This team can obtain and evaluate feedback from each corporate area affected by the security implementation. The results of this evaluation may suggest revisions to the implementation plan. If the implementation is completed, the results may suggest revisions in security direction or design to meet a changing environment. The results may even suggest revisions to the security policy or document of security objectives.
Remember that security considerations become a part of any environmental change once your organization is committed to implementing a security product. These considerations become part of the evaluation or modification checklist for each proposed acquisition or modification in your environment. Otherwise, you may find that new or revised software has security exposures after your organization is committed to the change.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|