Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Mapping of information assets and value assessment
  2. Identify existing safeguards
  3. Identifcation of risk elements
  4. Assessment of risk level (consequence and probability)
  5. Controls in relation to risk factorselements
  6. Categorization and prioritization of controls
  7. Approval of controls
  8. Risk treatment. Implementation and follow-up of controls

...