RART

Created by Venkat Pothamsetty, Modified on Tue, 26 Aug at 11:13 AM by Venkat Pothamsetty

Risk Assessment & Risk Treatment (RART) – SquareX

ISMS Standard: ISO/IEC 27001:2022


1. Document Metadata

FieldDescription
Document TitleRisk Assessment & Risk Treatment (RART) – SquareX
Version1.1
Date2025-08-22
ScopeAWS & Azure infrastructure and services supporting SquareX Browser Security Platform
Prepared byVenkat Pothamsetty
Approved byJohn Carse

Revision History

VersionDateChangesApproved by
1.02025-08-22Initial creation for SquareX ISMS scopeJeswin Mathai
1.12025-08-22Updated to focus on AWS & Azure medium/low risksJeswin Mathai

2. Risk Assessment Methodology

  • Governance Framework: ISO/IEC 27001 Clause 6.1.3 & SquareX Risk Assessment Policy.

  • Process: Asset identification → Threats → Vulnerabilities → Likelihood/Impact → Risk Rating → Treatment → Residual Risk.

  • Risk Criteria:

    • Low (<3): Acceptable with monitoring.

    • Medium (3–7): Acceptable with treatment and CISO approval.

    • High (>7): Immediate treatment required (not included here).


3. Risk Register (AWS & Azure – Medium/Low Risks Only)

Risk IDAssetThreat / ScenarioVulnerabilityInherent RiskTreatmentResidual RiskOwnerReview Date
SX-AWS-01AWS S3 BucketsData exposure via misconfigured public accessLack of uniform bucket policies3.2 (Medium)Enforce SCPs, default encryption & access logs2.0 (Low)Cloud Ops Lead2026-02-22
SX-AWS-02AWS IAMPrivilege creep in service accountsInfrequent role reviews2.8 (Medium)Implement IAM Access Analyzer, quarterly reviews1.5 (Low)SecOps Lead2026-02-22
SX-AZ-01Azure Key VaultUnauthorized access attemptsWeak monitoring of access logs3.5 (Medium)Enable Azure Monitor, conditional access2.3 (Medium)Cloud Ops Lead2026-02-22
SX-AZ-02Azure ADMFA bypass attemptsMFA brute force
2.5 (Medium)Block legacy auth, enforce conditional MFA1.8 (Low)IT Manager2026-02-22

4. Treatment Plan & Residual Risk Analysis

Risk SX-AWS-01 – S3 Misconfiguration

  • Controls: Service Control Policies (SCPs), block public access, encryption enforced.

  • Residual Risk: Low – accepted by CISO.

Risk SX-AWS-02 – IAM Privilege Creep

  • Controls: Access Analyzer, quarterly reviews, least-privilege enforcement.

  • Residual Risk: Low – accepted.

Risk SX-AZ-01 – Azure Key Vault Access Risks

  • Controls: Logging via Azure Monitor, conditional access enforcement.

  • Residual Risk: Medium – accepted with monitoring.

Risk SX-AZ-02 – Azure AD Legacy Auth

  • Controls: Disable legacy protocols, enforce MFA.

  • Residual Risk: Low – accepted.

Risk SX-AZ-03 – Blob Storage SAS Token Leakage

  • Controls: Short-lived tokens, logging, monitoring.

  • Residual Risk: Low – accepted.


5. Monitoring & Review

  • Review Cycle: Annually, or upon major cloud service changes.

  • Controls Verification: Quarterly access reviews, SIEM log analysis.

  • KPIs:

    • 100% IAM role reviews on time.

    • Zero unauthorized blob storage access events.

    • Zero public S3 buckets detected.


6. Risk Scoring & Acceptance Criteria

  • Low (<3): Acceptable with monitoring.

  • Medium (3–7): Acceptable with treatment and CISO approval.

  • High (>7): Not in scope here (requires urgent mitigation).


7. Annex A Control Mapping

Risk IDThreat ScenarioControl References
SX-AWS-01Misconfigured S3 exposureA.5.23 (Cloud services), A.8.9 (Config mgmt), A.13.1 (Network security)
SX-AWS-02IAM privilege creepA.8.2.2 (Ownership of assets), A.9.2 (User access mgmt), A.9.4 (Access restrictions)
SX-AZ-01Unauthorized Key Vault accessA.5.13 (Access control), A.12.4 (Logging & monitoring), A.8.16 (Activity monitoring)
SX-AZ-02Legacy protocol MFA bypassA.9.1.2 (Access to networks), A.5.15 (Use of mobile devices), A.5.23 (Cloud security)
SX-AZ-03Blob Storage token leakageA.8.8 (Data leakage prevention), A.8.27 (Information deletion), A.13.2 (Network confidentiality)


Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article