Share

Risk Audit

Risk OverviewConfidentialityData Confidentiality ClassificationIntegrityAvailabilityOverall Residual RiskGenerating Risk ReportsReporting Service Data Completion

IT Risk Audit - Overview


Risks are divided into 3 categories:

Confidentiality: - The risk of unauthorised access to data
Integrity: - The risk of data being changed or incorrect
Availability: - The risk of the service or data not being available when needed

This classification is a common way of representing risks in security standards such as ISO-27001

IT Risk Audit - Confidentiality


The confidentiality risk is gauged by the type of data stored in, or captured by the service.

For instance course & subject information may be a 1, whereas student identity information might be a 7.

Each data type is given a confidentiality level in a central table (Data Confidentiality Classification).

For each service we want to set a Target which is determined by the confidentiality of the data stored, and an Actual which is determined by what controls are in place to protect the data.

Actual is determined by the answers to the following questions. The scores for each control are added up totalling in the Actual .

QuestionAnswerScore
Equipment AccessRemote Desktop0.0
Equipment AccessOther0.0
Equipment AccessTelnet0.0
Equipment AccessSSH1.0
Equipment AccessOther Encrypted1.0
Equipment AccessConsole Only2.0
Equipment AccessNot Applicable2.0
Equipment Access IP RestrictionsNo Restrictions0.0
Equipment Access IP RestrictionsRestricted to organisation IP addresses1.5
Equipment Access IP RestrictionsRestricted to engineers IP addresses1.75
Equipment Access IP RestrictionsNot Applicable2.0
Equipment Access IP RestrictionsNo Network Connection2.0
Equipment LocationOffice/Location (UnSecured)0.0
Equipment LocationOffice/Location (Secured)0.5
Equipment LocationCommunications Room0.75
Equipment LocationNot Applicable1.0
Equipment LocationSecure Data Centre (Single)1.0
Equipment LocationSecure Data Centres (Multiple)1.0
FirewallNo0.0
FirewallNot Applicable1.0
FirewallRestricted by firewall or ACL 2.0
LifecycleEmerging0.0
LifecycleRetire0.0
LifecycleContain0.5
LifecycleCore1.0
Service TypeOther0.0
Service TypeBespoke0.0
Service TypeCloud1.0
Service TypeOpen Source1.0
Service TypeCommercial Off The Shelf (COTS)1.0
User Interface ConnectionConnects Over Network (e.g. HTTP)0.0
User Interface ConnectionRuns On Local PC1.0
User Interface ConnectionConnects Over Secure Network (e.g. HTTPS)1.0
User Interface ConnectionClient/Server type connection1.0
User Interface ConnectionNot Applicable1.0
User Interface IP RestrictionsNo Restrictions0.0
User Interface IP RestrictionsRestricted to Organisation IP addresses1.5
User Interface IP RestrictionsNot Applicable1.75
User Interface IP RestrictionsNo Network Access1.75
User Interface IP RestrictionsRestricted by Port2.0
User Interface IP RestrictionsRestricted to a subset of Organisation IP addresses2.0
User Interface LoginNo Usernames or Passwords0.0
User Interface LoginCloud Usernames & Passwords (Google/Other)0.5
User Interface LoginWindows Login1.0
User Interface LoginNot Applicable1.75
User Interface LoginLocal Usernames & Passwords1.75
User Interface LoginCentral Organisation Usernames & Passwords2.0

Note the priority of a service (Service Restoration Priorities) is not taken into consideration when looking at confidentiality as any service is equally vulnerable to hacking regardless of how important it is to the organisation.

