Information Security Management
Stage
2
Process
6
Information Security Management ensures that information is:
- Available and usable when required (availabililty)
- Disclosed only to those who have a right to know (confidentiality)
- Complete, accurate, and protected against unauthorized modification (integrity)
- Information exchanges between enterprises or with partners can be trusted (authenticity and non-repudiation)
Recommended Security Controls
- Preventive -> Keep a security incident from happening.
- Detective -> Identify a risk or threat as quickly as possible.
- Repressive -> Work like counterattacks.
- Corrective -> Repair any damage caused by an error or incident.