Use the following guidelines to assist in preplanning tasks.
Security | Example data needed, where applicable, and by location | Data collected |
---|---|---|
Security policies |
Collect information about your organization’s security policies, such as the following:
|
|
Separation of or delegation of duties between IT divisions within the enterprise. |
|
|
The degree to which users must retain control of clients, and any exceptions to such policies (such as servers, or computers used by programmers). |
|
|
You should collect information about how security-related issues will be handled and supported, such as the following information:
|
|