ID.RA-01.152
Does your organization regularly conduct vulnerability assessments of business processes and procedures to identify potential cybersecurity weaknesses?
Explanation
This question assesses whether your organization systematically evaluates its operational workflows and procedures to identify vulnerabilities that could be exploited by threat actors. Such assessments should examine how information flows through your organization, where sensitive data is stored or transmitted, and how human behaviors might create security gaps that technical controls alone cannot address. Evidence of compliance could include documented vulnerability assessment reports specific to business processes, gap analysis documents comparing current practices against security standards, or minutes from security review meetings where process weaknesses were identified and remediation plans developed.
Implementation Example
Review processes and procedures for weaknesses that could be exploited to affect cybersecurity
ID: ID.RA-01.152
Context
- Function
- ID: IDENTIFY
- Category
- ID.RA: Risk Assessment
- Sub-Category
- Vulnerabilities in assets are identified, validated, and recorded

