- IT security risk management: A lifecycle approach | Overview
- Annex 1 - Departmental IT security risk management activities
- Annex 2 - Information system security risk management activities
- Annex 3A - Security control catalogue
- Annex 4A - Profile 1 - (PROTECTED B / Medium integrity / Medium availability)
- Annex 4A - Profile 3 - (SECRET / Medium integrity / Medium availability)
- Annex 5 - Glossary
- Suggested security controls and control enhancements
The following spreadsheet contains the suggested security control profiles from Annex 4A - Profile 1 - (PROTECTED B / Medium Integrity / Medium Availability) (ITSG-33) and Annex 4A - Profile 3 - (SECRET / Medium Integrity / Medium Availability) (ITSG-33). This spreadsheet can be used to create specific security control profile(s):