Security Policy - Cloudmadeez LLC

Security Policy

Effective Date: July 25, 2025

1. Overview

Cloudmadeez LLC is committed to protecting the security and privacy of all users of fasttrackscholar.com. We follow industry best practices and regulatory standards to safeguard personal data and maintain platform integrity.

2. Infrastructure and Hosting

Our services are hosted on Google Cloud Platform (GCP), which provides robust physical and network security. We leverage Google’s built-in infrastructure protections to ensure uptime, data protection, and disaster recovery.

3. Data Encryption

  • All data in transit is protected using TLS (HTTPS).
  • All data at rest is encrypted using industry-standard encryption protocols managed by GCP.

4. Access Controls

  • Role-based access controls (RBAC) are enforced across our systems.
  • Only authorized personnel have access to sensitive information or administrative features.
  • Strong password policies and multi-factor authentication are implemented for administrative access.

5. Vulnerability Management

We regularly scan for vulnerabilities and apply security patches promptly. We monitor system logs and use automated tools to detect suspicious activity or attempted breaches.

6. AI and Data Handling

Our AI-powered tools do not store or expose sensitive user data unnecessarily. All interactions are logged for quality improvement and filtered for inappropriate content. We do not use AI outputs for marketing or resale.

7. Backup and Disaster Recovery

We perform regular backups of critical systems and user data. Disaster recovery plans are tested periodically to ensure business continuity in the event of failure or breach.

8. Compliance

Cloudmadeez LLC adheres to SOC 2 Type 1 security principles and is actively working toward full compliance. We follow FERPA and COPPA guidance to protect student data where applicable.

9. Reporting Security Issues

If you believe you have discovered a vulnerability or security concern, please report it to us immediately at:

  • Email: support@fasttrackscholar.com
  • Alternate Email: support@cloudmadez.com

10. Policy Updates

This Security Policy may be updated periodically to reflect changes in best practices or regulatory requirements. Users will be notified of significant changes through our website.

Access Control Policy

SCOPE

This policy applies to all information, assets, systems, and processing facilities, including logical and physical access.

PURPOSE

Defines rules for provisioning and revoking access within Cloudmadeez LLC.

TERMS AND DEFINITIONS

  • ISG: Information Security Group
  • LT: Leadership Team
  • Logical Access: Identification, authentication, authorization protocols
  • Access Control: Regulates who or what can view/use resources
  • MFA: Multi-factor authentication
  • Privilege: Special right or advantage
  • Privileged Access: Admin/super-user access
  • SSO: Single Sign-On
  • Password: Secret phrase for access
  • Least Privilege: Minimum access required to perform job

RESPONSIBILITIES

Ownership lies with ISG and relevant teams handling access.

POLICY

  • Access granted under least privilege principle
  • Group-based access preferred over user-based
  • Access changes logged and reviewed periodically
  • Inactive accounts reviewed after 30/90 days
  • Access removed immediately on employment change
  • Privileged access requires MFA and expiration management
  • Third-party access requires sponsorship and defined expiration
  • Provisioning via email/ticketing tools, revocation within 24 hours
  • Quarterly access reviews with audit records

Version: v1
Created By: Adarsh, July 11, 2025
Approved By: CEO/Management, July 13, 2025
Published By: Adarsh, July 13, 2025

Backup & Restore Policy

PURPOSE

This policy aims to define the rules for taking data backups and testing the restoration.

SCOPE

The policy covers backups of all types of data and information within the Cloudmadeez LLC (herein referred to as Organization).

DEFINITION

  • Backup: A copy of file, data, or information made in case the original is lost or damaged.
  • Backup Server: A backup server enables the backup of data, files, applications, and/or databases on a specialized in-house or remote server.
  • Incremental Backup: One in which successive copies of the data contain only the portion that has changed since the preceding backup.
  • Differential Backup: A method that copies all files that have changed since the last full backup.
  • Recovery Test: A process to ensure that the backup and recovery plan functions properly during a real emergency.

RESPONSIBILITIES

The primary ownership of implementing this policy is with the IT and DevOps Team and the ISG.

POLICY

  • All backups shall be executed in an automated way based on frequency and timing to minimize impact.
  • All backups shall be available on two different systems in two locations.
  • Backup data shall be encrypted where required by legislation, regulation, or customer contracts.
  • Cloud backup data must reside in a different physical region/zone than source data.
  • Cloud backups must be stored on redundant media at alternate locations.

Data Backups and Frequency

Below types of data shall be backed up:

  • Emails on Outlook – Real-time
  • Application server (Azure)
  • Database (Azure) – Full Daily, Incremental Daily (Auto)
  • Files/Folders on SharePoint
  • Client/User Data on Azure
  • Source Code on Azure DevOps – Real-time

Backup Restoration Testing

  • Database: Annually (Last 35 days only)
  • Microsoft 365: Never (Service Provider responsibility)
  • Source Code: Quarterly (No Limit)
  • Records of restoration tests shall be maintained.
  • Follow incident management in case of errors/failures.

Backup Monitoring

  • Backup systems monitored at least quarterly.
  • Status dashboards required for IT management oversight.

Version: v1
Created By: Adarsh, July 11, 2025
Approved By: CEO, July 12, 2025
Published By: Adarsh, July 12, 2025

Business Continuity and Disaster Recovery Policy

PURPOSE

Details the planning and operation of business continuity and disaster recovery at Cloudmadeez LLC.

SCOPE

Applies to all employees, contractors, operations, and third parties.

TERMS AND DEFINITIONS

  • ISMS, ISG, LT, CEO
  • BCP: Business Continuity Plan
  • DRP: Disaster Recovery Procedure
  • BIA, MAO, RTO, RPO

RESPONSIBILITIES

DevOps and IT Team are responsible. Refer to escalation matrix and emergency contact tables.

POLICY PRINCIPLES

  • Focus on disruption outcomes, not causes
  • Plans must be scalable, adaptable, and promote local decisions
  • Formal BIA guides continuity planning
  • Plans exclude low-risk and cost-prohibitive events with approval
  • Annual testing (tabletop, simulation, partial/full test)
  • Training required for involved stakeholders

CLOUD-SPECIFIC CONSIDERATIONS

  • Ensure SaaS infrastructure resiliency
  • Account for outages and cross-region restoration
  • Follow shared responsibility model for cloud continuity

Version: v1
Created By: Adarsh, July 11, 2025
Published By: Adarsh, July 12, 2025

Change Management Policy

PURPOSE

This policy aims to control the planned and unplanned changes within the environment and infrastructure of Cloudmadeez LLC (herein referred to as the Organization), including the cloud.

SCOPE

This policy applies to Cloudmadeez LLC and covers its employees and operations. It applies to all forms of change that impact production, development, testing, configuration, and administration of shared assets, services, and processes managed by the Organization. This includes IT assets, OS and software installation/configuration, networking, public computing services, storage, databases, application development/support, documentation, and access requests.

