Guide To BS 7799 Risk Assessment: Guidance Aimed at Those Responsible For Carrying Out Risk Management
Guide To BS 7799 Risk Assessment: Guidance Aimed at Those Responsible For Carrying Out Risk Management
Guide to BS 7799
Risk Assessment
Contents
What is an ISMS 3
Target Readership 4
2.2 References 13
4.1 Introduction 27
Page 1
Guide to BS 7799 Risk Assessment
B.1 Tools 41
Page 2
Guide to BS 7799 Risk Assessment
This guide addresses the topic of risk assessment in the context of ISO/IEC 17799:2000 ‘Code of
Practice for Information Security Management, [1]’ and BS 7799-2:2002 ‘Information security
management systems – specification with guidance for use, [2]’. This guide aims at providing a
common basis and understanding of the terminology used and underlying concepts behind risk
assessment and the overall process of involved in carrying out a risk assessment. This document will be
useful to those:
• Establishing and maintaining an Information Security Management System (ISMS),
• Preparing for ISMS certification,
• Involved in auditing an organization’s ISMS (first party, second party and third party audits and
certification).
It is important that the results of risk assessment activities are used by the organization to explain and
justify, in particular as a key part of the certification process, why certain control objectives and controls
from Annex A of BS 7799-2 have been selected, why some of them have not been selected and (where
applicable) why controls additional to those in BS 7799-2 have been selected.
What is an ISMS
The information security management system (ISMS) is that part of the overall management system,
based on a business risk approach, to establish, implement, operate, monitor, maintain and improve
information security. The management system includes organization structure, policies, planning
activities, responsibilities, practices, procedures, processes and resources. The scope of an ISMS can be
defined in terms of the organization as a whole, or parts of the organization, covering the relevant
assets, systems, applications, services, networks and technology employed to process, store and
communicate information. This includes information as an asset itself. For the purposes of this guide
this collection of information related items is called an ‘information system’ or ‘information systems’.
In this context an ISMS could encompass:
Page 3
Guide to BS 7799 Risk Assessment
The scope of an ISMS as determined by the organization is the subject of certification as indicated in the
table at the end of this section. An organization may need to define a different ISMS for different parts
or aspects of its business. For example, an ISMS may be defined for an organization’s specific trading
relationship with another company. Another example might be where an organization structures its
business to ensure suitable separation of business interests are taken care of, in which case this could be
covered by establishing one or more different ISMS. There are different scenarios that are possible
which could be covered by one or more ISMS.
Target Readership
This guide will be useful for organizations:
• That need to understand the process of risk assessment in the context of ISO/IEC 17799 and BS
7799-2,
• Establishing and maintaining their Information Security Management System,
• Preparing for certification or re-certification of their Information Security Management System.
It is also intended to be used by those organizations involved in conducting certification, which need to
understand the process of assessing risks.
There are a number of other guides, which also provide helpful guidance with regard to BS 7799 and
ISMS development and certification:
• Preparing for BS 7799 certification (PD 3001) - Guidance on implementation of ISMS process
requirements to organizations preparing for certification
• Guide to BS 7799 Risk Assessment (PD 3002) - Guidance aimed at those responsible for carrying
out risk management
• Are you ready for a BS 7799 Part 2 Audit? (PD 3003) - A compliance assessment workbook
• Guide to the implementation and auditing of BS 7799 controls (PD 3004) - Guide to the
implementation and auditing of BS 7799 controls
• Guide on the selection of BS 7799 Part 2 controls (PD 3005)
Page 4
Guide to BS 7799 Risk Assessment
Furthermore, there are several annexes giving more detailed examples of threats and vulnerabilities in
relation to the ISO/IEC 17799 and BS 7799-2 control objectives and controls, and information about
tools and methods for risk assessment and risk treatment.
ISO/IEC 17799:2000 (see [1]) provides guidance on best practice for information security management.
The prime objectives of ISO/IEC 17799:2000 are to provide:
• A common basis for organizations to develop, implement and measure effective security
management practice;
• Confidence in inter-organizational dealings.
ISO/IEC 17799 defines a set of control objectives together with a comprehensive set of security
controls that can be implemented to support the control objectives. These controls are based on
information security controls currently being implemented by commercial, industrial and governmental
organizations both in the UK and internationally.
These controls are recommended as good information security practice, subject of course to limiting
factors such as environmental or technological constraints. Some controls are not applicable to every
business environment and they should be used selectively, according to local circumstances.
BS 7999 Part 2 (see [2]) specifies the requirements for establishing, implementing, operating,
monitoring, reviewing, maintaining and improving a documented ISMS within the context of the
Page 5
Guide to BS 7799 Risk Assessment
organization’s overall business risks. It specifies requirements for the implementation of security
controls customized to the needs of individual organizations or parts thereof.
The ISMS is designed to ensure adequate and proportionate security controls to adequately protect
information assets and give confidence to customers and other interested parties. This can be translated
into maintaining and improving competitive edge, cash flow, profitability, legal compliance and
commercial image.
Assessing the Risks and Selecting Controls in the Context of BS 7799 Part 2
An organization needs to assess its security risks taking into account the business value of the
information and other assets at risk for those information systems defined to be in the scope of the ISMS
being established and maintained. The control objectives and controls which are selected by an
organization, and documented in an ISMS, related to its particular business situation and environment,
will need to be determined through a process of identifying and assessing the security risks using a risk
assessment process (see also Section 3.1 – 3.5).
Based on the results of risk assessment, suitable controls can be selected from Annex A of BS 7799 Part
2 to protect the organization's assets encompassed by an ISMS against the identified risks. In order to
get an ISMS certified, an organization needs to be able to demonstrate that the control objectives and
controls they selected to achieve information security are appropriate to protect against the identified
risks.
The process of selecting control objectives and controls does not preclude the identification and
implementation of controls, which are not included in Annex A of BS 7799 Part 2. It could be the case
that the assessed risks justify other controls not in BS 7799 Part 2. These may then be selected from
other security control catalogues, libraries, standards and other sources. Justification for controls not in
BS 7799 Part 2 needs to be documented for the purpose of certification in the same way as those
controls selected from BS 7799 Part 2.
Section 4.2 of BS 7799 Part 2 describes the establishment and management of a documented ISMS.
Organizations seeking to be certified or re-certified as complying to BS 7799 Part 2 shall apply the
Plan-Do-Check-Act Model to the ISMS processes as described in the following table (more details are
given in Section 3 of this document):
Page 6
Guide to BS 7799 Risk Assessment
Note: The clause references listed in parenthesis in the first column of this table refer to the related clauses in
Section 4.2 of BS 7799 Part 2 [2].
