{"id":16,"date":"2022-04-12T00:52:01","date_gmt":"2022-04-12T00:52:01","guid":{"rendered":"http:\/\/tcm.gov.to\/?page_id=16"},"modified":"2022-08-18T01:22:21","modified_gmt":"2022-08-18T01:22:21","slug":"risk-treatment","status":"publish","type":"page","link":"https:\/\/tcm.gov.to\/?page_id=16","title":{"rendered":"Risk Treatment"},"content":{"rendered":"<div id=\"themify_builder_content-16\" data-postid=\"16\" class=\"themify_builder_content themify_builder_content-16 themify_builder\">\n    \t<!-- module_row -->\n\t<div   class=\"themify_builder_row module_row clearfix module_row_0 themify_builder_16_row module_row_16-0 tb_2g0o239\">\n\t    \t    <div class=\"row_inner col_align_top\" >\n\t\t\t<div  class=\"module_column tb-column col-full first tb_16_column module_column_0 module_column_16-0-0 tb_uu13240\">\n\t    \t    \t        <div class=\"tb-column-inner\">\n\t\t    <!-- module text -->\n<div  class=\"module module-text tb_wi9m998    \">\n            <div  class=\"tb_text_wrap\">\n    <h1 style=\"text-align: center;\">Risk Treatment and Security Controls<\/h1>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-151 aligncenter\" src=\"http:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/1234-1-293x300.jpg\" alt=\"\" width=\"418\" height=\"428\" srcset=\"https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/1234-1-293x300.jpg 293w, https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/1234-1-1000x1024.jpg 1000w, https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/1234-1-768x787.jpg 768w, https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/1234-1.jpg 1029w\" sizes=\"auto, (max-width: 418px) 100vw, 418px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 3. Risk treatment activity according to ISO\/IEC 27005:2018<\/em><\/p>\n<p>In general, risk treatment gives four options to consider for each and every identified risk. These options are risk modification, retention, avoidance and risk sharing.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->\n<!-- module text -->\n<div  class=\"module module-text tb_6fvz265    \">\n            <div  class=\"tb_text_wrap\">\n    <h4>Risk modification\u00a0<\/h4>\n<p>The level of risk should be managed by introducing, removing or altering security controls so that the residual risk can be reassessed as being acceptable.\u00a0<\/p>\n<p>Appropriate and justified controls should be selected to meet the requirements identified by the risk assessment and risk treatment. This selection should also take account of the cost and timeframe for implementation of controls, or technical, environmental and cultural aspects.\u00a0<\/p>\n<p>In general, controls can provide one or more of the following types of protection: correction, elimination, prevention, impact minimization, deterrence, detection, recovery, monitoring and awareness. During control selection, it is important to weigh the cost of acquisition, implementation, administration, operation, monitoring, and maintenance of the controls against the value of the assets being protected.\u00a0\u00a0<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->\n<!-- module text -->\n<div  class=\"module module-text tb_8o4p357    \">\n            <div  class=\"tb_text_wrap\">\n    <h4>Risk retention<\/h4>\n<p>The decision on retaining the risk without further action should be taken depending on risk evaluation.\u00a0<\/p>\n<p>If the level of risk meets the risk acceptance criteria, there is no need for implementing additional controls and the risk can be retained.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->\n<!-- module text -->\n<div  class=\"module module-text tb_vlxi686    \">\n            <div  class=\"tb_text_wrap\">\n    <h4>Risk avoidance<\/h4>\n<p>The activity or condition that gives rise to the particular risk should be avoided.\u00a0<\/p>\n<p>When the identified risks are considered too high, or the costs of implementing other risk treatment options exceed the benefits, a decision can be made to avoid the risk completely, by withdrawing from a planned or existing activity or set of activities, or changing the conditions under which the activity is operated. For example, for risks caused by nature it can be the most cost-effective alternative to physically move the information processing facilities to a place where the risk does not exist or is under control.\u00a0\u00a0<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->\n<!-- module text -->\n<div  class=\"module module-text tb_2893736    \">\n            <div  class=\"tb_text_wrap\">\n    <h4>Risk sharing\u00a0<\/h4>\n<p>The risk should be shared with another party that can most effectively manage the particular risk depending on the risk evaluation.