DEFINITION

  • Change: Modification from current state to a different form, nature, or course.
  • Standard Change: Pre-authorized, low-risk changes that follow a known procedure.
  • Minor Change: Non-standard, minor changes affecting a single user/system.
  • Major Change: Non-standard, major changes affecting multiple users/systems/platforms.
  • Emergency Change: Urgent changes needing immediate implementation to restore or continue services.
  • CR (Change Request): A formal request to implement a change.
  • Change Requestor: Person initiating the change request.
  • Change Reviewer: Person reviewing and forwarding the change request.
  • Change Approver: Person approving/rejecting/postponing the change.
  • Change Implementer: Person responsible for executing the change.

RESPONSIBILITIES

The primary responsibility for implementing this policy lies with the department heads. The Information Security Group (ISG) will implement the policy under the guidance of the Leadership Team and in coordination with department heads.

POLICY

The organization ensures adherence to change management directives, life cycles, access controls, separation of duties, test data sanitization, impact inclusion, managerial signoff, and functional testing documentation.

PROCEDURE

  1. Change Initiation: A user identifies the need for a change and classifies it (Standard or Emergency).
  2. Categorization: Assign category based on impact (Application, Access, Network, Others).
  3. Priority Allocation: Assign priority based on impact.
  4. Register Change: Register change request (e.g., JIRA ticket).
  5. Emergency Change: Tag change as emergency if critical, follow expedited approval.
  6. Standard Change Implementation: Sent to implementation team; approvals not required.
  7. Normal Change Implementation: Requires approvals and QA before implementation.
  8. Build and Test: Change is tested, records maintained.
  9. QA Approval: QA validates the implementation success.
  10. Change Implementation: Change is implemented in the live environment.
  11. Rollback (if needed): Execute rollback if implementation fails.
  12. Post-Implementation Review: Conducted by someone other than the initiator, then close CR.

Annexure A - Categorization Guideline

  • Standard Change: Pre-authorized changes with low risk, frequently processed, following established procedures. May still require assessments and scheduling.
  • Emergency Change: Urgent changes with high impact; scheduling may be skipped. Higher risk possible.

Annexure A2 - Change Priority Matrix

  • Priority 1: High-impact changes affecting significant IT operations or multiple customers.
  • Priority 2: Partial services affected for multiple customers.
  • Priority 3: Single customer services affected.
  • Priority 4: Partial services for a single customer, including standard changes.
  • Priority 5: No impact on systems/services.

Version

v1

Created By: Adarsh, July 11, 2025

Published By: Adarsh, July 12, 2025

Encryption and Key Management Policy

Purpose

This policy defines Cloudmadeez LLC’s (herein referred to as "Organization") security control requirements for encryption and key management lifecycle.

Scope

This policy applies to all data stored at rest and/or transmitted, including writable media and databases. It applies to the entire organization, employees, contractors, and third parties.

Definition

Sensitive Information: Data that must be protected from unauthorized access to safeguard the privacy or security of an individual or organization.

Responsibilities

The IT Head and DevOps Head are responsible for implementing this policy.

Cryptography Policy

  • All data and information storage media must be identified.
  • Best practices should be implemented where technically feasible.
  • Methods used in cryptography shall be documented and secured from unauthorized access.
  • When selecting new cryptographic technologies, Information Technology must approve them before use.
  • Technologies used must be interoperable with other technologies within the company and during external exchanges.
  • Technologies must meet applicable legal requirements based on the location of the information assets.
  • Encryption algorithms must be AES-compatible or partially AES-compatible, following IETF/IRTF Cipher Catalog standards.
  • Algorithms, key lengths, and hash values must be reviewed at least annually.
  • Data recovery logic must be implemented to ensure encrypted data is recoverable.
  • Implement recovery mechanisms for forensic investigation and law enforcement access.

Encryption Requirements

  • Hard disk encryption must use hardware tokens for key management.
  • Sensitive information, including personal data or cryptographic keys, requires additional security measures when exchanged.
  • A process must be established to decrypt data or restore encryption keys if the original key is lost.
  • TLS should be used for network communication.

Application of Encryption

Data in Transit

Includes, but is not limited to:

  • Data transmitted via Internet connections
  • Email transmissions
  • Remote access connections
  • File transfers to third parties
  • Administrative access to IT systems

Data in Storage

Includes, but is not limited to:

  • Backup and removable media
  • Mobile device drives (e.g., laptops, phones, tablets)
  • Application/database fields and tables or electronic files

Transmission Encryption Methods

  • TLS: Encrypts communication over the Internet.
  • VPN: Uses public networks to provide secure services to remote personnel (RSA encryption methods).
  • SFTP: Transfers files securely using SSH; encrypts passwords and sensitive data over public networks.
  • TLS/SSH: Encrypts passwords and authentication data for privileged accounts.

Encryption Levels

  • Symmetric cryptosystems must use keys of at least 128 bits.
  • Asymmetric cryptosystems must use key lengths of at least 1024 bits.

Key Management

  • Cryptographic measures and techniques shall be implemented to protect keys.
  • Organizations must protect keys from unauthorized use, modification, and loss.
  • Key lengths must align with best practices or technological feasibility.

Information Security Policy

Purpose

This document aims to provide Cloudmadeez LLC (herein referred to as the Organization) with a policy that communicates the need to protect the Confidentiality, Integrity, and Availability of information assets. It ensures that information and information systems are available to intended users, protected against unauthorized access and modification, and compliant with relevant legislative, regulatory, and contractual requirements. It aims to motivate employees to maintain responsibility, ownership, and knowledge about information security to minimize the risk of incidents and ensure continuity of service, even during major security events. The organization also aims to comply with international standards for information security, such as SOC2.

Scope

This policy applies to Cloudmadeez LLC, its employees (including contractors), and its operations.

Definition

  • Information Processing System – Subsystems of the information system in which data are recorded and processed following formal procedures.
  • Information – An asset of value to an organization that must be suitably protected.
  • Confidentiality – Ensuring information is not made available or disclosed to unauthorized individuals, entities, or processes.
  • Integrity – Safeguarding the accuracy and completeness of assets.
  • Availability – Ensuring authorized entities can access and use information upon demand.
  • Information Security – Preservation of the confidentiality, integrity, and availability of information in any medium (electronic, paper-based, or other storage media).

Roles and Responsibilities

The Information Security Manager is responsible for implementing, maintaining, and enforcing the policy.

Policy

  • Ensure Confidentiality, Integrity, and Availability of information assets.
  • Use information and processing systems securely to support strategic goals.
  • Establish an Information Security Management System (ISMS) to implement, operate, monitor, and improve security controls.
  • Handle information securely throughout its lifecycle—creation, storage, processing, transmission, and disposal.
  • Classify information based on confidentiality, integrity, and availability requirements.
  • Identify and mitigate all information-related risks promptly.
  • Train employees and raise awareness about their information security responsibilities.
  • Restrict access to authorized users as per business needs.
  • Secure personnel, information, and systems from physical and environmental threats.
  • Identify, control, and monitor risks associated with third-party vendors or suppliers.
  • Manage and control changes to information systems securely.
  • Report and manage all security incidents promptly.
  • Define, implement, and test Business Continuity Plans.
  • Comply with all applicable legal and regulatory information security requirements.
  • Continuously review and improve the organization's information security posture.
  • Employees must not disclose, copy, alter, or destroy information unless properly authorized.
  • Take measures to protect confidential information within their professional scope.
  • Apply data masking to reduce exposure of personal data and comply with requirements.
  • Delete and securely store data no longer required.
  • Follow approved information security policies, procedures, standards, and guidelines.
  • Do not attempt to circumvent or subvert any security controls.
  • Collect and analyze threat information to support informed decision-making and reduce impact.

