<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic DDoS Risk Assessment in Governance, Risk, Compliance</title>
    <link>https://community.isc2.org/t5/Governance-Risk-Compliance/DDoS-Risk-Assessment/m-p/48483#M550</link>
    <description>&lt;P&gt;My organization received a recommendation from a third-party audit that we conduct a DDoS specific risk assessment. Are there any publicly available tools or templates for this specific purpose? Any help is appreciated!&lt;/P&gt;</description>
    <pubDate>Wed, 01 Dec 2021 15:49:39 GMT</pubDate>
    <dc:creator>djscoot215</dc:creator>
    <dc:date>2021-12-01T15:49:39Z</dc:date>
    <item>
      <title>DDoS Risk Assessment</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/DDoS-Risk-Assessment/m-p/48483#M550</link>
      <description>&lt;P&gt;My organization received a recommendation from a third-party audit that we conduct a DDoS specific risk assessment. Are there any publicly available tools or templates for this specific purpose? Any help is appreciated!&lt;/P&gt;</description>
      <pubDate>Wed, 01 Dec 2021 15:49:39 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/DDoS-Risk-Assessment/m-p/48483#M550</guid>
      <dc:creator>djscoot215</dc:creator>
      <dc:date>2021-12-01T15:49:39Z</dc:date>
    </item>
    <item>
      <title>Re: DDoS Risk Assessment</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/DDoS-Risk-Assessment/m-p/48484#M551</link>
      <description>&lt;P&gt;You can check NIST SP 800-30 which describes how to conduct a risk assessment. Conducting a control assessment (utilizing NIST SP 800-53A) is a good start to see how well the controls are actually working. You can then conduct a risk assessment to see if the working controls mitigated the risk to your organization's risk tolerance level.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Always keep in mind the basics of what risk is: It's the likelihood of a threat exploiting a vulnerability and the resulting impact.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Look at the various threats then determine the vulnerabilities of your information system. The impact caused by those threats (e.g., high, moderate, or low impact) is a subjective matter, dependent on your organization's opinion on the compromise of its data.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Dec 2021 18:43:11 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/DDoS-Risk-Assessment/m-p/48484#M551</guid>
      <dc:creator>Until_then</dc:creator>
      <dc:date>2021-12-01T18:43:11Z</dc:date>
    </item>
    <item>
      <title>Re: DDoS Risk Assessment</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/DDoS-Risk-Assessment/m-p/48491#M552</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any framework or something as such from NIST to define the scope and goals of &lt;STRONG&gt;Annual Pen testing&lt;/STRONG&gt; of a software product?&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 18:26:53 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/DDoS-Risk-Assessment/m-p/48491#M552</guid>
      <dc:creator>iluom</dc:creator>
      <dc:date>2021-12-02T18:26:53Z</dc:date>
    </item>
  </channel>
</rss>

