Process: A72 - Security Management
Identify security threats, determine risks and vulnerabilities which affect the IT organization or that IT can affect, and recommend mitigating changes based on this analysis. To get more information, select Description (introduction and list of tool mentors), Work Breakdown Structure (workflow diagram and table), Team Allocation (table of roles), or Work Product Usage (table of work products).
DescriptionWorkflowRolesWork Products
Work Product Breakdown