SlideShare a Scribd company logo
1 of 3
Security Risk Assessment 
Project Work ID: <Remedy ID> 
Project Title: <Meaningful Title for Project> 
Prepared by: <Name of Project Manager> 
Date of Document: <MM/DD/YYYY> 
1. BUSINESS NEED 
2. RISK QUESTIONS 
The goal of these questions is to have the individual submitting a “need for security risk assessment” 
to provide enough information to determine if an assessment should be performed. 
2.1 What is the mission/business need for the system/service/application? 
2.2 Is there an architecture document available? If so, please provide it. 
2.3 Is the service or application considered an enterprise application/service1? 
2.3.1 Does the application provide functional support to more than one 
department? Which ones? 
2.3.2 Is the service or application accessed by faculty/staff of more than one 
department? Can you define the group? 
2.3.3 Is the service or application accessed by students? 
2.3.4 Would the loss or interruption of this service negatively impact standard 
University operations? 
2.3.5 Would the loss, interruption, of compromise of this system have the potential 
to negatively impact the public perceptions of the University? 
2.4 Is the service or application dealing with restricted data2? 
1 Enterprise Systems Policy - http://its.uncg.edu/Policy_Manual/Enterprise_Systems/ 
2 Data Classification Policy - http://its.uncg.edu/Policy_Manual/Data/default.aspx 
10/1/2014 PAGE 1 OF 3 Security Risk 
Assessment 
Template Version 2.0
Security Risk Assessment 
2.4.1 What applicable law/regulation is applicable? 
2.4.2 How sensitive is the data? 
2.5 Is the application using University credentials3? 
2.6 Who are the target users of the service/application? 
2.6.1 What would be means of restricting the service/application to that target 
community? 
2.6.2 Who is making modifications in the data? 
2.6.3 How is the access authority managed? 
2.7 What connections does the system/application have to other systems? 
2.8 Does the confidentially, integrity, and availability of the data matter to the users of 
the system? 
2.9 What known risks are there associated with the application/service/system? 
Beyond the standard physical access, network and web server specific risks: 
3. ASSUMPTIONS 
4. SUMMARY 
5. SIGNATURES 
The signatures below certify that the Project Manager has met with and reviewed this document with 
the individuals below and the information contained herein is accurate. 
3 Account Management Procedure - 
http://its.uncg.edu/Technology_Procedures/Acceptable_Use/Account_Management/ 
10/1/2014 PAGE 2 OF 3 Security Risk 
Assessment 
Template Version 2.0
Security Risk Assessment 
Name Role/Title Signature Date 
Chuck Curry 
Director, ITS 
Technical Planning 
and Security 
Project Manager 
Client 
ITS AVC 
OR 
UNCG Client: 
Name Title Signature Date 
UNCG ITS Associate Vice Chancellor: 
Name Title Signature Date 
UNCG Information Technology Services: 
Name Title Signature Date 
Director, ITS Technical 
Planning and Security 
10/1/2014 PAGE 3 OF 3 Security Risk 
Assessment 
Template Version 2.0

More Related Content

What's hot

Low level design template (1)
Low level design template (1)Low level design template (1)
Low level design template (1)anosha jamshed
 
Software Engineering - Chapter 4 - Requirements engineering
Software Engineering - Chapter 4 - Requirements engineering  Software Engineering - Chapter 4 - Requirements engineering
Software Engineering - Chapter 4 - Requirements engineering Ra'Fat Al-Msie'deen
 
High level design document template
High level design document templateHigh level design document template
High level design document templateanosha jamshed
 
Requirement Change Request Template
Requirement Change Request TemplateRequirement Change Request Template
Requirement Change Request Templatesanjeev085
 
Daycare construction project
Daycare construction projectDaycare construction project
Daycare construction projectYOUBEJOSEPH
 
Requirements validation - requirements engineering
Requirements validation - requirements engineeringRequirements validation - requirements engineering
Requirements validation - requirements engineeringRa'Fat Al-Msie'deen
 
Engineering Software Products: 5. cloud based software
Engineering Software Products: 5. cloud based softwareEngineering Software Products: 5. cloud based software
Engineering Software Products: 5. cloud based softwaresoftware-engineering-book
 
Software Engineering Process
Software Engineering ProcessSoftware Engineering Process
Software Engineering ProcessAbdul Naqashbandi
 
