Information security
The information security work consists of a number of different data. The main list is Assets. The others are used in the Asset list.
Asset
In the Asset list, you register all assets of various categories such as software, information, hardware, infrastructure, knowledge, etc. If you need more categories, let us know in the support system, and we can add more. The various data in the categorized tabs in an Asset are filled in according to relevance:
Classification (such as security clearance, confidentiality, etc.)
Personal data (which the asset contains)
Roles (supplier and data processor)
Integrations between the Asset and other Assets
Cases - are reported and processed here
Measures (classic Measures and Safeguard measures)
Risks (which can also be evaluated here)
The module contains a number of data lists that are used in the Assets and that can be built up and used there. See the articles below for more information on these lists.
Supplier
Used for both the Supplier and Data Processor fields. Must be entered in the Supplier List before they become available for these two fields.