Identify risks based on threats and vulnerabilities. Determine owners of risks.
Maintain information about all risks in a repository.
©Copyright IBM Corp. 2005, 2008. All Rights Reserved.