Reference no: EM132354008
Introduction
Identifying and assessing risks is challenging, but treating them is another matter entirely.
Treating risks means making changes based on a risk assessment and probably a few hard decisions. When treating even the most straightforward of risks, practice due diligence by documenting what steps you are taking to mitigate the risk. If you don't document the change and the reasoning behind it, it's possible that your organization could reverse the mitigation and reintroduce the risk based on the notion of "but that's how we always did it before."
After you've addressed a risk, appoint someone to make certain that the risk treatment is being regularly applied. If a security incident arises even with the change in place, having a single person in charge will ensure that any corrective action aligns with the risk-mitigation plan. You're not appointing someone so you can blame that person if things go wrong; you are instead investing that individual with the autonomy to manage the incident effectively. The purpose of a risk-mitigation plan is to define and document procedures and processes to establish a baseline for ongoing mitigation of risks in the seven domains of an IT infrastructure.
In this lab, you will identify the scope for an IT risk-mitigation plan, you will align the plan's major parts with the seven domains of an IT infrastructure, you will define the risk-mitigation steps, you will define procedures and processes needed to maintain a security baseline for
ongoing mitigation, and you will create an outline for an IT risk-mitigation plan.
Learning Objectives
Upon completing this lab, you will be able to:
Identify the scope for an IT risk-mitigation plan focusing on the seven domains of a typical IT infrastructure.
Align the major parts of an IT risk-mitigation plan in each of the seven domains of a typical IT infrastructure.
Define the tactical risk-mitigation steps needed to remediate the identified risks, threats, and vulnerabilities commonly found in the seven domains of a typical IT infrastructure.
Define procedures and processes needed to maintain a security baseline definition for ongoing risk mitigation in the seven domains of a typical IT infrastructure.
Create an outline for an IT risk-mitigation plan encompassing the seven domains of a typical IT infrastructure.
Attachment:- Developing Risk-Mitigation Plan.rar