Page 7
Guide to BS 7799 Risk Assessment
The purpose of information security is to ensure business continuity and minimise business damage by
preventing and minimising the impact of security incidents.
Information security management enables information to be shared, while ensuring the protection of
information and all other assets within the scope of the ISMS (see also Section 3.1). It has three basic
components to achieve confidence in and assurance of information:
Information takes many forms. It can be stored on computers, transmitted across networks, printed out
or written down on paper, and spoken in conversations. From a security perspective, appropriate
protection should be applied to all forms of information, including papers, databases, films, view foils,
tapes, diskettes, CD ROMs, conversations (e.g. conversations using technologies such as fixed and
mobile telephones) and any other methods and media used to convey knowledge and ideas.
Page 8
Guide to BS 7799 Risk Assessment
The growth in the use of networking presents new opportunities for unauthorised access to computer
systems and the trend to distributed computing reduces the scope for centralised, specialist control of an
organization’s ISMS.
To deal with this, suitable control objectives and controls for protecting an organization's information
need to be identified and implemented. In this respect ISO/IEC 17799 and BS 7799 Part 2 provide a
good source of controls to meet this need, and for the establishment of ISMSs. In order to identify and
select which controls are appropriate, an organization should identify their security requirements (see
also Section 3.3 and 3.4) for the information systems included in the ISMS(s) in the context of its
business processes and applications.
Organizations of all business types and of all sizes, from the multinational company through to SMEs
(Small to Medium sized Enterprises), are vulnerable to security threats. The sooner action is taken to
protect an organization's information, the cheaper and more effective security will be for the
organization in the long run.
Generally, risk assessment methods and techniques are applied to a complete ISMS or specific
information systems and facilities, but they can also be directed to individual system components or
services where this is practicable, realistic and helpful. Assessment of risks involves the systematic
consideration of the following (see also the definition in 2.3.9):
• Consequence - the business harm likely to result from a significant breach of information security,
taking account of the potential consequences of loss or failure of information confidentiality,
integrity and availability;
• Probability - the realistic likelihood of such a breach occurring in the light of prevailing threats,
vulnerabilities and controls.
• The selection of a method of risk assessment (see Section 4) that is suitable for the ISMS, and the
identified business information security, legal and regulatory requirements, as well as determining
criteria for accepting risks and identifying the acceptable levels of risk.
• Identify and assess the risks (see Section 3) for the ISMS(s) and the information systems
encompassed in ISMS(s), identify and evaluate options for the treatment of risk, select control
objectives and controls to reduce the risks to acceptable levels, and – for certification purposes –
produce a Statement of Applicability.
Page 9
Guide to BS 7799 Risk Assessment
Any organization that wants to have adequate security controls in place should use the results of risk
assessments to guide and determine the appropriate risk treatment action and priorities for managing
information security risks. This process enables an organization to identify the necessary controls from
ISO/IEC 17799 or BS 7799 Part 2, Annex A, respectively, to be implemented and operated. Assessment
of risks depends upon the following factors:
The risk assessment might identify exceptional business security risks requiring stronger controls that
are additional to the recommendations given in BS 7799 Part 2. These controls need to be justified on
the basis of the conclusions of the risk assessment. Expenditure on information security controls needs
to be balanced against, and appropriate to, the business value of the information and other business
assets at risk, and the business harm likely to result from security failures. A periodic review of business
risks and security controls, to address changing business requirements and priorities, is therefore a
regular feature of information security management.
The resources needed for the risk assessment and management process can vary according to the depth
of the review involved, and the security requirements of the organization and the complexity of its
business.
Experience has shown that the following factors are often critical to the successful implementation of
information security within an organization:
• Security objectives and activities being based on business objectives and requirements, and led by
business management;
• Visible support and commitment from top management;
• A good understanding of the security risks;
• Effective marketing of security to all managers and employees;
• Distribution of comprehensive guidance on information security policy and standards to all
employees and contractors.
Page 10
Guide to BS 7799 Risk Assessment
What might not be as obvious, but is very important to notice is that the “Check” activity includes a
re-assessment of all the risks to check that the controls in place are effectively reducing the risks, and
that part of the “Act” activity is nothing else but treating the re-assessed risks, therefore similar to the
“Do” part. This means that the risk assessment and risk treatment described in the rest of this guide help
to support all parts of the PDCA model.
'Guidelines for the Management of IT Security' (GMITS) is the internationally recognised ISO/IEC
guidelines for the management of IT security, which are referenced in several places in this guide.
GMITS provides a set of security management practices and techniques that have been developed and
agreed by many leading international companies and organizations.
GMITS forms the basis for many of the ideas, concepts and techniques for the risk assessment and
treatment process as described in this guide. Although the title of the GMITS standard refers to IT
security, its scope goes beyond this and the principles given in these guidelines can also be applied for
information security.
Sections 3 and 4 of this guide explains how the advice and guidance given the different parts of GMITS
can be used to support the risk assessment and treatment processes for the general application of
ISO/IEC 17799 and BS 7799 Part 2 and also in combination with the BS 7799 Part 2 certification
process.
The following is a brief summary of the five different parts of the GMITS standard (see [3] - [7]).
NOTE: At the time this guide was published Parts 1 to 3 of GMITS are under revision in ISO/IEC
JTC1/SC27. Revised versions of these Parts will be published by ISO/IEC in due course therefore the
reader needs to check what the latest version of GMITS are as the descriptions in 2.1.1-2.1.3 below may
Page 11
Guide to BS 7799 Risk Assessment
change. The reader should note that Part 4 of GMITS might also be revised at some point in time in the
near future.
Part 1 of GMITS describes the basic concepts and models, which should be considered with respect to
risk assessment. An overview of these concepts is given in Section 3. Users of this guide not familiar
with these ideas should consult GMITS, Part 1 for further details and information.
NOTE: At the time this guide was published Part 1 of GMITS is under revision in ISO/IEC JTC1/SC27.
Part 2 of GMITS addresses the different activities related to the management of IT security within an
organization. It can be used to support the selection of management strategies and the assignment of
responsibilities in the IT security process. It also describes the various stages of planning, security
policy development, risk assessment, implementation of controls and maintenance of IT security from a
management point of view. As with GMITS, Part 1, users of this guide should consult Part 2 for detailed
information.
NOTE: At the time this guide was published Part 2 of GMITS is under revision in ISO/IEC JTC1/SC27.
Part 3 of GMITS discusses and recommends techniques for the successful management of IT security.
This includes the various risk assessment options described in Section 4 and the risk assessment process
described in Section 3, including a detailed description of various risk assessment possibilities in an
Annex. Hence, GMITS, Part 3 can be used to obtain more detailed information about these topics,
especially on how to carry out a risk assessment.
NOTE: At the time this guide was published Part 3 of GMITS is under revision in ISO/IEC JTC1/SC27.
Part 4 of GMITS provides information about the selection of controls according to different assessment
methods (as, for example, are described in Section 4). Part 4 can help to select controls from codes of
practice like ISO/IEC 17799 as well as the selection of controls according to a detailed risk assessment.
It can be used to support the selection of controls described in Section 3 of this guide.
Page 12
Guide to BS 7799 Risk Assessment
Part 5 of GMITS provides guidance to an organization connecting its information systems to external
networks. This part of GMITS includes the selection and use of security controls to provide security for
the external connections and the services supported by those connections, and additional controls
required for the systems because of the connections. Part 5 can also support the selection of security
controls from ISO/IEC 17799 if external connections are involved.
2.2 References
2.3.1 Asset
Anything that has value to the organization, its business operations and their continuity.
Page 13
Guide to BS 7799 Risk Assessment
2.3.3 Information
The meaning that is currently assigned to data by means of the conventions applied to those data.
1
Guide 73 used the word ‘measure’ for what is called ‘control’ in ISO/IEC 17799 and BS 7799-2, the rest of the definition
is exactly the same.
Page 14
Guide to BS 7799 Risk Assessment
Page 15
Guide to BS 7799 Risk Assessment
Each asset within this boundary should be clearly identified and appropriately valued (see also Section
3.2 below), and its ownership and security classification agreed and documented (see ISO/IEC 17799
[1] Section 5, and [8]/[9]). Examples of assets includes:
• Information assets: databases and data files, system documentation, user manuals, training
material, operational or support procedures, continuity plans, fallback arrangements;
• Paper documents: contracts, guidelines, company documentation, documents containing important
business results;
• Software assets: application software, system software, development tools and utilities;
2
Section 3 of ISO/IEC 17799 defines two specific objectives in regard to assets: (I) 3.1 Accountability for assets, and (ii) 3.2
Information classification.
3
Accountability for assets helps ensure that adequate information security is maintained. Owners should be identified for
major assets and assigned the responsibility for the maintenance of appropriate security controls. Responsibility for
implementing security controls may be delegated, though accountability should remain with the nominated owner of the
asset.
Page 16
Guide to BS 7799 Risk Assessment
• Physical assets: computer and communications equipment, magnetic media (tapes and disks), other
technical equipment (power supplies, air-conditioning units), furniture, accommodation;
• People: personnel, customers, subscribers;
• Company image and reputation;
• Services: computing and communications services, other technical services (heating, lighting,
power, air-conditioning).
Asset identification and valuation, based on the business needs of an organization, is a major factor in
risk assessment. In order to identify the appropriate protection for assets, it is necessary to assess their
values in terms of their importance to the business or their potential values given certain opportunities.
These values are usually expressed in terms of the potential business impacts of unwanted incidents such
as the disclosure, modification, non-availability and/or destruction of information, and other assets.
These incidents could, in turn, lead to financial losses, loss of revenue, market share, or company image.
The input for the valuation of assets should be provided by owners and users of assets, those who can
speak authoritatively about the importance of assets, particularly information, to the organization and its
business.
The values assigned should be related to the cost of obtaining and maintaining the asset, and the impacts
the loss of confidentiality, integrity and availability could have to the business of the organization. In
order to consistently assess the asset values and to relate them appropriately, a value scale for assets
should be applied.
For each of the assets, values should be identified that express the business impacts if the confidentiality,
integrity or availability, or any other important property4 of the asset is damaged. An example of such a
valuation scale could be:
4
Sometimes, the criteria ‘confidentiality’, ‘integrity’ and ‘availability’ alone are not sufficient to express the importance of
an asset, e.g. when considering information where intellectual property rights need to be protected. In such cases, an
additional criterion should be introduced to match these requirements.
Page 17
Guide to BS 7799 Risk Assessment
An organization should define its own limits for the asset valuation scale. It is entirely up to the
organization to decide what is considered as being a 'low' or a 'high' damage - a damage that might be
disastrous for a small organization could be low or even negligible for a very large organization.
Giving a good interpretation of what the values mean in terms of the business of the organization is very
important when speaking to owners and users to gain input for the asset valuation.
Security requirements in any organization, large or small, are in effect derived from three main sources
and should be to be documented in an ISMS:
• The unique set of threats and vulnerabilities which could lead to significant losses in business if they
occur;
• The statutory and contractual requirements which have to be satisfied by the organization, its
trading partners, contractors and service providers;
• The unique set of principles, objectives and requirements for information processing that an
organization has developed to support its business operations and processes, and apply to the
organization’s information systems.
Once these security requirements have been identified, it is helpful to formulate them in terms of
requirements for confidentiality, integrity, and availability.
At some point, either prior to starting the risk assessment activities, or before starting this step, the
already implemented security controls should be identified. This is necessary for a complete
identification and realistic valuation of the threats and vulnerabilities, and is also important to select
additional controls (see also Step 3.6) that are working well with those already in place. The Guide PD
Page 18
Guide to BS 7799 Risk Assessment
3003 gives a possibility of checking the existing security status against ISO/IEC 17799 and BS 7799
Part 2.
Assets are subject to many kinds of threats. A threat has the potential to cause an unwanted incident
which may result in harm to a system or organization and its assets. This harm can occur from a direct or
an indirect attack on an organization’s information e.g. its unauthorised destruction, disclosure,
modification, corruption, and unavailability or loss. Threats can originate from accidental or deliberate
sources or events. A threat would need to exploit a vulnerability (see below) of the systems, applications
or services used by the organization in order to successfully cause harm to the asset. Examples of threats
are given in Annex A.1 and A.2 of this guide, and GMITS Part 3 and the publication 'Protecting
Business Information' (see [8] and [9]), provides additional information on threats.
Vulnerabilities are weaknesses associated with an organization’s assets. These weaknesses may be
exploited by a threat causing unwanted incidents that may result in loss, damage or harm to these assets.
A vulnerability in itself does not cause harm, it is merely a condition or set of conditions that may allow
a threat to affect an asset. The vulnerability identification should identify the weaknesses related to the
assets in the:
• Physical environment,
• Personnel, management and administration procedures and controls,
• Hardware, software or communications equipment and facilities,
that may be exploited by a threat source to cause harm to the assets, and the business they support.
Examples of vulnerabilities are given in Annex A.3 of this guide, and GMITS Part 3 provides additional
information on vulnerabilities.