Ch9-Software Engineering 9
Ch9-Software Engineering 9Ch9-Software Engineering 9
Ch9-Software Engineering 9Ian Sommerville
 
Change request form
Change request form Change request form
Change request form Stefan Csosz
 
Ch23-Software Engineering 9
Ch23-Software Engineering 9Ch23-Software Engineering 9
Ch23-Software Engineering 9Ian Sommerville
 
MANAGING S/W DESIGN CHANGES USING C.R. DESIGNER
MANAGING S/W DESIGN CHANGES USING C.R. DESIGNERMANAGING S/W DESIGN CHANGES USING C.R. DESIGNER
MANAGING S/W DESIGN CHANGES USING C.R. DESIGNERIJSEA
 

What's hot (20)

Low level design template (1)
Low level design template (1)Low level design template (1)
Low level design template (1)
 
Software Engineering - Chapter 4 - Requirements engineering
Software Engineering - Chapter 4 - Requirements engineering  Software Engineering - Chapter 4 - Requirements engineering
Software Engineering - Chapter 4 - Requirements engineering
 
High level design document template
High level design document templateHigh level design document template
High level design document template
 
Requirement Change Request Template
Requirement Change Request TemplateRequirement Change Request Template
Requirement Change Request Template
 
Print report
Print reportPrint report
Print report
 
Ch24 quality management
Ch24 quality managementCh24 quality management
Ch24 quality management
 
Daycare construction project
Daycare construction projectDaycare construction project
Daycare construction project
 
Requirements validation - requirements engineering
Requirements validation - requirements engineeringRequirements validation - requirements engineering
Requirements validation - requirements engineering
 
Engineering Software Products: 5. cloud based software
Engineering Software Products: 5. cloud based softwareEngineering Software Products: 5. cloud based software
Engineering Software Products: 5. cloud based software
 
Chap4 RE validation
Chap4 RE validationChap4 RE validation
Chap4 RE validation
 
Software Engineering Process
Software Engineering ProcessSoftware Engineering Process
Software Engineering Process
 
Ch11 reliability engineering
Ch11 reliability engineeringCh11 reliability engineering
Ch11 reliability engineering
 
Ch9-Software Engineering 9
Ch9-Software Engineering 9Ch9-Software Engineering 9
Ch9-Software Engineering 9
 
Ch7
Ch7Ch7
Ch7
 
Change request form
Change request form Change request form
Change request form
 
Ch23-Software Engineering 9
Ch23-Software Engineering 9Ch23-Software Engineering 9
Ch23-Software Engineering 9
 
USDA-funcSpecs
USDA-funcSpecsUSDA-funcSpecs
USDA-funcSpecs
 
MANAGING S/W DESIGN CHANGES USING C.R. DESIGNER
MANAGING S/W DESIGN CHANGES USING C.R. DESIGNERMANAGING S/W DESIGN CHANGES USING C.R. DESIGNER
MANAGING S/W DESIGN CHANGES USING C.R. DESIGNER
 
Chap5 RE management
Chap5 RE managementChap5 RE management
Chap5 RE management
 
Block 1 ms-034 unit-3
Block 1 ms-034 unit-3Block 1 ms-034 unit-3
Block 1 ms-034 unit-3
 

Viewers also liked

Project meeting minutes template v2.0
Project meeting minutes template v2.0Project meeting minutes template v2.0
Project meeting minutes template v2.0Aditya Pandey
 
Project status report template v2.0
Project status report template v2.0Project status report template v2.0
Project status report template v2.0Aditya Pandey
 
Sap bpc 10 end to end implementation training
Sap bpc 10 end to end implementation trainingSap bpc 10 end to end implementation training
Sap bpc 10 end to end implementation traininggriteshkaran
 
Igqie14 analytics and ethics 20141107
Igqie14   analytics and ethics 20141107Igqie14   analytics and ethics 20141107
Igqie14 analytics and ethics 20141107Alan D. Duncan
 
The one question you must never ask!" (Information Requirements Gathering for...
The one question you must never ask!" (Information Requirements Gathering for...The one question you must never ask!" (Information Requirements Gathering for...
The one question you must never ask!" (Information Requirements Gathering for...Alan D. Duncan
 
04. Logical Data Definition template
04. Logical Data Definition template04. Logical Data Definition template
04. Logical Data Definition templateAlan D. Duncan
 
WHITE PAPER: Distributed Data Quality
WHITE PAPER: Distributed Data QualityWHITE PAPER: Distributed Data Quality
WHITE PAPER: Distributed Data QualityAlan D. Duncan
 
