Information Security Work Flow
Set up
- Divisions
- Contacts
- Documents
- Risk Appetite
Resources
- Identifying information resources
- Identifying supporting resources
- Resource relationships
- Resource CIA scoring
Threats
- Mapping to Resources
- Mapping to Controls
- Scoring
Controls
Risk Assessment
Risk Register
Risk Treatment Plan
Reporting
- Statement of applicability
- Risk Register
- Risk Treatment Plan