Operational risks to information assets are identified and managed.
Operational risks to information assets are identified and managed.
Risks to information assets are periodically identified and assessed.
Risk response plans for risks to information assets are developed and implemented.
The confidentiality and privacy considerations of information assets are managed.
Cryptographic controls are applied to information assets to ensure confidentiality and prevent accidental disclosure.
Access controls are developed and implemented to limit access to information assets.
The means for disposing of information assets are controlled.
The integrity of information assets to support high-value services is managed.
The modification of information assets is controlled.
Information asset baselines are created and changes are managed.