02. Information solution outline template
02. Information solution outline template02. Information solution outline template
02. Information solution outline templateAlan D. Duncan
 
05. Physical Data Specification Template
05. Physical Data Specification Template05. Physical Data Specification Template
05. Physical Data Specification TemplateAlan D. Duncan
 
Example data specifications and info requirements framework OVERVIEW
Example data specifications and info requirements framework OVERVIEWExample data specifications and info requirements framework OVERVIEW
Example data specifications and info requirements framework OVERVIEWAlan D. Duncan
 
Managing for Effective Data Governance: workshop for DQ Asia Pacific Congress...
Managing for Effective Data Governance: workshop for DQ Asia Pacific Congress...Managing for Effective Data Governance: workshop for DQ Asia Pacific Congress...
Managing for Effective Data Governance: workshop for DQ Asia Pacific Congress...Alan D. Duncan
 
Road To Success In Business Intelligence
Road To Success In Business IntelligenceRoad To Success In Business Intelligence
Road To Success In Business Intelligencesilvaft
 
06. Transformation Logic Template (Source to Target)
06. Transformation Logic Template (Source to Target)06. Transformation Logic Template (Source to Target)
06. Transformation Logic Template (Source to Target)Alan D. Duncan
 
GoogleWave presentation from Opensource Days 2010
GoogleWave presentation from Opensource Days 2010GoogleWave presentation from Opensource Days 2010
GoogleWave presentation from Opensource Days 2010Figaf.com
 
A step by-step process to design and manage a successful sap bi implementatio...
A step by-step process to design and manage a successful sap bi implementatio...A step by-step process to design and manage a successful sap bi implementatio...
A step by-step process to design and manage a successful sap bi implementatio...Xoomworks Business Intelligence
 
Steel India Limited Business Blue print
Steel India Limited Business Blue printSteel India Limited Business Blue print
Steel India Limited Business Blue printLav Memories
 
03. Business Information Requirements Template
03. Business Information Requirements Template03. Business Information Requirements Template
03. Business Information Requirements TemplateAlan D. Duncan
 
Capturing Data Requirements
Capturing Data RequirementsCapturing Data Requirements
Capturing Data Requirementsmcomtraining
 
SAP BI Requirements Gathering Process
SAP BI Requirements Gathering ProcessSAP BI Requirements Gathering Process
SAP BI Requirements Gathering Processsilvaft
 

Viewers also liked (20)

Project meeting minutes template v2.0
Project meeting minutes template v2.0Project meeting minutes template v2.0
Project meeting minutes template v2.0
 
Project status report template v2.0
Project status report template v2.0Project status report template v2.0
Project status report template v2.0
 
Sap bpc 10 end to end implementation training
Sap bpc 10 end to end implementation trainingSap bpc 10 end to end implementation training
Sap bpc 10 end to end implementation training
 
Igqie14 analytics and ethics 20141107
Igqie14   analytics and ethics 20141107Igqie14   analytics and ethics 20141107
Igqie14 analytics and ethics 20141107
 
The one question you must never ask!" (Information Requirements Gathering for...
The one question you must never ask!" (Information Requirements Gathering for...The one question you must never ask!" (Information Requirements Gathering for...
The one question you must never ask!" (Information Requirements Gathering for...
 
04. Logical Data Definition template
04. Logical Data Definition template04. Logical Data Definition template
04. Logical Data Definition template
 
WHITE PAPER: Distributed Data Quality
WHITE PAPER: Distributed Data QualityWHITE PAPER: Distributed Data Quality
WHITE PAPER: Distributed Data Quality
 
02. Information solution outline template
02. Information solution outline template02. Information solution outline template
02. Information solution outline template
 
05. Physical Data Specification Template
05. Physical Data Specification Template05. Physical Data Specification Template
05. Physical Data Specification Template
 
Example data specifications and info requirements framework OVERVIEW
Example data specifications and info requirements framework OVERVIEWExample data specifications and info requirements framework OVERVIEW
Example data specifications and info requirements framework OVERVIEW
 
Managing for Effective Data Governance: workshop for DQ Asia Pacific Congress...
Managing for Effective Data Governance: workshop for DQ Asia Pacific Congress...Managing for Effective Data Governance: workshop for DQ Asia Pacific Congress...
Managing for Effective Data Governance: workshop for DQ Asia Pacific Congress...
 
