The CSRA executes a technical cybersecurity risk assessment on one or more Processing Activities.
This process requires at least one cyber-asset to be successfully associated with the selected Processing Activity upon which the cyber security risk assessment will be performed.
Cyber security risk management plays a critical role in managing the threats, aiming to overall system’s resilience. It enables the identification of vulnerabilities and threats and the determination of suitable proactive control measures to tackle the related risks. Towards this, SENTINEL cyber security risk assessment has been identified as an essential tool for any organisation, involving some of the best preventive activities to protect systems and their cyber-components.
Risk on SENTINEL reflects three basic concepts:
A risk event can be certain or uncertain and can be influenced by a single occurrence or a series of occurrences. Likelihood indicates the frequency of an event and how probable it is to occur. Severity is the expected result of an event (degree of injury, property damage or other mission impairing factors).
Risk identification and calculation in SENTINEL is primarily based on:
The list of asset’s vulnerabilities. SENTINEL automatically identifies all known vulnerabilities of the selected cyber-asset using the open online repository Common Vulnerabilities and Exposures (CVE) of MITRE, already cataloged in the National Vulnerability Database (NVD) of NIST
The list of asset’s threats. SENTINEL allows the automatic identification of the threat landscape of the underlined cyber-asset, providing an up-to-date catalog of known threats, from the Common Attack Pattern Enumeration and Classification (CAPEC) of MITRE
See also:
Cybersecurity risk assesment
There are two different options available upon which you can initiate the process of performing a cyber security risk assessment.
Visit SENTINEL Data Protection section
Visit the profile of your preferred Processing Activity
Both options described above allow you now to visit the analysis reports of your cyber security risk assessment.
Risk Analysis report
Asset Risk Level report
Previous topic: DPIA
Next topic: Policy recommendations