TechTarget.com/searchsecurity

https://www.techtarget.com/searchsecurity/tip/5-steps-to-determine-residual-risk-during-the-assessment-process

5 steps to determine residual risk during the assessment process

By Judith Myerson

Governance, risk and compliance-related residual risks are risk factors left over after an organization applies security controls to ensure compliance with laws and regulations. It's important to remember that these residual risks might be acceptable with regard to one regulation but not others.

Residual risks might eventually become more tolerable due to changes in compliance data requirements and/or risk management methodologies. For example, security controls to offset risk may become more cost-effective and/or technologically advanced as risk assessments evolve, thereby lowering the threat level.

Organizations can best determine residual risks after undertaking the following risk mitigation efforts:

To complete the risk assessment, organizations should undertake mitigation steps and report the results -- including the status of any residual risk instance -- to corporate leadership and then review residual risks and update them accordingly.

Here are five steps to handle residual risks as part of the risk assessment process.

Step 1. Identify residual risks

First, it's important to identify initial risks, whether you have rated them as weak, moderate or high. Once that's completed, you can implement security controls.

You should deem residual risks high if security controls for the initial risks are weak; moderate if security controls for high initial risks are adequate or if security controls for the low initial risks are weak; and low if security controls for the high, medium or low initial risks are strong or if security controls for the medium- or low-rated initial risks are adequate.

Step 2. Identify relevant GRC requirements

You should determine your organization's GRC requirements by checking the business's relevant regulations. Some examples of regulatory requirements include those under the Sarbanes-Oxley Act, the Gramm-Leach-Bliley Act and HIPAA. If relevant, privacy compliance regulations, such as the EU's GDPR and the California Consumer Privacy Act, should be considered.

Each of these regulations -- and many others -- has different data retention requirements for different document types. Organizations must determine what specific data requirements apply to them.

Step 3. Identify security controls

Your next step is to identify applied security controls and any resulting residual risk. These risk controls include the following:

Step 4. Determine how to handle unacceptable residual risks

Once you have reviewed security controls and determined your residual risks, offset these threats by considering the following options:

Step 5. Apply any changes to residual risk status

Determine risk tolerance by gathering a list of residual risks that are unacceptable after you have applied security controls to the initial risks. For each of these residual risks, periodically check for any changes to the applied security controls.

Then, compare alternative, cheaper security controls from current and new vendors. Determine the ROI of each, and if possible, apply the security control changes with the highest ROI.

Following these five steps can help you determine whether you should accept or reject residual risk. Remember to keep your eyes open: Cost-effective security controls that are currently unavailable may be on the market during your next round of risk assessments.

28 May 2020

All Rights Reserved, Copyright 2000 - 2025, TechTarget | Read our Privacy Statement