Layer on baseline controls in accordance with CIA information ratings. This step ties the organization's business...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
risks into information security controls. Many organizations are challenged with regulatory compliance and implementation of security best practices. Do not lose track of the big picture, controls are meant to insulate the business from unacceptable risk. The simple process of applying controls based upon data sensitivity and impact ratings will address most compliance concerns. Any deviation from baseline controls should require a formal exception approved by information security management and the business.
INSIDER THREAT MANAGEMENT GUIDE
Introduction: Insider threat management
Data organization and impact analysis
Baseline management and control
Risk management audit
Risk management references