{"id":17,"date":"2022-04-12T00:52:01","date_gmt":"2022-04-12T00:52:01","guid":{"rendered":"http:\/\/tcm.gov.to\/?page_id=17"},"modified":"2022-04-29T01:15:26","modified_gmt":"2022-04-29T01:15:26","slug":"security-control","status":"publish","type":"page","link":"https:\/\/tcm.gov.to\/?page_id=17","title":{"rendered":"Security Control"},"content":{"rendered":"<div id=\"themify_builder_content-17\" data-postid=\"17\" class=\"themify_builder_content themify_builder_content-17 themify_builder\">\n    \t<!-- module_row -->\n\t<div   class=\"themify_builder_row module_row clearfix module_row_0 themify_builder_17_row module_row_17-0 tb_y3gw363\">\n\t    \t    <div class=\"row_inner col_align_top\" >\n\t\t\t<div  class=\"module_column tb-column col-full first tb_17_column module_column_0 module_column_17-0-0 tb_xu3c364\" >\n\t    \t    \t        <div class=\"tb-column-inner\">\n\t\t    <!-- module text -->\n<div  class=\"module module-text tb_uh5a364    \">\n            <div  class=\"tb_text_wrap\">\n    <h1 style=\"text-align: center;\"><a name=\"_Toc99630225\"><\/a>Security Control Assessment<\/h1>    <\/div>\n<\/div>\n<!-- \/module text -->\n<!-- module text -->\n<div  class=\"module module-text tb_m5px365    \">\n            <div  class=\"tb_text_wrap\">\n    <p>Assess security controls for the system and its operating environment to determine if they have been implemented correctly and are operating as intended. Furthermore, the review and assessment of opportunities for improvement is necessary to ensure the continuing suitability, adequacy and effectiveness of the organization\u2019s approach to managing information security.<\/p>\n<p>In conducting a security assessment, it is important that assessors and system owners first agree to the scope, type and extent of assessment activities, which may be documented in a security assessment plan, such that any risks associated with the security assessment can be appropriately managed. To a large extent, the scope of the security assessment will be determined by the type of system and security controls that have been implemented for the system and its operating environment.<\/p>\n<p>Security control assessment can be performed in two waves: at first, this could be an internal review, delivered by an independent person who was not responsible for implementing the controls. Individuals carrying out these reviews should have the appropriate skills and experience. In a later stage, additional assurance can be obtained by an independent third party review\/assessment\/audit.<\/p>\n<p>Outcome of the assessment should be documented and reported to the management who initiated the review. \u00a0Any identified issues should be put again to the risk assessment table or security controls registry, including responsible persons and implementation deadlines.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->\n\t        <\/div>\n\t    \t<\/div>\n\t\t    <\/div>\n\t    <!-- \/row_inner -->\n\t<\/div>\n\t<!-- \/module_row -->\n\t<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Security Control Assessment Assess security controls for the system and its operating environment to determine if they have been implemented correctly and are operating as intended. Furthermore, the review and assessment of opportunities for improvement is necessary to ensure the continuing suitability, adequacy and effectiveness of the organization\u2019s approach to managing information security. In conducting [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-17","page","type-page","status-publish","hentry","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"builder_content":"<h1 style=\"text-align: center;\"><a name=\"_Toc99630225\"><\/a>Security Control Assessment<\/h1>\n<p>Assess security controls for the system and its operating environment to determine if they have been implemented correctly and are operating as intended. Furthermore, the review and assessment of opportunities for improvement is necessary to ensure the continuing suitability, adequacy and effectiveness of the organization\u2019s approach to managing information security.<\/p> <p>In conducting a security assessment, it is important that assessors and system owners first agree to the scope, type and extent of assessment activities, which may be documented in a security assessment plan, such that any risks associated with the security assessment can be appropriately managed. To a large extent, the scope of the security assessment will be determined by the type of system and security controls that have been implemented for the system and its operating environment.<\/p> <p>Security control assessment can be performed in two waves: at first, this could be an internal review, delivered by an independent person who was not responsible for implementing the controls. Individuals carrying out these reviews should have the appropriate skills and experience. In a later stage, additional assurance can be obtained by an independent third party review\/assessment\/audit.<\/p> <p>Outcome of the assessment should be documented and reported to the management who initiated the review. \u00a0Any identified issues should be put again to the risk assessment table or security controls registry, including responsible persons and implementation deadlines.<\/p>","_links":{"self":[{"href":"https:\/\/tcm.gov.to\/index.php?rest_route=\/wp\/v2\/pages\/17","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tcm.gov.to\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/tcm.gov.to\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/tcm.gov.to\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tcm.gov.to\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=17"}],"version-history":[{"count":9,"href":"https:\/\/tcm.gov.to\/index.php?rest_route=\/wp\/v2\/pages\/17\/revisions"}],"predecessor-version":[{"id":250,"href":"https:\/\/tcm.gov.to\/index.php?rest_route=\/wp\/v2\/pages\/17\/revisions\/250"}],"wp:attachment":[{"href":"https:\/\/tcm.gov.to\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=17"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}