Professional Documents
Culture Documents
Version:1.0 January,2010
Government of India Department of Information Technology Ministry of Communications and Information Technology New Delhi 110 003
ESecurityAssuranceFramework
DocumentNo:eSAFEGD300
GD300
DepartmentofIT
GovernmentofIndia MinistryofCommunications&IT ElectronicsNiketan,6CGOComplex NewDelhi110003
VersionNo:1.0
January,2010
Page2of20
ESecurityAssuranceFramework
DocumentNo:eSAFEGD300
Introduction
Giventhesophisticationoftoday'scyberthreatsandtherichtargetsthatgovernmentinformationsystems provide, eSAFE security standards and guidelines need to be flexible and extensible. In that light, risk assessmentplaysanimportantpartineGovernanceISprogramandoverallprotectionstrategy. Once a eGovernance project choose and tailor the baseline security controls based on the initial security categorizationasperGD100andtherespectivebaselinesecuritycontrolsets(GD201,GD202,GD203),they must select additional controls based on risk assessment. The assessment is employed in a more targeted manner to consider additional threat information, specific mission requirements, operating environments, andanyotherfactorsthatmightaffectaccomplishmentoftheprojectsmissionorfunctions. The eGovernance projects can add appropriate security controls or control improvements from the GD200 catalog, demonstrating the commitment to increasing informationsystem security levels beyond required minimumbaselines.Onceagreedonthesecuritycontrols,thoseneedtobedocumentedandimplementedin theeGovernanceproject. This guideline documents information security risk assessment and management methodology for eGovernance projects and is one of the documents identified in the eGovernance Security Assurance Framework(eSAFE).Thelistofthedocumentsisgivenbelow. Document No. ISF 01 GD 100 Document Title Information Security Assessment Framework Guidelines for Security Categorization of eGovernance Information Systems Catalog of Security Controls Baseline Security Controls for LOW IMPACT INFORMATION SYSTEMS Baseline Security Controls for MEDIUM IMPACT INFORMATION SYSTEMS Baseline Security Controls for HIGH IMPACT INFORMATION SYSTEMS Guidelines for Implementation of Security Controls Guidelines for Assessment of Effectiveness of Security Controls Guidelines for Information Security Risk Assessment and Management
GD 200 GD 201
GD 202
GD 203
VersionNo:1.0
January,2010
Page3of20
ESecurityAssuranceFramework
DocumentNo:eSAFEGD300
Contents
Introduction............................................................................................................................................3 Contents.................................................................................................................................................4 1.0Scope.........................................................................................................................................................6 1.1Objective................................................................................................................................................6 1.2Description............................................................................................................................................6 2.0TargetAudience ........................................................................................................................................6 . 3.0TypeofDocument.....................................................................................................................................6 4.0DefinitionsandAcronyms.........................................................................................................................6 5.0InformationSecurityRiskManagementProcess......................................................................................7 6.0RiskAssessment ........................................................................................................................................8 . 6.1Step1:InformationSystemAssetIdentification .................................................................................9 . 6.2Step2:RiskIdentification.....................................................................................................................9 6.3Step3:RiskLikelihoodAssessment....................................................................................................10 6.4Step4:RiskImpactAssessment.........................................................................................................11 6.5Step5:RiskEstimation.......................................................................................................................12 7.0RiskTreatment........................................................................................................................................13 . 8.0RiskMonitoringandReview....................................................................................................................14 9.0References...............................................................................................................................................15 10.0Acknowledgementstothecontributors...............................................................................................15 Appendix1:ATypicalListofInformationSystemAssets.............................................................................16 Appendix2:RiskAssessmentSheet..............................................................................................................18 Appendix3:RiskAssessmentExample1......................................................................................................19 Appendix4:RiskAssessmentExample2......................................................................................................20
Tables
Table1:InformationSecurityRiskManagementProcessvisvisISMSPDCA.....................................8 Table2:RiskLikelihoodDefinition......................................................................................................10 Table3:RiskImpactDefinition.............................................................................................................12 Table4:RiskLevelMatrix.....................................................................................................................12 Table5:RiskLevel................................................................................................................................13
VersionNo:1.0
January,2010
Page4of20
ESecurityAssuranceFramework
DocumentNo:eSAFEGD300
Figures
Figure1:RiskManagementProcess ......................................................................................................7 . Figure2:RiskAssessmentMethod........................................................................................................9 . Figure3:RiskTreatment......................................................................................................................13
VersionNo:1.0
January,2010
Page5of20
ESecurityAssuranceFramework
DocumentNo:eSAFEGD300
1.0Scope
1.1Objective ThisdocumentprovidesguidelinesforInformationSecurityRiskAssessmentandManagementin aneGovernanceproject,supportingtheeGovernanceSecurityStandardsFramework(eSAFE).This documentcanalsobeusedtoconductriskassessmentandriskmanagementtocomplythe requirementsofISO/IEC27001. 1.2Description Asystematicapproachtoinformationsecurityriskmanagementisnecessarytoidentify organizationalneedsregardinginformationsecurityrequirementsandtocreateaneffective informationsecuritymanagementsystem(ISMS).Thisapproachshouldbesuitableforthe organizationsenvironment,andinparticularshouldbealignedwithoverallenterpriserisk management.Securityeffortsshouldaddressrisksinaneffectiveandshouldbeanintegralpartof allinformationsecuritymanagementactivitiesandshouldbeappliedbothtotheimplementation andtheongoingoperationofISMS.
