💼 ID.RA-4: Potential business impacts and likelihoods are identified
- Contextual name: 💼 ID.RA-4: Potential business impacts and likelihoods are identified
- ID:
/frameworks/nist-csf-v1.1/id-ra/04
- Located in: 💼 Risk Assessment (ID.RA)
Description
Empty...
Similar
- Sections
/frameworks/nist-sp-800-53-r4/ra/02
/frameworks/nist-sp-800-53-r4/ra/03
/frameworks/nist-sp-800-53-r4/sa/14
/frameworks/iso-iec-27001-2013/16/01/06
- Internal
- ID:
dec-c-975c6b1b
- ID:
Similar Sections (Take Policies From)
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
💼 ISO/IEC 27001:2013 → 💼 A.16.1.6 Learning from information security incidents | ||||
💼 NIST SP 800-53 Revision 4 → 💼 RA-2 SECURITY CATEGORIZATION | ||||
💼 NIST SP 800-53 Revision 4 → 💼 RA-3 RISK ASSESSMENT | ||||
💼 NIST SP 800-53 Revision 4 → 💼 SA-14 CRITICALITY ANALYSIS | 1 |
Similar Sections (Give Policies To)
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
💼 NIST CSF v2.0 → 💼 ID.RA-04: Potential impacts and likelihoods of threats exploiting vulnerabilities are identified and recorded | 7 |
Sub Sections
Section | Sub Sections | Internal Rules | Policies | Flags |
---|
Policies (7)
Internal Rules
Rule | Policies | Flags |
---|---|---|
✉️ dec-x-1a2f6279 | 1 | |
✉️ dec-x-9f7d853f | 1 | |
✉️ dec-x-52ac4ac0 | 1 | |
✉️ dec-x-8535d1ff | 1 | |
✉️ dec-x-a00b4ec9 | 1 | |
✉️ dec-x-a0471977 | 1 | |
✉️ dec-x-fafadacd | 1 |