Risk Description | Assets Impacted | Vulnerabilities | Risk Owner | Assessment Date |
The protection of data, applications, and infrastructures involved in cloud computing. | 1 | 4 | February 10, 2020 |
Inherent Risk | Analysis | Controls | ||||
Vulnerability | Impact | Probability | Risk | |||
Moderate | Severe | Anticipated | 37.0 |
Proposed Risk Treatment | Residual Risk | Notes | |||
Avoid | Vulnerability | Impact | Probability | ||
Mitigate | |||||
Accept | |||||
Transfer | Target |