2.0TargetAudience
Thisdocumentisrelevanttoconcernedmanagersandstaffforinformationsecurityriskassessment andmanagementwithinanorganization.Itisalsorelevantfortheexternalpartiessupportingsuch activities.
3.0TypeofDocument
ItisaGuidelinesdocumentrecommendedforenforcementinsystemsforeGovernance.
4.0DefinitionsandAcronyms
Forthepurposesofthisdocument,thetermsanddefinitionsgiveninISO/IEC27001,ISO/IEC 27002,ISO/IEC27005,ISO/IECGuide73:2002,NISTSP80030andthefollowingapply. Impact:Adversechangetothelevelofbusinessobjectivesachieved Informationsecurityrisk:Potentialthatagiventhreatwillexploitvulnerabilitiesofanassetor groupofassetsandtherebycauseharmtotheorganization. (NOTE:Itismeasuredintermsofacombinationofthelikelihoodofaneventanditsconsequence.) Riskavoidance:Decisionnottobecomeinvolvedin,oractiontowithdrawfrom,arisksituation [ISO/IECGuide73:2002] Riskidentification:Processtofind,listandcharacterizeelementsofrisk[ISO/IECGuide73:2002] Riskreduction:Actionstakentolessentheprobability,negativeconsequences,orboth,associated witharisk[ISO/IECGuide73:2002] Riskretention:Acceptanceoftheburdenoflossorbenefitofgainfromaparticularrisk[ISO/IEC Guide73:2002]
VersionNo:1.0
January,2010
Page6of20
ESecurityAssuranceFramework
DocumentNo:eSAFEGD300
(NOTE:Inthecontextofinformationsecurityrisks,onlynegativeconsequences(losses)are consideredforriskretention.) Risktransfer:Sharingwithanotherpartytheburdenoflossorbenefitofgain,forarisk[ISO/IEC Guide73:2002] (NOTE:Inthecontextofinformationsecurityrisks,onlynegativeconsequences(losses)are consideredforrisktransfer.) Threat:Thepotentialforathreatsourcetoexploit(accidentallytriggerorintentionallyexploit)a specificvulnerability. Threatsource:Either(1)intentandmethodtargetedattheintentionalexploitationofa vulnerabilityor(2)asituationandmethodthatmayaccidentallytriggeravulnerability. Vulnerability:Aflaworweaknessinsystemsecurityprocedures,design,implementation,or internalcontrolsthatcouldbeexploited(accidentallytriggeredorintentionallyexploited)and resultinasecuritybreachoraviolationofthesystemssecuritypolicy.