Road To Success In Business Intelligence
Road To Success In Business IntelligenceRoad To Success In Business Intelligence
Road To Success In Business Intelligence
 
06. Transformation Logic Template (Source to Target)
06. Transformation Logic Template (Source to Target)06. Transformation Logic Template (Source to Target)
06. Transformation Logic Template (Source to Target)
 
BPD Design Template
BPD Design TemplateBPD Design Template
BPD Design Template
 
GoogleWave presentation from Opensource Days 2010
GoogleWave presentation from Opensource Days 2010GoogleWave presentation from Opensource Days 2010
GoogleWave presentation from Opensource Days 2010
 
A step by-step process to design and manage a successful sap bi implementatio...
A step by-step process to design and manage a successful sap bi implementatio...A step by-step process to design and manage a successful sap bi implementatio...
A step by-step process to design and manage a successful sap bi implementatio...
 
Steel India Limited Business Blue print
Steel India Limited Business Blue printSteel India Limited Business Blue print
Steel India Limited Business Blue print
 
03. Business Information Requirements Template
03. Business Information Requirements Template03. Business Information Requirements Template
03. Business Information Requirements Template
 
Capturing Data Requirements
Capturing Data RequirementsCapturing Data Requirements
Capturing Data Requirements
 
SAP BI Requirements Gathering Process
SAP BI Requirements Gathering ProcessSAP BI Requirements Gathering Process
SAP BI Requirements Gathering Process
 

Similar to Security risk assessment template v2.0

Project report college information management system on Advanced Java
Project report college information management system on Advanced JavaProject report college information management system on Advanced Java
Project report college information management system on Advanced JavaRishabh Kumar ☁️
 
ACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docxACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docxnettletondevon
 
ACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docxACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docxbobbywlane695641
 
SCHOOL_MANAGEMENT_SYSTEM_This_Report_Pre.doc
SCHOOL_MANAGEMENT_SYSTEM_This_Report_Pre.docSCHOOL_MANAGEMENT_SYSTEM_This_Report_Pre.doc
SCHOOL_MANAGEMENT_SYSTEM_This_Report_Pre.docbosed0737
 
Threat and Risk Assessment QuestionnaireCompletion da.docx
 Threat and Risk Assessment QuestionnaireCompletion da.docx Threat and Risk Assessment QuestionnaireCompletion da.docx
Threat and Risk Assessment QuestionnaireCompletion da.docxMARRY7
 
Chapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfChapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfKamal Acharya
 
Chapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfChapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfKamal Acharya
 
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONSQUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONSIJCSEA Journal
 
Alumni Record System
Alumni Record SystemAlumni Record System
Alumni Record SystemIRJET Journal
 
project documentation.docx
project documentation.docxproject documentation.docx
project documentation.docxpoojamogaveer
 
A secure cloud service deployment framework for DevOps
A secure cloud service deployment framework for DevOpsA secure cloud service deployment framework for DevOps
A secure cloud service deployment framework for DevOpsnooriasukmaningtyas
 
Running head APPLICATIONS RELATIVE TO COURSE OBJECTIVES .docx
Running head APPLICATIONS RELATIVE TO COURSE OBJECTIVES          .docxRunning head APPLICATIONS RELATIVE TO COURSE OBJECTIVES          .docx
Running head APPLICATIONS RELATIVE TO COURSE OBJECTIVES .docxtoddr4
 
The impact of user involvement in software development process
The impact of user involvement in software development processThe impact of user involvement in software development process
The impact of user involvement in software development processnooriasukmaningtyas
 
E filling system (report)
E filling system (report)E filling system (report)
E filling system (report)Badrul Alam
 
IMPLEMENTATION OF MOSRE FRAMEWORK FOR A WEB APPLICATION - A CASE STUDY
IMPLEMENTATION OF MOSRE FRAMEWORK FOR A WEB APPLICATION - A CASE STUDYIMPLEMENTATION OF MOSRE FRAMEWORK FOR A WEB APPLICATION - A CASE STUDY
IMPLEMENTATION OF MOSRE FRAMEWORK FOR A WEB APPLICATION - A CASE STUDYijwscjournal
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYShivananda Rai
 

Similar to Security risk assessment template v2.0 (20)

Project report college information management system on Advanced Java
Project report college information management system on Advanced JavaProject report college information management system on Advanced Java
Project report college information management system on Advanced Java
 
ACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docxACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docx
 
ACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docxACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docx
 
SCHOOL_MANAGEMENT_SYSTEM_This_Report_Pre.doc
SCHOOL_MANAGEMENT_SYSTEM_This_Report_Pre.docSCHOOL_MANAGEMENT_SYSTEM_This_Report_Pre.doc
SCHOOL_MANAGEMENT_SYSTEM_This_Report_Pre.doc
 
Threat and Risk Assessment QuestionnaireCompletion da.docx
 Threat and Risk Assessment QuestionnaireCompletion da.docx Threat and Risk Assessment QuestionnaireCompletion da.docx
Threat and Risk Assessment QuestionnaireCompletion da.docx
 
Chapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfChapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdf
 
Chapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfChapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdf
 
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONSQUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
 
Alumni Record System
Alumni Record SystemAlumni Record System
Alumni Record System
 
project documentation.docx
project documentation.docxproject documentation.docx
project documentation.docx
 
A secure cloud service deployment framework for DevOps
A secure cloud service deployment framework for DevOpsA secure cloud service deployment framework for DevOps
A secure cloud service deployment framework for DevOps
 
Running head APPLICATIONS RELATIVE TO COURSE OBJECTIVES .docx
Running head APPLICATIONS RELATIVE TO COURSE OBJECTIVES          .docxRunning head APPLICATIONS RELATIVE TO COURSE OBJECTIVES          .docx
Running head APPLICATIONS RELATIVE TO COURSE OBJECTIVES .docx
 
Ijcet 06 07_005
Ijcet 06 07_005Ijcet 06 07_005
Ijcet 06 07_005
 
The impact of user involvement in software development process
The impact of user involvement in software development processThe impact of user involvement in software development process
The impact of user involvement in software development process
 
E filling system (report)
E filling system (report)E filling system (report)
E filling system (report)
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
FinalReviewReport
FinalReviewReportFinalReviewReport
FinalReviewReport
 
IMPLEMENTATION OF MOSRE FRAMEWORK FOR A WEB APPLICATION - A CASE STUDY
IMPLEMENTATION OF MOSRE FRAMEWORK FOR A WEB APPLICATION - A CASE STUDYIMPLEMENTATION OF MOSRE FRAMEWORK FOR A WEB APPLICATION - A CASE STUDY
IMPLEMENTATION OF MOSRE FRAMEWORK FOR A WEB APPLICATION - A CASE STUDY
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
 

More from Aditya Pandey

Project scope statement template v2.3
Project scope statement template v2.3Project scope statement template v2.3
Project scope statement template v2.3Aditya Pandey
 
Project closure template v3.0
Project closure template v3.0Project closure template v3.0
Project closure template v3.0Aditya Pandey
 
Project client signoff template v2.0
Project client signoff template v2.0Project client signoff template v2.0
Project client signoff template v2.0Aditya Pandey
 
Project change request template v2.0
Project change request template v2.0Project change request template v2.0
Project change request template v2.0Aditya Pandey
 
Project agenda template v2.0
Project agenda template v2.0Project agenda template v2.0
Project agenda template v2.0Aditya Pandey
 
Pmo document template
Pmo document templatePmo document template
Pmo document templateAditya Pandey
 
Its resource estimate for work request v c
Its resource estimate for work request v c Its resource estimate for work request v c
Its resource estimate for work request v c Aditya Pandey
 
Its resource estimate for work request v2.3
Its resource estimate for work request v2.3Its resource estimate for work request v2.3
Its resource estimate for work request v2.3Aditya Pandey
 
Communication plantemplate
Communication plantemplateCommunication plantemplate
Communication plantemplateAditya Pandey
 
XXXX BBP Summary Template
XXXX BBP Summary Template XXXX BBP Summary Template
XXXX BBP Summary Template Aditya Pandey
 
SAP SD Business Blue Print E1 Sales Template
SAP SD Business Blue Print E1 Sales TemplateSAP SD Business Blue Print E1 Sales Template
SAP SD Business Blue Print E1 Sales TemplateAditya Pandey
 
Visa photo dimensions sample photos rules_adults
Visa photo dimensions sample photos rules_adultsVisa photo dimensions sample photos rules_adults
Visa photo dimensions sample photos rules_adultsAditya Pandey
 
