
Information system security processes and invitees provide valuable input into managing IT systems and their development, enabling g risk identification, planning and mitigation. A risk management approach involves continually balancing the protection of agency information and assets with the cost of security controls and mitigation strategies throughout the complete information system development life cycle (see Figure 2-1). The most effective...