Lab6 IAA202 HoVietAn
Lab6 IAA202 HoVietAn
Overview
After you have completed your qualitative risk assessment and identification of the
critical “1” risks, threats, and vulnerabilities, mitigating them requires proper planning
and communication to executive management. Students are required to craft a detailed
IT risk management plan consisting of the following major topics and structure:
A. Executive Summary
The purpose of the plan, the major risks identified, and a summary of the mitigation
strategies. Keep this brief but informative so that executive management can quickly
grasp the essential points.
Purpose: Explain the goal of the IT risk management plan (e.g., to identify,
prioritize, and mitigate risks in the IT infrastructure).
Key Findings: Summarize the critical risks and vulnerabilities discovered.
Mitigation Overview: Highlight the overall approach to addressing these
risks, focusing on critical ones.
Prioritize risks within each domain, ranking them as critical ("1"), major ("2"), or
minor ("3").
Example:
The specific steps to mitigate the risk. These could involve technical solutions (e.g.,
software updates, firewall rules) or organizational changes (e.g., user training).
Example:
E. Remediation Steps for Mitigating Major “2” and Minor “3” Risks, Threats,
and Vulnerabilities
While critical risks take priority, it's essential to address other risks as well. Provide a
plan for addressing major ("2") and minor ("3") risks.
Example:
Discuss continuous risk management and the steps necessary to maintain the security
posture over time. This includes:
G. Cost Magnitude Estimates for Work Effort and Security Solutions for the
Critical Risks
Estimate the financial cost of implementing the security measures for critical risks.
Include:
Provide a detailed timeline and action plan for implementing remediation efforts for
critical risks. This should include: