You are on page 1of 4

CONTROL ANALYSIS

The purpose of this step is to document a list of security controls used for the IT system. These controls should correspond to the requirements of the Policy, Standard, and Audit Standard. The analysis should also specify whether the control is in-place (i.e., current) or planned, and whether the control is currently enforced. In the next step these controls are matched with the risks identified in Table D, in order to identify those risks that require additional response. Table E is an example of a security controls list that corresponds to the requirements of the Policy, Standard, and Audit Standard. This list shows controls that are in-place, as well as those planned for implementation.

Geographical Matrix

Activities are grouped accordingto location. A combination of the functional and divisional.Dual reporting lines

You might also like