iAuditor Mobile App Preview

Audit

General

Describe the purpose of this IT security risk assessment

Describe the scope of the risk assessment

List all participants including role (e.g. system owner, system custodian, network manager etc.)

Describe key technology components including commercial software

Describe how users access the system and their intended use of the system

Risk Assessment

Click Add Vulnerability (+) after you have identified a vulnerability or threat source

Vulnerability
Threat Source & Vulnerability

Observation

Threat source/ vulnerability

Enter threat/ vulnerability

Evidence (flow diagrams, screenshots etc.) (optional)

Existing controls

Risk rating

Consequence

Likelihood

Risk rating

Recommended Controls

Recommended controls or alternative options for reducing risk

Completion

Recommendations

Signature

IT Risk Assessment Template Checklist

Created by: Howie Mann | Industry: ICT | Downloads: 1,865

Perform security risk and vulnerability assessments across internal IT technology and systems.

Signup for a free iAuditor account to download and edit this checklist. It will be added to your free account and you will be able to conduct inspections from your mobile device.

Download and edit this free checklist

Browse for other checklists


iauditor logo

The World's #1 Cloud-Based Inspection Software and App

chevron logo
coles logo
emirates logo
overground logo
tesla logo
toyota logo

Audit

General

Describe the purpose of this IT security risk assessment

Describe the scope of the risk assessment

List all participants including role (e.g. system owner, system custodian, network manager etc.)

Describe key technology components including commercial software

Describe how users access the system and their intended use of the system

Risk Assessment

Click Add Vulnerability (+) after you have identified a vulnerability or threat source

Vulnerability
Threat Source & Vulnerability

Observation

Threat source/ vulnerability

Enter threat/ vulnerability

Evidence (flow diagrams, screenshots etc.) (optional)

Existing controls

Risk rating

Consequence

Likelihood

Risk rating

Recommended Controls

Recommended controls or alternative options for reducing risk

Completion

Recommendations

Signature