Navigation: CHAPTER THREE: THE REQUIREMENTS > 3.5 Assessing security and privacy capabilities
Figure 3 summarizes the security control and privacy control assessment process including the activities carried out during pre-assessment, assessment, and post-assessment.