Supporting Policies

  • Human Resource Security Policy – Ensures users understand their responsibilities and are suitable for their roles.
  • Information Classification Policy – Defines guidelines and baseline controls for protecting organizational data.
  • Access Control Policy – Limits access to information and systems to authorized users only.
  • Asset Management and Disposal Policy – Ensures proper protection and disposal of information assets.
  • Encryption and Key Management Policy – Manages encryption effectively to protect confidentiality, authenticity, and integrity.
  • Acceptable Use Policy – Outlines best practices for use of IT and information assets.
  • Mobile and Teleworking Policy – Protects information accessed, processed, or stored on mobile devices or during telework.
  • Log Management and Monitoring Policy – Records and monitors system events to generate evidence.
  • Secure Development and Maintenance Policy – Integrates security throughout system development and maintenance phases.
  • Incident Management Policy – Provides a consistent approach for managing incidents and weaknesses.
  • Change Management Policy – Controls changes to systems and facilities affecting security.
  • Risk Management Procedure – Establishes governance for identifying and addressing security risks.
  • Patch and Vulnerability Management Policy – Ensures timely response to technical vulnerabilities.
  • Network Management Policy – Protects information within networks and supporting systems.
  • Backup and Restore Policy – Defines rules for backing up and restoring data.
  • Business Continuity and Disaster Recovery Policy – Plans for maintaining operations during emergencies.
  • Vendor Management Policy – Governs relationships with external service providers.

Version and Approval

  • Version: v1
  • Created By: Adarsh, July 11, 2025
  • Approved By: CEO, July 12, 2025
  • Published By: Adarsh, July 12, 2025

Password Management Policy

Purpose

This policy defines the rules and guidelines for password management at Cloudmadeez LLC (herein referred to as Organization).

Scope

This policy applies to the entire IT assets, employees, and contractors. It applies to all assets.

Definition

  • ISG: Information Security Group
  • CISO: Chief Information Security Officer

Responsibilities

The ISG and CISO are responsible for implementing this policy under the guidance of top management and the DevOps Team.

Policy Requirements

Passwords will be managed at the following levels:

  • Employees (email, endpoints, web applications, etc.)
  • System level (root accounts, service accounts, admin passwords, etc.)

All employee- and system-level passwords must conform to this policy. All passwords will be uniquely associated with a user account.

The ISG will implement procedures for creating, changing, resetting, and communicating initial passwords. Users must change temporary passwords at first login. Default vendor passwords must be changed.

Password sharing is prohibited unless approved by ISG. All systems must adhere to this policy.

Password Creation Requirements

Cloud Infrastructure

  • Minimum 14 characters with 1 uppercase, 1 lowercase, 1 number, and 1 special character
  • Multi-factor authentication (MFA) must be enabled
  • Password and user ID must not be identical
  • Must not contain personal information
  • Must not be easily guessable
  • Must differ from previous 3 passwords
  • Passwords expire after 90 days

Email, Endpoints, and Web Applications

  • Minimum 8 characters with 1 uppercase, 1 lowercase, 1 number, and 1 special character
  • Same rules for uniqueness and personal data as above
  • Must differ from previous 3 passwords
  • Passwords expire after 90 days

Password Modification

Users may change passwords using the provided password change option in systems per policy.

Password Reset

Reset requests initiated by IT Head via email or phone. ISG or CISO resets password to default and requires change at next login. Records of resets will be maintained.

Password Protection

  • Default passwords must be changed upon onboarding
  • Passwords must not be reused across systems
  • Details not sent via email or SMS in plain text
  • Passwords must not be revealed verbally or shared
  • Passwords must be encrypted in storage and transmission
  • Use of password manager is required
  • Admin/superuser passwords stored in personal vaults and updated on resignation or termination

Termination of Employee Relationship

All user IDs and passwords for IT employees must be changed. For others, accounts should be disabled and removed. Department head can request ID retention with password change.

User Responsibilities

  • Do not use user ID as password
  • Do not share passwords
  • Passwords are confidential
  • Do not store passwords in unencrypted files
  • Report any suspected compromise immediately

Application Development Standards

  • Applications must authenticate individual users, not groups
  • Passwords must not be stored in clear text or reversible formats
  • Role-based access management is required
  • Implement OAuth and SSO where applicable

Document Information

  • Version: v1
  • Created By: Adarsh, July 11, 2025
  • Approved By: CEO/Management, July 11, 2025
  • Published By: Adarsh, June 13, 2025
Patch Vulnerability Policy - Cloudmadeez LLC

Patch & Vulnerability Management Policy

PURPOSE

This policy ensures that vulnerabilities, weaknesses, or exposures in IT and engineering resources or processes are identified, assessed, and remediated to prevent attacks that may lead to security or business risks. This policy outlines the technology and procedures used by Cloudmadeez LLC (herein referred to as Organization) to detect and remediate vulnerabilities and maintain maximum levels of security.

SCOPE

This policy applies to Cloudmadeez LLC and all of their employees and contractors. It covers the following areas:

  • Desktop and laptop operating environment
  • Server operating environment within the organization and on the cloud
  • Network devices and equipment installed within the organization and on the cloud
  • Code repository in development, testing, and production environment

DEFINITIONS

  • CVSS: The Common Vulnerability Scoring System - a method used to supply a qualitative measure of severity.
  • ISG: Information Security Group

RESPONSIBILITIES

The IT Head and DevOps Head are responsible for identifying significant security vulnerabilities and making recommendations about patch installation timelines. The DevOps Head will monitor and track vulnerability alert statuses, including changes and updates, and ensure the CVSS score is updated accordingly.

VULNERABILITY IDENTIFICATION

Security vulnerabilities are identified by:

  • Annual external vulnerability scans on public-facing IPs
  • Annual external network penetration tests
  • Vulnerability scanning after significant infrastructure or application changes
  • Monitoring industry publications for zero-day vulnerabilities
  • Daily virus scan log reviews
  • Regular security log reviews
  • Audit-reported issue reviews

VULNERABILITY MANAGEMENT

A vulnerability scanning and assessment provider will sign an agreement, including confidentiality provisions. Upon receiving a report:

  • Verify results and validate exposure through penetration testing
  • Follow Change Management Policy for all configuration and code changes
  • Implement mitigating measures, log exceptions, and get approvals as needed
  • Conduct re-scans to ensure effective mitigation

Remediation Timeframes

Based on CVSS v3.1 severity:

  • Critical: Remote root/admin access. Remediate within 5 business days or less.
  • High: Privileged access risk. Remediate within 10 business days or less.
  • Medium: Standard user access risk. Remediate within 30 business days or less.
  • Low: Indirect risk, potentially part of a more informed attack. Reasonable timeframe.