5.0InformationSecurityRiskManagementProcess
Riskmanagementprocessconsistsofthreebroadsubprocessesriskassessment,risktreatment andriskmonitoringandreview.TheprocessdiagramisgiveninFigure1
Figure1:RiskManagementProcess
VersionNo:1.0
January,2010
Page7of20
ESecurityAssuranceFramework
DocumentNo:eSAFEGD300
ISMSProcess Plan
InformationSecurityRiskManagementProcess Riskassessment,Risktreatmentplan
Do Check Act
6.0RiskAssessment
Riskassessmentisthefirstsubprocessoftheriskmanagementprocess.Riskassessmentisusedto estimatelevelsoftheidentifiedrisksonthetargetinformationsystemassets.Therisksare functionsofthelikelihoodofagiventhreatsourcesexploitingpotentialvulnerabilities,andthe resultingimpactsofthatadverseeventonthesystemortheorganization. Riskassessmentmethodconsistsoffourprimarysteps,(1)identificationofinformationsystem assets,(2)identificationofrisksforeachoftheassets,(3)assessmentofrisklikelihood,(4) assessmentofriskimpactontheassetand/ortheorganization,(5)Estimationoflevelofrisk.The riskassessmentmethodisrepresenteddiagrammaticallyinFigure2
VersionNo:1.0
January,2010
Page8of20
ESecurityAssuranceFramework
DocumentNo:eSAFEGD300
Figure2:RiskAssessmentMethod
6.1Step1:InformationSystemAssetIdentification Purposeofthisstepistoestablishthescopeofriskassessmentbyidentifyingthetargetinformation systemassets.Theseareusuallyallinformationsystemswhichhelptocarryoutvarious business/missionprocessesorservices.Eachinformationsystemmayconsistofagroupof supportingassetslikehardware,software,network,data/information,users/operators,interfaces etc.However,theriskassessmentcanbedoneonindividualsupportingassetsalsoifrequired.A typicallistofinformationsystemsisgiveninAppendix1 6.2Step2:RiskIdentification Inthisstepforeachtargetassetsidentifiedinstep1asetofpotentialrisksareidentified.These risksarenothingbutsomeincidentscenarios.Anincidentscenariodescribesathreatsourcewhich maycausedamagetotheassetbyexploitingavulnerabilityorsetofvulnerabilities.Outputofthis
VersionNo:1.0
January,2010
Page9of20
ESecurityAssuranceFramework
DocumentNo:eSAFEGD300
stepwillbeanarrayofriskswithuniqueriskid,riskdescriptionandassociatedthreatsand vulnerabilities.AlltheseinformationshouldbecapturedintheRiskAssessmentSheets(Refer Appendix2foratypicalRiskAssessmentSheet).CreateRiskAssessmentSheetsforeachidentified risks. 6.3Step3:RiskLikelihoodAssessment Afteridentifyingtherisksorincidentscenarios,itisnecessarytoassessthelikelihoodofeachrisk. Levelofriskdependsuponthislikelihoodvalue.Thisshouldtakeaccountofhowoftenthethreats occurandhoweasilythevulnerabilitiesmaybeexploited,considering: I. II. Experienceandapplicablestatisticsforthreatlikelihood. Fordeliberatethreats:themotivation,capabilitiesandresourcesavailabletothethreat sources,aswellastheperceptionofattractivenessandvulnerabilityofthetargetassetsfor thethreatsource. foraccidentalthreats:geographicalfactorse.g.proximitytochemicalorpetroleumplants, thepossibilityofextremeweatherconditions,andfactorsthatcouldinfluencehumanerrors andequipmentmalfunction. Identifiedvulnerabilities,bothindividuallyandinaggregation. Existingcontrolsorthebaselinecontrolsandhoweffectivelytheyreducethevulnerabilities.
III.
IV. V.
Table2:RiskLikelihoodDefinition
LikelihoodDefinition Thethreatsourceishighlymotivatedandsufficientlycapableandhaving adequateresources,andcontrolstopreventexploitationofthe vulnerabilitiesareineffective. Thethreatsourceismotivatedandcapablewithadequateresources, butcontrolsareinplacethatmayimpedesuccessfulexploitationofthe vulnerabilities Thethreatsourcelacksmotivationorcapabilityorwithoutadequate resources,orcontrolsareinplacetoprevent,oratleastsignificantly impede,theexploitationofthevulnerabilities.
