Information Security Work Flow
Click on the titles for each sectionsection, and it will take you to the relevant sectionsections of the User Guide. The workflow below is the recommended workflow for completing informationdata ininput into Abriska to provide the outputs for an ISO 27001:2022 compliant risk assessment.
Set up
- Divisions
- Contacts
- Documents
- Risk Appetite
Assets
- Identifying information assets
- Identifying supporting assets
- Asset relationships
- Asset CIA scoring
Threats
- Mapping to Assets
- Mapping to Controls
- Scoring
Controls
- Control Applicability
- Control Ownership
- Mapping to assets
- Control Maturity Assessment
Risk Assessment
- Risk Assessment set up
- Risk Assessment steps
- Specific vulnerabilities
- Vulnerabilities Risk Treatment
Risk Register
- Risk Register Breakdown
- Risk decisions
Risk Treatment Plan
- Creating Risk actions
- Understanding risk treatment decisions
Reporting
- Statement of applicability
- Risk Register
- Risk Treatment Plan
Return to Abriska User Guides