It Risk Assessment

This IT risk assessment checklist can be used by information security officers to perform security risk and vulnerability assessments and recommend solutions.​

IT Risk Assessment


1. What is the purpose of this assessment?

Photo Comment

2. Specify the range of the IT Risk Assessment

Photo Comment

3. Explain key technology components including commercial software

Photo Comment

4. Explain how users enter the system and their planned usage of the system

Photo Comment

5. List all participants including their position (e.g., system owner, system custodian, network manager etc.)

Photo Comment
Risk Assessment

1. What is the vulnerability or threat source(s) identified?

Photo Comment
Risk Rating

1. Consequences

Photo Comment

2. Probability

Photo Comment

3. Overall risk rating

Photo Comment
Recommended Controls

1. What are the recommended inspections or alternative options for decreasing risk?

Photo Comment

Is this sample what you are looking for?
Sign up to use & customise this template, or create your own custom checklist:

Checklist by – Please note that this checklist is intended as an example. We do not guarantee compliance with the laws applicable to your territory or industry. You should seek professional advice to determine how this checklist should be adapted to your workplace or jurisdiction.

goaudits app

Get started on a free trial

Seeing is believing! Try the full platform FREE for 14 days with your own data.
Or ask us to setup the system for you, at no cost.

GoAudits Logo

Is GoAudits right for you?

Trusted by 600+ businesses globally

Book Intro Call