\u00a0<\/p>\n<p>Risk sharing involves a decision to share certain risks with external parties. Risk sharing can create new risks or modify existing, identified risks. Therefore, additional risk treatment may be necessary. Sharing can be done by an insurance that covers the consequences, or by sub-contracting a partner whose role is to monitor the information system and take immediate action to stop an attack before it makes a defined level of damage.\u00a0<\/p>\n<p>It should be noted that it can be possible to share the responsibility to manage risks but it is not normally possible to share the liability of an impact.\u00a0\u00a0<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->\n<!-- module text -->\n<div  class=\"module module-text tb_5mh4807    \">\n            <div  class=\"tb_text_wrap\">\n    <p class=\"u-text u-text-1\">Specific risk treatment starts with selecting the appropriate treatment option \u2013 risk modification, retention, avoidance or sharing. According to the chosen risk treatment option, security controls for the system can now be selected and tailored to achieve the desired security objectives. Once the applicable security controls have been identified for a system, the implementation process follows. To facilitate the risk treatment process, a tool (see <a href=\"http:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/08\/Copy-of-20220805_WP5_Annex-1-Risk-Register_v0-2.xlsx\">Annex 1<\/a>) has been created that helps to record details about the implementation status of the control, required resources, responsible persons and deadlines of control implementation.\u00a0<\/p>\n<p>The following listed security controls should be considered as a baseline, and not be considered as an exhaustive list of applicable security controls.\u00a0<\/p>\n<p>The security controls listed in this manual cover the following domains:\u00a0\u00a0<\/p>\n<ul class=\"u-text u-text-2\">\n<li>Information security governance and management<\/li>\n<li>Mobile devices and remote access\u00a0<\/li>\n<li>Human resources security (including training)<\/li>\n<li>Asset management\u00a0<\/li>\n<li>Access control\u00a0<\/li>\n<li>Cryptography\u00a0<\/li>\n<li>Physical and environmental security\u00a0<\/li>\n<li>Operations security and management of end points<\/li>\n<li>Network security\u00a0<\/li>\n<li>Logging and monitoring \u00a0<\/li>\n<li>Backup of systems and data\u00a0<\/li>\n<li>Vulnerability and patch management\u00a0<\/li>\n<li>Systems development and maintenance\u00a0<\/li>\n<li>Supplier relationship management\u00a0<\/li>\n<li>Business continuity\u00a0<\/li>\n<li>Information security incident management<\/li>\n<\/ul>    <\/div>\n<\/div>\n<!-- \/module text -->\n\t        <\/div>\n\t    \t<\/div>\n\t\t    <\/div>\n\t    <!-- \/row_inner -->\n\t<\/div>\n\t<!-- \/module_row -->\n\t\t<!-- module_row -->\n\t<div   class=\"themify_builder_row module_row clearfix module_row_1 themify_builder_16_row module_row_16-1 tb_h8ul794\">\n\t    \t    <div class=\"row_inner col_align_top\" >\n\t\t\t<div  class=\"module_column tb-column col-full first tb_16_column module_column_0 module_column_16-1-0 tb_qsf8795\">\n\t    \t    \t<\/div>\n\t\t    <\/div>\n\t    <!-- \/row_inner -->\n\t<\/div>\n\t<!-- \/module_row -->\n\t<\/div>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Risk Treatment and Security Controls Figure 3. Risk treatment activity according to ISO\/IEC 27005:2018 In general, risk treatment gives four options to consider for each and every identified risk. These options are risk modification, retention, avoidance and risk sharing. Risk modification\u00a0 The level of risk should be managed by introducing, removing or altering security controls [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-16","page","type-page","status-publish","hentry","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"builder_content":"<h1 style=\"text-align: center;\">Risk Treatment and Security Controls<\/h1> <p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/1234-1-293x300.jpg\" alt=\"\" width=\"418\" height=\"428\" srcset=\"https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/1234-1-293x300.jpg 293w, https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/1234-1-1000x1024.jpg 1000w, https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/1234-1-768x787.jpg 768w, https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/1234-1.jpg 1029w\" sizes=\"auto, (max-width: 418px) 100vw, 418px\" \/><\/p> <p style=\"text-align: center;\"><em>Figure 3. Risk treatment activity according to ISO\/IEC 27005:2018<\/em><\/p> <p>In general, risk treatment gives four options to consider for each and every identified risk. These options are risk modification, retention, avoidance and risk sharing.<\/p>\n<h4>Risk modification\u00a0<\/h4> <p>The level of risk should be managed by introducing, removing or altering security controls so that the residual risk can be reassessed as being acceptable.\u00a0<\/p> <p>Appropriate and justified controls should be selected to meet the requirements identified by the risk assessment and risk treatment. This selection should also take account of the cost and timeframe for implementation of controls, or technical, environmental and cultural aspects.