December 2020
Intermediate to advanced
361 pages
6h 26m
English
Your intended risk treatments are likely to fall within the CRF processes, telling you which ones you need and to what level of maturity you should aim to implement each, and by extension enabling you to refine your project plan (see appendix 2).
Where there is a large gap between your current and target states, it is sensible to take an iterative approach, making use of the continual improvement model you established in step 5 (chapter 22) and prioritising the controls that address the biggest risks. It is important, however, that each iteration maintains a balance between the three security pillars – people, processes and technology (see 5.2).
Remember that the full set of controls you implement ...