The Engineering Guild will generate annual vulnerability status reports to assess policy effectiveness.

PATCH MANAGEMENT

A patch management tool or tracker must be used. Patches are categorized by severity and validated to exclude false positives. All patches must be tested in a test environment before being deployed to production.

Laptops, Desktops, and Endpoint Software

  • Latest patches for critical and security updates must be installed based on availability.
  • Employees must prioritize patch deployment on their devices.
  • The ISG will verify patch status on devices periodically.
  • Operating systems and office software will be updated to the latest versions where possible.
  • Random sampling will verify patch effectiveness monthly.
  • Application patches will be deployed on a need basis.

VERSION & APPROVAL

  • Version: v1
  • Created by: Adarsh, July 11, 2025
  • Approved by: CEO, July 12, 2025
  • Published by: Adarsh, July 12, 2025
Physical Security Policy - Cloudmadeez LLC

Physical Security Policy

Purpose

This policy defines the requirements for granting, controlling, monitoring, and removing physical access to Cloudmadeez LLC facilities.

Scope

This policy applies to all individuals with authorized access to Cloudmadeez LLC facilities.

Policy

  • Physical access to restricted facilities must be documented and managed.
  • Only authorized personnel whose job responsibilities require it may access information resource facilities.
  • Access cards/keys must not be shared or loaned. Lost or stolen items must be reported immediately.
  • Visitor access must be logged, and visitors must be escorted at all times.
  • Facility access must be reviewed periodically, and access removed when no longer required.
  • Physical signage should be minimal and practical, without disclosing importance.

Clear Desk & Data Security

  • Sensitive data must be secured when unattended or after hours.
  • Workstations must be locked when not in use.
  • Confidential materials must be stored or shredded appropriately.
  • Passwords must not be written or visible on desks or devices.
  • USBs and portable devices must be secured.

Equipment Security

  • All assets must be covered by warranties or service contracts.
  • Regular inspections and tests must be conducted to ensure functionality.
  • Asset movement must be tracked, and inventories updated.
  • Network cabling must be protected and not routed through unsecured areas.

Document Control

Version: v1
Created By: Adarsh, July 11, 2025
Approved By: CEO/Management, July 13, 2025
Published By: Adarsh, July 13, 2025

Risk Management Procedure Cloudmadeez - Cloudmadeez LLC

Cloudmadeez LLC

Risk Management Procedure Cloudmadeez

 
 
 
 
 
 
 
 
 
 
Cloudmadeez L
LC
 
Risk Manage ment 
Procedure
 

PURPOSE
 
Th is
 
d o cum en t
 
de fine s
 
a ctio n s
 
to
 
ad d ress
 
Clo u dm ad e e z LL C
 
(he rein
 
refe rre d
 
to
 
as
 
Org an izat ion )
 
inf o rma tio n  se cu rity
 
risks
 
an d
 
op p o rtu n ities.
 
It
 
a lso
 
d e fine s
 
a
 
p lan
 
fo r
 
a ch ievin g
 
info rma tio n
 
se cu rity
 
and
 
p riva cy 
objectives.
 
 
 
SCOPE
 
 
 
A ll
 
Clo u d ma de e zL L C
 
IT
 
system s
 
th at
 
p roce ss,
 
sto re,
 
or
 
tran sm it
 
con fid en tia l,
 
p riva te ,
 
or
 
b u sine ss
-
 
critica l da ta.
 
 
Risks
 
th a t
 
co u ld
 
a ffe ct
 
CloudmadeezLLC

s
 
me d ium
 

to
 
long
-
te rm
 
go a ls
 
sh o u ld
 
be
 
co n side red ,
 
as
 
well a srisks t h a t will b e e n co un te red in  th e d a y
-
to
-
day d e live ry o f se rvice s.
 
 
C l o u d m a d e e z  L L C
 
risk
 
m a n a g em en t
 
syste m s
 
an d
 
p roce sses
 
will
 
be
 
ta rge te d
 
to
 
a ch ieve
 
m a xim um  be ne fit with ou t increa sing th e  bu reau crat ic bu rden  a nd  u ltim a te ly a ffe ctin g  
co re se rvice  de live ry to t h e o rgan izat ion .
 
 
C l o u d m a d e e z  L L C
 
wi ll,
 
th e refo re,
 
conside r
 
the
 
ma te ria lity
 
of
 
risk
 
in
 
d e ve lo p ing
 
syste m s
 
and
 
p roce sse s t o ma na g e  risk.
 
 
Th is p o licy a nd  p roced u re ap p ly to  a lle mp loye e s of 
Clo u dma d ee zL L C
 
an d  to  a ll e xte rna l 
p a rtie s, inclu d ing ,
 
bu t
 
no t
 
lim ited
 
to,
 
CloudmadeezLLC
 
co n su lta n ts
 
and
 
co n tra cto rs,
 
b u sine ss
 
p a rtn e rs,
 
ve nd o rs, supp lie rs, o u tso u rced  se rvice p rovid e rs,a nd  o th er th ird
-
p a rty en titie s with  
a cce ss to  
Clo u dma d eez L L C
 
ne two rks an d  syste m  re so u rce
s
.
 
DEFINITIONS
 
 
CIS O:
 
Chie f
 
In fo rm atio n
 
Se cu rity
 
Of fice r 
 
CTO:
 
Chie f Te ch no log y O ff icer
 
 
P II : P e rson a lly I de n tifiab le In fo rma tion
 
 
L ikeliho o d : Th e p roba b ility t ha t a g iven e ven t will o ccu r
 
 
Im p a ct: Th e e xte n tto wh ich a  risk e ve n t m igh t a ffe ctth e o rgan izat io n
 
 
A cce p tan ce
 
Crite ria :
 
Accept an ce
 
cr it eria
 
are
 
t he
 
l imit s
 
abov e
 
w hich
 
an
 
organiz at ion
 
w il l
 
not  
t ol erat e risk.
 
 
R OL ES
 
AN D 
RESPONSIBILITIES
 
 
 
Th e
 
CIS O
 
is
 
u ltim ate ly
 
resp on sible
 
fo r
 
a ccep tin g
 
a nd /o r
 
tre a tin g
 
an y
 
risks
 
to
 
the
 
o rga n izatio n . 
Th e  CIS O ca n a pp rove t h e a vo ida n ce, rem e d ia tio n , t ran sfe ren ce , o ra cce p ta n ce o f a n y risk 
cite d  in th e Risk Reg iste r.
 
 
Th e  CTO sh a ll id en tify a n d d e ve lop tre a tm en t p lan s fo r a ll in fo rm a tion  se cu rity
-
rela te d  risks.
 
Th e se
 
p e rson s
 
sh a ll
 
co mm un icat e
 
risks
 
to
 
top
 
m a na g eme n t
 
a nd
 
a do p t
 
risk
 
tre a tm en ts
 
b y 
e xe cu tive  d ire ction .
 
