Data Port
To identify and plan security requirements DP
IT Security Management
Description
Data Mapping
Mapping Source
Mapping Target
D28 Risk treatment decision
Security policy
D77 Approved Activity Lists
Security policy