Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
Compliance & Standards Glossary

Risikomanagement (IT-Sicherheit)

A systematic process for identifying, assessing, and addressing information security risks. ISO 27001 and NIS2 require a risk-based approach: risks are assessed based on their likelihood of occurrence and impact, and are mitigated through measures to bring them down to an acceptable level.

IT Security Risk Management is the structured approach to managing information security risks. Unlike a rigid list of measures, ISO 27001 asks: "What specific risks does our organization face—and how do we address them?"

The Risk Management Cycle (ISO 27001)

┌─────────────────────────────────────────────────────┐
│                 RISK ASSESSMENT                   │
│                                                     │
│  Define context          Identify assets   │
│       ↓                           ↓                 │
│  Threats             Vulnerabilities             │
│  Identify          Identify             │
│       ↓                           ↓                 │
│       └──────── Assess risks ─┘                 │
│                     ↓                               │
│              Risk acceptance?                       │
└─────────────────────────────────────────────────────┘
          ↓ (if risk is unacceptable)
┌─────────────────────────────────────────────────────┐
│               RISK TREATMENT                      │
│                                                     │
│  Avoid  │  Reduce  │  Transfer  │ Accept. │
└─────────────────────────────────────────────────────┘

┌─────────────────────────────────────────────────────┐
│    MONITORING & REVIEW (continuous)             │
└─────────────────────────────────────────────────────┘

Step 1: Identify and Classify Assets

Asset Types

Primary Assets (directly valuable):

  • Data: Customer data, financial data, IP, employee data
  • Processes: Order processing, HR processes
  • People: Key employees, administrators

Supporting Assets (enable primary assets):

  • IT systems: Servers, workstations, network devices
  • Software: ERP, CRM, databases
  • Infrastructure: Data center, power supply

Classification (CIA Triad)

Confidentiality: "What happens if this information becomes public?" → Public / Internal / Confidential / Strictly Confidential

Integrity: "What happens if this data is altered?" → Low / Medium / High / Critical

Availability: "What happens if this system goes down for 1 hour/1 day?"

  • RTO: Recovery Time Objective
  • RPO: Recovery Point Objective

Step 2: Assess Risks

Qualitative Method (5×5 Matrix)

Risk = Probability of Occurrence × Severity of Impact

Probability:

ValueLevelFrequency
1Very unlikely< 1% per year
2Unlikely1–5% per year
3Possible5–20% per year
4Likely20–50% per year
5Very likely> 50% per year

Impact:

ValueLevelSignificance
1NegligibleNo noticeable consequences
2MinorMinor damage, resolvable internally
3SignificantNoticeable impairment, external effort required
4SevereSignificant damage, reputational damage
5CatastrophicThreatens existence, risks insolvency

Risk Level:

ScoreLevelAction
1-4LowAccept or address cost-effectively
5-9MediumAddress planned
10-16HighImmediate action required
17-25CriticalImmediate escalation, emergency measures

Example: Risk Assessment (Excerpt)

ID  | Scenario                    | W | A | Risk | Response
────────────────────────────────────────────────────────────
R01 | Ransomware on file server   | 4 | 5 |  20  | Critical → Backup + EDR
R02 | Phishing → CEO fraud        | 4 | 3 |  12  | High → Awareness + DMARC
R03 | Insider data theft      | 2 | 4 |   8  | Medium → DLP + PAM
R04 | DDoS on web shop            | 3 | 3 |   9  | Medium → CDN + Scrubbing
R05 | Physical Data Center Breach      | 1 | 5 |   5  | Low → Access Control
R06 | Software Vendor Compromise   | 2 | 5 |  10  | High → Vendor Assessment

Step 3: Risk Treatment Options

1. Avoid (Risk Avoidance): The activity or process causing the risk is discontinued. Example: Cloud service in a non-EU country → do not use

2. Reduce (Risk Reduction/Mitigation): Measures lower the probability or impact. Example: MFA → reduces the probability of phishing success; Backup → reduces the impact of ransomware

**3. Risk Transfer: Outsource the risk to a third party. Example: Cyber insurance (transfer impact); outsourcing (partially transfer risk) > Note: Responsibility remains with the company (GDPR!)

4. Risk Acceptance: Conscious decision: The risk is tolerable. Example: Outdated system with CVSS 4.2 in an isolated network Prerequisite: Documented, management informed

Statement of Applicability and Risk Treatment

ISO 27001 Section 6.1.3 links risk assessment with controls. For each of the 93 controls in Annex A, the following is documented:

Control A.8.5 Secure Authentication:
  Reference: Risk R02 (Phishing → Credential Compromise)
  Applicable: Yes
  Justification: We use MS365 with remote access → MFA is critical
  Implemented: Yes (2024-11)
  Evidence: MFA policy, Azure AD Conditional Access configuration

Control A.7.2 Physical Entry Controls:
  Reference: Risk R05 (physical intrusion)
  Applicable: Yes (office with server room)
  Implemented: Partially (access secured, but no logging)
  Action: Implement logging by 2026-06

Risk Acceptance and Risk Appetite

Define Risk Acceptance Threshold

Sample Company Policy: > "Risks with a score > 12 are not accepted. All risks > 12 must be reduced to ≤ 12 through mitigation measures."

Requirements for Accepted Risks

Accepted risks must:

  • Be documented (date, justification)
  • Be approved by management (CEO signature)
  • Be reviewed regularly (at least annually)
  • Be accepted only temporarily (with a target date for resolution)

Sample Form:

FieldContent
Risk IDR15
DescriptionLegacy system XY without patch support
Risk Score15 (HIGH)
Accepted until2027-01 (replacement planned)
ReasonCost of replacement > potential damage during transition period
MitigationNetwork segmentation, increased monitoring
Approved byMax Muster, CEO (Date)

Continuous Risk Management

When must the risk assessment be revised?

Event-driven:

  • New technologies or services introduced
  • Organizational changes (acquisition, restructuring)
  • Security incident occurred
  • New regulatory requirements (NIS2, GDPR amendment)
  • New threat landscapes (new malware families, APT reports)
  • Results of the internal audit

Regularly (at least):

  • Annual review of all risks (ISO 27001 requirement)
  • Quarterly: Incorporate new threats?
  • Management Review: Executive Board receives annual risk overview

KPIs for Risk Management

  • Number of open critical risks
  • % of risks addressed according to plan
  • Average resolution time
  • Number of accepted risks > risk appetite (exceptions)