It is now considered good practice to perform risk assessments - or at very least to acknowledge that they should be done.
Unfortunately, far too often we see that businesses only conduct risk assessments in order to satisfy some sort of compliance requirement or other types of requirements (audit, contract, statute etc.). If you are lucky, you might have the resources to conduct them once per year.
Typically, you will conduct your risk assessment, speak with your organisation and then finally you submit a fancy report. And then your "project" is done. However, it would be wrong to consider the risk assessment as a project. Risk assessments should be a process. It is a process that involves feedback and continual adjustments.
» Our risk assessment is the basis of our information security and it permeates our entire ISMS
» We need to use our risk management plan in selecting the right security measures in our company
» Our risk assessment helps to ensure that management is on a firm footing and that the company's needs are identified
And how do we do that?
We must make an active choice to apply the risk assessment. We need to change our culture with regards to risk assessments.
Specifically, as a part of the risk assessment, we need to do the following:
Risk treatment, as it is called in ISO27001/5, is the part of the process that brings the risk assessment results into the rest of our ISMS.
When we treat identified risks that are beyond our risk acceptance criteria, we do the following:
If we apply or comply with ISO27001, the risks we have identified, as well as the identified action plans, can be linked to our "Statement of Applicability". This ensures we have a common thread throughout our security measures and controls.
The risk treatment plans may also set out inter alia requirements on how we implement:
In conclusion, I would like to remind you that a risk assessment is not just something to do for the auditor; it is something you need to do for yourself. It is an extremely important and powerful tool for implementing information security - so use it!