 
 
POLICY
 
Clo u d ma de e zL L C
 
ha s d e ve lo p ed  p roce sse sto  id en tify th o se  risks th a t will re strict a ch ie ving  its 
stra te g ica n d o pe rationa l o b jective s. 
Clo ud mad e e zL L C
 
will, the refo re , en su re th a t it ha s in p lace  th e  
m e an s to  id en tify, a na lyze,
 
con tro l,
 
a nd
 
m on ito r
 
the
 
stra te g ic
 
a nd
 
ope ratio na l
 
risks
 
it
 
fa ce s
 
u sing
 
th is
 
risk
 
m a na ge me n tp o licy b a sed  on  be st p ra ctice s.
 
CloudmadeezLLC
 
w ill
 
e n su re
 
th e
 
risk
 
m a na ge m en t
 
po licy
 
&
 
p roce du re
 
a re
 
revie wed
 
regu larly
 
and
 
th a t in te rna l a ud it fu n ction s a re re sp on sible  for e n su rin g:
 
 
Th e  risk m a na ge me nt p o licy is ap p lie d t o a ll a p p licab le a re a s of 
 
Clo u dm ad e e z L L C

 
Th e
 
risk
 
m a na g eme n t
 
p o licy
 
and
 
its
 
o p e ra tion a l
 
ap p lica tion
 
a re
 
regu larly
 
revie wed  
 
Non
-
co m p lian ce  is rep o rte d t o a pp rop ria te  co m pa n yo ff icersa n d au th o ritie s
 
 
RIS K 
CATEGORIES
 
 
CloudmadeezLLC
 
w ill
 
co n side r
 
a nd
 
a sse ss
 
risks
 
a cross
 
th e
 
o rgan iza tio n .
 
Risk
 
ca teg o rie s
 
th a t
 
sh ou ld
 
b e  con side red  fo r e va lu a tion  in clude :
 
 
Rep u tatio n a l 
 
Con tra ctu a l
 
 
Reg u lato ry/Co mp lia nce  
 
E co n om ic/Fin an cial
 
 
Fra u d
 
 
P riva cy
 
 
Im p a ct o n P eo p le
 
 
Use
 
of
 
Clo ud
 
S e rvices 
 
Op e ratio na l Capa city
 
E a ch
 
risk
 
will
 
be
 
a sse sse d
 
fo r
 
its
 
like liho o d
 
and
 
imp a ct.
 
Bo th
 
imp a ct
 
and
 
like lih o od
 
a re
 
a ssesse d
 
on 
a  sca leo f1
-
 

 
 
 
RIS K 
CRITERIA
 
 
Th e
 
crite ria
 
fo r
 
d e te rm in ing
 
risk
 
is
 
the
 
com b ine d
 
like lih oo d
 
a nd
 
im pact
 
of
 
an
 
e ve n t
 
ad ve rsely 
a ff e ctin g  th e  co n fide n tia lity,  a va ilab ility, int eg rity,  o r p riva cyo fo rga n iza tio na l a nd  cu stom e r 
inf o rma tio n , p e rso n a lly id e n tifia b le info rma tion  (PI I),o r b u sine ss in fo rm a tio n  syste m s.
 
Fo r a ll risk in p u ts, su ch a s risk a sse ssm en ts, vu lne rab ility sca n s,p en e tra tion  te sts, b u g b ou n ty 
p rog ram s,
 
etc. ,
 
CloudmadeezLLC
 
m an a ge men t
 
sh a ll
 
rese rve
 
th e
 
righ t
 
to
 
m od ify
 
risk
 
ran king s
 
b a sed
 
on
 
its a sse ssme n to f the  n atu rea n d critica lity o f the  syste m p roce ssin g  an d th e n a tu re, critica lity,  
a n d e xp loita b ility (o r o th e r re levan t fa cto rsa nd  co n sid e ration s) o fthe  id en tifie d  vu lne rab ility.
 
 
 
RIS K
 
RES P ONSE ,
 
T REAT ME NT ,
 
AND
 
TRACKING
 
 
Risks
 
will
 
be
 
p rio ritize d
 
a nd
 
m a inta ined
 
in
 
a
 
risk
 
reg iste r,
 
whe re
 
the y
 
will
 
be
 
p rio ritize d
 
and
 
m a pp ed  
u sing  th e a p p ro a ch con ta ine d  in th is po licy. Th e  fo llo win g  re sp o n se s t o  risk sh ou ldb e e mp loye d :
 
 
Reme dia te
: 
Clo ud ma d ee z L L C
 
ma y t a ke  actio n s o re mp loy strateg ies to re d u ce  th e  risk.
 
 
Acc e pt
:
 
Cloudmadeez LLC
 
m a y
 
d e cide
 
to
 
a cce p t
 
and
 
m on ito r
 
the
 
risk
 
at
 
th e
 
p re se nt
 
tim e.
 
Th is
 
m a y
 
be  ne ce ssa ry f o r som e  risks th a ta rise fro m e xte rna l e ve n ts.
 
 
T ra ns fe r
:
 
Cloudmadeez LLC
 
m a y
 
de cide
 
to
 
p a ss
 
th e
 
risk
 
on
 
to
 
a no th e r
 
pa rty.
 
Fo r
 
e xamp le,
 
co n tra ctu a l te rm s
 
m a y
 
be
 
a g reed
 
u p on
 
to
 
ensu re
 
tha t
 
th e
 
risk
 
is
 
n ot
 
b o rne
 
by
 
Cloudmadeez 
LLC
,
 
or
 
insu ran ce
 
m a yb e  ap p rop ria te  fo r p rote ctio n a g a in st fina n cial lo ss.
 
 
Avoi d
:
 
Th e
 
risk
 
ma y
 
be
 
su ch
 
th at
 
th e
 
Cloudmadeez LLC
 
co u ld
 
d e cid e
 
to
 
ce a se
 
the
 
a ctivity
 
or
 
ch a ng e
 
it in  su ch  a  way a s t o e nd  th e  risk.
 
W h e re
 
CloudmadeezLLC
 
ch o o se s
 
a
 
risk
 
resp on se
 
o the r
 
th an
 

 
or
 
 
 
a
 
risk
 
tre a tm e nt
 
p lan  sh a ll be d e ve lo p ed .
 
 
 
R ISKM AN AGEM EN T 
PROCEDURE
 

Th e  p roce d u re  f o rm ana g ing risk will m e e tth e f o llo win g  
criteria:
 
1.
 
CloudmadeezLLC
 
w ill
 
m a inta in
 
a
 
Risk
 
Reg iste r
 
and
 
Trea tm e nt
 
Plan.
 
2.
 
 
 
 
 
a s critica l, h igh ,m e d ium ,a n d  
low.
 
3.
 
Ove rall risk sh a ll b e d ete rm ine d  th roug h a  com b ina tio n o f like liho o da n d  
impact.
 
4.
 
CloudmadeezLLC
 
w ill
 
r e sp on d
 
to
 
risks
 
in
 
a
 
p rio ritize d
 
fa sh ion .
 
