Not logged in - Login
< back

Information Security Work Flow

Set up

  1. Divisions
  2. Contacts
  3. Documents
  4. Risk Appetite

Resources

  1. Identifying information resources
  2. Identifying supporting resources
  3. Resource relationships
  4. Resource CIA scoring

Threats

  1. Mapping to Resources
  2. Mapping to Controls
  3. Scoring

Controls

  1. Control Applicability
  2. Control Ownership
  3. Mapping to resources
  4. Control Maturity Assessment

Risk Assessment

  1. Risk Assessment set up
  2. Risk Assessment steps
  3. Specific vulnerabilities
  4. Vulnerabilities Risk Treatment

Risk Register

  1. Risk Register Breakdown
  2. Risk decisions

Risk Treatment Plan

  1. Creating Risk actions
  2. Understanding risk treatment decisions

Reporting

  1. Statement of applicability
  2. Risk Register
  3. Risk Treatment Plan