Process: A72 - Security Management
Identify security threats, determine risks and vulnerabilities which affect the IT organization or that IT can affect, and recommend mitigating changes based on this analysis. To get more information, select Description (introduction and list of tool mentors), Work Breakdown Structure (workflow diagram and table), Team Allocation (table of roles), or Work Product Usage (table of work products).
DescriptionWorkflowRolesWork Products
Workflow

Activity diagram: Security Management Establish Security Management Framework Analyze Security Threats, Vulnerabilities and Risks Plan and Implement Security Practices Operate Security Protection Mechanisms Monitor, Assess, Audit and Report Security Evaluate Security Management Performance Produce and Maintain Security Policy Classify Information Asset Security
Work Breakdown