Rem ed iat ion
 
p rio rity
 
will
 
co n side r
 
the
 
risk likeliho o d a n d imp a ct, co st,work e ff o rt, a nd  a va ilab ility o f resou rces.  Mu ltiple  
rem ed iat ion s ma y be  un d e rta ke n  sim u lta n eo usly
 
5.
 
Reg u lar
 
rep o rts
 
will
 
be
 
m a de
 
to
 
th e
 
se n ior
 
lead e rship
 
of
 
CloudmadeezLLC
 
to
 
en su re
 
risks
 
a re
 
be ing m itiga te d a pp rop ria te lya n d b yb u sin e ss p rio ritie sa n d o b je ctive s.
 

APP E NDIX
 
A
 
RIS K
 
ASS E S S ME NT  
PROCESS
 
 
 
Th e
 
fo llo win g
 
is
 
a
 
h igh
-
leve l
 
o ve rvie w
 
of
 
th e
 
p ro ce ss
 
u se d
 
by
 
CloudmadeezLLC
 
to
 
a sse ss
 
an d
 
m a na ge  in fo rm atio n  secu rity
-
rela te d  risks.
 
Th e  risk a sse ssm en tproce ss is com p rise d o fth e  fo llo win g  
steps:
 
1.
 
P rep a refo r th e  
assessment
 
2.
 
Con d u ct the  
assessment
 
3.
 
Comm u n icate  th e  
assessment
 
4.
 
Ma int a in th e  
assessment
 
 
 
S tep 1 : Pre pa re for the
 
Assessment
 
In
 
th is
 
step ,
 
the
 
ob ject ive
 
is
 
to
 
e sta b lish
 
the
 
co n te xt
 
fo r
 
the
 
risk
 
a ssessm e nt.
 
Th is
 
ca n
 
be  
a cco mp lish ed  b yp e rform ing  th e fo llo win g :
 
 
Id e n tify th e p u rpo se o f the  a sse ssme n t
 
 
Det e rm ine
 
th e
 
in fo rma tio n
 
the
 
a sse ssme n t
 
in te nd s
 
to
 
p rod u ce
 
and
 
th e
 
d e cision s
 
th e  
a sse ssme n t in ten d sto su p po rt.
 
Id e ntify the  scop e o f the  
assessment.
 
 
Det e rm ine
 
th e
 
a pp lica b le
 
o rgan izat ion a l
 
fu nctio n
 
or
 
p roce ss,
 
th e
 
asso ciat ed
 
tim e
 
fra me , 
a n d a n ya p p licab lea rchite ctu ralo r te ch n o lo g ica l co n side ration s.
 
Id e ntify an y a ssu mp tion s o r con stra int s a sso ciat e d  with  t he  
assessment
 
 
Det e rm ine
 
a ssu mp tion s
 
in
 
ke y
 
a rea s
 
rele vant
 
to
 
the
 
risk
 
a sse ssm e nt,
 
includ ing : 
 
Org a n izat ion a l p rio ritie s
 
 
B u sine sso b ject ive s
 
 
Reso u rce
 
a va ila b ility
 
 
S kills a n d  e xpe rtise  of th e risk a sse ssm en t te a m
 
 
Id e n tify so u rceso f info rm a tio n .
 
 
A rchite ctu ral/te chn o log ical
 
d iag ram s
 
a nd
 
syste m
 
con figu ratio n s 
 
L e g a la n d re g u la to ryreq u ire me n ts
 
 
Th rea t
 
S ou rces 
 
Th rea t E ve n ts
 
 
V u lne rab ilities
 
and
 
influ e n cing
 
co nd ition s 
 
P o te ntia l Im p a cts
 
 
E xisting  Co ntro ls
 
 
 
S tep 2 : Conduc t the
 
Assessment
 
Th is
 
step
 
a im s
 
to
 
p rodu ce
 
a
 
list
 
of
 
in fo rm a tion
 
se cu rity
-
rela ted
 
risks
 
th a t
 
ca n
 
be
 
p rio ritize d
 
by
 
risk 
leve l a nd  u se d  to  in fo rm  risk re sp on se d e cisio n s. Th is ca n b e a ccom p lish ed  b y p e rfo rm ing  t he  
following:
 

Id e ntify
 
Th rea t 
Sources
 
 
Det e rm ine
 
and
 
cha racte rize
 
th rea t
 
so u rces
 
rele va nt
 
to
 
a nd
 
of
 
co n ce rn
 
to
 
Cloudmadeez 
LLC
, in clud ing  bu t no t lim ite d to :
 
 
Hum a n
 
(In ten tio na l
 
or
 
Unin te n tio n a l
 
/
 
In te rna l
 
or
 
E xte rna l) 
 
E n viro n me n ta l
 
 
Nat u ral
 
 
S yste m o r Equ ipmen t
 
Con side r
 
th e
 
fo llo win g
 
whe n
 
iden tifyin g
 
th rea t
 
so u rces:  
 
Cap a b ility
 
 
Mo tive  /  In te nt
 
 
In te n tion a lly t a rg e te d p e op le,  p ro ce sse s, and /o r te ch no log ies.
 
 
Unin te n tio na lly t a rge te d  pe o p le , p ro ce sse s,a n d /o r te ch n o lo g ies.
 
Id e ntify
 
Th rea t 
Events
 
 
Det e rm ine
 
wha t
 
th reat
 
e ven ts
 
co u ld
 
be
 
p ro du ce d
 
by
 
th e
 
iden tified
 
th rea t
 
so u rces
 
tha t 
h a ve th e p ote n tia l to  im p a ct 
Clo ud ma d ee z LL C
.
 
Con side r th e  re leva n ce  o fth e e ven tsa n d t h e so u rces th a t co u ld  in itia te  th e  
events.
 
Id e ntify 
Vulnerabilities
 
 
Det e rm ine
 
th e
 
vu lne ra b ilities
 
a sso ciate d
 
with
 
p e op le,
 
p roce sse s,
 
an d
 
te ch n o lo g ies
 
th a t 
th e  ide n tified  th rea t sou rces a nd  e ve n ts co u ld  e xp lo it.
 
Con side r
 
a n y in flu en cing
 
co nd ition s th a t
 
cou ld  a ffe ct
 
a nd  a id
 
in su cce ssfu l 
exploitation.
 
Det e rm ine  
Likelihood
 
 
Det e rm ine
 
th e
 
like lihoo d
 
th a t
 
the
 
ide n tifie d
 
threa t
 
so u rces
 
wo u ld
 
initia te
 
th e
 
iden tified  
th rea te ven ts an d  co u ld  su cce ssfu lly e xp lo it an y id en tifie d  vu lne rab ilities.
 
Th e  vu lne rab ilitiesa n d/o r in flu en cing co nd ition s 
identified
 
Clo u d ma de e zL L C

s
 
exp o su re
 
is
 
ba sed
 
on
 
a ny
 
sa fe g ua rds/ cou n te rme a su res
 
p lan n ed
 
or
 
im p lem e nte d
 
to  p reve nt o r m itig a te  su ch  e vents.
 
