Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

This page outlines Vertic’s current organisational Risk management process as well as the Risk register.

...

Risk #

Risk Name

Description/Risk Outcome

Annex A Controls

Likelihood

Impact Level

Severity

Mitigation/Treatment

Post-Treatment Likelihood

Post-Treatment SeverityPost-Treatment Assessment

1

Client Data Breach

A data breach may occur in one of our client’s software environments which may result in exposure of critical information.

  • A.9.1.1

  • A.5.1.1

Status
colourPurple
titlelow

Status
colourRed
titleHigh

Status
colourPurple
titlelow

Status
colourPurple
titlelow

2

Staff Breach

A staff member may expose critical data from a client’s software environment which could then be published.

  • A.7.1.1

  • A.7.2.2

  • A.7.2.3

Status
colourPurple
titlelow

Status
colourRed
titlehigh

Status
colourYellow
titlemedium

Status
colourYellow
titlemedium

3

Hardware Loss

We may experience the failure of our hardware (primarily work laptops) which could result in loss of critical information to perform our duties.

Status
colourYellow
titlemedium

Status
colourYellow
titlemedium

Information Continuity

Status
colourPurple
titlelow

Status
colourPurple
titlelow

4

Software Failures

Software we use might fail; this could include either Salesforce or other key services.

Status
colourYellow
titlemedium

Status
colourRed
titlehigh

Status
colourPurple
titlelow

Status
colourPurple
titlelow

5

Employee Fraud

An employee might defraud Vertic but stealing critical information.

  • A.7.1.1

  • A.7.1.2

Status
colourPurple
titlelow

Status
colourRed
titlehigh

Status
colourYellow
titlemedium

Status
colourRed
titlehigh

6

Employee Injury

An employee might get injured whilst performing their duties for Vertic.

Status
colourPurple
titlelow

Status
colourYellow
titlemedium

Status
colourPurple
titlelow

Status
colourPurple
titlelow

7

Natural Disaster

A natural disaster might strike impacting our geographic area.

Status
colourPurple
titlelow

Status
colourYellow
titlemedium

Status
colourPurple
titlelow

Status
colourPurple
titlelow

8

Software Development Standard Breach

An employee or contractor might breach our development standards.

Status
colourYellow
titlemedium

Status
colourYellow
titlemedium

Status
colourYellow
titlemedium

Status
colourPurple
titlelow

9

Physical Security Breach

An employee or contractor might breach physical security policies, such as leaving laptops unattended.

  • A.6.2.2

Status
colourPurple
titlelow

Status
colourYellow
titlemedium

Status
colourPurple
titlelow

Status
colourPurple
titlelow

10

Contractural Relations Breach

A supplier might breach their contractural obligations with Vertic.

Status
colourPurple
titlelow

Status
colourYellow
titlemedium

Status
colourPurple
titlelow

Status
colourYellow
titlemedium

11

Damage caused by Third Party

A third party, such as visitors, might cause physical or virtual damage to critical Vertic assets.

  • A.6.1.3

  • A.6.1.4

Status
colourPurple
titlelow

Status
colourYellow
titlemedium

Status
colourPurple
titlelow

Status
colourYellow
titlemedium

12

Malicious Code

An employee or contractor might deliberately produce malicious code.

Status
colourPurple
titlelow

Status
colourRed
titlehigh

Status
colourPurple
titlelow

Status
colourYellow
titlemedium

13

Equipment Theft

An employee might defraud Vertic but stealing critical hardware infrastructure or laptops.

  • A.6.2.1

Status
colourPurple
titlelow

Status
colourYellow
titlemedium

Status
colourPurple
titlelow

Status
colourPurple
titlelow

14

Sensitive Data Threat

Sensitive data might be under threat outside of Vertic’s control.

  • A.6.2.1

Status
colourYellow
titlemedium

Status
colourRed
titlehigh

Status
colourPurple
titlelow

Status
colourRed
titlehigh

15

Security Information System Failure

Our VQMS processes might fail resulting in critical data exposure and/or loss.

  • A.5.1.1

  • A.5.1.2

  • A.6.1.1

  • A.6.1.2

  • A.6.1.5

  • A.7.2.1

Status
colourPurple
titlelow

Status
colourYellow
titlemedium

Status
colourPurple
titlelow

Status
colourPurple
titlelow

16

Production Data Loss

Whilst performing our duties, we might experience production data loss.

  • A.8.2.1

  • A.8.2.2

  • A.8.3.2

  • A.8.3.3

Status
colourRed
titlehigh

Status
colourRed
titlehigh

Status
colourRed
titlehigh

Status
colourYellow
titlemedium

Status
colourRed
titlehigh
We will not undertake production data migration as the information risk is too large for us to accept.

We have used the following matrix to determine the severity of a stated risk:

...