description |
---|
This is the place to define the context for risk and compliance management. All items here are optional. |
A threat is the potential cause of an incident that may result in a breach of information security or compromise business operations (ISO 27000). Threats are used to clarify the aim of a requirement or an applied control. They are informative, assessments can be realized without using them.
Threats are can be imported from a library, but you can create your own threats in the global domain or in a specific domain.
Reference controls are templates for applied controls. They facilitate the creation of an applied control, and help to have consistent applied controls. They are optional, but recommended.
Reference controls can be provided by security frameworks that are imported from a library, but you can create your own reference controls in the global domain or in a specific domain.
Applied controls are fundamental objects for compliance and remediation. They can derive from a reference control, which provides better consistency, or be independent.
Applied controls are always defined by the entity and can be attached to the global domain or in a specific domain.
An asset refers to any piece of information that holds value to an organization. These assets can be digital or physical and encompass a wide range of data types, including customer records, financial information, intellectual property, employee records, proprietary software, marketing materials, and more.
Assets are always defined by the entity and can be attached to the global domain or in a specific domain.
There are two types of assets:
- Primary assets are core resources directly contributing to an organization's main objectives, like machinery or intellectual property.
- Support assets indirectly aid primary functions, such as IT systems or administrative services.