IT Risk Audit - Data Confidentiality Classification


By default data is catalogued with the following confidentiality:

Data TypeConfidentiality Score
Alumni & Advancement > Advancement Identity & Demographics > Alumni7
Alumni & Advancement > Advancement Identity & Demographics > Donor7
Alumni & Advancement > Alumni Enquiries5
Alumni & Advancement > Fundraising Campaigns5
Alumni & Advancement > Giving (to us)7
Enterprise Content > Commercial IP7
Enterprise Content > Email5
Enterprise Content > Graphics & Media5
Enterprise Content > Intranet Web Sites5
Enterprise Content > Performance Measures5
Enterprise Content > Project Register5
Enterprise Content > Public Web Sites1
Enterprise Content > Strategic Funding0
Enterprise Content > Strategic Initiatives5
Enterprise Content > Strategic Plans5
Finance > Budgets & Forecasts7
Finance > Chart of Accounts3
Finance > Financial Delegations3
Finance > Insurance > Insurance Policies3
Finance > Insurance > Liabilities & Claims5
Finance > Procurement > Invoices5
Finance > Procurement > Purchase Orders5
Finance > Procurement > Receipt/Delivery4
Finance > Procurement > Requisitions5
Finance > Procurement > Vendors3
Finance > Transactions5
Marketing > Event Management3
Marketing > Marketing Campaigns5
Marketing > Marketing Resources3
Other > Administration > Committees/Teams3
Other > Administration > Meetings5
Other > Administration > University Senate1
Other > Enterprise Governance and Compliance > Accreditation1
Other > Enterprise Governance and Compliance > Audit Plans7
Other > Enterprise Governance and Compliance > Audit Reports & Work Papers7
Other > Enterprise Governance and Compliance > Board/Committee Records7
Other > Enterprise Governance and Compliance > Contracts7
Other > Enterprise Governance and Compliance > Feedback5
Other > Enterprise Governance and Compliance > Hazards7
Other > Enterprise Governance and Compliance > Improvement Action5
Other > Enterprise Governance and Compliance > Misconduct Investigations7
Other > Enterprise Governance and Compliance > OH&S Incidents7
Other > Enterprise Governance and Compliance > Partnership Agreement/MOUs7
Other > Enterprise Governance and Compliance > Policies5
Other > Enterprise Governance and Compliance > Procedures5
Other > Enterprise Governance and Compliance > Regulatory Compliance Certifications7
Other > Enterprise Governance and Compliance > Risks7
Other > Enterprise Governance and Compliance > Services3
Other > IT Services > Service Desk Requests5
Other > IT Services > Work Orders/Change Requests3
Other > Medical Records7
Other > Organisation > Organisation Structures1
Other > Organisation > Organisation Unit Types1
Other > Organisation > Organisation Units1
Other > System Operational Data0
Other > System Operational Data > Directory Services Data5
Other > System Operational Data > Firewall Configuration Data5
Other > System Operational Data > Hostmaster Configuration Data3
Other > System Operational Data > IP and Subnet0
Other > System Operational Data > Networking Data0
Other > System Operational Data > Postmaster Configuration Data3
Other > System Operational Data > VPN Configuration Data5
Other > System Operational Data > Webmaster Configuration Data3
Property Management > Construction Project Administration5
Property Management > Facilities1
Property Management > Leases5
Property Management > Locations/Sites1
Property Management > Maintenance & Work Orders3
Property Management > Notice of Works1
Property Management > Occupancy3
Property Management > Other Assets5