Please note: Depending on the risk assessment methodology used (see also Section 4 and Annex B.2),
threats and vulnerabilities might or might not be assessed together. Both variations are possible, and
should be decided upon when deciding on the overall risk assessment approach.
The security requirements relating the set of statutory and contractual requirements that an organization,
its trading partners, contractors and services providers have to satisfy, should be documented in an
ISMS. It is important e.g. for the control of proprietary software copying, safeguarding of
organizational records, or data protection, that the ISMS supports these requirements, and vital that the
Page 19
Guide to BS 7799 Risk Assessment
implementation, or absence, of security controls in each of the information systems do not breach any
statutory, criminal or civil obligations, or commercial contracts. Therefore, the legal statutory and
contractual requirements related to each of the assets should be identified.
The security requirements relating to the organization-wide principles, objectives and requirements for
information processing to support its business operations should also be documented in an ISMS. It is
important, e.g. for competitive edge, cash flow and/or profitability, that the ISMS supports these
requirements, and vital that the implementation, or absence, of security controls in each of the
information systems do not impede efficient business operations. For each of the assets, the related
business objectives and requirements should be identified.
Like for the valuation of assets, it is necessary for the valuation of security requirements to identify a
scale for this valuation that is suitable to the risk assessment methodology applied (see also Section 4).
In many cases, a simple three level scale, such as
• Low
• Medium
• High
will be sufficient, in order to not make the process overly complex.
After identifying the threats and vulnerabilities it is necessary to assess the likelihood that a combination
of the threats and vulnerabilities occur.
Please note: Depending on the whether the threats and vulnerabilities are assessed separately or
together, a separate valuation of threats and vulnerabilities or a combined assessment should be used.
Page 20
Guide to BS 7799 Risk Assessment
• Deliberate threats: the motivation, the capabilities perceived and necessary, resources available to
possible attackers, and the perception of attractiveness;
• Accidental threats - how often it might occur, according to experience, statistics, etc., and
geographical factors such as proximity to chemical or petroleum factories, in areas where extreme
weather conditions are always possible, and factors that could influence human errors and
equipment malfunction.
The overall likelihood for an incident to occur depends as well on the vulnerability of the assets, i.e. how
easily they may be exploited. Accordingly, vulnerabilities should be rated with respect to some scale
such as:
• Highly probable or probable – it is easy to exploit the vulnerability, there is no or very little
protection in place;
• Possible – the vulnerability might be exploited, but some protection is in place;
• Unlikely or impossible – it is not easy to exploit the vulnerability, the protection in place is good.
Information used to support the threat and vulnerability assessment can be obtained from those people
involved with the ISMS, and related business processes being considered. These people could be for
example, personnel department staff, facility planning and IT specialists, as well as people responsible
for security within the organization. It might also be useful to use threat and vulnerability lists (e.g. in
Annex a and in GMITS, Part 3) and links between threats and controls from ISO/IEC 17799 given in
Annex A in this guide.
In the same way as the threats and vulnerabilities have been assessed, a value should now be identified
for the legal and business requirements (see also 3.3.3 and 3.3.4). This is necessary to allow the
calculation of the risks related to these security requirements.
• How serious the impact to the business is if the legal/contractual or the business requirement is not
fulfilled;
• What consequences this might have for the asset considered, and the whole ISMS; and
• How likely this is to happen.
Page 21
Guide to BS 7799 Risk Assessment
The results of these considerations should be used to identify for each asset and for each
legal/contractual and each business requirement the appropriate value on the value scale for the security
requirements.
The objective of the risk assessment is to identify and assess the risks, based on the results of Steps 3.1 –
3.4. The risks are calculated from the combination of asset values and assessed levels of related security
requirements.
There are different ways of relating these factors; for example, the values assigned to the assets,
vulnerabilities and threats, and legal and business requirements are combined to obtain measures of
risks. Several different ways to obtain these values are described in Annex B.2 'Types and Examples of
Risk Assessment and Risk Management Methods', which are based on the concepts described in Section
3 of this guide.
It is important to note that there are no ‘right’ or ‘wrong’ ways of calculating the risks, as long as the
concepts described in the previous sections are combined in a sensible way, and it is up to the
organization to identify a method for risk assessment that is suitable to their business and security
requirements.
When the risks have been identified and assessed, the next task for the organization is to identify and
evaluate the most appropriate action of how to deal with these risks. This decision should be made
based on the assets involved and the impacts on the business. Another important input into this decision
Page 22
Guide to BS 7799 Risk Assessment
is the acceptable level of risk that has been identified following the selection of the appropriate risk
assessment methodology (see also Section 4).
For the identified and assessed risks (as a result of the actions described in Steps 3.1 – 3.5), there are four
possible actions an organization might want to take:
• Applying appropriate controls to reduce the risks (see also Section 3.7 below);
• Knowingly and objectively accepting risks, providing they clearly satisfy the organization’s policy
and the criteria for risk acceptance (see also Section 4);
• Avoiding the risks (see 3.6.1 below);
• Transferring the associated business risks to other parties (see 3.6.2 below).
For each of the risks, these options should be evaluated to identify the most suitable one. The results of
this activity should be documented, and later on in the process used to develop a risk treatment plan.
Risk avoidance describes any action where assets are moved away from risky areas (e.g. physical areas
or business processes). This can, for example, be achieved by:
• Not conducting certain business activities (e.g. not using e-commerce arrangements or not using the
Internet for specific business activities);
• Moving assets away from an area of risk (e.g. not storing sensitive files in the organization’s Intranet
or moving assets away from areas that are not sufficiently physically protected); or
• Deciding not to process particularly sensitive information, e.g. with third parties, if sufficient
protection cannot be guaranteed.
When evaluating the option of risk avoidance, this needs to be balanced against business and monetary
needs. For example, it might be inevitable for an organization to use the Internet or e-commerce because
of business demands, despite of all their concerns about hackers, and it might be not feasible from a
business process point of view to move certain assets to a safer place. In such situations, one of the other
options, i.e. risk transfer or risk reduction, should be considered.
Risk transfer might be the best option if it seems impossible to avoid the risk, and it is difficult, or too
expensive, to achieve appropriate reduction of risk. For example, risk transfer can be achieved by taking
Page 23
Guide to BS 7799 Risk Assessment
out insurance to a value commensurate with the assessed asset values and related risks, taking also into
account the importance for the business processes of the organization.
Another possibility is to use third parties or outsourcing partners to handle critical business assets or
processes if they are suitably equipped for doing so. In this case, care should be taken that all security
requirements, control objectives and controls are included in associated contracts to ensure that
sufficient security will be in place. What should be kept in mind is that, in many cases, the ultimate
responsibility for the security of the outsourced information and information processing facilities
remains with the original organization.
