Menu

  1. Introduction
    1. Licensing
    2. System Requirements
    3. Setup and Installation
  2. Getting Started
    1. Creating the Database
    2. RM Studio Users/Contacts
    3. Email Configuration
    4. Web Module Setup
    5. Web Module Update
  3. Navigating RM Studio
    1. Main Menu
      1. Save Function
      2. Import External Data
      3. Clear User Cache
      4. Security
      5. Properties
      6. Languages
      7. Registration
      8. User Manual
      9. Manage Checkouts
      10. About
      11. Application Style
    2. Navigation Tree
    3. Tabs
    4. The Grid
    5. Context & Flow
  4. Common Entities
    1. Business Entities
      1. Asset Details - Basic Information tab
      2. Asset Details - Risks tab
      3. Asset Details - Categories tab
      4. Asset Details - Business Entities tab
    2. Contacts
    3. Teams
    4. Categories
    5. Assets
    6. Threats
    7. Standards/Controls
      1. How to: Standards, Regulations, Controls
      2. Standards Implementation Comparison
  5. Gap Analysis
    1. How to: Gap Analysis
    2. Reporting
  6. Risk Assessment
    1. How to: Risk Assessment
      1. Working with Assets
      2. Evaluation Values
      3. Evaluating Risks
      4. Various Definitions
      5. Risk Assessment Reporting
    2. Evaluation Templates
    3. Risk Owner Web Solution
  7. Web Module
    1. Dashboard
    2. My Tasks
    3. Reports
    4. Standards/Regulations
    5. Documents
    6. Incidents
    7. Risk Owner Web Solution
  8. Control Maturity and Effectiveness Assessment
    1. Control Assessment Templates
    2. Reporting
  9. Risk Treatment
    1. How to: Risk Treatment
      1. Risk Treatment Templates
      2. Risk Criteria
      3. Asset Level
      4. Controls Tab
      5. Scheduling a Future Control
      6. Future Controls Tab
      7. Overview
      8. Reload Assets, Threats and Controls
    2. Risk Treatment Reports
  10. STPA
    1. Intro to Models, Diagrams, Analyses
    2. STPA Projects
    3. Models and Diagrams
      1. How to: Create HCS Models
      2. How to: Create HCS Diagram
        1. Diagram Elements
    4. Performing the Analysis
      1. Setting up the Analysis
      2. System Level Hazards and Losses
      3. Step 1
    5. Reporting
  11. Business Continuity Management Module
    1. Organization
      1. New Organization
      2. Stakeholders
      3. Resources/Processes
        1. Impact Analysis
        2. Requirements
    2. Incident Response/Recovery
      1. Associated Threats
      2. Plans
        1. Steps
      3. Maintenance
        1. Test plans
        2. Test Results
    3. Templates
    4. Maintenance
    5. Reports BCM
  12. Database Settings
    1. Database Upgrade
    2. Add Existing
    3. Remove
    4. Migrate
    5. Backup
    6. Restore
  13. Glossary
  14. Calculations
  15. Documents
  16. Import Assets

4.6.Threats

RM Studio includes an ISMS Threat library that is optimized for ISO 27001, but this may not be a complete Threat and Vulnerability library for your specific information security requirements. You can add, delete, or modify all included threats to better tailor the library to meet your needs, as well as change the associations with categories and controls.

When creating new Threat, the new Threat must have a Name, be assigned to a Category and linked to mitigating controls from the Standard you are preparing to implement or existing company process or procedure.

How to Create a New Threat

  1. Name the threat with great detail. The more precise the name the better it is for other people to understand and use, and the same is true for the description of the new threat.
  2. Input a detailed description of the threat, and identify the key markers of the threat.
  3. Threat Type is used for sorting purposes and can be used to specify types of threats for specific departments, divisions, etc. Threat Types are created separately and selected in a drop down.
  4. The status is Active or Inactive and by default all new threats are active. You may choose to inactivate a threat until a specific time or after using RM Studio for a period of time, a threat may become irrelevant and then be changed to inactive.

Categories

To assign the Threat to a Category navigate to the Category tab and click on the “Add New Categories” icon. You will then be presented with a list of Categories. Select one Category and click the OK button to assign it to the Threat. You can add more Categories to a Threat by repeating these steps.

Threatened Assets

The Threatened Assets tab aggregates all the Assets from all the Assessments that have been marked as threatened by the respective Threats.

Mitigating Controls

Under Mitigating Controls you can define which Controls work against a given Threat. To add a new Mitigating Control from the Control list you must click on the “Add New Mitigating Control” icon on the Mitigating Controls Toolbar.

Threat Types are a way to categorize threats for easy identification for the users. All predefined threats are assigned to the “Stiki” threat Type.

Threat Types is where you set the name for the Threat type in your Threats list. Every Threat in RM Studio is by default assigned to the Created By Stiki type and now you can create your own types and categorize your Threats.

The only thing to do here is to open up Threats > Threat Types, press add new button, give the new type a name and save. From there you can navigate to Threats, press the refresh button, create Threats and assign your type to them. You can also change the ones that are assigned to Stiki to your new type. Furthermore you can also remove the type and leave it BLANK with no type at all.

To assign, remove or delete type’s right-click the type assigned to the Threat and navigate to Type and change the settings.

Help Guide Powered by Documentor
Suggest Edit