Knowledge and Information Management (KIM)

Operational risks to information assets are identified and managed.


Login

Knowledge and Information Management (KIM)

Risks to information assets are periodically identified and assessed.


Login

Knowledge and Information Management (KIM)

Risk response plans for risks to information assets are developed and implemented.


Login

Knowledge and Information Management (KIM)

The confidentiality and privacy considerations of information assets are managed.


Login

Knowledge and Information Management (KIM)

Cryptographic controls are applied to information assets to ensure confidentiality and prevent accidental disclosure.


Login

Knowledge and Information Management (KIM)

Access controls are developed and implemented to limit access to information assets.


Login

Knowledge and Information Management (KIM)

The means for disposing of information assets are controlled.


Login

Knowledge and Information Management (KIM)

The integrity of information assets to support high-value services is managed.


Login

Knowledge and Information Management (KIM)

The modification of information assets is controlled.


Login

Knowledge and Information Management (KIM)

Information asset baselines are created and changes are managed.


Login