Another example of risk transfer might be where assets at risk are moved outside the scope of the ISMS.
This can make the protection of particularly sensitive information easier and cheaper, but care should be
taken to include all assets needed for the business carried out in the ISMS via interfaces and
dependencies.
In order to reduce the assessed risks within the scope of the ISMS being considered, appropriate and
justified security controls should be identified and selected. Controls can be selected from ISO/IEC
17799 or BS 7799 Part 2, Annex A, and also from additional sources, as and when necessary. The aim
of control selection is to reduce risks to a level that is acceptable for the organization. This selection
should be supported by the results of the risk assessment, for example, the vulnerabilities with
associated threats indicate where protection may be needed, and what form it should take. Especially for
the purpose of certification, the links to the risk assessment should be documented to justify the selection
(or otherwise) of the controls.
Page 24
Guide to BS 7799 Risk Assessment
in place, and maybe add another control. This process should include the results of the “Check” activity
in the PDCA model, if a previous risk assessment has been made.
When selecting controls for implementation, a number of factors should be considered including:
• Ease of use of the control,
• Transparency to the user,
• The help provided to the users to perform their function,
• The relative strength of the controls, and
• The types of functions performed - prevention, deterrence, detection, recovery, correction,
monitoring, and awareness.
Generally, a control will fulfil more than one of these functions and the more it can fulfil the better.
When examining the overall security, or set of controls to be used, a balance should be maintained
between the types of functions if at all possible. This helps the overall security to be more effective and
efficient. Control selection should also always include a balance of operational (non-technical) and
technical controls supporting and complementing each other. Operational controls include those, which
provide physical, personnel, and administrative security.
Besides the very important risk reduction (see also Section 3.7.2 below), also the cost factor should be
considered for control selection. It would be inappropriate to recommend controls, which are more
expensive to implement and maintain than the previously agreed budget assigned for security, and
cheaper alternatives should be sought. However, great care should be taken if the budget reduces the
number or quality of controls to be implemented since this can lead to an unwanted acceptance of risks.
The established budget for controls should only be used as a limiting factor with considerable care.
Examples are provided in Annex A on the selection of specific controls from ISO/IEC 17799 in
accordance with a number of example threats. More about control selection can also be found in PD
3005.
For all those risks where the option ‘risk reduction’ has been chosen in Section 3.6 above, appropriate
controls need to be selected to reduce the risks to the level that has been identified as acceptable. For the
identification of controls it is useful to consider the security requirements related to the risks (i.e. the
threats and vulnerabilities, legal and business requirements), and all other results from the risk
assessment. Controls can reduce the assessed risks in many different ways, for example by:
Page 25
Guide to BS 7799 Risk Assessment
• Reducing the likelihood of the threat or vulnerability that causes the risk;
• Ensuring the fulfilment of legal or business requirements;
• Reducing the possible impact if the risk occurs;
• Detect unwanted events, react, and recover from them.
Which of these ways (or a combination of them) an organization chooses to adopt to protect its assets
within the ISMS is a business decision and depends on the business environment and circumstances in
which the organization needs to operate. It is always important to match the controls to the specific
needs of an organization, and to justify their selection.
After identifying suitable controls to reduce a specific risk to the acceptable level, it should be assessed
how much these controls, if implemented, will reduce the risk – this reduced risk is called residual risk.
This residual risk is generally difficult to assess, but at least an estimation on how much the controls
reduce the level of the associated security requirements value should be identified, to ensure that
sufficient protection is achieved.
If the residual risk is unacceptable, a business decision needs to be made on how to deal with this. One
option is to select more controls in order to finally reduce the risk to an acceptable level. Whilst it is
generally good practice to not tolerate unacceptable risks, it might not always be possible or financially
feasible to reduce all risks to the acceptable level.
After the implementation of the selected controls, there will always be risks remaining. This is because
organization’s information systems can ever be made absolutely secure. Because of this, it is necessary
to check the implementation, and the outputs of the controls (such as incident reports or log files) to
finally assess how well the controls implemented are working. These actions are part of the “Check”
phase in the PDCA model, and the identified improvements should then be implemented in the “Act”
phase to achieve more effective security.
Page 26
Guide to BS 7799 Risk Assessment
4.1 Introduction
Section 3 provides a description of the overall risk assessment processes. As already mentioned in
Section 3, it is up to the organization to select the appropriate approach for the risk assessment, so this
section describes different options for an organization-wide approach for risk assessment. The different
approaches vary in the time and effort involved and the depth of detail explored. Despite of the fact that
the organization is free to chose the risk assessment approach, it needs to be ensured that the risk
assessment method(s) applied are suitable and detailed enough for the organization's business and
security requirements.
If, for example, an organization or the ISMS and its assets have at most low to medium security
requirements, a Basic Risk Assessment (see 4.2) approach might be sufficient. If the security
requirements are higher, requiring more detailed and special assessment, then a Detailed Risk
Assessment (see 4.3 and 4.4) approach may be necessary. In any case, it should be ensured that the
chosen approach fulfils all criteria from Section 4.2.1 in BS 7799 Part 2, namely:
• identifying the assets (see also 3.1);
• identifying threats and vulnerabilities, and any other applicable security requirements (see also 3.3);
• identifying the impacts that losses of confidentiality, integrity and availability might have on the
assets (see also 3.2);
• based on this information, assessing the harm and the likelihood of risks occurring, and estimating
the levels of risk (see also 3.4 and 3.5);
• identifying the most appropriate risk treatment option (see also 3.6); and
• select control objectives and controls to reduce the risks to an acceptable level (see also 3.7).
The Basic approach involves the selection of a set of security controls based on a simple and
straightforward application of the process described in Section 3.
This approach enables an organization to establish its ISMS(s) by achieving a basic level5 of protection,
based on the identification and assessment of the basic and essential needs and requirements of the
organization. The basic level of security achieved, using this straightforward and easy to use approach,
5
Sometimes referred to as a baseline level of security.
Page 27
Guide to BS 7799 Risk Assessment
may be suitable for a part of an organization with low security requirements, or – in some cases – even
for the whole organization if its security requirements are sufficiently low. What is important for any
organization regarding BS 7799 Part 2 certification is that they are able to justify why the baseline
approach is sufficient, if this is what has been chosen.
A typical example of the use of this approach might be a part of an organization whose business
operations are not very complex and whose dependency on information processing and networking is
not that extensive. This might also be the case with some SMEs, however, there may be SMEs whose
business environment is more complex and they are dependent on extensive use of technology based
information systems, and are involved in the processing of commercially sensitive information.
