Вы находитесь на странице: 1из 2

IT Risk Registration Form

Business Unit : Information Technology


Division : Technology Application
Risk Area : Physical & Environmental Security Management
Created By : Kean Chanrith

No. Risk Name Risk Nature Consequence Cause Likelihood Implication Recommendation Remedial Action Severity Risk Owner

1 Shortcomings of Natural disaster risk can be Cause to damaged critical Lack of Site and Location 3 Risk of data lost and recovery Head of IT, Project Manager and Top Head of IT, Project Manager and Top management 4 Head of IT
Location Selection happened and destroy or damage system, facility, operation and Selection Procedure and Survey could not be mitigated in case Management is to ensure below: need to: Project
& Survey for the the critical system such as flood, financial lost. Significant data for the data center/critical of no full HA. Manager
critical system in earthquakes. can be lost and can't be system location. 1. Establish and well implementation on the 1. Enguage qualified vendor, engineer, Insurer to Top
term of physical restored in case of no DR site, Risk of operation failure and site/location selection for the data center/ study the details on the site/location selection by Management
and environmental Man-Made Disaster risk can be Full HA and full data backup Weakness of Project financial lost could not be critical system to protect against damage from identifying the hazards and possibilities for the data
security happened such as the area where with replication method. Management. mitigated in the acceptable natural or man-made disasters such as fire, center/critical system before implementing.
management. the possibility of riots, strikes, periods. flood, explosion etc.
explosions and fires. Weakness of sustainable safety 2. Proper arrangement of power backup
Compliance. Risk of reputation lost could not 2. Protect critical infrastructure and resources (generator) with enough capacity to survive the
Infrastructure risk can be happened be mitigated in the mindset of from temporary losses of power or surges. continuity of system with standard requirements.
due to non-standard electrical customers and stakeholders.
installation, consumption. 3. Setup Policy and Procedure to montior and 3. Establish independant committee to control and
evaluate the project properly. evaluate the project.
Sole purpose risk can be happened
as the data center or critical system 4. Emergency and DR drill must be regularly 4. Analyze the performance of all the emergency
room/building shared with others conducted with proper procedure and records drill.
due to cost concerned. maintained.

2 Shortcomings of Unsafe perimeter for the data Unauthorized people is easily Weakness of facility security 4 Risk of system Head of IT, Security and Top management need Head of IT, Security and Top Management shall: 4 Head of IT
Perimeter Security center or critical system/server to access data center or especially low height of fense destruction/damage by intruder to: Head of
for the data center room. critical system/server room at (at least 20 feet) with guard that could not be mitigated 1. Engage contractor to build secure perimeter for Security
or critical system any time. points at each perimeter 1. Establish and well implementation of the data center/critical system room/building. Top
room/building. Lack of surveillance system and access point. Risk of data leakage by the Perimeter security for the facility. Management
alarm system. Lack of evidence in case of system compromise or stolen that 2. Install surveillance system (CCTV) and Alarm for
accidents happened. Weakness of CCTV installation, could not be mitigated. 2. Conduct regular training on the physical the surrounding of facility and ensure that CCTV
Unsafe Windows, doors and monitoring for the surrounding security of building / Room access control. system is not compromised by lacking of vendor
Computer Room Placement. Data Leakage in case of of facility and critical points. Risk of lost reputation and management.
intrusion. business integrity with customers 3. Install sufficient surveillance (CCTV) for the
Poor Access Points Management. Weakness of facility and stakeholders. facility and regularly monitor with records 3. All windows, doors to access the data
Lost or Damage to critical management especially maintained. center/critical system room are secured with
system/server in case of housekeeping that can block Risk of lack of evidences in case proper access control.
intruision. the surveillance system (CCTV). of incidents happened that 4. Better housekeeping to ensure that installed
could not be mitigated. CCTV are free from obstruction. 4. Ensure appropriate defence against intruders or
Weakness of Access points unauthorized colleagues
Management especially lock 5. All access points are guarded or equipped
mechanism for authorized with secure access control mechanism.
personnel to access data
center and critical system 6. Setup and Implement Incident Reponse and
room. Handling management policy and team and
reguarly conduct the training to them.
3 Unsafe Poor design of Computer server Unauthorized people easily Weakness of server room design 4 Risk of system Head of IT and Top Management need to: Head of IT and Top Management Shall: 4 Head of IT
environmental room with access control, non- access to the computer room. with standard requirement (non destruction/damage/stolen and Top
conditions for the fireproof or non-fire rated wall. compliance). data leakage in case of 1. Each Computer Server Room should have 1. Setup secure and proper server room followed Management
data center or Nearby fire caused to spread unsecured access, fire and redundant access to Power, Cooling and by technical standard or requirement to ensure the
Computer Server Improper installation of firefighting flames and damage the Lack of site/location analysis for environmental hazards. Networks. safeguards of critical system with fire proof or fire
Room and fire prevention tools for the critical system. the physical security. rated wall.
server room. Risk of financial lost, reputation 2. there should be at least an 18" access to floor
Can't set out fire if wrong fire Lack of fire code compliance. lost with customers and to provide for air flow and cable management. 2. Proper and adequate instalation of firefighting
Environmental hazard due to lack of extinguising equipments and stakeholders when fire Computer Server room should have air filtration equipments following by International Fire Code.
humidity control for the server room. also damage the critical Lack of environmental hazard happened. with humidity control.
system. awareness and technical 3. Setup Temperature Management Policy for the
Unsecured Server room that share standard for server room 3. Correct type of fire extinguishers (FM-200)( Server Room to prevent environmental hazard.
space with others if the space is Can't handle the incidents if management. should be in place and automatic fire
being leased. lack of automatic fire suppression with centralized alarm system must 4. Site and Location Selection Policy for Server
suppression system. Lack of Access Control and be in place. Room must be in place.
Physical access Policy and
Environmental hazard cause to Procedure. 4. Computer Server Room shall be designed with
damage or burn the system standard requirement especially fire-proof or fire
(humidity control). rated wall.

