18.01.2013 Views

Enabling Processes

Enabling Processes

Enabling Processes

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

224<br />

: ENABLING PROCESSES<br />

Figure 16—Risk IT Key Management Practices Covered by COBIT 5<br />

Risk IT Key Management Practice Covered in COBIT 5 by:<br />

RG1.1 Perform enterprise IT risk assessment. EDM03.01; APO12.02-03<br />

RG1.2 Propose IT risk tolerance thresholds. EDM03.01<br />

RG1.3 Approve IT risk tolerance. EDM03.01-02<br />

RG1.4 Align IT risk policy. EDM03.01-02<br />

RG1.5 Promote IT risk-aware culture. EDM03.02<br />

RG1.6 Encourage effective communication of IT risk. EDM03.03<br />

RG2.1 Establish and maintain accountability for IT risk management. EDM03.02<br />

RG2.2 Co-ordinate IT risk strategy and business risk strategy. EDM03.01-02<br />

RG2.3 Adapt IT risk practices to enterprise risk practices. EDM03.01-02<br />

RG2.4 Provide adequate resources for IT risk management. EDM04.01; APO07.01; APO07.03<br />

RG2.5 Provide independent assurance over IT risk management. EDM03.03<br />

RG3.1 Gain management buy-in for the IT risk analysis approach. EDM01.01-02; EDM03.02<br />

RG3.2 Approve IT risk analysis. EDM03.01<br />

RG3.3 Embed IT risk considerations in strategic business decision making. EDM03.01<br />

RG3.4 Accept IT risk. EDM03.01<br />

RG3.5 Prioritise IT risk response activities. EDM03.02<br />

RE1.1 Establish and maintain a model for data collection. APO12.01<br />

RE1.2 Collect data on the operating environment. APO12.01<br />

RE1.3 Collect data on risk events. APO12.01<br />

RE1.4 Identify risk factors. APO12.01<br />

RE2.1 Define IT risk analysis scope. APO12.02<br />

RE2.2 Estimate IT risk. APO12.02<br />

RE2.3 Identify risk response options. APO12.02<br />

RE2.4 Perform a peer review of IT risk analysis. APO12.02<br />

RE3.1 Map IT resources to business processes. APO12.02<br />

RE3.2 Determine business criticality of IT resources. APO12.03<br />

RE3.3 Understand IT capabilities. APO12.03<br />

RE3.4 Update IT risk scenario components. APO12.03<br />

RE3.5 Maintain the IT risk register and IT risk map. APO12.03<br />

RE3.6 Develop IT risk indicators. APO12.03<br />

RR1.1 Communicate IT risk analysis results. APO12.04<br />

RR1.2 Report IT risk management activities and state of compliance. APO12.04<br />

RR1.3 Interpret independent IT assessment findings. APO12.04<br />

RR 1.4 Identify IT-related opportunities. APO12.04<br />

RR2.1 Inventory controls. APO12.05<br />

RR2.2 Monitor operational alignment with risk tolerance thresholds. APO12.05<br />

RR2.3 Respond to discovered risk exposure and opportunity. APO12.05<br />

RR2.4 Implement controls. APO12.05<br />

RR2.5 Report IT risk action plan progress. APO12.05<br />

RR3.1 Maintain incident response plans. APO12.06<br />

RR3.2 Monitor IT risk. APO12.06<br />

RR3.3 Initiate incident response. APO12.06<br />

RR3.4 Communicate lessons learned from risk events. APO12.06<br />

Personal Copy of: Mr. Dong Hong Wang

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!