Property Management > Parking Fines5
Property Management > Parking Permits5
Property Management > Room Bookings3
Property Management > Rooms1
Property Management > Security > Access > Security Access Keys5
Property Management > Security > Access > Security Access PIN5
Property Management > Security > Access > Security Access Swipe Card5
Property Management > Security > Alarms5
Property Management > Security > Incidents7
Property Management > Vehicle Fleet5
Research > Animal Information7
Research > Library Resources5
Research > Research Administration > Creative Work Management1
Research > Research Administration > Ethical Approvals5
Research > Research Administration > Patent Management1
Research > Research Administration > Plant Breeders Rights1
Research > Research Administration > Publication Management1
Research > Research Administration > Registered Design Management1
Research > Research Grants & Projects7
Research > Research Outputs > Creative Works3
Research > Research Outputs > Patents7
Research > Research Outputs > Publications3
Research > Research Outputs > Registered Designs7
Research > Research Outputs > Research Data7
Research > Research Resources5
Staff > Annual Review5
Staff > Careers1
Staff > Contact Details > Phone Numbers (fixed lines and mobiles)0
Staff > Contact Details > Physical location0
Staff > Contact Details > Telephone usage records0
Staff > Contact Details > Type of equipment (end user phone device)0
Staff > Contact Details > Voicemail accounts0
Staff > Enterprise Agreement > Hours & Leave Entitlements1
Staff > Enterprise Agreement > Payscales & Allowances1
Staff > Position Management3
Staff > Recruitment > Applications & Job Offers7
Staff > Recruitment > Vacancies & Advertisements1
Staff > Salary & Payroll7
Staff > Staff Expertise3
Staff > Staff Identity & Demographics7
Staff > Staff Leave5
Staff > Staff Placements > Classification7
Staff > Staff Placements > Hours & Work Patterns5
Staff > Staff Placements > Loading7
Staff > Staff Placements > Organisation Unit3
Staff > Staff Placements > Split appointments0
Staff > Staff Qualifications3
Staff > Timesheets5
Staff > Training History5
Staff > Work Allocation > Academic Workload Models5
Staff > Work Allocation > Staff Rosters5
Student > Configuration Items3
Student > Student & Academic Careers > Graduation Eligibility5
Student > Student & Academic Careers > RHD Candidatures3
Student > Student & Academic Careers > Student Grievances7
Student > Student & Academic Careers > Student Program Enrolments > Class Sign-Ons7
Student > Student & Academic Careers > Student Program Enrolments > Course Enrolments5
Student > Student & Academic Careers > Student Program Enrolments > Evaluations7
Student > Student & Academic Careers > Student Program Enrolments > Results5
Student > Student Applications > Program Applications5
Student > Student Applications > Scholarship Applications > Academic Scholarships5
Student > Student Applications > Scholarship Applications > Equity/Diversity Scholarships7
Student > Student Applications > Student Offers & Admissions5
Student > Student Applications > Student Prior Learning5
Student > Student Enquiries5
Student > Student Identity & Demographics > Admitted Students7
Student > Student Identity & Demographics > Prospective Students7
Student > Student Misconduct7
Teaching & Learning > Academic Programs1
Teaching & Learning > Course Material & Resources5
Teaching & Learning > Course Plans1
Teaching & Learning > Courses1
Teaching & Learning > Teaching Periods1

IT Risk Audit - Integrity


The integrity requirements for the service depends on the system that is using it. Getting a students name wrong in the student portal may be embarrassing, but it's far more important it is correct when printing their diploma.

For each service we want to set a Target which is determined by answers to the folloiwng questions:

QuestionAnswerIntegrity Target
Data AccuracyNot Applicable0
Data AccuracyNot Important0
Data AccuracyModerately Important4
Data AccuracyVery Important7
Data AccuracyVitally Important10

And an Actual which is determined by what controls are in place to protect the data. The score of each control is added up to make the Actual

QuestionAnswerIntegrity Score
Application LogsNo0.0
Application LogsYes0.50
Application LogsYes and logs are monitored for unusual activity1.0
Backup & RecoveryNo Backups0.0
Backup & RecoveryIrregular Backups0.50
Backup & RecoveryNot Applicable1.0
Backup & RecoveryScheduled Backups1.0
Equipment AccessTelnet0.0
Equipment AccessRemote Desktop0.0
Equipment AccessOther0.0
Equipment AccessSSH1.0
Equipment AccessOther Encrypted1.0
Equipment AccessNot Applicable2.0
Equipment AccessConsole Only2.0
Equipment Access IP RestrictionsNo Restrictions0.0
Equipment Access IP RestrictionsRestricted to organisation IP addresses0.25
Equipment Access IP RestrictionsNot Applicable0.50
Equipment Access IP RestrictionsRestricted to engineers IP addresses0.50
Equipment Access IP RestrictionsNo Network Connection0.75
Equipment LocationOffice/Location (Unsecured)0.0
Equipment LocationOffice/Location (Secured)0.25
Equipment LocationCommunications Room0.50
Equipment LocationNot Applicable0.75
Equipment LocationSecure Data Centre (Single)0.75
Equipment LocationSecure Data Centres (Multiple)0.75
FirewallNo0.0
FirewallNot Applicable1.0
FirewallRestricted by firewall or ACL 1.0
Incident LoggingNo Formal Process0.0
Incident LoggingOther0.50
Incident LoggingIncident Management System e.g. LANDesk1.0
LifecycleEmerging0.0
LifecycleRetire0.0
LifecycleContain0.50
LifecycleCore1.0
Service MonitoringNo0.0
Service MonitoringNot Applicable0.50
Service MonitoringYes0.50
Service MonitoringYes With email or SMS alerting1.0
Service TypeOther0.0
Service TypeBespoke0.0
Service TypeCloud1.0
Service TypeCommercial Off The Shelf (COTS)1.0
Service TypeOpen Source1.0
User Interface ConnectionConnects Over Network (e.g. HTTP)0.0
User Interface ConnectionNot Applicable1.0
User Interface ConnectionRuns On Local PC1.0
User Interface ConnectionClient/Server type connection1.0
User Interface ConnectionConnects Over Secure Network (e.g. HTTPS)1.0
User Interface IP RestrictionsNo Restrictions0.0
User Interface IP RestrictionsRestricted to Organisation IP addresses1.0
User Interface IP RestrictionsRestricted by Port1.0
User Interface IP RestrictionsRestricted to a subset of Organisation IP addresses1.25
User Interface IP RestrictionsNot Applicable1.50
User Interface IP RestrictionsNo Network Access1.50
User Interface LoginNo Usernames or Passwords0.0
User Interface LoginCloud Usernames & Passwords (Google/Other)0.25
User Interface LoginWindows Login0.50
User Interface LoginLocal Usernames & Passwords0.75
User Interface LoginNot Applicable1.0
User Interface LoginCentral Organisation Usernames & Passwords1.0

Integrity Workflow

When the Target and the Actual are known, the following workflow is performed to calculate the residual integrity risk.

The integrity workflow uses the service priority, which is how important the service is to the organisation. More informartion here: Service Restoration Priorities

IT Risk Audit - Availability


Availability, or uptime will vary for each service. The eLearning system might need to be up 24x7, whilst the time sheeting system doesn't have to be as reliable.

For each service we want to set a Target which is determined by answers to the following questions:

QuestionAnswerAvailability Target
Business Impact of Service OutageThere Will Be No Impact On The Business If This Service Is Down0
Business Impact of Service OutageService Can Be Down For No More Than 1 Day5
Business Impact of Service OutageService Can Be Down For No More Than 4 Hours7
Business Impact of Service OutageService Can Be Down For No More Than 1 Hour8
Business Impact of Service OutageService Can Only Be Down For Scheduled Maintenance8
Business Impact of Service OutageService Cannot Be Down For Any Period9

And the following is added to the availability target

QuestionAnswerAvailability Target
Service Uptime hour requirementsBusiness Hours Only0.5
Service Uptime hour requirements24 Hours1

The Actual which is determined by what controls are in place to keep the service available. The score of each control is added up to make the Actual

