💼 ID.RA-5: Threats, vulnerabilities, likelihoods, and impacts are used to determine risk
- Contextual name: 💼 ID.RA-5: Threats, vulnerabilities, likelihoods, and impacts are used to determine risk
- ID:
/frameworks/nist-csf-v1.1/id-ra/05
- Located in: 💼 Risk Assessment (ID.RA)
Description
Empty...
Similar
- Sections
/frameworks/nist-sp-800-53-r4/ra/02
/frameworks/nist-sp-800-53-r4/ra/03
/frameworks/iso-iec-27001-2013/12/06/01
- Internal
- ID:
dec-c-b9c9c15c
- ID:
Similar Sections (Take Policies From)
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
💼 ISO/IEC 27001:2013 → 💼 A.12.6.1 Management of technical vulnerabilities | 7 | 7 | ||
💼 NIST SP 800-53 Revision 4 → 💼 RA-2 SECURITY CATEGORIZATION | ||||
💼 NIST SP 800-53 Revision 4 → 💼 RA-3 RISK ASSESSMENT |
Similar Sections (Give Policies To)
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
💼 NIST CSF v2.0 → 💼 ID.RA-05: Threats, vulnerabilities, likelihoods, and impacts are used to understand inherent risk and inform risk response prioritization | 7 |
Sub Sections
Section | Sub Sections | Internal Rules | Policies | Flags |
---|
Policies (7)
Internal Rules
Rule | Policies | Flags |
---|---|---|
✉️ dec-x-1a2f6279 | 1 | |
✉️ dec-x-9f7d853f | 1 | |
✉️ dec-x-52ac4ac0 | 1 | |
✉️ dec-x-8535d1ff | 1 | |
✉️ dec-x-a00b4ec9 | 1 | |
✉️ dec-x-a0471977 | 1 | |
✉️ dec-x-fafadacd | 1 |