Risk management

Expand all questions

Are there examples of aviation services that may be considered when determining the information security management system (ISMS) scope and interfaces?

Are there examples of threat scenarios that need to be considered for Part-IS?

Is there a standard sequence to be followed when conducting an information security risk assessment?

Is it acceptable to use an existing risk matrix of the organisation in order to comply with Part-IS or a new risk matrix should be designed and implemented?

Is risk transfer an option under Part-IS?

Should vulnerabilities be handled in the same way as incidents?