In the context of BS 7799-2, this approach would involve making a systematic assessment of the
organization's security requirements (see Section 3.3 and 3.4) for the information and the assets being
considered, identifying those control objectives that should be satisfied and then a selection of a set of
controls to meet these objectives.
This basic risk assessment approach involves the following activities based on the processes described
in Section 3 and should take into account the security requirements from all sources.
Asset Identification and Valuation (3.1 and List those assets associated with the business environment, operations and
3.2) information being assessed within the scope of the ISMS, and identify their
values, using a simple valuation scale.
Identification and Assessment of Security The security requirements should be identified (this can be supported by the
Requirements (3.3 and 3.4) use of checklists of generalised or commonly known threats and
vulnerabilities), and all identified security requirements should be valued,
using a simple valuation scale
Risk Calculation (3.5) Calculate the risks, based on the information on assets and security
requirements, using a simple calculation scheme.
Identification and Evaluation of the Risk Identify the suitable risk treatment action for each of the identified risks;
Treatment Options (3.6) document the results for the risk treatment plan.
Selection of Security Controls and Risk For each of the identified assets identify the control objectives and controls
Reduction and Acceptance (3.7) in ISO/IEC 17799:2000 that are relevant. Ensure that the control
objectives and controls selected reduce the risks to an acceptable level.
Page 28
Guide to BS 7799 Risk Assessment
Using lists of generalised or commonly known threats and vulnerabilities can help to guide and direct
the thinking process behind the assessment activities. More details of this basic approach and associated
control selection are described in GMITS Part 4 and PD 3005.
This approach can be applied by using a simplified version of the matrix method given in Annex B (see
B.2.2). Such an approach could involve, for example, two levels of security requirements (e.g. High and
Low), and a valuation of assets using a predefined scale (e.g. High Value, Medium Value and Low
Value).
The numbers in the table below represent a measure of risks (e.g. 0 to 4).
The risk measures can be used to decide what risks should be dealt with first and need the most attention,
and what the appropriate risk treatment options might be. For those risks where the option of risk
reduction is chosen, an acceptable level of risk needs to be identified that is suitable to the business and
security requirements for the ISMS considered. For the above example matrix it is recommendable that
the acceptable level of risk is not chosen higher than 2.
There are a number of advantages with the Basic Risk Assessment approach, such as:
• A minimum of resources is needed for risk assessment, and the time and effort spent on control
selection is reduced. Normally, no significant resources are needed to identify appropriate controls,
• The same or similar controls can be adopted for several assets without great effort. If a large number
of an organization's assets operate in a common environment, and if the business and security
requirements are comparable, these controls may offer a cost-effective solution.
Page 29
Guide to BS 7799 Risk Assessment
This approach involves conducting detailed risk assessment, which include the detailed identification
and valuation of assets, and identification and assessment of the levels of security requirements. This
information is used to assess the risks and is subsequently used for the identification and selection of
security controls.
The selection of these controls is justified by the identified risks to the assets, and it is ensured that the
risks are reduced to the acceptable level, if this risk treatment option was chosen.
Detailed risk assessment can be a very resource intensive process, and therefore needs careful
establishment of boundaries of the business environment, operations, information and assets within the
scope of the ISMS to be assessed. It is also an approach that requires constant management attention.
According to the risks assessed, controls can be selected from ISO/IEC 17799 in relation to those control
objectives that should be satisfied. This overall approach is different from the Basic Risk Assessment
approach given in Section 4.2 in that much more detailed analysis of the assets and the security
requirements is carried out, using the concepts that have been described in Section 3, and assessment
method like one of those given in Annex B, in order to relate the various values and to calculate the risks.
Asset Identification and Identify and list all those assets associated with the business environment, operations and
Valuation (3.1 and 3.2) information within the scope of the ISMS, define a value scale and for each asset assign values
from this scale (one value for each: confidentiality, integrity and availability, and any other value,
if applicable).
Security Requirements Identify all security requirements (threats and vulnerabilities, legal and business requirements)
Identification (3.3) associated with the list of assets within the scope of the ISMS.
Security Requirements Identify an appropriate valuation scale for the security requirements, and assign the appropriate
Assessment (3.4) value for each of the identified security requirements.
Calculation of Risks (3.5) Calculate the risks (based on the assets and security requirements, and their values resulting from
the above assessments) using, for example, one of the risk assessment methods outlined in Annex
B, or any variant or similar type of method that is appropriate for the security requirements of the
ISMS considered.
Identification and Identify a suitable risk treatment action for each of the identified risks. Evaluate that the identified
Evaluation of Options for option is realistic, suitable and in line with all business and security requirements, and document
the Treatment of Risks (3.6) the results for the risk treatment plan
Selection of Security Determine the acceptable level of risk for the risk assessment methodology chosen, and ensure that
Controls, Reducing the this level of acceptable risk is appropriate for the business and security requirements of the ISMS
Risks and Risk Acceptance considered. For those risks where the option of risk reduction was chosen, select, suitable control
Page 30
Guide to BS 7799 Risk Assessment
objectives and controls from ISO/IEC 17799 that will reduce these risks to an acceptable level.
Assess how much the controls selected reduce the identified risks. For each of those risks that
cannot be reduced to the acceptable level, identify additional action to deal with it (either
management approval to accept the risk for business reasons, or to reduce it further).
In addition to having the combined advantages of the two approaches it also has the advantage that:
• Resources and money can be applied where they will be most beneficial, and an organization’s
information systems, which are likely to be at high risk, can be addressed early.
As explained in the previous clauses of this section, there are different overall, organization-wide,
approaches an organization can take to risk assessment. The previous clauses have indicated some of
Page 31
Guide to BS 7799 Risk Assessment
the advantages and disadvantages of these approaches. Which approach is suitable for an organization
is dependent on a number of factors, including:
• Their business environment and the kind of business conducted;
• The dependency on information processing and applications supporting their business;
• The complexity of the business and supporting systems, applications and services;
• The number of trading partners and external business and contractual relationships.
These factors should be generally common to all businesses, therefore when selecting an appropriate
organization-wide, approach an organization needs to consider these factors together with the
advantages and disadvantages of the approaches. It is up to the organization to make the decision of
which approach to take, as long as the criteria set out in BS 7799 Part 2 (see also 4.1 above) are satisfied.
As a general rule of thumb the more important and essential security is to the organization and for its
business, and the more there is to lose, the more time and resources should be devoted to security.
