Scope is described

1

Components in scope are identified, listed.

2

Third party services in scope are identified, listed.

3

Data flows between components are identified, listed.

4

Risks to components in scope are identified, evaluated and listed.

5

A policy that governs and provides direction for protection of the systems is scope is defined

6

Responsible person is assigned to each component

Last updated