Protection-Needs Assessment & Inheritance🔗
Purpose🔗
The protection-needs assessment determines the protection needs of processes and assets based on the protection goals confidentiality, integrity, and availability (CIA).
After approval, the protection needs can be inherited along the modelled dependencies.
Usage🔗
- Click + to create a new protection-needs assessment form for processes, hardware, software, or infrastructure of the selected scope.
- Select or create an assessment period (e.g. year).
- Assess each object for:
- Confidentiality, Availability, Integrity via a rating dropdown (e.g. low / normal / high / very high)
- document the rationale for the classification.
- Submit the form for approval. The approver can:
- reject (for rework), or
- approve (including notification).
- After approval, a protection-needs overview is available.
Start "Calculate inheritance" to update the overall protection needs along the dependencies.
This produces a consistent protection-needs overview that is subsequently used in risk management.