Lack of security documentation
Risk Description
It leads to weak data and information protection, increased security risks, difficulty in responding to incidents, as well as lack of clarity of security procedures for employees and students.
Existing Controls
No control
Risk Mitigation Policy
- Create a Security Documentation Plan
- Define clear policies for access control and permission levels for sensitive data and systems.
- Create written protocols for handling data breaches, cyber-attacks, or other security incidents. This includes identifying responsible parties, containment procedures, and communication strategies.
- Create and document procedures for data backup, storage, and recovery to ensure continuity of operations in the event of data loss or system failures
Location/Contact Person details
The chairman of risk management sub-committee in UTAS-SUR
Dr.Sami Al-Batashi, Phone: +968 9293 9604
Email: sami.albattashi@utas.edu.om
Risk Management Authority
Risk Management Committee in UTAS-SUR
Risk Likelihood
High
Risk Impact
High
Risk Level
High
Risk Incident Response Procedures
- The incident is assessed immediately to determine its severity and take containment actions.
- The response team gathers information and data to analyses the incident and identify the root cause.
- Actions are taken to remove threats and malware from affected systems.
- The process of restoring services and systems begins, ensuring they are secure before being brought back online.
- After the incident, a review is conducted to assess the response and analyses lessons learned for future improvement.
- Modifying the Security Documentation
Risk Termination
By sending the final report explaining the problem causes and how we can mitigate next times.