IT Risk Assessment

This IT risk assessment checklist can be used by information security officers to perform security risk and vulnerability assessments and recommend solutions.​

IT Risk Assessment



General

1. What is the purpose of this assessment?


Photo Comment

2. Specify the range of the IT Risk Assessment


Photo Comment

3. Explain key technology components including commercial software


Photo Comment

4. Explain how users enter the system and their planned usage of the system


Photo Comment

5. List all participants including their position (e.g., system owner, system custodian, network manager etc.)


Photo Comment
Risk Assessment

1. What is the vulnerability or threat source(s) identified?


Photo Comment
Risk Rating

1. Consequences


Photo Comment

2. Probability


Photo Comment

3. Overall risk rating


Photo Comment
Recommended Controls

1. What are the recommended inspections or alternative options for decreasing risk?


Photo Comment

Is this sample what you are looking for?
Sign up to use & customise this template, or create your own custom checklist:

Checklist by GoAudits.com – Please note that this checklist is intended as an example. We do not guarantee compliance with the laws applicable to your territory or industry. You should seek professional advice to determine how this checklist should be adapted to your workplace or jurisdiction.

goaudits app

Get started on a free trial

Seeing is believing! Try the full platform FREE for 14 days with your own data.
Or ask us to setup the system for you, at no cost.