Posts

Showing posts from February, 2018

Building a Process Improvement System with CMMI Consulting Services In Bangalore

Have you ever heard about the Capability Maturity Model Integration or CMMI? If not, you are missing out on something that is so important to your business. CMMI certification is a process model that clearly defines the actions an organization should take to enhance certain behaviors that boost performance. It defines the most imperative elements needed to deliver awesome services or create good quality products. This process model has different levels. Why do you need CMMI? The answer is easy; the Capability Maturity Model Integration helps you comprehend the answers to the “what “questions about your business. These may include questions such as these: what do we do to create better products/services, what do we do to know if our processes are working, what do we do to boost our business performance? When you have this process model implemented, it will help you identify and attain measurable business goals. The effect of this is that you will get happier customers who lov

Risk Assessment based on CIA

Risk Assessment based on CIA C: Confidentiality - property that information is not made available or disclosed to unauthorised individuals, entities, or processes I: Integrity - property of accuracy and completeness A: Availability - property of being accessible and usable upon demand by an authorised entity (Courtesy: ISO 27000) CIA approach is based on Risk Scenario. There are three building blocks to prepare Rick Scenario: i. Asset ii. Threat iii. Vulnerability  Threat and vulnerabilities has been mentioned in ISO 27005:2011 in Annex C and D Risk Score: a) CIA to be identified by each asset by consensus among the team (C,I,A can be Low = 0, Medium = 1, High = 2) b) Each vulnerabilities are scored corresponding to each asset (Very Low =0, Low=1, Medium=2, High =3)  c) Threat against each vulnerabilities on the likelihood of occurrence (Rare = 0, Annual = 1, Monthly = 2, Weekly = 3) After associating vulnerability and threats with assets, the risk s