Security Policy: Difference between revisions

Jump to navigation Jump to search
Line 118: Line 118:


# Select appropriate information security risk treatment options, taking account of the risk assessment results;
# Select appropriate information security risk treatment options, taking account of the risk assessment results;
# Determine all controls that are necessary to implement the information security risk treatment option(s) chosen;
# Determine all controls that are necessary to implement the information security risk treatment option(s) chosen;