Technology Risk Management - The Definitive Guide | LeanIX (2024)

How to perform a technology risk assessment

Now that we have established the benefits, you will probably want to know what the steps are to create a thorough technology risk assessment.

We recommend the following:

Get a complete list of applications you use

Hopefully, you have been documenting your applications over the past year. If not, I would suggest first reading our rules and guidelines for Application Rationalization.

Without an overview of your current application landscape, it does not make sense to start a technology assessment. You wouldn’t start baking a cake without a list of ingredients, right? As a first step, you need to collect a list of all the applications you are currently using in your enterprise.

Assess the software versions that are in use

The next step is to find out what software versions are being used.

As a best practice, we recommend using a technology stack to group your software. You can also tag your software (manually or using out-of-the-box LeanIX tags) to reference them in the future. In the screenshot example below, you can see that we have tagged them via the Candidate, Leading, Exception, Sunsetmodel.

Assess servers and data centers in use

This next step is similar to the previous ones. We recommend again assigning a technology stack to each server and data center.

In this step, you should also verify the data. For example, you can check where your servers are located by using an IT component location report.

Link software and servers to applications

After having collected and verified all of the data in the previous steps, it is important to now create the link between software, servers, and applications. This lets you later understand the dependencies between these objects, and thus avoid situations like the one previously described.

Technology Risk Management - The Definitive Guide |LeanIX (1)

Image 4: Free draw report showing dependencies between an application and its IT components and technical stacks.

Find out how technology affects your business

You made it to the final step. Now it’s time to find out what technology risk actually means for your business. Time to put the pieces together, for example, we can now use find out where applications using certain software versions are hosted.

Deep-Dive: end-of-life management

One of the most important factors in technology risk management is obsolescence risk management.

What does this mean? Companies that don’t pay attention to deployed technology reaching obsolescence facea higher number of security risks and vulnerabilitiesthan companies that keep a close eye on the life-cycle of elements in their IT landscape. Also, continuing to use hardware or software that is no longer supported makes it easier for cybercriminals to gain access to systems and data.

This crucial topic is often overlooked, even government agencies are not immune to this. US Government auditors blasted the Internal Revenue Service (IRS) in 2015 for missing deadlines to upgrade Windows XP PCs and data center servers running Windows Server 2003, both of which have been retired by Microsoft.

Nine months after Windows XP fell off Microsoft’s support list, the agency still could not account for 1,300 PCs, about 1% of its total, and so could not say whether they had been purged of the ancient OS. The IRS also had to pay Microsoft for post-retirement support contracts to be provided with critical security updates.

Technology Risk Management - The Definitive Guide |LeanIX (3)
Figure 5 - The business
impact of technology obsolescence.

📚 Related: Technology Lifecycle Management

Deep-dive: Compliance

Businesses need to comply with many regulations from HIPAA to PCI and FISMA. While compliance does cost money and in terms of technology, requires an accurate view of applications and technology, the cost of non-compliance is usually higher. As a rule of thumb, experts say that the cost of non-compliance is 2.5 times higher than the cost of compliance.

An up-to-date EA Inventory does not only provide you with reliable data that you can use to document your compliance with regulations. The LeanIX Survey Add-on can also help you to create ad-hoc or regular surveys for the appropriate staff to maintain accurate information about, for example, the use of sensitive data by applications.

A current EA use case is GDPR for example; We can assess our data to determine their level of privacy sensitivity, categorizing them as public/unclassified, sensitive, restricted, or confidential. If you are using a professional enterprise architecture management tool such as LeanIX, you can use tags to add further attributes (e.g. "GDPR restricted") to a data object or application. This will usually already be part of your internal security processes, where you assign attributes such as confidentiality, integrity, or availability to data.

Technology Risk Management - The Definitive Guide |LeanIX (4)

Deep-dive: Complexity

Complexity is the enemy of security. When it comes to the retirement of old technology, CIOs have to carefully balance two aspects. On the one hand, they need to “keep the lights on”. They need to make sure, above everything else, that IT operations are running smoothly.

The old proverb says, “If it isn't broken, don’t fix it,” but this adage was not written with digital transformation in mind. There is, of course, some truth in the saying, as an upgrade to newer technology usually is accompanied by some kind of interruption, but keeping the status quo comes at the cost ofincreased complexity.

Figure 6:LeanIX dashboardillustrates which applications are at risk as the underlying IT components are out of the lifecycle.

Obsolescence and hardware maintenance, as well as security, are some of the most pressing information technology problems facing organizations today. Not planning for the future of technology is by far one of the most costly IT mistakes that many enterprises make.

Conclusion

Most companies are much better at introducing new technologies than retiring them. The cost of running unsupported technology can be high. Costs of IT outages and data breaches run into the millions.

Technology risk management is a broad, complex topic that cannot be solved by manual data maintenance – no matter how great your team is. With the help of LeanIX software, enterprise architects can quickly source up-to-date technology product information. This information is essential when assessing the risk of the application landscapes, and to plan, manage or retire technology components in a smart way.

Technology Risk Management - The Definitive Guide | LeanIX (2024)
Top Articles
The Difference Between AP Macroeconomics and AP Microeconomics
Where should you invest your emergency fund?
Navicent Human Resources Phone Number
Wizard Build Season 28
Unitedhealthcare Hwp
Beautiful Scrap Wood Paper Towel Holder
Tabler Oklahoma
Our Facility
Https E24 Ultipro Com
Lax Arrivals Volaris
Mills and Main Street Tour
Cinebarre Drink Menu
Commodore Beach Club Live Cam
Mals Crazy Crab
How Much Is Tay Ks Bail
Amazing deals for DKoldies on Goodshop!
Missed Connections Inland Empire
X-Chromosom: Aufbau und Funktion
Aps Day Spa Evesham
Veracross Login Bishop Lynch
Euro Style Scrub Caps
Best Nail Salons Open Near Me
Doki The Banker
Apparent assassination attempt | Suspect never had Trump in sight, did not get off shot: Officials
Shelby Star Jail Log
Narragansett Bay Cruising - A Complete Guide: Explore Newport, Providence & More
Times Narcos Lied To You About What Really Happened - Grunge
Intel K vs KF vs F CPUs: What's the Difference?
Lacey Costco Gas Price
1636 Pokemon Fire Red U Squirrels Download
Evil Dead Rise Showtimes Near Regal Sawgrass & Imax
031515 828
Fairwinds Shred Fest 2023
How to Watch the X Trilogy Starring Mia Goth in Chronological Order
آدرس جدید بند موویز
October 31St Weather
Scottsboro Daily Sentinel Obituaries
Hebrew Bible: Torah, Prophets and Writings | My Jewish Learning
Indio Mall Eye Doctor
Gravel Racing
FedEx Authorized ShipCenter - Edouard Pack And Ship at Cape Coral, FL - 2301 Del Prado Blvd Ste 690 33990
Searsport Maine Tide Chart
Dagelijkse hooikoortsradar: deze pollen zitten nu in de lucht
Big Brother 23: Wiki, Vote, Cast, Release Date, Contestants, Winner, Elimination
Gelato 47 Allbud
53 Atms Near Me
Okta Hendrick Login
Kidcheck Login
Osrs Vorkath Combat Achievements
Latest Posts
Article information

Author: Errol Quitzon

Last Updated:

Views: 6044

Rating: 4.9 / 5 (59 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Errol Quitzon

Birthday: 1993-04-02

Address: 70604 Haley Lane, Port Weldonside, TN 99233-0942

Phone: +9665282866296

Job: Product Retail Agent

Hobby: Computer programming, Horseback riding, Hooping, Dance, Ice skating, Backpacking, Rafting

Introduction: My name is Errol Quitzon, I am a fair, cute, fancy, clean, attractive, sparkling, kind person who loves writing and wants to share my knowledge and understanding with you.