Det e rm ine  
Impact
 
 

a sse ts,  in d ivid ua ls, cu sto me rs, an d /o r o the r o rg a n izatio n sb y con siderin g  t h e 
following:
 
 
B u sine ss
 
/
 
Op e ra tio na l
 
Imp a cts 
 
Fin a n cial Dam a ge
 
 
Rep u tatio n  Dama g e
 
 
L e g a l o r Reg u lato ry Issu e s
 
W h en
 
d e te rm inin g
 
im pa ct,
 
co n side r
 
any
 
sa fe gu a rds/ cou n te rme a su res
 
p lan n ed
 
o r 
im p lem e nte d b y 
Clou dm a de e zL L C
 
th a t wo u ld  m itiga te o r le ssen  the  im pa ct.
 
Det e rm ine  
Risk
 
 
Det e rm ine
 
th e
 
o ve rall
 
inf o rm a tio n
 
se cu rity
-
relat e d
 
risks
 
to
 
CloudmadeezLLC
 
by
 
co m b ining
 
th e  
following:
 
 
Th e  likeliho o d o fth ee ve n t o ccu rring . (L )
 
 
Th e  im pa ct th a t wo u ld  re su lt f ro m th e e ven t. (I)
 
Ris k  Sc ore  = Lik e li hood x  
Impact
 
 
Th e
 
risk
 
to
 
CloudmadeezLLC
 
is
 
p rop o rtio na l
 
to
 
th e
 
like lih oo d
 
an d
 
im pa ct
 
of
 
an
 
event.
 
 
Hig h e r Risk E ve n t:  Th is is m o re  likely t o o ccu r, resu lting in  g re a te r im p a ct.
 

 
L o wer
 
Risk
 
E ve n t:
 
Th is
 
is
 
less
 
like ly
 
to
 
o ccu r,
 
a nd
 
th e
 
resu lting
 
imp act
 
will
 
be
 
m inim a l,
 
if 
any.
 
 
 
S tep 3 : Communic a te a nd S ha re  the Risk
 
Ass e ss me nt 
Results
 
Th is
 
ste p
 
e n su res
 
th at
 
d e cisio n
-
ma ke rs
 
a cross
 
th e
 
CloudmadeezLLC
 
and
 
e xe cu tive
 
lea d e rsh ip
 
h a ve
 
th e a p p rop ria te  risk
-
rela te d in fo rm a tion  ne ed ed  t o  in fo rm  an d g u ide risk d e cisio n s.
 
 
Com m un icat e t he  Resu lts
 
 
Com mu n icate  th e  risk a sse ssm e nt resu lts t o  
Clo u d ma de e zL L C
 
de cisio n  ma ke r an d  
e xe cu tive  le ad e rship
 
to
 
h e lp
 
d rive
 
risk
-
b a se d
 
d e cisio n s
 
a nd
 
o b ta in
 
the
 
ne ce ssa ry
 
su p po rt
 
fo r
 
the  risk re sp o n se .
 
 
S h a re
 
th e
 
risk
 
a sse ssm e nt
 
and
 
risk
-
rela te d
 
inf o rma tion
 
with
 
the
 
app rop ria te
 
pe rson ne l
 
at 
Clo u d ma de e zL L C
 
to he lp sup p o rtth e risk re sp o n se  e ffo rts.
 
 
 
S tep 4 : Ma intai n the
 
Assessment
 
In  t h is ste p, the  ob ject ive  is t o  ke ep  cu rre n t with  t he  spe cific kn o wledg e  re late d to  th e  risks th a t 
Clo u d ma de e zL L C
 
incu rs.
 
Th e
 
resu lts
 
of
 
the
 
a sse ssme n ts
 
info rm
 
and
 
d rive
 
risk
-
b a se d
 
d e cision s
 
and
 
g u ide o ng o ing  risk re sp o n se  e ffo rts.
 
 
Mo n ito r Risk Fa cto rs
 
 
Con d u ct o ng o ing m on ito rin g o f th e  risk f a cto rs th a t co ntrib u te t o ch a ng e s in  risk to  
Clo u d ma de e zL L C

 
bu sine ss
 
o b ject ive s,
 
o pe ratio n s,
 
a sse ts,
 
in d ivid u a ls,
 
cu stome rs,
 
a n d /o r
 
o th e r 
organizations.
 
Ma int a ina n d Up d ate th e
 
Assessment
 
 
Upd a te
 
e xisting
 
risk
 
asse ssm en ts
 
u sing
 
the
 
re su lts
 
fro m
 
o ng o ing
 
mo n ito rin g
 
of
 
risk 
fa cto rs an d b y con du cting  ad d itiona l a sse ssme n ts, a tm inim um  an n ua lly.
 

OOD
 
OD
 
APP E NDIX  
B
 
Ris k
 
Asse s s me nt Matrix  a nd Des c ription 
Key
 
 
RISK= 
LIKELIH
 
* 
IMPACT
 
LIKELIHOOD
 
IMPACT
 
Very 
unlikely: 
1
 
Unlikely: 
2
 
Somewhat 
li k e ly : 3
 
Lik e ly : 
4
 
V e ry
 
lik ely :
 
5
 
Very 
high
 
impa c t: 
5
 
5
 
10
 
15
 
20
 
25
 
High 
impa c t:
 
4
 
4
 
8
 
12
 
16
 
20
 
Medium 
impa c t:
 
3
 
3
 
6
 
9
 
12
 
15
 
Low 
impa c t:
 
2
 
2
 
4
 
6
 
8
 
10
 
V e ry low 
impa c t: 
1
 
1
 
2
 
3
 
4
 
5
 
 
 
 
RISK 
LEVEL
 
RIS K 
DESCRIPTION
 
Low (1
-
7)
 
A
 
th rea t
 
e ven t
 
cou ld
 
be
 
e xp e cte d
 
to
 
h a ve
 
a
 
limite d
 
a d ve rse
 
e ffe ct
 
on  
o rga n izatio na l o pe ration s, m ission  cap ab ilities,  a sse ts, ind ividu a ls, 
cu stom e rs,o r o the r o rg a n izatio n s.
 
Medium 
(7
-
14)
 
A
 
th rea t
 
e ven t
 
cou ld
 
be
 
e xp e cte d
 
to
 
h a ve
 
a
 
serio u s
 
a d ve rse
 
e ff e ct
 
o n 
o rga n izatio na l o pe ration s, m ission  cap ab ilities,  a sse ts, ind ividu a ls, 
cu stom e rs,o r o the r o rg a n izatio n s
 
High
 
(15
-
 
25)
 
A
 
th rea t
 
e ven t
 
cou ld
 
be
 
e xp e cte d
 
to
 
h a ve
 
a
 
seve re
 
a d ve rse
 
e ffe ct
 
o n 
o rga n izatio na l o pe ration s, m ission  cap ab ilities,  a sse ts, ind ividu a ls, 
cu stom e rs,o r o the r o rg a n izatio n s.
 
 
 
 
LIKELIHO 
LEVEL
 
LIKELIHOOD 
DESCRIPTION
 
RATING
 
(NUME RICAL)
 

Very 
unlikely 
(1)
 
A
 
th re a te ve nt is so  
u n like ly tha t it ca n  
be
 
a ssum ed
 
tha t
 
its 
o ccu rre n ce
 
ma y
 
no t 
b e  e xp e rie n ce d .
 
