2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet113/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   109   110   111   112   113   114   115   116   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Risk Identification
The next phase of the BIA is the identification of risks posed to your organization. Some ele-
ments of this organization-specific list may come to mind immediately. The identification of 
other, more obscure risks might take a little creativity on the part of the BCP team.
Risks come in two forms: natural risks and man-made risks. The following list includes 
some events that pose natural threats:

Violent storms/hurricanes/tornadoes/blizzards

Lightning strikes

Earthquakes

Mudslides/avalanches

Volcanic eruptions
Man-made threats include the following events:

Terrorist acts/wars/civil unrest

Theft/vandalism

Fires/explosions

Prolonged power outages

Building collapses

Transportation failures

Internet disruptions

Service provider outages
Remember, these are by no means all-inclusive lists. They merely identify some common 
risks that many organizations face. You may want to use them as a starting point, but a 
full listing of risks facing your organization will require input from all members of the BCP 
team.
The risk identification portion of the process is purely qualitative in nature. At this 
point in the process, the BCP team should not be concerned about the likelihood that 
each type of risk will actually materialize or the amount of damage such an occur-
rence would inflict upon the continued operation of the business. The results of this 
analysis will drive both the qualitative and quantitative portions of the remaining
BIA tasks.


108
Chapter 3 

Business Continuity Planning
Business Impact assessment and the Cloud
As you conduct your business impact assessment, don’t forget to take any cloud vendors 
on which your organization relies into account. Depending on the nature of the cloud 
service, the vendor’s own business continuity arrangements may have a critical impact 
on your organization’s business operations as well.
Consider, for example, a firm that outsourced email and calendaring to a third-party
Software as a service (SaaS) provider. Does the contract with that provider include details 
about the provider’s SLA and commitments for restoring operations in the event of a 
disaster?
Also remember that a contract is not normally sufficient due diligence when choosing a 
cloud provider. You should also verify that they have the controls in place to deliver on 
their contractual commitments. Although it may not be possible for you to physically visit 
the vendor’s facilities to verify their control implementation, you can always do the next 
best thing—send someone else!
Now, before you go off identifying an emissary and booking flights, realize that many 
of your vendor’s customers are probably asking the same question. For this reason, the 
vendor may have already hired an independent auditing firm to conduct an assessment of 
their controls. They can make the results of this assessment available to you in the form 
of a Service Organization Control (SOC) report.
Keep in mind that there are three different versions of the SOC report. The simplest of 
these, an SOC-1 report, covers only internal controls over financial reporting. If you want 
to verify the security, privacy, and availability controls, you’ll want to review either an 
SOC-2 or SOC-3 report. The American Institute of Certified Public Accountants (AICPA) 
sets and maintains the standards surrounding these reports to maintain consistency 
between auditors from different accounting firms.
For more information on this topic, see the AICPA’s document comparing the SOC report 
types at 
https://www.aicpa.org/interestareas/frc/assuranceadvisoryservices/
downloadabledocuments/comparision-soc-1-3.pdf
.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   109   110   111   112   113   114   115   116   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish