Under active development Content is continuously updated and improved

1.4.11.4.1

>Control Description

+ Risk assessments are carried out both at regular intervals and in response to events. + Information security risks are appropriately assessed (e.g. for probability of occurrence and potential damage). + Information security risks are documented. + A responsible person (risk owner) is assigned to each information security risk. This person is responsible for the assessment and handling of the information security risks.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.