risk-management

risk-management Controls

12 controls across 3 frameworks.

HIPAA

NIST CSF

gv-ov-2

The cybersecurity risk management strategy is reviewed and adjusted to ensure coverage of organizational requirements and risks

Govern / Oversight

gv-rm-1

Risk management objectives are established and agreed to by organizational stakeholders

Govern / Risk Management Strategy

gv-rm-2

Risk appetite and risk tolerance statements are established, communicated, and maintained

Govern / Risk Management Strategy

gv-rm-3

Cybersecurity risk management activities and outcomes are included in enterprise risk management processes

Govern / Risk Management Strategy

gv-rm-4

Strategic direction that describes appropriate risk response options is established and communicated

Govern / Risk Management Strategy

gv-rm-5

Lines of communication across the organization are established for cybersecurity risks, including risks from suppliers and other third parties

Govern / Risk Management Strategy

gv-rm-6

A standardized method for calculating, documenting, categorizing, and prioritizing cybersecurity risks is established and communicated

Govern / Risk Management Strategy

gv-rm-7

Strategic opportunities (positive risks) are characterized and included in organizational cybersecurity risk discussions

Govern / Risk Management Strategy

gv-sc-3

Supply chain risk management is integrated into enterprise risk management processes

Govern / Cybersecurity Supply Chain Risk Management

id-ra-7

Changes and exceptions are managed, assessed for risk impact, and tracked

Identify / Risk Assessment

SOC2