ABCDEFGHIJKLMNOPQRSTUVWXYZ
1
2
SECURITY ASSESSMENT TEMPLATE
3
The threats, vulnerabilities, and risks mentioned on this sheet are examples of common scenarios. Make a copy of the sheet and customize it to your business's specifications. (File > Make a Copy OR File > Download)
4
How to use the template:
5
1. The risk scenarios and subsequent information populated in the template are only examples. Actual risks, vulnerabilities, impact, and control measures will vary depending on your business. Please change the data accordingly.
2. You can customize the template by adding or removing columns to meet your specific needs.
3. The template is intended to serve only as a guide to help you complete your security assessment.
6
IT assetSecurity riskSecurity threatVulnerabilityImpact of riskRisk levelImpact levelExisting controlsProposed controlsPriorityPerson responsibleTimeframe for completionNotes
7
Network systemsInformation involved in electronic messaging gets compromisedSpyware attackInformation in transit is not encrypted.● Leakage of sensitive data will attract penalties from regulatory bodies
● Loss of customer trust
● Fall in brand equity
HIGHHIGHSecurity policy states that sensitive data should not be sent to external sources.● Implement encryption for data at rest as well as in transit.
● Use data loss prevention software to detect data exfiltration transmission.
HIGHIT team leadJun-22Justin from the IT team to shortlist data loss prevention software vendors and send RFPs by May 20, 2022.
8
Desktops or serversUnathorized users gain access to the operating system and steal data or crash the systemPhishing attackEmployees may accidentally—or knowingly—give away certain details that help hackers gain access to the systems.

Weak passwords that hackers can easily crack.
● Loss of productivity due to system downtime
● Leakage of certain data types can lead to loss of IP rights
● Client data may get compromised
MEDIUMHIGHEmployees are trained on phishing and other social engineering techniques.

Passwords have to be changed every six months.
● Use computer-based awareness training to train employees and identify weak points using simulation excercises.
● Install a password manager tool to enforce the use of strong passwords.
HIGHHR or learning and development team

IT team lead
Jul-22First batch of employees to be trained on June 10, 2022. HR head Megha to decide on the batch strength and department for the training sessions.
9
WebsiteUsers are not able to access the websiteDDoS attackThe website runs on a free version of the software package, which offers limited security capabilities.● Loss of clients due to the inability to make online purchases
● Loss of revenue
● Advantage for competitors
MEDIUMHIGHNone in place.
● Move the website to a more secure and trusted platform.
● Get SSL certification for the website.
MEDIUMIT team leadSep-22N/A
10
Security policyData theft or loss due to security breaches at third-party vendorsRansomware attackSecurity considerations are not checked when dealing with third-party vendors.● Data loss
● Loss of revenue and customers
● Regulatory penalties
MEDIUMMEDIUMNone in place.● Check third-party vendor security before getting into a partnership. Add a clause to the partnersip agreement that vendors need to be PCI DSS compliant, and check for any discrepancies.MEDIUMProcurement team leadDec-21Seek advice from legal counsel.
11
User devicesMalicious appsMalware attackEmployees use the same mobile device for office as well as personal work. There is no separation of data and no control of what type of content can be downloaded.● System downtime
● Loss of critical data
● Loss of competitive advantage
HIGHHIGHBring-your-own-device (BYOD) policy with limited guidelines.● Implement endpoint security solutions.
● Monitor devices that are connected to your network.
● Use device management and application management tools to manage the installation of apps from a single, centralized source.
● Revise BYOD policies to enforce greater security.
HIGHIT team lead and HR team leadJun-22Next meeting to discuss progress on proposed controls will be on May 10, 2022.
12
Data storageRecords get lost or manipulated due to poor sharing practicesEmployee negligenceNo common business rules around document and version control management.● Discrepancies in the records maintained by different teams and/or between the company and client firms, leading to loss of trust and data mismanagement
● Data loss without any backups
HIGHMEDIUMTeams have their own policies around data storage.● Develop and implement centralized policy and procedures around version control.
● Lock down share drives.
● Implement an electronic documents and records management system (EDRMS) for content management.
HIGHIT team lead and department headsJul-22Policy preparation to be completed by May 31, 2022.
13
Employee dataA terminated employee dials into the company's network and accesses proprietary informationDisgruntled former employeesTerminated employees' system identifiers are not removed soon enough● Loss of data
● Data misuse
LOWMEDIUMTerminated employee details are removed every three months.● Ensure employee identifiers are archived within a week of an employee leaving.LOWIT team leadDec-21N/A
14
APIAPI key exposureDisgruntled employeesInsecure storage of API keys.

API keys that are no longer needed, are not disposed off securely.
● Attackers with illegal access to keys can cause a denial of service.MEDIUMMEDIUMOnly SSL keys are disposed off routinely.● Ensure API keys are stored well and disposed off routinely.
● Implement API gateway software to provide the API security administrator with complete control over access management, threat detection, confidentiality, integrity, and audits for every API the organization publishes.
MEDIUMIT team leadDec-22N/A
15
FirewallUnauthorized users hack into the system through the internetRansomware attackCompany's firewall allows inbound telnet, and guest ID is enabled on XYZ server.● Unauthorized access to sensitive files due to system vulnerabilitiesHIGHLOWNone in place.● Control the firewall's inbound traffice files.MEDIUMIT teamDec-22N/A
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100