Activity: A728 - Evaluate Security Management Performance
DescriptionWorkflowRolesWork Products
Workflow

Activity diagram: Evaluate Security Management Performance Assess Process Execution Assess Process Framework Audit Process Collect Evaluation Results Collect Feedback Communicate to Stakeholders Complete Evaluation Produce Gap Analysis Produce Process Measurements Recommend Initiatives Research Trends and Best Practices Review Existing Documentation

Activity detail diagram: Evaluate Security Management Performance Security Manager Assess Process Execution Assess Process Framework Audit Process Collect Feedback Communicate to Stakeholders Security Manager Security Manager Complete Evaluation Produce Process Measurements Recommend Initiatives Research Trends and Best Practices Review Existing Documentation Security Manager Security Management Activity Data Security Management Framework Assess Process Execution Security Management Evaluation Assess Process Execution Security Management Activity Data Security Management Framework Assess Process Framework Security Management Evaluation Assess Process Framework Security Management Framework Security Management Activity Data Audit Process Security Management Evaluation Audit Process Security Analyst Collect Evaluation Results Produce Gap Analysis Security Analyst Security Management Activity Data Collect Evaluation Results Security Management Evaluation Collect Evaluation Results Security Management Activity Data Collect Feedback Security Management Evaluation Collect Feedback Security Management Evaluation Communicate to Stakeholders Security Management Evaluation Stakeholder Notification Communicate to Stakeholders Security Management Evaluation Complete Evaluation Security Management Evaluation Complete Evaluation Security Management Evaluation Produce Gap Analysis Security Management Evaluation Produce Gap Analysis Security Management Activity Data Produce Process Measurements Security Management Evaluation Produce Process Measurements Security Management Evaluation Recommend Initiatives Security Management Evaluation Recommend Initiatives Security Management Activity Data Research Trends and Best Practices Security Management Evaluation Research Trends and Best Practices Security Management Activity Data Review Existing Documentation Security Management Evaluation Review Existing Documentation
Work Breakdown