Security Policy: Difference between revisions
Jump to navigation
Jump to search
Line 118: | Line 118: | ||
# Select appropriate information security risk treatment options, taking account of the risk assessment results; | # Select appropriate information security risk treatment options, taking account of the risk assessment results; | ||
# Determine all controls that are necessary to implement the information security risk treatment option(s) chosen; | # Determine all controls that are necessary to implement the information security risk treatment option(s) chosen; | ||