Information Security Work Flow
Set up
- Divisions
- Contacts
- Documents
- Risk Appetite
Resources
- Identifying information resources
- Identifying supporting resources
- Resource relationships
- Resource CIA scoring
Threats
- Scoring
Controls
Risk Assessment
Risk Register
Risk Treatment Plan
Reporting