ID.RA-04.160
Has your organization documented a comprehensive assessment of the potential business impacts that could result from unauthorized access to your communications, systems, and data?
Explanation
This question evaluates whether your organization has formally analyzed and documented the potential consequences of security breaches across your digital environment. Such analysis should identify impacts like financial losses, operational disruptions, reputational damage, regulatory penalties, and intellectual property theft that could result from unauthorized access incidents. An acceptable evidence document would be a Business Impact Analysis (BIA) report that identifies and quantifies the various consequences of unauthorized access to different systems and data types, with clear categorization of critical assets and their associated business risks. This document should be approved by relevant stakeholders and periodically reviewed.
Implementation Example
Enumerate the potential business impacts of unauthorized access to the organization's communications, systems, and data processed in or by those systems
ID: ID.RA-04.160
Context
- Function
- ID: IDENTIFY
- Category
- ID.RA: Risk Assessment
- Sub-Category
- Potential impacts and likelihoods of threats exploiting vulnerabilities are identified and recorded

