CALL US TODAY : (0)20 8798 9282

Risk Assessment and Treatment Process


The Information Security Manager is responsible for carrying out risk assessments wherever they are required by the ISMS or when significant changes are proposed or occur.

Information Asset

Determine the asset category and the asset:

  • People (including staff, customers, subscribers, suppliers and any other person within scope that is involved with storing or processing of information)
  • Hardware, Infrastructure / Utilities & Physical items (including computer and communications equipment, media (paper, tapes, CDs and disks), and other technical equipment (power supplies, air-conditioning units), and buildings that are used to support the processing of information)
  • Software and firmware (including application software, system software, development tools and utilities, databases)
  • Information (Including customer information, supplier information, proprietary information, organizational information)
  • Paper Documentation
  • Processes & Services (including business processes, application specific activities, computing and communications services and other technical services supporting the processing of information (heating, lighting, power, air-conditioning services)
  • Third party suppliers
  • Company Image & Reputation

Number of assets

Determine number of assets. If you have a number of assets that are of the same type, these can be assessed as a group (i.e. laptops with same software).

Process based risk assessment

Risks can also be identified without being specifically related to an asset or asset category.

Risk Assessment

Identify the risks

The risks to AnyCo’s information are identified under the headings of risks to availability, confidentiality and integrity, and are documented in the the Risk Assessment and Risk Treatment Plan (Office 365 online tool).


The impact that losses of availability, confidentiality and integrity might have on AnyCo are determined and documented.

Assess (score) the risk

The impact that might result from the loss of availability, confidentiality or integrity, for each of these risks, is assessed.

The realistic likelihood that each of these risks might occur is assessed.

The risk levels are determined using the formula: LIKELIHOOD + IMPACT = RISK using 3×3 matrix provided below.


The risk levels are determined using the formula: LIKELIHOOD x IMPACT = RISK using 4×4 matrix provided below.


Risk Priority

3×3 Matrix Choice

4×4 Matrix Choice

Please note that the 4×4 matrix choice has not yet been implemented within the SharePoint app. It is expected that this functionality will be available as a choice before the end of 2020.

All risks are reviewed by the Information Security Comittee and are prioritised based on the risk score.

Treatment options are:

  1. Selection of controls
  2. Transfer of risks to a third party
  3. Risk avoidance
  4. Risk acceptance

Risk Treatment Plan

Mitigating action

For each of the risks, identify the possible options for treating and document which mitigating action is going to be taken.

Select controls for treatment of the risks

Appropriate control objectives are selected or designed according to the specific needs of the risk and the organization and controls to achieve those objectives are selected from a variety of sources.

Controls selected are compared against those from Annex A of ISO27001:2013 to ensure that none have been missed and are documented in the Risk Assessment and Risk Treatment Plan.

These control objectives and controls are then summarised in the Statement of Applicability.

Treatment Planning

For each risk, identify the risk owner. The risk owner should be a manager within AnyCo.

The risk owner will plan the risk mitigation by establishing resources required and a target date for the implementation of the controls.

Residual risk

Following the mitigating action for the risk perform a new risk assessment and rescore likelihood and impact, and a new risk score is calculated.

If the residual risk is accepted by management this is recorded.



An asset is broadly defined as ‘anything, which has value to an organisation, its business operations and its continuity’. If the confidentiality, integrity or availability of an asset is compromised then there will be an impact felt by the business or other stakeholders.


CIA refers to Confidentiality, Integrity and Availability. Confidentiality of information, integrity of information and availability of information. Many security measures are designed to protect one or more facets of the CIA triad.


Confidentiality is concerned with protecting the information asset from access or disclosure to unauthorized parties.


Integrity means maintaining and assuring the accuracy and consistency of information assets over their entire life-cycle.  This means that data cannot be modified in an unauthorized or undetected manner.


Availability refers to ensuring that authorized parties are able to access the information asset when needed.


In general terms an information risk can be thought of as the likelihood that a threat will exploit a vulnerability leading to a business impact.


The potential danger that a vulnerability may be exploited intentionally, triggered accidentally, or otherwise exercised.

Threat Agent

A means or method used to exploit a vulnerability in a system, operation or facility.


A potential or actual flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a compromise of the integrity, availability, or confidentiality of an information asset.


Adverse change to the level of business objectives achieved.


Is the probability that a threat caused by a threat-source will occur against a vulnerability.

Risk Treatment

Risk Treatment is the process of selecting and implementing of measures to modify risk.


Actions taken to lessen the probability, negative consequences, or both, associated with a risk.  This enables you to continue with the activity/objective but with controls and actions in place to maintain the risk at an acceptable level.


Transferring the risk with a third party to lessen the burden of loss such as the use of an insurance policy.


Acceptance of the burden of loss or benefit of gain from a particular risk, usually taken if you have a limited ability to mitigate the risk or the cost of mitigation may be disproportionate to the benefit gained.


Some risks can only be contained at an acceptable level by terminating the activity, alternatively senior management or the executive can dismiss (terminate) the risk.

Intangible Asset

An asset that is not physical in nature. Corporate intellectual property (items such as patents, trademarks, copyrights, business methodologies), goodwill and brand recognition are all common intangible assets in today’s marketplace. An intangible asset can be classified as either indefinite or definite depending on the specific Adapt of that asset. A company brand name is considered to be an indefinite asset, as it stays with the company as long as the company continues operations. However, if a company enters a legal agreement to operate under another company’s patent, with no plans of extending the agreement, it would have a limited life and would be classified as a definite asset.