With regard to certification of a BS 7799 Information Security Management System (ISMS) there is a
requirement to do appropriate risk assessment review(s) and to document the results of this assessment
in a Statement of Applicability (see Section 2). This is an important part of the certification process and
it is therefore equally important that the organization has selected the most appropriate
organization-wide, approach to risk assessment. More about this can also be found in the first part of
Guide PD 3003.
It is certainly the case that the less complex the business operations are and the fewer systems there are,
the simpler the information security requirements might be, and this situation probably holds true for the
majority of SMEs.
However, there are some SMEs whose business requirements could be quite involved. An SME might
be a supplier to many other organizations and there may be a contractual agreement to implement a
range of ISO/IEC 17799 controls. For example, the SME will need to consider those aspects of Section
Page 32
Guide to BS 7799 Risk Assessment
4.2 of ISO/IEC 17799 (Security of Third Party Access), and whether any aspects of Section 8.7 (Data
and Software Exchange), Sections 9.3/9.4/9.5 (Network/Computer/Application Access Control), and
Section 10 (Systems Development and Maintenance) applies in their capacity as a supplier of a range of
different services and products. In addition, they will certainly need to consider what aspects of Section
12 (Compliance) apply.
An SME's dependency on the use of information processing and computing systems may be very high
and their business may be highly reliant on the use of such systems. For example, an SME might use
such systems to produce information products for the entertainment industry where the content and
design has a high market value in terms of intellectual property.
An SME needs to balance what resources it would need to devote to risk assessment in accordance with
one of the three approaches (see Sections 4.2, 4.3 and 4.4) and the implementation of security controls to
meet its own security requirements and those of its customers. As a minimum an SME will need to
implement some security controls, whatever their business is, and the Basic Risk Assessment approach
will enable them to establish what this should be. Certainly there is a need to have some form of security
policy in place, to have some forms of access control and to be compliant with statutory and regulatory
requirements. In addition, there may be a need to give special treatment to some specific requirements
resulting from its business relationships, using some or all of a Detailed Risk Assessment approach, as
described in Section 4.3.
Page 33
Guide to BS 7799 Risk Assessment
Again the most important principle is that an organization needs to adopt risk assessment and risk
management approaches that will appropriately address and identify the complete range of threats and
vulnerabilities relevant to their business environment. This may include some or all of the threats and
vulnerabilities given in the lists below.
Page 34
Guide to BS 7799 Risk Assessment
Depending on the type of threat, their occurrence could result in a number of different outcomes, such as:
Accidental or unintended changes to software and data sharing Breach of security due to non-compliance with
facilities in a computing environment. operational procedures.
Breach of security due to inaccurate, incomplete or inappropriate operating procedures or the definition of responsibilities,
or insufficient updating of such procedures.
Breach of security due to non-compliance with incident handling Compromise, damage of loss of data at a
procedures. contractor’s site.
Damage due to inaccurate, incomplete or inappropriate continuity plans, insufficient testing or insufficient updating of plans
Forgery Fraud
Negligent or deliberate misuse of facilities due to lack of segregation Unauthorised disclosure of the location of
and execution of duties sites/buildings/offices containing critical and/or
sensitive computing and processing facilities
Fire Flooding
Bomb attack Hurricane
Earthquake Industrial action
Environmental contamination (and Lightning
other forms of natural or man-made Theft
disasters) Wilful damage
Page 35
Guide to BS 7799 Risk Assessment
Page 36
Guide to BS 7799 Risk Assessment
Page 37
Guide to BS 7799 Risk Assessment
Page 38
Guide to BS 7799 Risk Assessment
The following lists give examples for vulnerabilities in various security areas, including examples of
threats, which might exploit these vulnerabilities. The lists can provide help during the assessment of
vulnerabilities.
Page 39
Guide to BS 7799 Risk Assessment
A.3.4 System access control/Systems development and maintenance (BS 7799 Part 1: Sections 7
and 8)
Page 40
Guide to BS 7799 Risk Assessment
B.1 Tools
A variety of methods exist for undertaking risk assessment and risk management reviews ranging from
simple question and answer checklist based approaches through to structured analysis based techniques.
There are many commercially available tools which can be used to assist the assessment process. These
include both automated (computer assisted) and manual based products.
Whatever methods or products are used by the organization, they should at least address the
components, relationships between the components, and processes, as described in Sections 3 and 4 of
this guide.
Once a risk assessment review has been completed for the first time, the results of the review (assets and
their values, security requirements and risk levels, and identified controls) should be stored and
documented, for example, in a database. Software support tools can make this activity, and any future
re-assessment activity, much easier.
What to look for in a risk assessment tool? The following list gives a few ideas of criteria to be
considered when selecting a risk assessment tool:
• The tool should at least contain modules for
• data collection,
• analysis,
• output of results.
• The method upon which the selected tool works and functions should reflect the organization's
policy and overall approach to risk assessment.
• Effective reporting of the results of risk assessment is an essential part of the process if management
is to weigh the alternatives and make an appropriate, reliable and cost effective selection of controls
therefore the tool should be capable of reporting the results in a clear and accurate manner.
• The ability to maintain a history of the information collected during the data collection phase, and
of the analysis, is useful in subsequent reviews or queries.
• Documentation describing the tool is essential to its effective use and should be available.
• The tool selected should be compatible with the hardware and software in use in the organization.
Page 41
Guide to BS 7799 Risk Assessment
• Automated tools are generally efficient and error free, but some may be more difficult to install or
learn therefore it may be necessary to consider the availability of training and support for the tool.
• The effective use of the tool depends, in part, on how well the user understands the product, whether
it has been installed and configured correctly; therefore availability of guidance on installation andb
use may be essential.
The process of risk assessment has a number of stages, which have been discussed in Section 3. Those
stages are:
The objective of risk assessment is to identify and assess the risks to which the information system and
its assets are exposed, in order to identify and select appropriate and justified security controls. The
assessment is thus based on the values of the assets and the levels of the security requirements, taking
into account the existing/planned controls. This annex focuses on the first part of the risk assessment
where the risks are identified and calculated (Steps 3.1 – 3.5 in Section3).
The asset values, or potential business impacts if an incident occurs, may be assessed in several ways,
including using quantitative, e.g. monetary, and qualitative measures (which can be based on the use of
adjectives such as moderate or severe), or a combination of both. A difficult part of the risk assessment
process can be the assessment of threats and vulnerabilities. The probability of a threat occurring is
affected by the following:
• The attractiveness of the asset - applicable when a deliberate human threat is being considered;
• The ease of conversion of the asset into reward - applicable if a deliberate human threat is being
considered;
• The technical capabilities necessary to perform the threat - applicable to deliberate human threats;
• The likelihood of the threat;
Page 42
Guide to BS 7799 Risk Assessment
Many risk assessment methods make use of tables, and combine qualitative and quantitative measures.
