Manage Security and Privacy RCM

Subscriber Content
Screenshot of the first page of Manage Security and Privacy RCM

A successful risk management strategy requires a strong internal control environment. The RCM format emphasizes that strong and risk-oriented internal control environments are often optimized with automated/manual controls, depending on the situation.

An RCM provides an overview of different control objectives that organizations should take into consideration and the corresponding controls to safeguard the company against risks, which may arise if not checked timely. Once customized to an organization, this document can help the user in assessing each control. The control assessment can then also be summarized to develop an action plan.

This document outlines risks and controls common to the 4.2 Manage Security and Privacy process in a risk control matrix (RCM) format.

Sample risks include:

  • Inappropriate collection of personal data
  • Lack of monitoring and compliance with the company's policies and procedures
  • Inadequate safeguarding of IT infrastructure (servers, applications, internet protocol [IP], networks) can lead to phishing attacks, data loss and theft
  • Unauthorized access may be gained to important data, which could result in loss, misuse and theft in the company
  • Access is given to individuals so they can review and update their personal information

This document can be used as a sample RCM and is not meant to be an exhaustive list of risks and controls. The KnowledgeLeader team will periodically update this RCM with new content. Organizations should select, update and modify the risks and controls included in this document to ensure that it reflects business operations.

Free Trial

Sign up for a free, no-obligation trial to start exploring our timesaving, valuable resources.