Product SiteDocumentation Site

4.3.2. Threat Assessment

The Threat Assessment is to be written for dissemination to management and communication personnel listed as team members. Provide high level technical details, and remember the people reading this assessment may not be technical. Include appropriate explanations for all technical terms used in the assessment.
Threat Assessment Sign off
Sign offTaskDescription
Threat AssessmentAnswer the questions below.
For each of the following questions, provide an answer that takes into account each of the hosts that have been affected and the information on those hosts.
Threat Assessment
CompleteQuestionAnswer
Could this incident impact end users or customers?
Could this incident impact contributors, contractors, co-workers, or partners?
Could private data have been read or written to by the attacker?
Has private data been read or written to by the attacker?
Provide an estimate of how long the incident has been occurring.