As mentioned before, there is no right or wrong method for risk assessment. Besides ensuring that the
method used complies with the requirements laid out in BS 7799 Part 2, it is also important that the
organization uses a method with which they are comfortable, have confidence and that will produce
repeatable results. A few examples of table-based techniques are given below.
In this example, threats and vulnerabilities are not combined as reasons for incidents (as in Section 3.3
or in PD 3005), but considered separately. This is another feasible way of risk assessment and is
explained in detail e.g. in GMITS, Part 3, and also supported by several tools. If this method is chosen,
care should be taken to give appropriate consideration of legal and business requirements.
The values for assets are obtained by interviewing the selected business personnel (the ‘asset owners’)
who can speak authoritatively about the information, to determine the value and sensitivity of the asset.
The interviews facilitate assessment of the value and sensitivity of the assets in terms of the worst case
scenarios that could be reasonably expected to happen from incidents such as unauthorised disclosure,
unauthorised modification, repudiation, non-availability for varying time periods, and destruction.
In order to take into account legal and business requirements in this method, the valuation for the assets
should include issues such as:
• Personal safety;
• Personal information;
• Legal and regulatory obligations;
• Law enforcement;
• Commercial and economic interests;
• Financial loss/disruption of activities;
• Public order;
• Business policy and operations;
• Loss of goodwill.
Page 43
Guide to BS 7799 Risk Assessment
Based on this valuation, the appropriate level on a valuation scale, in this example a scale from 1 to 4,
should be identified for each of the potential losses, and each asset.
The next major activity is the completion of questionnaires for each asset, and for each of the threat s
and vulnerabilities that relate to this asset to enable the assessment of the levels of threats (likelihood of
occurrence) and levels of vulnerabilities (ease of exploitation by the threats to make incidents happen).
Each question answer attracts a score. This identifies threat and vulnerability levels on a predefined
scale (in the example below, a Low – Medium – High scale is used, as shown in the matrix below).
Information to complete the questionnaires should be gathered from interviews with appropriate
technical, personnel and accommodation people, possible physical location inspections and reviews of
documentation.
The asset values, and the threat and vulnerability levels, are matched in a matrix such as that shown
below, to identify for each combination the relevant measure of risk on a scale of 1 to 8:
For each asset, the relevant vulnerabilities and their corresponding threats are considered. If there is a
vulnerability without a corresponding threat, or a threat without corresponding vulnerability, there is
presently no risk (but care should be taken in case this situation changes!). Now the appropriate row in
the matrix is identified by the asset value, and the appropriate column is identified by the severity of the
threat and the vulnerability. For example, if the asset has the value 3, the threat is 'high' and the
vulnerability 'low', the measure of risk is 5.
The matrix can vary in terms of the number of threat levels, vulnerability levels, and the number of asset
valuation categories, and can thereby be adjusted to the needs of the organization. Additional columns
and rows will necessitate additional risk measures. Once a risk assessment review has been completed
for the first time, the results of the review (assets and their values, threat/vulnerability and risk levels,
and identified controls) should be stored and documented, for example, in a database. Software support
tools can make this activity, and any future re-assessment activity, much easier.
Page 44
Guide to BS 7799 Risk Assessment
A matrix or table can be used to relate the factors of impact (asset value) and likelihood of incident
occurrence (taking account of threats and vulnerabilities or any other security requirements that might
cause a particular incident). The first step is to evaluate the impact (asset value) on a predefined scale,
e.g., 1 through 5, of each asset (column "b" in the table below). The second step is to evaluate the
likelihood of incident occurrence on a predefined scale, e.g., 1 through 5, of each incident (column "c"
in the table below). The third step is to calculate the measure of risk by multiplying (b x c). Finally the
incidents can be ranked in order of their "exposure" factor. Note that in this example 1 is taken as the
lowest impact and the lowest likelihood of occurrence.
As shown above, this is a procedure which permits different incidents with differing impact and
likelihood of occurrence to be compared and ranked in order of priority, as shown here. In some
instances it will be necessary to associate monetary values with the empirical scales used here.
In this example, the emphasis is placed on determining which systems should be given priority, taking
into account incidents and their impacts. This is done by assessing two values for each asset and risk,
which in combination will determine the score for each asset. When all the asset score for the systems
are summed, a measure of risk to that information system is determined.
First, a value is assigned to each asset. This value relates to the potential damage, which can arise if the
asset is threatened. For each applicable threat to the asset, this asset value is assigned to the asset.
Next a frequency value is assessed for each incident, like described above in B.2.3. Then, an
asset/incident score is assigned by finding the intersect of asset value and frequency value in the table
below.
Page 45
Guide to BS 7799 Risk Assessment
Asset Value 0 1 2 3 4
Incident Frequency
Value
0 0 1 2 3 4
1 1 2 3 4 5
2 2 3 4 5 6
3 3 4 5 6 7
4 4 5 6 7 8
The final step is to total all the asset total scores for the assets of the system, producing a system score.
This can be used to differentiate between systems and to determine which system's protection should be
given priority. The following is an example:
Suppose System S has three assets A1, A2 and A3. Also suppose there are two incidents I1 and I2
applicable to systems S. Let the value of A1 be 3, similarly let the asset value of A2 be 2 and the asset
value of A3 be 4.
If for asset A1 an incident I1 frequency value is 1, the asset/incident score A1/I1 can be derived from the
table above as the intersection of asset value 3 and incident frequency value 1, i.e. 4. Similarly, for
A1/I2 let the incident likelihood of occurrence be 3, giving an A1/T2 score of 6.
Now the total asset score (A1_total) for all incidents for the particular assets considered can be
calculated, and then the total asset score is calculated for each asset and applicable threat. The total
system score is calculate by adding A1_total + A2_total + A3_total to give the overall score of the
system.
Another way of measuring the risks is to only distinguish between acceptable and not acceptable risks.
The background of this is that the measures of risks are only used to rank the risks in terms of where
action is needed most urgently, and the same can be achieved with less effort.
With this approach, the matrix used simply does not contain numbers but only As and Ns stating
whether the corresponding risk is acceptable or not. For example, the matrix in B.2.4 could be changed
into:
Page 46
Guide to BS 7799 Risk Assessment
Damage Value 0 1 2 3 4
Incident Frequency
Value
0 T T T T N
1 T T T N N
2 T T N N N
3 T N N N N
4 N N N N N
Again, this is only an example, and it is left to the user where to draw the line between acceptable and
not acceptable risks.
Page 47