
399
Appendix M
Control Lists
Overview
For years I have worked to establish a sample list of threats that could be used by risk
management professionals to expedite the risk assessment process. A few years ago
when I was doing a class in Brazil a student gave me a URL that has helped the threat
identification process. A German organization, IT-Grundschutz, has established two
important lists for the risk management professional. e first set was discussed in
Appendix G; that list focused on threats. is time, IT-Grundschutz — an orga-
nization that aims to achieve a security level for IT systems that is reasonable and
adequate to satisfy normal pro ...