and round to the nearest tenth. Then transfer to the corresponding spoke in the IT Security Risk Assessment Scorecard on the second next page of the Self-Assessment.
Your completed IT Security Risk Assessment Scorecard will give you a clear presentation of which IT Security Risk Assessment areas need attention.
IT Security Risk Assessment
Scorecard Example
Example of how the finalized Scorecard can look like:
IT Security Risk Assessment
Scorecard
Your Scores:
BEGINNING OF THE
SELF-ASSESSMENT:
Table of Contents
About The Art of Service8
Included Resources - how to access8
Purpose of this Self-Assessment10
How to use the Self-Assessment11
IT Security Risk Assessment
Scorecard Example13
IT Security Risk Assessment
Scorecard14
BEGINNING OF THE
SELF-ASSESSMENT:15
CRITERION #1: RECOGNIZE16
CRITERION #2: DEFINE:27
CRITERION #3: MEASURE:43
CRITERION #4: ANALYZE:57
CRITERION #5: IMPROVE:73
CRITERION #6: CONTROL:90
CRITERION #7: SUSTAIN:102
IT Security Risk Assessment and Managing Projects, Criteria for Project Managers:126
1.0 Initiating Process Group: IT Security Risk Assessment127
1.1 Project Charter: IT Security Risk Assessment129
1.2 Stakeholder Register: IT Security Risk Assessment131
1.3 Stakeholder Analysis Matrix: IT Security Risk Assessment132
2.0 Planning Process Group: IT Security Risk Assessment134
2.1 Project Management Plan: IT Security Risk Assessment136
2.2 Scope Management Plan: IT Security Risk Assessment138
2.3 Requirements Management Plan: IT Security Risk Assessment140
2.4 Requirements Documentation: IT Security Risk Assessment142
2.5 Requirements Traceability Matrix: IT Security Risk Assessment144
2.6 Project Scope Statement: IT Security Risk Assessment146
2.7 Assumption and Constraint Log: IT Security Risk Assessment148
2.8 Work Breakdown Structure: IT Security Risk Assessment150
2.9 WBS Dictionary: IT Security Risk Assessment152
2.10 Schedule Management Plan: IT Security Risk Assessment155
2.11 Activity List: IT Security Risk Assessment157
2.12 Activity Attributes: IT Security Risk Assessment159
2.13 Milestone List: IT Security Risk Assessment161
2.14 Network Diagram: IT Security Risk Assessment163
2.15 Activity Resource Requirements: IT Security Risk Assessment165
2.16 Resource Breakdown Structure: IT Security Risk Assessment167
2.17 Activity Duration Estimates: IT Security Risk Assessment169
2.18 Duration Estimating Worksheet: IT Security Risk Assessment171
2.19 Project Schedule: IT Security Risk Assessment173
2.20 Cost Management Plan: IT Security Risk Assessment175
2.21 Activity Cost Estimates: IT Security Risk Assessment177
2.22 Cost Estimating Worksheet: IT Security Risk Assessment179
2.23 Cost Baseline: IT Security Risk Assessment181
2.24 Quality Management Plan: IT Security Risk Assessment183
2.25 Quality Metrics: IT Security Risk Assessment185
2.26 Process Improvement Plan: IT Security Risk Assessment187
2.27 Responsibility Assignment Matrix: IT Security Risk Assessment189
2.28 Roles and Responsibilities: IT Security Risk Assessment191
2.29 Human Resource Management Plan: IT Security Risk Assessment193
2.30 Communications Management Plan: IT Security Risk Assessment195
2.31 Risk Management Plan: IT Security Risk Assessment197
2.32 Risk Register: IT Security Risk Assessment199
2.33 Probability and Impact Assessment: IT Security Risk Assessment201
2.34 Probability and Impact Matrix: IT Security Risk Assessment203
2.35 Risk Data Sheet: IT Security Risk Assessment205
2.36 Procurement Management Plan: IT Security Risk Assessment207
2.37 Source Selection Criteria: IT Security Risk Assessment209
2.38 Stakeholder Management Plan: IT Security Risk Assessment211
2.39 Change Management Plan: IT Security Risk Assessment213
3.0 Executing Process Group: IT Security Risk Assessment215
3.1 Team Member Status Report: IT Security Risk Assessment217
3.2 Change Request: IT Security Risk Assessment219
3.3 Change Log: IT Security Risk Assessment221
3.4 Decision Log: IT Security Risk Assessment223
3.5 Quality Audit: IT Security Risk Assessment225
3.6 Team Directory: IT Security Risk Assessment228
3.7 Team Operating Agreement: IT Security Risk Assessment230
3.8 Team Performance Assessment: IT Security Risk Assessment232
3.9 Team Member Performance Assessment: IT Security Risk Assessment234
3.10 Issue Log: IT Security Risk Assessment236
4.0 Monitoring and Controlling Process Group: IT Security Risk Assessment238
4.1 Project Performance Report: IT Security Risk Assessment240
4.2 Variance Analysis: IT Security Risk Assessment242
4.3 Earned Value Status: IT Security Risk Assessment244
4.4 Risk Audit: IT Security Risk Assessment246
4.5 Contractor Status Report: IT Security Risk Assessment248
4.6 Formal Acceptance: IT Security Risk Assessment250
5.0 Closing Process Group: IT Security Risk Assessment252
5.1 Procurement Audit: IT Security Risk Assessment254
5.2 Contract Close-Out: IT Security Risk Assessment256
5.3 Project or Phase Close-Out: IT Security Risk Assessment258
5.4 Lessons Learned: IT Security Risk Assessment260
Index262
CRITERION #1: RECOGNIZE
INTENT: Be aware of the need for change. Recognize that there is an