Medium(0.5)
Low(0.1)
VersionNo:1.0
January,2010
Page10of20
ESecurityAssuranceFramework
DocumentNo:eSAFEGD300
6.4Step4:RiskImpactAssessment Inthissteplevelofadverseimpactisassessedwhichisrequiredinestimatingrisklevel.Theadverse impactofasecurityincidentcanbedescribedintermsoflossordegradationofany,ora combinationofthefollowingthreesecuritygoals:confidentiality,integrityandavailability.The following I. LossofIntegrity:Systemanddataintegrityreferstotherequirementthatinformationbe protectedfromimpropermodification.Integrityislostifunauthorizedchangesaremadeto thedataorITsystembyeitherintentionaloraccidentalacts.Ifthelossofsystemordata integrityisnotcorrected,continueduseofthecontaminatedsystemorcorrupteddata couldresultininaccuracy,fraud,orerroneousdecisions.Also,violationofintegritymaybe thefirststepinasuccessfulattackagainstsystemavailabilityorconfidentiality.Forallthese reasons,lossofintegrityreducestheassuranceofanITsystem. LossofAvailability:IfamissioncriticalITsystemisunavailabletoitsendusers,the organizationsmissionmaybeaffected.Lossofsystemfunctionalityandoperational effectiveness,forexample,mayresultinlossofproductivetime,thusimpedingtheend usersperformanceoftheirfunctionsinsupportingtheorganizationsmission. LossofConfidentiality:Systemanddataconfidentialityreferstotheprotectionof informationfromunauthorizeddisclosure.Theimpactofunauthorizeddisclosureof confidentialinformationcanrangefromthejeopardizingofnationalsecuritytothe disclosureofPrivatedata.Unauthorized,unanticipated,orunintentionaldisclosurecould resultinlossofpublicconfidence,embarrassment,orlegalactionagainsttheorganization.
II.
III.
VersionNo:1.0
January,2010
Page11of20
ESecurityAssuranceFramework
DocumentNo:eSAFEGD300
Table3:RiskImpactDefinition
ImpactLevel(I) High(10)
ImpactDefinition
Exploitation of the vulnerability (1) may result in the highly costly loss of major tangible assets or resources; (2) may significantly violate, harm, or impede an organizations mission, reputation, or interest; or (3) may result in human death or serious injury. Exploitation of the vulnerability (1) may result in the costly loss of tangible assets or resources; (2) may violate, harm, or impede an organizations mission, reputation, or interest; or (3) may result in human injury. Exploitation of the vulnerability (1) may result in the loss of some tangible assets or resources or (2) may noticeably affect an organizations mission, reputation, or interest.
Medium(5)
Low(1)
RiskLevel:Low(1),Medium(>1and5),High(>5)
VersionNo:1.0
January,2010
Page12of20
ESecurityAssuranceFramework
DocumentNo:eSAFEGD300
Table5:RiskLevel
RiskLevel High
RiskDescription Riskneedstobemitigatedassoonaspossible.Risktreatmentplanwith identifiedadditionalcontrolsandcontrolimprovementsandtimeframe forimplementationneedstobeprepared. Riskneedstobemitigatedwithinareasonableperiodoftime.Risk treatmentplanwithidentifiedadditionalcontrolsandcontrol improvementsandtimeframeforimplementationneedstobe prepared. Riskisacceptableandnoothercontrolorcontrolimprovementsare required.
Medium
Low
7.0RiskTreatment
Risktreatmentisasystematicapproachtomitigatetheassessedrisksbyexercisingvariousoptions available.Therearefouroptionsavailableforrisktreatment:riskreduction,riskretention,risk avoidanceandrisktransfer.Figure3illustratestherisktreatmentactivity.
RiskAssessment Results
RiskTreatmentOptions
Risk Risk
Reduction
Retention
Risk Avoidance
Risk
Transfer
ResidualRisk
.
Figure3:RiskTreatment
VersionNo:1.0
January,2010
Page13of20
ESecurityAssuranceFramework
DocumentNo:eSAFEGD300
Riskretention:Ifthelevelofriskmeetstheriskacceptancecriteriatheriskcanberetainedor accepted.ISO27001usesthetermriskacceptanceinsteadofriskretention.Forexample,risk levelof4canberetainediftheriskisacceptableifitislessthan5. Riskavoidance:Whenanidentifiedriskistoohighortherisktreatmentcostexceedsthebenefit, theriskmaybeavoidedbywithdrawingtheconcernedactivitiesandlookingforsuitable alternatives.Forexampleifitisperceivedthatoutsourcingofnetworkmanagementactivityhas veryhighriskduetosensitivityofaproject,takethedecisiontonotoutsourceinsteadbuildyour ownteamfornetworkmanagement. Risktransfer:Sometypeofriskscanbetransferredtoexternalparties.E.g.purchasingofinsurance, outsourcingorobtainingmanagedservicesfromexternalparties. Risktreatmentoptionsshouldbeselectedbasedtheexpectedcostforimplementingtheseoptions andtheexpectedbenefitsfromtheseoptions.Whenlargereductionsinrisksmaybeobtainedwith relativelylowexpenditure,suchoptionsshouldbeimplemented. Ingeneral,theadverseconsequencesofrisksshouldbemadeaslowaspossible.Forsomerareand severeriskscontrolsarenotjustifiableonstrictlyeconomicgroundsbutneedtobeimplemented. (Forexample,businesscontinuitycontrolsconsideredtocoverspecifichighrisks). Thefouroptionsforrisktreatmentarenotmutuallyexclusive.Sometimesitisbeneficialtouse thoseoptionsincombination. Oncetherisktreatmentoptionshavebeendecidedandarisktreatmentplanismade,residualrisks needtobedetermined.Thisinvolvesanupdateoftherisklevels(inthecorrespondingRisk AssessmentSheets),determinedearlierbyconsideringtheeffectsoftherisktreatment.
