Risk management of new products, new technologies and user behaviors

edit

New or changing business models/strategies

edit

Internal and external influences

edit

Impact of de-perimiterization (e.g. constantly changing network boundary)

edit

Execute and implement risk mitigation strategies and controls

edit

Classify information types into levels of CIA – Confidentiality, Integrity, and Availability based on organization/industry

edit

Determine aggregate score of CIA

edit

"CVSS Implementation Guidance" (PDF). Retrieved 2014JUN26. {{cite web}}: Check date values in: |accessdate= (help) "Common Weakness Scoring System (CWSS™)". Retrieved 2014JUN26. {{cite web}}: Check date values in: |accessdate= (help)

Determine minimum required security controls based on aggregate score

edit

"Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations" (PDF). Retrieved 2014JUN30. {{cite web}}: Check date values in: |accessdate= (help)

Conduct system specific risk analysis

edit

"Guide for Conducting Risk Assessments". Retrieved 2014JUN30. {{cite web}}: Check date values in: |accessdate= (help)

Make risk determination

edit

"risk assessment". Retrieved 2014JUN30. {{cite web}}: Check date values in: |accessdate= (help)

Likelihood of threat

edit

"Factors for Estimating Likelihood". Retrieved 2014JUN30. {{cite web}}: Check date values in: |accessdate= (help)

Decide which security controls should be applied based on minimum requirements

edit

"Critical Security Controls". Retrieved 2014JUL07. {{cite web}}: Check date values in: |accessdate= (help)

Explain the importance of preparing for and supporting the incident response and recovery process

edit

"Computer Security Incident Handling Guide" (PDF). Retrieved 2014JUL14. {{cite web}}: Check date values in: |accessdate= (help)

E-Discovery

edit

Electronic inventory and asset control=

edit

Data retention policies

edit

Data recovery and storage

edit

Data ownership

edit

Data handling

edit

Data breach

edit

Recovery

edit

Minimization

edit

Mitigation and response

edit

System design to facilitate incident response taking into account types of violations

edit

Internal and external

edit

Privacy policy violations

edit

Criminal actions

edit

Establish and review system event and security logs

edit

Incident and emergency response

edit

Implement security and privacy policies and procedures based on organizational requirements

edit

Policy development and updates in light of new business, technology and environment changes

edit

Process/procedure development and updated in light of policy, environment and business changes

edit
edit

Use common business documents to support security

edit

Interconnection Security Agreement (ISA)

edit

Memorandum of Understanding (MOU)

edit

Service Level Agreement (SLA)

edit

Operating Level Agreement (OLA)

edit

Non-Disclosure Agreement (NDA)

edit

Business Partnership Agreement (BPA)

edit

Use general privacy principles for PII – Personally Identifiable Information/ Sensitive PII

Support the development of policies that contain

edit

Separation of duties

edit

Job rotation

edit

Mandatory vacation

edit

Least privilege

edit

Incident response

edit

Forensic tasks

edit

On-going security

edit

Training and awareness for users

edit

Auditing requirements and frequency

edit