HIPAA Security Implementation, Version 1.0
10.10 CHAPTER STEP-BY-STEP SUMMARY
-
Read some background information on risk analysis
-
Select a risk analysis methodology
-
Scope your assets, missions, and security objects
-
Work your way through one of the risk analysis methodologies
-
Balance the impact of the threats with potential safeguards
-
Select your safeguards and implement them
-
Document all findings