A  t h rea t sou rce is 
n o tm o tiva ted  o r
 
has
 
no
 
ca pa b ility,
 
o r 
co n tro ls
 
a re
 
in
 
p lace  
to  p reve n to r 
sign ifican tly im pe d e  
th e  vu lne rab ility 
fro m b e ing  
exploited.
 
1
 
Unlikely 
(2)
 
A  t h rea t e ve n t is 
u n like ly,
 
bu t
 
th e re
 
is 
a  sligh tp o ssibility 
th a t its o ccu rren ce  
m a yb e  
experienced.
 
A  t h rea t sou rce 
lacks su ff icie nt 
m o tivatio n o r 
ca p ab ility, o r 
co n tro ls
 
a re
 
in
 
p lace  
to  p reve n to r 
im p ed e  th e  
vu lne rab ility f rom  
b e ing e xp loite d .
 
2
 
Somewhat 
li k e ly  (3 )
 
A  t h rea t e ve n t is 
like ly,
 
and
 
it
 
ca n
 
be 
a ssu me d th at its 
o ccu rre n ce
 
ma y
 
be  
experienced.
 
A  t h rea t sou rce is 
m o tivate d o r po se s 
th e  ca p ab ility, b ut 
co n tro ls
 
a re
 
in
 
p lace  
th a tm a y 
sign ifican tly red u ce 
o r im pe d e t h e
 
successful 
e xp loitatio n
 
of
 
th e  
vulnerability.
 
3
 
Lik e ly 
(4)
 
A  t h rea t e ve n t is 
like ly,
 
and
 
it
 
ca n
 
be  
a ssu me d th at its 
o ccu rre n ce  will be  
experienced.
 
4
 

 
A
 
th reat sou rce 
is
 
h igh lym o tivate d o r 
p o se s su ff icie nt 
ca p ab ility a n d 
reso u rces, b u t
 
so m e
 
con tro ls
 
a re
 
in 
p lace  th a t ma y 
red u ce o r imp e de  
th e  su cce ssfu l 
e xp loitatio n o f th e  
vulnerability.
 
 
Very
 
likely 
(5)
 
A  t h rea t e ve n t is 
h igh ly like ly, an d  it 
ca n  be  a ssu me d  
th a t its o ccu rren ce  
will
 
be
 
e xpe rie n ced .
 
5
 
 
A  t h rea t sou rce is 
h igh lym o tivate d o r 
p o se s su ff icie nt 
ca p ab ility o r 
reso u rces, b u t n o  
co n tro ls a re in  
p lace ,o r co ntro ls 
th a t
 
a re
 
in
 
p lace
 
a re 
ine ff e ctive  an d d o  
n o tp reve nt o r 
im p ed e  th e
 
successful 
e xp loitatio n
 
of
 
th e  
vulnerability.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
IMPACT 
LEVEL
 
IMPACT
 
DESCRIPTION
 
RATING 
(NUMERICAL)
 
V e ry low 
impa c t
 
(1)
 
A  t h rea t e ve n t co u ld be  e xpe cted  to  h a ve  a lm o stn o  
a d ve rsee ffe ct on  o rgan izat iona l o pe ration s,m issio n  
ca p ab ilities,  a ssets,  ind ivid u a ls, cu stom e rs,or 
d e g rad a tion
 
of
 
m issio n
 
ca p a b ility,
 
yet
 
p rim a ry
 
fu n ction s 
ca n  st ill be  p e rfo rme d ,m ino rd am a ge ,m ino rfin a n cial 
loss,  o r a  ra n ge  o f e ffects
 
sign ifican td e g rad atio n  of 
m issio n  ca p ab ility ye tp rim a ry fun ction s can still b e  
p e rfo rme d
 
at
 
a
 
red u ced
 
ca p a city;
 
m ino r
 
da ma g e ;
 
m ino r
 
1
 

 
fin a n cial
 
loss;
 
o r a
 
rang e
 
o fe ff e cts,
 
a nd  
impede
-
 
se ve rely
 
a ffe ct
 
or
 
organizations
 
 
Low
 
impa c t 
(2)
 
A  t h rea t e ve n t co u ld be  e xpe cted  to  h a ve  a lim ite d 
a d ve rsee ffe ct, m ea n ing : de g rada tion  o f m issio n  
ca p ab ility ye t p rim a ry fu n ction s ca n st ill b e p erfo rm e d; 
m ino r
 
d am ag e ;
 
m ino r
 
fin a n cial
 
loss;
 
or
 
rang e
 
of
 
e ffe cts 
is lim ite d  to  som e cyb er re so u rces bu tn o  critica l 
resources.
 
2
 
Medium 
impa c t
 
(3)
 
A  t h rea t e ve n t co u ld be  e xpe cted  to  h a ve  a se rio u s 
a d ve rsee ffe ct, m ea n ing : sign ifica n td e g ra d atio n  of 
m issio n  ca p ab ility ye tp rim a ry fun ction s can still b e  
p e rfo rme d
 
at
 
a
 
red u ced
 
ca p a city;
 
m ino r
 
da ma g e ;
 
m ino r 
fin a n cial lo ss; o r ran g e o f eff e cts is sig n ifican t t o  som e 
cyb e r re so u rce s an d  so m e critica l reso u rces.
 
3
 
High
 
impa c t 
(4)
 
A
 
th rea t
 
e ven t
 
cou ld
 
be
 
e xp e cte d
 
to
 
h a ve
 
a
 
seve re
 
o r 
ca ta strop h ic ad ve rseeff e ct, me a n ing : se ve re 
d e g rad a tion  o r lo ss o fm issio n  ca p ab ility a nd o n e o r 
m o rep rim a ry fu n ctio n s ca n no tb e p e rfo rm e d;m a jor 
d a ma ge ;m a jor fin a n cia l loss;  o r ran g e o fe ffects is 
e xte n sive  t o mo st cyber re so u rces an d m o st critica l 
resources.
 
4
 
V e ry  high 
impa c t 
(5)
 
A  t h rea t e ve n t co u ld be  e xpe cted  to  h a ve m ultiple  
se ve re
 
or
 
ca ta strop h ic
 
a d ve rse
 
e ffe cts
 
on
 
o rga n izat ion a l 
o p e ratio n s,a sse ts, ind ividu a ls,o th e ro rgan izatio n s,o r 
th e  Natio n . Th e  Ra n ge o f eff e cts is swe ep ing , in vo lvin g  
a lm o st a ll cybe r re so u rce s.
 
5
 

 

Risk  Ma nageme nt 
Procedure
 
 
 
 
 
 
Version
 
v1
 
 
Cre a t ed
 
By
 
Adarsh
,
 
J
uly
 
1
1
,
 
2025
 
 
 
Appro v ed
 
By
 
 
C EO
, Ju
ly
 
12
, 
2025
 
 
P ublis hed
 
By
 
Adarsh, Ju
ly
 
12
, 
2025
 
 

Converted: Automatically from PDF