Applicable (Y)es / (N)o |
(C)onfidentiality |
(I)ntegrity |
(A)vailability |
RPN (C+I+A) |
(S)atisfactory |
||||||
L1 |
M2 |
H3 |
L1 |
M2 |
H3 |
L1 |
M2 |
H3 |
(O)ther than satisfactory +## |
||
|
|
|
|
|
|
|
|
|
|
|
|
###
pm-7 |
enterprise architecture |
|
|
assessment objective: Determine if the organization develops an enterprise architecture with consideration for: |
|
pm-7[1] |
information security; and |
|
pm-7[2] |
the resulting risk to organizational operations, organizational assets, individuals, other organizations, and the Nation. |
|
potential assessment methods and objects: Examine: [select from: Information security program plan; enterprise architecture documentation; procedures addressing enterprise architecture development; results of risk assessment of enterprise architecture; other relevant documents or records]. Interview: [select from: Organizational personnel with information security program planning and plan implementation responsibilities; organizational personnel responsible for developing enterprise architecture; organizational personnel responsible for risk assessment of enterprise architecture; organizational personnel with information security responsibilities]. Test: [select from: Organizational processes for enterprise architecture development; automated mechanisms supporting the enterprise architecture and its development]. |