Texas A&M – Information Security Risk Assessment Procedures
Risk Assessment
https://it.tamu.edu/policy/it-risk-management/risk-assessment-procedures/index.php%20
This procedure provides a risk assessment overview and describes the key phases of a risk assessment. The page provides links to related Risk Assessment content that may be useful
Texas A&M – IT Managed Assessment Checklist
Risk Assessment
https://it.tamu.edu/policy/it-risk-management/risk-assessment-procedures/it-managed-assessment-checklist.php%20
The checklist provides an example of steps/activities that might occur in the four phases of a risk assessment: 1) Pre-Assessment, 2) Inventory Management/Resource Identification and Grouping, 3) Assessment and Review, 4) Reporting. The page provides links to related Risk Assessment content that may be useful.
Tripwire – Vulnerability Management Program Best Practices
3.11 3.11.2 Risk Assessment
https://www.tripwire.com/state-of-security/vulnerability-management-best-practice
In this article from Tripwire, they discuss the four stages of a vulnerability management program
Wiz.io – 11 Vulnerability Management Best Practices
3.11 3.11.2 Risk Assessment
https://www.wiz.io/academy/vulnerability-management-best-practices
In this article from Wiz, they discuss the 11 essential vulnerability management best practices organizations should start with.