CASP/Risk
Risk management of new products, new technologies and user behaviors
editNew or changing business models/strategies
editInternal and external influences
editClient requirements
editImpact of de-perimiterization (e.g. constantly changing network boundary)
editConsiderations of enterprise standard operating environment (SOE) vs. allowing Bring Your Own Device(BYOD)
editExecute and implement risk mitigation strategies and controls
editClassify information types into levels of CIA – Confidentiality, Integrity, and Availability based on organization/industry
editDetermine aggregate score of CIA
edit"CVSS Implementation Guidance" (PDF). Retrieved 2014JUN26. {{cite web}}
: Check date values in: |accessdate=
(help)
"Common Weakness Scoring System (CWSS™)". Retrieved 2014JUN26. {{cite web}}
: Check date values in: |accessdate=
(help)
Determine minimum required security controls based on aggregate score
edit"Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations" (PDF). Retrieved 2014JUN30. {{cite web}}
: Check date values in: |accessdate=
(help)
Conduct system specific risk analysis
edit"Guide for Conducting Risk Assessments". Retrieved 2014JUN30. {{cite web}}
: Check date values in: |accessdate=
(help)
Make risk determination
edit"risk assessment". Retrieved 2014JUN30. {{cite web}}
: Check date values in: |accessdate=
(help)
Likelihood of threat
edit"Factors for Estimating Likelihood". Retrieved 2014JUN30. {{cite web}}
: Check date values in: |accessdate=
(help)
Decide which security controls should be applied based on minimum requirements
edit"Critical Security Controls". Retrieved 2014JUL07. {{cite web}}
: Check date values in: |accessdate=
(help)
Explain the importance of preparing for and supporting the incident response and recovery process
edit"Computer Security Incident Handling Guide" (PDF). Retrieved 2014JUL14. {{cite web}}
: Check date values in: |accessdate=
(help)
E-Discovery
editElectronic inventory and asset control=
editData retention policies
editData recovery and storage
editData ownership
editData handling
editData breach
editRecovery
editMinimization
editMitigation and response
editSystem design to facilitate incident response taking into account types of violations
editInternal and external
editPrivacy policy violations
editCriminal actions
editEstablish and review system event and security logs
editIncident and emergency response
editImplement security and privacy policies and procedures based on organizational requirements
editPolicy development and updates in light of new business, technology and environment changes
editProcess/procedure development and updated in light of policy, environment and business changes
editSupport legal compliance and advocacy by partnering with HR, legal, management and other entities
editUse common business documents to support security
editInterconnection Security Agreement (ISA)
editMemorandum of Understanding (MOU)
editService Level Agreement (SLA)
editOperating Level Agreement (OLA)
editNon-Disclosure Agreement (NDA)
editBusiness Partnership Agreement (BPA)
editUse general privacy principles for PII – Personally Identifiable Information/ Sensitive PII