QuestionAnswerIntegrity Score
Application LogsNo0.0
Application LogsYes0.50
Application LogsYes and logs are monitored for unusual activity1.0
Backup & RecoveryNo Backups0.0
Backup & RecoveryIrregular Backups0.50
Backup & RecoveryNot Applicable1.0
Backup & RecoveryScheduled Backups1.0
Equipment AccessTelnet0.0
Equipment AccessRemote Desktop0.0
Equipment AccessOther0.0
Equipment AccessSSH1.0
Equipment AccessOther Encrypted1.0
Equipment AccessNot Applicable2.0
Equipment AccessConsole Only2.0
Equipment Access IP RestrictionsNo Restrictions0.0
Equipment Access IP RestrictionsRestricted to organisation IP addresses0.25
Equipment Access IP RestrictionsNot Applicable0.50
Equipment Access IP RestrictionsRestricted to engineers IP addresses0.50
Equipment Access IP RestrictionsNo Network Connection0.75
Equipment LocationOffice/Location (UnSecured)0.0
Equipment LocationOffice/Location (Secured)0.25
Equipment LocationCommunications Room0.50
Equipment LocationNot Applicable0.75
Equipment LocationSecure Data Centre (Single)0.75
Equipment LocationSecure Data Centres (Multiple)0.75
FirewallNo0.0
FirewallNot Applicable1.0
FirewallRestricted by firewall or ACL 1.0
Incident LoggingNo Formal Process0.0
Incident LoggingOther0.50
Incident LoggingIncident Management System e.g. LANDesk1.0
LifecycleEmerging0.0
LifecycleRetire0.0
LifecycleContain0.50
LifecycleCore1.0
Service MonitoringNo0.0
Service MonitoringNot Applicable0.50
Service MonitoringYes0.50
Service MonitoringYes With email or SMS alerting1.0
Service TypeOther0.0
Service TypeBespoke0.0
Service TypeCloud1.0
Service TypeCommercial Off The Shelf (COTS)1.0
Service TypeOpen Source1.0
User Interface ConnectionConnects Over Network (e.g. HTTP)0.0
User Interface ConnectionNot Applicable1.0
User Interface ConnectionRuns On Local PC1.0
User Interface ConnectionClient/Server type connection1.0
User Interface ConnectionConnects Over Secure Network (e.g. HTTPS)1.0
User Interface IP RestrictionsNo Restrictions0.0
User Interface IP RestrictionsRestricted to Organisation IP addresses1.0
User Interface IP RestrictionsRestricted by Port1.0
User Interface IP RestrictionsRestricted to a subset of Organisation IP addresses1.25
User Interface IP RestrictionsNot Applicable1.50
User Interface IP RestrictionsNo Network Access1.50
User Interface LoginNo Usernames or Passwords0.0
User Interface LoginCloud Usernames & Passwords (Google/Other)0.25
User Interface LoginWindows Login0.50
User Interface LoginLocal Usernames & Passwords0.75
User Interface LoginNot Applicable1.0
User Interface LoginCentral Organisation Usernames & Passwords1.0

Availability Workflow

When the Target and the Actual are known, the following workflow is performed to calculate the residual availability risk.

The availability workflow uses the service priority, which is how important the service is to the organisation. More informartion here: Service Restoration Priorities

IT Risk Audit - Overall Residual Risk


Once the Confidentiality, the Integrity and the Availability risks are known the highest of the three becomes the overall service residual risk.

Generating Complete Risk Reports




To generate a complete risk report use the Risk Report link in the Reports side menu.



By combining all the services, the service dependencies, the target CIA's, the actual CIA's, the data stored and the priority of each service, ServiceView can generate a complete risk report.

Unlike the "Risk Classification" tab for each service this report takes into count the risks of underpinning services and how that might affect the availability of high priority services.

The first page is a summary of risks and high priority services, then there is a one page report on each service indicating its risk level, a service register documenting each service and its purpose. Following those is an Information Asset Register detailing which IT services store which data types, this is required by law in most countries, and lastly a Technology Asset Register organising service by their technology.

Generating a Report for Risk Data Completion


To create a report for viewing the completion status of the risk data per service, the user needs to logged in as a admin user.

Click on the Admin tab and go to Reports.



On the reports page, click the drop down menu and choose Service Field Population Percentage. Then click generate report.



This will list the service name, complete percent, service owner and technical owner.

The data can then be downloaded into a spread sheet by clicking the download data button in the top right.