IT Examiner School - Oct 2025

Internal Use Only

Step 5 – Evaluate and Monitor Controls

Examples of Monitoring & Continuous Improvement • Track vulnerability scan cadence & patch SLA compliance

• Monitor incident metrics (time to detect/respond) • Use threat intelligence feeds for emerging risks

• Test controls via penetration testing and control reviews • Update RA with new findings, incidents, or system changes

Internal Use Only

Examination Takeaways: Risk Assessment How much time should I spend on the Risk Assessment?

Plan to expand the depth of review when: • Not been reviewed at least annually. • Changes in management and/or environment. • Risk assessment completed with limited input from other stakeholders. • Discrepancies in the identified process. • Audit & Exam findings are evident. • You are not confident in management's responses.

Plan to reduce the depth of review when: • The risk assessment was recently reviewed by a qualified auditor and found to be adequate. • There have been no changes in management or the environment since the last examination. • The quality of the risk assessment process has been validated.

Made with FlippingBook Learn more on our blog