4.2.1 Establish the ISMS
The organization shall do the following. …
d) Identify the risks.
1) Identify the assets within the scope of the ISMS, and the owners2) of these assets.
2) Identify the threats to those assets.
3) Identify the vulnerabilities that might be exploited by the threats.
4) Identify the impacts that losses of confidentiality, integrity and availability may have on the assets.
e) Analyse and evaluate the risks.
f) Identify and evaluate options for the treatment of risks.