
15 The consequences of commiting an information security breach are not sufficiently clear to employees A.7.2.3 Disciplinary process
16 Ex-employees breach information security after leaving e.g. making confidential information public A.7.3.1 Termination or change of employment responsibilities
17 It is not clear what assets we are trying to protect and where they are located A.8.1.1 Inventory of assets
18 No-one takes responsibility for protecting specific assets A.8.1.2 Ownership of assets
19 Information and assets are used in ways that are not acceptable to the organization e.g. devices are A.8.1.3 Acceptable use of assets
physically abused and information left exposed
20 Assets are not returned when someone leaves the organization A.8.1.4 Return of assets
21 Assets that are stored with a cloud service provider are not returned CLD.8.1.5 Removal of cloud service customer assets
22 It is not clear how specific items of information should be protected A.8.2.1 Classification of information
23 Employees are unable to tell how information should be protected A.8.2.2 Labelling of information
24 Assets are handled inappropriately due to a lack of definition of how they should be addressed A.8.2.3 Handling of assets
25 Removable media is used without effective protection of the data held on it A.8.3.1 Management of removable media
26 The information stored on media is compromised when it is disposed of A.8.3.2 Disposal of media
27 Data held on media is accessed or lost whilst in transit and is not adequately protected e.g. by the use A.8.3.3 Physical media transfer
of encryption
28 Employees or third parties have access to information without authorisation or by mistake A.9.1.1 Access control policy
29 A user gains unauthorised access to information via a network that they have no reason to legitimately A.9.1.2 Access to networks and network services
use
30 User accounts are created without authority or not removed when no longer needed A.9.2.1 User registration and de-registration
31 Users are given an inappropriate level of access within systems A.9.2.2 User access provisioning
32 Privileged access rights are used by an unauthorised person to breach information security A.9.2.3 Management of privileged access rights
33 User passwords become known to someone other than the user to whom they relate A.9.2.4 Management of secret authentication information of
users
34 Inappropriate levels of access remain in place long term and attempts to increase permissions are not A.9.2.5 Review of user access rights
spotted
35 Ex-users still have access even when they have left the organization A.9.2.6 Removal or adjustment of access rights
36 Users share user accounts and let others know their passwords A.9.3.1 Use of secret authentication information
37 Too much access is allowed to a user where their role does not require it A.9.4.1 Information access restriction
38 Logon to secure systems is possible by unauthorised users A.9.4.2 Secure log-on procedures
39 Users do not set appropriately-strong passwords A.9.4.3 Password management system
40 A privileged utility program is used to bypass security controls and gain unauthorised access to A.9.4.4 Use of privileged utility programs
information
41 Program source code is destroyed or tampered with to benefit an attacker A.9.4.5 Access control to program source code
42 Another cloud customer is able to access the organization's information stored in a cloud application CLD.9.5.1 Segregation in virtual computing environments
43 A virtual machine is used as an entry point for an attack CLD.9.5.2 Virtual machine hardening
44 The use of encryption within the organization is haphazard and uncoordinated, resulting in a lack of A.10.1.1 Policy on the use of cryptographic controls
effectiveness and possible illegal use
45 Cryptographic keys are lost or compromised resulting in the loss of encrypted data A.10.1.2 Key management
46 It is not clear where physical security has been, or needs to be, applied A.11.1.1 Physical security perimeter
47 Unauthorised people are able to gain physical access to sensitive information A.11.1.2 Physical entry controls
48 Unauthorised people are able to gain physical access to sensitive information A.11.1.3 Securing offices, rooms and facilities
49 An accident, attack or natural disaster destroys or severely affects sensitive information and its A.11.1.4 Protecting against external and environmental
processing threats
50 People in secure areas leave the area open to attack or unauthorised access A.11.1.5 Working in secure areas
58 Sensitive information can be read from storage media that has been disposed of or reused A.11.2.7 Secure disposal or reuse of equipment
59 Someone accesses systems they are not authorised to using a device that has been left logged on. A.11.2.8 Unattended user equipment
60 Support staff, e.g. cleaners and security personnel, are able to read sensitive information left A.11.2.9 Clear desk and clear screen policy
unattended on desks
61 Operating procedures are not clear to all employees who need to perform them and vary according to A.12.1.1 Documented operating procedures
who does them
62 Information security becomes compromised when changes are made to the organization, business A.12.1.2 Change management
processes or information processing facilities and systems
63 Systems run slowly or not at all because the resources required are not available A.12.1.3 Capacity management
64 Software changes made in development are put live without adequate testing or supervision A.12.1.4 Separation of development, testing and operational
environments
65 An administrator of a cloud service makes a serious and unrecoverable error that affects service CLD.12.1.5 Administrator's operational security
availability or security
66 Systems are affected by malware e.g. ransomware or spyware, having a serious effect on service A.12.2.1 Controls against malware
delivery and security
67 Data is lost and cannot be recovered from backup A.12.3.1 Information backup
68 Suspicious events are not detected due to inadequate logs being kept A.12.4.1 Event logging
69 Incriminating logs are wiped or altered by an attacker A.12.4.2 Protection of log information
