At the conclusion of a security assessment for a system, a security assessment report is produced by the assessor and covers: • the scope of the security assessment • the system’s strengths and weaknesses • security risks associated with the operation of the system • the effectiveness of the implementation of controls • any recommended remediation actions."
Topic
Security assessment report
Applicable to
all
History
Jun 2022
At the conclusion of a security assessment for a system, a security assessment report is produced by the assessor and covers:
• the scope of the security assessment
• the system’s strengths and weaknesses
• security risks associated with the operation of the system
• the effectiveness of the implementation of controls
• any recommended remediation actions.
Miscellaneous changes were made to rationale and recommendations throughout the publication to clarify content. This included the adoption of ‘control’ terminology, in preference to ‘security control’ terminology, to allow for the capture of other types of controls in the future, such as privacy controls, in addition to security controls.
In addition, formatting changes were made to the system security plan annex template and the cloud controls matrix template in order to increase their alignment, such as the inclusion of an ‘implementation status’ column within the system security plan annex template. Furthermore, a new ‘responsible entity’ column was added to both templates in order to capture information on the responsible system (in the case of inherited controls) or responsible vendor (in the case of multi-vendor systems) that are responsible for the implementation of controls. Note, this column can also be used to capture information on teams or individuals that are responsible for the implementation of controls if desired.
May 2020
At the conclusion of a security assessment for a system, a security assessment report is produced by the assessor and covers: • the scope of the security assessment • the system’s strengths and weaknesses • security risks associated with the operation of the system • the effectiveness of the implementation of security controls • any recommended remediation actions.
Security control 1563 covering the content of a security assessment report was added.