\u00a0<\/p> <p>In general, controls can provide one or more of the following types of protection: correction, elimination, prevention, impact minimization, deterrence, detection, recovery, monitoring and awareness. During control selection, it is important to weigh the cost of acquisition, implementation, administration, operation, monitoring, and maintenance of the controls against the value of the assets being protected.\u00a0\u00a0<\/p>\n<h4>Risk retention<\/h4> <p>The decision on retaining the risk without further action should be taken depending on risk evaluation.\u00a0<\/p> <p>If the level of risk meets the risk acceptance criteria, there is no need for implementing additional controls and the risk can be retained.<\/p>\n<h4>Risk avoidance<\/h4> <p>The activity or condition that gives rise to the particular risk should be avoided.\u00a0<\/p> <p>When the identified risks are considered too high, or the costs of implementing other risk treatment options exceed the benefits, a decision can be made to avoid the risk completely, by withdrawing from a planned or existing activity or set of activities, or changing the conditions under which the activity is operated. For example, for risks caused by nature it can be the most cost-effective alternative to physically move the information processing facilities to a place where the risk does not exist or is under control.\u00a0\u00a0<\/p>\n<h4>Risk sharing\u00a0<\/h4> <p>The risk should be shared with another party that can most effectively manage the particular risk depending on the risk evaluation.\u00a0<\/p> <p>Risk sharing involves a decision to share certain risks with external parties. Risk sharing can create new risks or modify existing, identified risks. Therefore, additional risk treatment may be necessary. Sharing can be done by an insurance that covers the consequences, or by sub-contracting a partner whose role is to monitor the information system and take immediate action to stop an attack before it makes a defined level of damage.\u00a0<\/p> <p>It should be noted that it can be possible to share the responsibility to manage risks but it is not normally possible to share the liability of an impact.\u00a0\u00a0<\/p>\n<p>Specific risk treatment starts with selecting the appropriate treatment option \u2013 risk modification, retention, avoidance or sharing. According to the chosen risk treatment option, security controls for the system can now be selected and tailored to achieve the desired security objectives. Once the applicable security controls have been identified for a system, the implementation process follows. To facilitate the risk treatment process, a tool (see <a href=\"http:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/08\/Copy-of-20220805_WP5_Annex-1-Risk-Register_v0-2.xlsx\">Annex 1<\/a>) has been created that helps to record details about the implementation status of the control, required resources, responsible persons and deadlines of control implementation.\u00a0<\/p> <p>The following listed security controls should be considered as a baseline, and not be considered as an exhaustive list of applicable security controls.\u00a0<\/p> <p>The security controls listed in this manual cover the following domains:\u00a0\u00a0<\/p> <ul> <li>Information security governance and management<\/li> <li>Mobile devices and remote access\u00a0<\/li> <li>Human resources security (including training)<\/li> <li>Asset management\u00a0<\/li> <li>Access control\u00a0<\/li> <li>Cryptography\u00a0<\/li> <li>Physical and environmental security\u00a0<\/li> <li>Operations security and management of end points<\/li> <li>Network security\u00a0<\/li> <li>Logging and monitoring \u00a0<\/li> <li>Backup of systems and data\u00a0<\/li> <li>Vulnerability and patch management\u00a0<\/li> <li>Systems development and maintenance\u00a0<\/li> <li>Supplier relationship management\u00a0<\/li> <li>Business continuity\u00a0<\/li> <li>Information security incident management<\/li> <\/ul>","_links":{"self":[{"href":"https:\/\/tcm.gov.to\/index.php?rest_route=\/wp\/v2\/pages\/16","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tcm.gov.to\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/tcm.gov.to\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/tcm.gov.to\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tcm.gov.to\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=16"}],"version-history":[{"count":7,"href":"https:\/\/tcm.gov.to\/index.php?rest_route=\/wp\/v2\/pages\/16\/revisions"}],"predecessor-version":[{"id":306,"href":"https:\/\/tcm.gov.to\/index.php?rest_route=\/wp\/v2\/pages\/16\/revisions\/306"}],"wp:attachment":[{"href":"https:\/\/tcm.gov.to\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=16"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}