GRC Risks
Jump to navigation
Jump to search
Home > Applications > GRC > Risk Management > Risks | Index |
Creating a Risk
- Risk Type
- Select if the risk is a Threat Based Risk or a Custom Risk. Threat Based Risks will require you to link to a Threat and Vulnerability that has been defined within Framework & Asset Management in Administration
- Register
- Select from a list of available risk registers
- Risk
- This field is only available when the Risk Type has been set to Custom Risk
- Threat
- This option is only available when the Risk Type has been set to a Threat Based Risk. The available Threats are defined within Admin
- Key Risk
- Provides a Yes or No response to select from
- Status
- Select a Status for this Risk.
- Owner
- The owner of this risk. This field will default to the person creating the risk
Policy Impact
- Policy
- Select the Policy that this risk relates to
- Policy Statement
- Select the Policy Statement that this risk relates to
Managing a Risk
- Activity
- The Activity Stream allows for users to post and comment about activities related to this risk.
- Details
- Update and manage the details of the risk
- Assessment
- Define the impact and risk rating
- Controls
- Link this risk to Controls that have been defined
- Events
- Create an Event that is related to this risk
- Upstream Risks
- Risks that may cause disruption or impact to suppliers that provide services to you
- Down Steam Risks
- Risks that may cause disruption or impact users or service customers
- Tasks & Reviews
- Create appointments and activities that need to be completed for this risk
- Attachments
- Add any additional information as an attachment
- Lifecycle History
- View the history of the lifecycle that is set against this risk