70 The activities of administrators and operators cannot be verified A.12.4.3 Administrator and operator logs
71 The time sequence of an attack cannot be identified because each of the clocks involved tell a different A.12.4.4 Clock synchronisation
time
72 The organization can't tell if a cloud service has been compromised because no logs are kept CLD.12.4.5 Monitoring of cloud services
73 Software is installed on an operational system which causes an unwanted effect e.g. compatibility A.12.5.1 Installation of software on operational systems
issues or the introduction of vulnerabilities
74 Vulnerabilities in systems are not identified or addressed and are then exploited by attackers. A.12.6.1 Management of technical vulnerabilities
75 A user installs some software that introduces vulnerabilities to the organization and its network A.12.6.2 Restrictions on software installation
76 A penetration test disrupts a live system during peak service hours A.12.7.1 Information systems audit controls
77 Network devices and their configuration are unmanaged and uncoordinated, so introducing A.13.1.1 Network controls
vulnerabilities for the organization
78 The required security mechanisms, service levels and management requirements for network services A.13.1.2 Security of network services
are not agreed with the supplier and so are not provided
79 An attacker, having gained access to the network, is able to see and access all systems and devices A.13.1.3 Segregation in networks
80 Virtual networks are configured differently to physical ones and as a consequence don't provide the CLD.13.1.4 Alignment of security management for virtual and
same required level of security physical networks
81 Information in transit is intercepted and compromised A.13.2.1 Information transfer policies and procedures
82 Transfer of information between the organization and external parties is not subject to adequate A.13.2.2 Agreements on information transfer
protection
83 information sent in electronic messaging systems e.g. email and messenger services, is compromised A.13.2.3 Electronic messaging
84 Confidential information is shared with others by a third party because it was not agreed that this is not A.13.2.4 Confidentiality or nondisclosure agreements
allowed
85 Information security is not considered adequately when new or enhanced systems are designed A.14.1.1 Information security requirements analysis and
specification
86 Information involved in application services is intercepted and modified in order to commit fraud A.14.1.2 Securing application services on public networks
87 Application service transactions are able to be used to mount an attack on the organization or its A.14.1.3 Protecting application services transactions
business partners
88 Software is written that has an unacceptable level of vulnerabilities A.14.2.1 Secure development policy
89 Changes are uncontrolled whilst in development leading to poor quality software and badly-defined A.14.2.2 System change control procedures
releases
90 Business critical applications are adversely affected when the underlying operating platform is changed A.14.2.3 Technical review of applications after operating
platform changes
91 Significant modifications to software packages introduce security vulnerabilities, functionality issues A.14.2.4 Restrictions on changes to software packages
and support problems
92 Systems are deisgned without adequate regard to, or knowledge of, information security A.14.2.5 Secure system engineering principles
93 Development environments are able to be accessed by unauthorised persons who introduce code that A.14.2.6 Secure development environment
makes future attacks easier
94 Code developed by an outsourcing provider contains security flaws that are not discovered by the A.14.2.7 Outsourced development
organization
95 Security functionality doesn't work correctly in live software A.14.2.8 System security testing
96 Newly-implemented systems don't work as intended A.14.2.9 System acceptance testing
97 Test data doesn't identify issues with the software being tested and is itself of value to an attacker (e.g. A.14.3.1 Protection of test data
if copied from live data)
98 An attacker gains access to the organization's network using logon credentials obtained from a supplier A.15.1.1 Information security policy for supplier relationships
who has legitimate access
99 A supplier, who provides services to and has access to the organization's information, has inadequate A.15.1.2 Addressing security within supplier agreements
security controls in place and suffers a breach involving the organization's data
100 A supplier uses contractors who do not have adequate security controls in place A.15.1.3 Information and communication technology supply
chain
101 A supplier is not delivering the level of service that they should A.15.2.1 Monitoring and review of supplier services
102 A supplier e.g. cloud service provider, makes a change that is not expected and which significantly A.15.2.2 Managing changes to supplier services
affects the organization's business processes
103 It is not clear who should do what when an information security incident occurs A.16.1.1 Responsibilities and procedures
104 Management is not aware that an information security event has been detected A.16.1.2 Reporting information security events
105 Weaknesses in information security do not get addressed because they are not reported A.16.1.3 Reporting information security weaknesses
111 Information security controls become ineffective when a disruptive event happens A.17.1.2 Implementing information security continuity
112 The intended information security controls don't work during a disruptive event because they have A.17.1.3 Verify, review and evaluate information security
never been tested continuity
113 Information processing facilities fail due to a lack of sufficient redundancy A.17.2.1 Availability of information processing facilities
114 It is not known what legislative, regulatory and contractual requirements each information system must A.18.1.1 Identification of applicable legislation and
