HIPAA Security Implementation, Version 1.0

10.10 CHAPTER STEP-BY-STEP SUMMARY

  1. Read some background information on risk analysis

  2. Select a risk analysis methodology

  3. Scope your assets, missions, and security objects

  4. Work your way through one of the risk analysis methodologies

  5. Balance the impact of the threats with potential safeguards

  6. Select your safeguards and implement them

  7. Document all findings

Категории