iAuditor Mobile App Preview

Network Security Risk Assessment

General

Describe the purpose of this Network Security Risk Assessment

Describe the scope of the risk assessment (including system components, elements, users, field site locations (if any), and any other details about the system to be considered in the assessment)

List all participants including role (e.g. system owner, system custodian, security admin, database admin, network manager, risk assessment team, etc.)

Describe key technology components (applications, databases, operating systems, networks, interconnections, protocols)

Describe how users access the system and their intended use of the system

Risk Assessment

Click Add Vulnerability (+) after you have identified a vulnerability or threat source

Vulnerability
Threat Source & Vulnerability

Observation

Threat source/ vulnerability

Enter threat/vulnerability

Evidence (flow diagrams, screenshots etc.) (optional)

Existing controls

Risk rating

Consequence

Likelihood

Risk rating

Recommended Controls

Recommended controls or alternative options for reducing risk

Completion

Recommendations

Name and Signature

Network Security Risk Assessment Template Checklist

Created by: SafetyCulture Staff | Industry: General | Downloads: 4

Use this risk assessment template specifically designed for IT and network security. Enter as many vulnerabilities observed as needed and fill out the fields, include optional photos or flow diagrams, and provide the risk rating for each threat.

Signup for a free iAuditor account to download and edit this checklist. It will be added to your free account and you will be able to conduct inspections from your mobile device.

Download and edit this free checklist

Browse for other checklists


iauditor logo

The World's #1 Cloud-Based Inspection Software and App

chevron logo
coles logo
emirates logo
overground logo
tesla logo
toyota logo

Network Security Risk Assessment

General

Describe the purpose of this Network Security Risk Assessment

Describe the scope of the risk assessment (including system components, elements, users, field site locations (if any), and any other details about the system to be considered in the assessment)

List all participants including role (e.g. system owner, system custodian, security admin, database admin, network manager, risk assessment team, etc.)

Describe key technology components (applications, databases, operating systems, networks, interconnections, protocols)

Describe how users access the system and their intended use of the system

Risk Assessment

Click Add Vulnerability (+) after you have identified a vulnerability or threat source

Vulnerability
Threat Source & Vulnerability

Observation

Threat source/ vulnerability

Enter threat/vulnerability

Evidence (flow diagrams, screenshots etc.) (optional)

Existing controls

Risk rating

Consequence

Likelihood

Risk rating

Recommended Controls

Recommended controls or alternative options for reducing risk

Completion

Recommendations

Name and Signature