1.4.1—1.4.1
>Control Description
+ Risk assessments are carried out both at regular intervals and in response to events.
+ Information security risks are appropriately assessed (e.g. for probability of occurrence and potential damage).
+ Information security risks are documented.
+ A responsible person (risk owner) is assigned to each information security risk. This person is responsible for the assessment and handling of the information security risks.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.