< back
Information Security Work Flow
- Divisions
- Contacts
- Documents
- Risk Appetite
- Identifying information
resources assets
- Identifying supporting
resources assets
ResourceAsset relationships
ResourceAsset CIA scoring
- Mapping to Resources
- Mapping to Controls
- Scoring
- Control Applicability
- Control Ownership
- Mapping to resources
- Control Maturity Assessment
- Risk Assessment set up
- Risk Assessment steps
- Specific vulnerabilities
- Vulnerabilities Risk Treatment
- Risk Register Breakdown
- Risk decisions
- Creating Risk actions
- Understanding risk treatment decisions
- Statement of applicability
- Risk Register
- Risk Treatment Plan