How to keep catalog of threats

Last updated: 2024-11-05
Was this article helpful?
10 of total 10 found this helpful.

Overview of all Information Threats in Your Organization

For the purposes of information and cybersecurity and NIS2 requirements, it is necessary to maintain a catalog of information threats in your organization. This is facilitated by threat tracking, which is intended for the creation and management of the catalog of all information threats in the organization. We recommend using this tracking together with records of primary, supportive, and technical assets, as well as risk assessment records and vulnerabilities. This will provide you with a comprehensive overview of all the relevant connections you need for risk management and to fulfill obligations under NIS2 and the Cybersecurity Act.

  • You will gain an overview of all information threats.
  • An information threat catalog across the entire organization.
  • Detailed threat card for each individual threat.
  • Linkage to primary, supportive, and technical assets.
  • Association with risks.
catalog of information security threats

Information in the Threat Catalog according to the Cybersecurity Act

  • Threat ID
  • Threat description
  • Whether the threat pertains to availability
  • Whether the threat pertains to integrity
  • Whether the threat pertains to confidentiality
  • Description of the level of threat
  • Linkage of the threat to risks
Threats for risk analysis