8.0RiskMonitoringandReview
Risksarenotgenerallystaticasthreats,vulnerabilities,likelihoodorimpactmaychangeanytime. Therefore,constantmonitoringisnecessarytodetectthechanges.Monitoringofthefollowingis necessary. I. II. III. IV. V. VI. VII. VIII. Additionofnewassets Changeinassetvalues Newthreatsthathasnotbeenconsideredduringlastassessments Newvulnerabilitiesdiscovered Informationsecurityincidents Changeinriskimpact Changeincontrols/countermeasures Changeinbusiness/legal/contractualrequirements
Theoutcomeofriskmonitoringactivitiesmaybeinputtoriskreview.Therisksshouldbereviewed regularlyandinlightoftheabovechanges.
VersionNo:1.0
January,2010
Page14of20
ESecurityAssuranceFramework
DocumentNo:eSAFEGD300
9.0References
[1]eSAFEGD100:GuidelinesforSecurityCategorizationofInformationSystems [2]eSAFEGD200:CatalogofSecurityControls [3]FIPSPUB199:StandardsforSecurityCategorizationofFederalInformationandInformation Systems [4]NISTSP80053:RecommendedSecurityControlsforFederalInformationSystems [5]NISTSP80030:RiskManagementGuideforInformationTechnologySystems [6]ISO/IEC27001InformationtechnologySecuritytechniquesInformationsecurity managementsystemsRequirements [7]ISO/IEC27002InformationtechnologySecuritytechniquesCodeofpracticeforinformation securitymanagement [8]ISO/IEC27005:InformationtechnologySecuritytechniquesInformationsecurityrisk management [9]ISO/IECGuide73:2002:RiskmanagementVocabularyGuidelinesforuseinstandards
10.0Acknowledgementstothecontributors
MembersofthecoregroupinSTQC Ms.MitaliChatterjee,SeniorDirector(Convener) Mr.ArvindKumar,Director Mr.N.E.Prasad,Director Mr.B.K.Mondal,Director Mr.AlokeSain,Director Mr.SubhenduDas,Director
VersionNo:1.0
January,2010
Page15of20
ESecurityAssuranceFramework
DocumentNo:eSAFEGD300
Appendix1:ATypicalListofInformationSystemAssets
# 1 AssetDescription FinanceManagementSystem SupportingAssets Hardware: Software Data/Information Services 2 3 4 5 6 7 8 9 HRManagementSystem SalaryProcessingSystem ProductionManagementSystem InternetPortal IntranetPortal EmailService InternetService VPN(RemoteAccess)Service do do do do do do do do do do do do do do
VersionNo:1.0
January,2010
Page16of20
ESecurityAssuranceFramework
DocumentNo:eSAFEGD300
# AssetDescription SupportingAssets do do do do do do do do do do do do do do
16 CentralLoggingServer 17 OSUpdateServices 18 BackupSystem 19 NetworkManagementSystem 20 PrintingService 21 ScanningService 23 UserWorkstations 24 LAN 25 WiFiService 26 Firewall 27 IDS/IPS 28 LeasedLine 29 Support:ServicePowerSupply 30 SupportServiceAirConditioning
VersionNo:1.0
January,2010
Page17of20
ESecurityAssuranceFramework
DocumentNo:eSAFEGD300
Appendix2:RiskAssessmentSheet
RISKASSESSMENTSHEET Asset: RiskNo: <RiskID> Risk Description: ThreatDescription: Vulnerabilities: ExistingControls: LikelihoodLevel: ImpactLevel: <Value> <Value> <Rationale> <Rationale> RiskLevel: RiskTreatmentActions: <Value> <Remarks> <ListSelctedControlsorCotrolImprovementsoranyotheractions> RevisedLikelihoodLevel: <Value> <Rationale> RevisedImpactLevel: <Value> <Rationale> ResidualRiskLevel: <Value> <Remarks> <Listrelevantexistingorplannedcontrolsorbaselinecontrols> <Listrelevantvulnerabilities> <Describethethreat,threatsource> <NameoftheTargetInformationSystemAsset> <Describetheriskorincidentscenario>
