Not logged in - Login
< back

Information Security Work Flow

Set up

  1. Divisions
  2. Contacts
  3. Documents
  4. Risk Appetite

Resources

  1. Identifying information resources
  2. Identifying supporting resources
  3. Resource relationships
  4. Resource CIA scoring

Threats

  1. Mapping to Resources
  2. Mapping to Controls
  3. Scoring

Controls

Risk Assessment

Risk Register

Risk Treatment Plan

Reporting

  1. Statement of applicability
  2. Risk Register
  3. Risk Treatment Plan