-
Customization
- Organizations might also apply specific configuration standards to high value assets. This may mean requiring more stringent controls on certain systems and data elements, based upon the sensitivity of the data, or the criticality of the system to business operations.
-
Any customization that organizations make to security standards should refer to clear security and/or business requirements. These deviations should include descriptions of the impact the change will have on:
- the confidentiality, integrity and/or availability of systems and information
- compliance with other security requirements.
-
Documentation
- Organizations often modify industry baselines to develop their own security standards, to tailor the standard to meet the organization's specific needs.
-
Referencing
- To document these changes, write a security standard that references the original (source) standard,