VersionNo:1.0
January,2010
Page18of20
ESecurityAssuranceFramework
DocumentNo:eSAFEGD300
Appendix3:RiskAssessmentExample1
RISKASSESSMENTSHEET Asset: RiskNo: R0012 IntranetInformationPortalforEmployees Risk Description: AttackersaccesstoemployeeprivatedatabyDictionaryorBruteForceAttackon theLoginpage. ThreatDescription: Attackercanbeanyuserhavinglegitimateaccesstotheportal.Hecanuseeasilyavailable passwordcrackingtoolorwritescriptstofindoutauserspasswordandcangetaccesstoher privatedata. Vulnerabilities: Theapplicationusesformbasedauthenticationbutithasnotincorporatedanymechanismto limitunsuccessfulattemptsoflogin. ExistingControls: (i)TheportalcanbeaccessedfromtheLAN.NoaccessispossiblefromInternetorpublic network,(ii)Allusersaremadeawareaboutselectionofqualitypasswords,(iii)Physicaland logicalaccesstotheLANworkstationsarerestrictedtotheemployeesonly. LikelihoodLevel: Low 0.1 ImpactLevel: 5 Medium RiskLevel: RiskTreatmentActions: 0.5 RisklevelisLowsinceitislessthan1.Riskisacceptable. NA RevisedLikelihoodLevel: <Value> <Rationale> RevisedImpactLevel: <Value> <Rationale> ResidualRiskLevel: 0.5 LowRisk Somepersonalinformationlikedateofbirth,panno.etc.maybemisusedand whichcancausesomeimpactonanemployee. SinceitisrestrictedtoLANenvironment,andtheothersprivateinformationmay notbethatattractivetomotivatetheemployeestoattack.
VersionNo:1.0
January,2010
Page19of20
ESecurityAssuranceFramework
DocumentNo:eSAFEGD300
Appendix4:RiskAssessmentExample2
RISKASSESSMENTSHEET Asset: RiskNo: R0006 GovernmentInformationPortal Risk Description: Defacingofthewebsite ThreatDescription: Vulnerabilities: ExistingControls: Defacementofwebpagesbymalicioususers. Lackofregularvulnerabilityassessmentofthewebapplication. (i)Thewebserverisplacedbehindasophisticatedfirewallandaccesstothesiteispossible throughport80and443onlywithassociatedsecuritymeasureslikeIPS,(ii)Nouploadingof contentstothesiteisallowedfromInternet,(iii)Webapplicationisthoroughlytestedandthe associatedinfrastructureandoperatingenvironmentishardendbeforeopeningtotheInternet, (iv)Allchangesofcontentsofthesiteiscarriedoutbyauthorisedpersonsbyfollowingchange controlprocedure.(iv)Thewebserverislocatedinthedatacentre,whichisunderstrictphysical andlogicalaccesscontrol,(v)Theserverisprotectedbyantiviruswithfacilitytoautoupdate,(vi) TheOSandapplicationserversareregularlypatchedforsecurityassoonastheyareavailable. Medium 0.5 Althoughmanycontrolshavebeenimplemented,stillmoderatelikelihoodexists because,(i)ItisaGovernmentsiteandmanyantiGovernment/Countryactivists arethereinInternet,(ii)Thewebapplicationisnotassessedforvulnerabilityand configurationmistakesregularly. HugelossofreputationandimageoftheGovernment/Country.
LikelihoodLevel:
ImpactLevel:
High 10
RiskLevel: RiskTreatmentActions:
RisklevelisMedium.Riskisnotacceptableandneedstobetreated.
RevisedLikelihoodLevel:
RevisedImpactLevel:
High 10
ResidualRiskLevel:
VersionNo:1.0
January,2010
Page20of20