15.0 – Identify Needs, Issues and Threats

There are important components which are necessary to have an efficient security policy implementation.  There could be an investigation into an existing security policy implementation or lack thereof. The primary motivation is to identify nexus of threats and issues. Typically,…