Visa photo dimensions sample photos rejected_photos
Visa photo dimensions sample photos rejected_photosVisa photo dimensions sample photos rejected_photos
Visa photo dimensions sample photos rejected_photosAditya Pandey
 
Visa photo dimensions sample photos children
Visa photo dimensions sample photos childrenVisa photo dimensions sample photos children
Visa photo dimensions sample photos childrenAditya Pandey
 
Visa photo dimensions sample photos adults
Visa photo dimensions sample photos adultsVisa photo dimensions sample photos adults
Visa photo dimensions sample photos adultsAditya Pandey
 
Configurationguidecin 121107011256-phpapp02
Configurationguidecin 121107011256-phpapp02Configurationguidecin 121107011256-phpapp02
Configurationguidecin 121107011256-phpapp02Aditya Pandey
 

More from Aditya Pandey (18)

Project scope statement template v2.3
Project scope statement template v2.3Project scope statement template v2.3
Project scope statement template v2.3
 
Project closure template v3.0
Project closure template v3.0Project closure template v3.0
Project closure template v3.0
 
Project client signoff template v2.0
Project client signoff template v2.0Project client signoff template v2.0
Project client signoff template v2.0
 
Project change request template v2.0
Project change request template v2.0Project change request template v2.0
Project change request template v2.0
 
Project agenda template v2.0
Project agenda template v2.0Project agenda template v2.0
Project agenda template v2.0
 
Pmo document template
Pmo document templatePmo document template
Pmo document template
 
Its resource estimate for work request v c
Its resource estimate for work request v c Its resource estimate for work request v c
Its resource estimate for work request v c
 
Its resource estimate for work request v2.3
Its resource estimate for work request v2.3Its resource estimate for work request v2.3
Its resource estimate for work request v2.3
 
Communication plantemplate
Communication plantemplateCommunication plantemplate
Communication plantemplate
 
Swot analysis
Swot analysisSwot analysis
Swot analysis
 
XXXX BBP Summary Template
XXXX BBP Summary Template XXXX BBP Summary Template
XXXX BBP Summary Template
 
SAP SD Business Blue Print E1 Sales Template
SAP SD Business Blue Print E1 Sales TemplateSAP SD Business Blue Print E1 Sales Template
SAP SD Business Blue Print E1 Sales Template
 
Visa photo dimensions sample photos rules_adults
Visa photo dimensions sample photos rules_adultsVisa photo dimensions sample photos rules_adults
Visa photo dimensions sample photos rules_adults
 
Visa photo dimensions sample photos rejected_photos
Visa photo dimensions sample photos rejected_photosVisa photo dimensions sample photos rejected_photos
Visa photo dimensions sample photos rejected_photos
 
Visa photo dimensions sample photos children
Visa photo dimensions sample photos childrenVisa photo dimensions sample photos children
Visa photo dimensions sample photos children
 
Visa photo dimensions sample photos adults
Visa photo dimensions sample photos adultsVisa photo dimensions sample photos adults
Visa photo dimensions sample photos adults
 
Configurationguidecin 121107011256-phpapp02
Configurationguidecin 121107011256-phpapp02Configurationguidecin 121107011256-phpapp02
Configurationguidecin 121107011256-phpapp02
 
SAP MM Config Guide
SAP MM Config GuideSAP MM Config Guide
SAP MM Config Guide
 

Recently uploaded

How Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptxHow Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptxAaron Stannard
 
Safety T fire missions army field Artillery
Safety T fire missions army field ArtillerySafety T fire missions army field Artillery
Safety T fire missions army field ArtilleryKennethSwanberg
 
digital Human resource management presentation.pdf
digital Human resource management presentation.pdfdigital Human resource management presentation.pdf
digital Human resource management presentation.pdfArtiSrivastava23
 
internship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamrainternship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamraAllTops
 
The Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard BrownThe Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard BrownSandaliGurusinghe2
 
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime SiliguriSiliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siligurimeghakumariji156
 
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot ModelGautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNitya salvi
 
Information Technology Project Management, Revised 7th edition test bank.docx
Information Technology Project Management, Revised 7th edition test bank.docxInformation Technology Project Management, Revised 7th edition test bank.docx
Information Technology Project Management, Revised 7th edition test bank.docxssuserf63bd7
 
Marketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docxMarketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docxssuserf63bd7
 
Persuasive and Communication is the art of negotiation.
Persuasive and Communication is the art of negotiation.Persuasive and Communication is the art of negotiation.
Persuasive and Communication is the art of negotiation.aruny7087
 