System compromise, attack,


stolen if server room shared the
space.

Page 1 of 2
IT Risk Registration Form
Business Unit : Information Technology
Division : Technology Application
Risk Area : Physical & Environmental Security Management
Created By : Kean Chanrith

No. Risk Name Risk Nature Consequence Cause Likelihood Implication Recommendation Remedial Action Severity Risk Owner

4 Poor security Poor implementation of access Unauthorized Access to data Lack of Access Control Policy 5 Risk of Data leakage, System Head of IT, Security and Top management need Head of IT, Security and top management shall: 4 Head of IT
program for the control the restricted area. center or critical system room and Procedure or Poor Compromise, destruction and to: Head of
Access control by unauthorized employees, Implementation of Access stolen by unauthorized person 1. Limit the number of entry points. Security
Lack of Vendor Management on guests and vendors. Control Policy and Procedure. (employees, guests, vendor). 1. Establish and well implement of Access Top
Access Control Procedure. Control Policy and Procedure with reguarly 2. Force all guests to go to a front desk and sign in Management
Data Leakage or system Poor Vendor Management on Risk of late response on the conduct training and awareness to relevant before entering the environment.
Lack of Segregation of Duty with compromise by unauthorized the Access Control, SLA and incidents that happened due to personnels.
multiple access to Critical Server employees, guests and NDA. lack of intrusion alarm system, 3. Reduce the number of entry ponts even further
Room. vendors. BOD and DA. 2. Enguage with qualified supplier/vendor on the after hours or during the weekend when not as
Lack of Intrusion Alarm system installation of intrusion alarm system and ensure many employees are around.
Lack of Intrusion System and Non-responsibility by multi- for the critical points of facility. that all installed system are verified with
Communicated Device. authorized personnel hardening checklist. 4. Have a seurity guard validate a picutre ID before
(segregation of duty) to access Lack of Incident Reponse and allowing entrance.
Poor Incident Response and the critical system. Handling Management 3. Setup Computer Incident Response and
Handling Management Procedure Procedure and Team. Handling Management Policy with structural 5. Required guests to sign in and be escorted.
and Team. Out of control for the incident team and detailed roles and responsibility of
response. each member. 6. Encourage employees to question strangers.

5 Disaster Recovery Lack of Disaster Recovery Plan Operational failure because of Poor setup or Lack of Disaster 5 Risk of data lost and recovery Head of IT and Top Management need to: Head of IT and Top Management shall: 4 Head of IT
Failure (DRP) poor or lack of DRP. Recovery Plan (DRP) Policy and could not be mitigated in case Top
Procedure. of no full HA. 1. Ensure that DRP is in place and well 1. Proper selection of DR site by technical standard Management
Lack of Regular DR exercise or drill Lack of measurement of DR implemented. or requirement.
performance. Poor implementation of DR Risk of operation failure and
Lack of Security Training and exercise due to management financial lost could not be 2. Conduct the DR exercise regularly with 2. Setup and Implement DRP to ensure the
awareness on the DR Drill. Lower performance of overlook. mitigated in the acceptable performance evaluation and records continuity of service operation.
operation when real Disaster periods. maintained.
Recovery failure. 3. Regularly conduct the DR exercise as per stated
Risk of reputation could not be in the policy and guideline.
mitigated in the mindset of
customers.

6 Power Supplies fail • Server will shut down. • Affect on business operation • Component or Circuit failure 2 • Never perform testing or • Should porform testing as monthly or quarterly 2 IT Security
Software can broken. such core banking… Device stop working checking basic.
7 No Power Supplies • Server will shut down. • Affect on business operation • electricity cut-off or primary 2 N/A • All servers should have a UPS to provide a short- • UPS are in place to provide a short-term 2 IT Security
Software can broken. such core banking… power source loss term in event of a primary power source loss. uninterruptible power supply to facilitate an orderly
shutdown of the information asset.
8 Overheating The temperature can be high or low • Is able to make hardware • No system to maintain a 5 • Can't control the temperature • Cooling system or air-conditionair or heat 5 IT Security
at any time that make our server and software of server broken consist engine temperature detector should be properly installed.
broken. • Loss of information asset such cooling system or heat
detector
9 No Smoke Fire or smoke can occur at any time • Is able to make hardware • Mistake from users 2 • No device to alert staffs at • Smoke detector or alarm should be properly 1 IT Security
alarm/detector that make our building or server and software of server broken • Technical Error different floor to know when installed.
destroyed • Loss of information asset smoke ocurred.
10 Lighting • Server will shut down. • Affect on business operation • Inadequate lighting for 2 • No back-up generators or • Adequate lighting inside and outside • Plans in place to maintain and repair equipment. 2 IT Security
Software can broken. such core banking… external and internal doors, alternative power supplies to • Where appropriate the use of back-up
windows, gates, fences and ensure constant lighting during generators or alternative power supplies to
parking areas any disruption to local power ensure constant lighting during any disruption to
supplies local power supplies

Page 2 of 2

Вам также может понравиться