SUCCESS
  • Home
  • About
  • Controls
    • Governance
    • Access Control
    • Asset Management
    • Data Security
    • Human Resources
    • Software Security
    • Incident Response
    • Vulnerability Management
    • Risk Management
    • Physical Security
    • Team
  • Other Resources
  • More
    • Home
    • About
    • Controls
      • Governance
      • Access Control
      • Asset Management
      • Data Security
      • Human Resources
      • Software Security
      • Incident Response
      • Vulnerability Management
      • Risk Management
      • Physical Security
      • Team
    • Other Resources
SUCCESS
  • Home
  • About
  • Controls
    • Governance
    • Access Control
    • Asset Management
    • Data Security
    • Human Resources
    • Software Security
    • Incident Response
    • Vulnerability Management
    • Risk Management
    • Physical Security
    • Team
  • Other Resources

17 - Potential risks and security weaknesses should be identified and assessed how they may harm

Purpose:

Identifying risks and their impact can help mitigate their impact


Best Practices:

Develop privacy risk assessment to categorize sensitivity of and risk to different systems

18 - Plans should be developed to mitigate those risks

Purpose:

Having an outlined plan to mitigate risk will provide a standardized way to respond


Best Practices:

Create a minimum security policy first, and build upon it as the company grows


Examples:

NIST Framework gives a good outline, other resources on the website


Copyright © 2023 SUCCESS - All Rights Reserved.

Powered by GoDaddy

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept