Effort: ~ 2 hours
Based on: BSI IT Grundschutz M 2.25 / M 2.31 / M 2.34 / M 2.219 / M 2.259
The CSR should document the company’s resources and the resources employees use to process company related data. This is needed to identify the threats and to identify which devices need to be managed and monitored by the CSR.
The author created a documentation template for startups. It is available under the following link: https://leanstartupsecurity.com/wp-content/uploads/2016/09/Documentation_Template.xlsx
The information contained in this website is for general information purposes only. You can find more information about the accuracy of the information on the disclaimer and terms and conditions pages.