meet and, as a result, such requirements are not met contractual requirements
115 The organization is subject to legal action as a result of breaching intellectual property rights and A.18.1.2 Intellectual property rights
licensing requirements
116 Records that are required to be kept are lost, falsified or accessed, resulting in legal or contractual issues A.18.1.3 Protection of records
117 Laws requiring the protection of personally identifiable information are breached, resulting in A.18.1.4 Privacy and protection of personally identifiable
prosecution and fines information
118 Cryptography is used inappropriately, resulting in prosecution A.18.1.5 Regulation of cryptographic controls
119 The implementation of information security is never independently checked and many controls do not A.18.2.1 Independent review of information security
work as intended
120 Management does not check that policies and procedures are being followed and people stop using A.18.2.2 Compliance with security policies and standards
them over time
121 As systems evolve, security controls become less effective and more vulnerable to attack A.18.2.3 Technical compliance review
122 Data subjects are unable to exercise their legal rights and the relevant data controller is subject to A.1.1 Obligation to cooperate regarding PII principals' rights
prosecution
123 PII is used by the processor for additional purposes without the controller's consent A.2.1 Public cloud PII processor's purpose
124 The processor uses the PII for marketing purposes, so breaching relevant legislation A.2.2 Public cloud PII processor's commercial use
125 PII held in temporary files, e.g. database journals, is not deleted and is accessed by unauthorised A.4.1 Secure erasure of temporary files
persons
126 The controller is unaware that the processor has provided PII to a law enforcement agency, despite the A.5.1 PII disclosure notification
processor being permitted to tell them
127 The PII that has been disclosed and the third parties it has been disclosed to, is not known because it A.5.2 Recording of PII disclosures
was not recorded
128 The processor uses sub-contractors that do not provide adequate protection for PII A.7.1 Disclosure of sub-contracted PII processing
129 The controller is not aware that the PII under their control has been breached and so cannot meet its A.9.1 Notification of a data breach involving PII
legal obligations
130 It is not certain what version of a policy or procedure was in force, or its contents, at the time of an A.9.2 Retention period for administrative security policies
issue that is later being investigated and guidelines
131 PII is not returned or disposed of correctly by the processor when no longer required, making it A.9.3 PII return, transfer and disposal
vulnerable to compromise
132 Employees of the PII processor make the controller's PII available to others because they weren't aware A.10.1 Confidentiality or non-disclosure agreements
that it is confidential
133 Printouts containing PII are lost or accessed by unauthorised persons A.10.2 Restriction of the creation of hardcopy material
134 Legal obligations to record data restorations are not met, resulting in prosecution A.10.3 Control and logging of data restoration
135 PII on storage media in transit is lost or compromised A.10.4 Protecting data on storage media leaving the premises
136 PII on storage media that can't be encrypted is accessed by unauthorised persons A.10.5 Use of unencrypted portable storage media and
devices
137 Transmitted PII is intercepted and its confidentiality breached A.10.6 Encryption of PII transmitted over public data-
transmission networks
138 Hardcopy that has been disposed of in an inadequate way may be still readable A.10.7 Secure disposal of hardcopy materials
139 It is unclear which individual performed a task or accessed PII A.10.8 Unique use of userids
140 More people than intended have access to the PII A.10.9 Records of authorized users
141 User accounts are re-used and it is unclear who accessed PII on a specific date and time A.10.10 Userid management
142 The processor does not put adequate security controls in place to protect the PII and uses them for A.10.11 Contract measures
unauthorised purposes
143 A sub-contractor used by the processor does not put adequate security controls in place to protect the A.10.12 Sub-contracted PII processing
PII
144 Data previously held on a storage device is visible to the new recipient of that storage space A.10.13 Access to data on pre-used data storage space
145 The controller cannot comply with data protection legislation because no information is provided by the A.11.1 Geographical location of PII
processor about where the PII is stored
146 PII that is transmitted does not arrive at the intended destination A.11.2 Intended destination of PII
Pre-Treatment Post-Treatment
5 0 0 0 0 0 5 0 0 0 0 0
4 0 0 0 0 0 4 0 0 0 0 0
Risk Risk
3 0 0 0 0 0 3 0 0 0 0 0
Likelihood Likelihood
2 0 0 0 0 0 2 0 0 0 0 0
1 0 0 0 0 0 1 0 0 0 0 0
1 2 3 4 5 1 2 3 4 5
0
Low Medium High
Risk Level
10
7
Number of risks
0
Total Result
10
7
Number of risks
6
Risk Level Total Result
5
0
Total Result
Risk Owner
10
8
Treatment Cost
0
Total Result
4 Very Likely It would be a surprise if the risk did not occur either based on past
frequency or current circumstances
5 Almost certain Either already happens regularly or there is some reason to believe it is
virtually imminent
2 Slight Some local disturbance to Some Within acceptable limits Slight Small risk of not meeting
normal business compliance
operations
3 Moderate Can still deliver Unwelcome but could be Elevated risk requiring Moderate In definite danger of operating
product/service with borne immediate attention illegally
some difficulty
4 High Business is crippled in key Severe effect on income Significant danger to life High Operating illegally in some
areas and/or profit areas
5 Very High Out of business; no Crippling; the Real or strong potential Very High Severe fines and possible
service to customers organisation will go out of loss of life imprisonment of staff
business
RISK SCORE
5
HIGH
Risk 3 MEDIUM
Likelihood
LOW
1 2 3 4 5
Risk Impact