Governance (GV)

Cybersecurity roles and responsibilities are coordinated and aligned with internal roles and external partners


Login

Governance (GV)

Legal and regulatory requirements regarding cybersecurity, including privacy and civil liberties obligations, are understood and managed


Login

Governance (GV)

Governance and risk management processes address cybersecurity risks


Login

Risk Assessment (RA)

Asset vulnerabilities are identified and documented


Login

Risk Assessment (RA)

Cyber threat intelligence is received from information sharing forums and sources


Login

Risk Assessment (RA)

Threats, both internal and external, are identified and documented


Login

Risk Assessment (RA)

Potential business impacts and likelihoods are identified


Login

Risk Assessment (RA)

Threats, vulnerabilities, likelihoods, and impacts are used to determine risk


Login

Risk Assessment (RA)

Risk responses are identified and prioritized


Login

Risk Management Strategy (RM)

Risk management processes are established, managed, and agreed to by organizational stakeholders


Login