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professionalW.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professionalWilliam (Bill) H. Bender, FCSI
 
International Ocean Transportation p.pdf
International Ocean Transportation p.pdfInternational Ocean Transportation p.pdf
International Ocean Transportation p.pdfAlejandromexEspino
 
Beyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable developmentBeyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable developmentNimot Muili
 

Recently uploaded (14)

How Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptxHow Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptx
 
Safety T fire missions army field Artillery
Safety T fire missions army field ArtillerySafety T fire missions army field Artillery
Safety T fire missions army field Artillery
 
digital Human resource management presentation.pdf
digital Human resource management presentation.pdfdigital Human resource management presentation.pdf
digital Human resource management presentation.pdf
 
internship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamrainternship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamra
 
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTECAbortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
 
The Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard BrownThe Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard Brown
 
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime SiliguriSiliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
 
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot ModelGautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Information Technology Project Management, Revised 7th edition test bank.docx
Information Technology Project Management, Revised 7th edition test bank.docxInformation Technology Project Management, Revised 7th edition test bank.docx
Information Technology Project Management, Revised 7th edition test bank.docx
 
Marketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docxMarketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docx
 
Persuasive and Communication is the art of negotiation.
Persuasive and Communication is the art of negotiation.Persuasive and Communication is the art of negotiation.
Persuasive and Communication is the art of negotiation.
 
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professionalW.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
 
International Ocean Transportation p.pdf
International Ocean Transportation p.pdfInternational Ocean Transportation p.pdf
International Ocean Transportation p.pdf
 
Beyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable developmentBeyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable development
 

Security risk assessment template v2.0

  • 1. Security Risk Assessment Project Work ID: <Remedy ID> Project Title: <Meaningful Title for Project> Prepared by: <Name of Project Manager> Date of Document: <MM/DD/YYYY> 1. BUSINESS NEED 2. RISK QUESTIONS The goal of these questions is to have the individual submitting a “need for security risk assessment” to provide enough information to determine if an assessment should be performed. 2.1 What is the mission/business need for the system/service/application? 2.2 Is there an architecture document available? If so, please provide it. 2.3 Is the service or application considered an enterprise application/service1? 2.3.1 Does the application provide functional support to more than one department? Which ones? 2.3.2 Is the service or application accessed by faculty/staff of more than one department? Can you define the group? 2.3.3 Is the service or application accessed by students? 2.3.4 Would the loss or interruption of this service negatively impact standard University operations? 2.3.5 Would the loss, interruption, of compromise of this system have the potential to negatively impact the public perceptions of the University? 2.4 Is the service or application dealing with restricted data2? 1 Enterprise Systems Policy - http://its.uncg.edu/Policy_Manual/Enterprise_Systems/ 2 Data Classification Policy - http://its.uncg.edu/Policy_Manual/Data/default.aspx 10/1/2014 PAGE 1 OF 3 Security Risk Assessment Template Version 2.0
  • 2. Security Risk Assessment 2.4.1 What applicable law/regulation is applicable? 2.4.2 How sensitive is the data? 2.5 Is the application using University credentials3? 2.6 Who are the target users of the service/application? 2.6.1 What would be means of restricting the service/application to that target community? 2.6.2 Who is making modifications in the data? 2.6.3 How is the access authority managed? 2.7 What connections does the system/application have to other systems? 2.8 Does the confidentially, integrity, and availability of the data matter to the users of the system? 2.9 What known risks are there associated with the application/service/system? Beyond the standard physical access, network and web server specific risks: 3. ASSUMPTIONS 4. SUMMARY 5. SIGNATURES The signatures below certify that the Project Manager has met with and reviewed this document with the individuals below and the information contained herein is accurate. 3 Account Management Procedure - http://its.uncg.edu/Technology_Procedures/Acceptable_Use/Account_Management/ 10/1/2014 PAGE 2 OF 3 Security Risk Assessment Template Version 2.0
  • 3. Security Risk Assessment Name Role/Title Signature Date Chuck Curry Director, ITS Technical Planning and Security Project Manager Client ITS AVC OR UNCG Client: Name Title Signature Date UNCG ITS Associate Vice Chancellor: Name Title Signature Date UNCG Information Technology Services: Name Title Signature Date Director, ITS Technical Planning and Security 10/1/2014 PAGE 3 OF 3 Security Risk Assessment Template Version 2.0