activities are used to assess the risks and after that
security safeguards are identified.
In detail, the steps in this module are:
Step 6.1: Valuing the Threats and Vulnerabilities
Step 6.2: Valuing the Legal and Contractual
Obligations
Step 6.3: Valuing the Business Requirements
Step 6.4: Calculating Risk
Step 6.5: Identifying the Controls for Risk Reduction
Step7: Selecting the Controls
The measures of determined risks in the previous
step should be used for identifying all safeguards that
are necessary for appropriate protection.
In detail, the steps in this module are:
Step 7.1: Refining the Selection
Step 7.2: Implementing the Selected Controls
Step8: Reviewing and reforming CRM security
policy and strategy.
The policy should be maintained and reviewed
according to a defined review process base on risk
analysis report.
5. Conclusion
The present analysis suggests that, Security
Management is worthy of consideration in CRM
systems. Risk analysis and management have potential
to contribute to effective CRM Security Management, at
this point, suggested method for CRM Security
Management System (is named CRM-SMS) can play a
critical role to increase confidentiality, integrity,
availability, accountability, authenticity and reliability
of CRM information and services; on the other hand,
Risk Management has important role in CRM-SMS and
it has 8 steps. Gathering Information, Analyzing Gap,
Identifying the Security Requirements (is based on
CRM security policy and gap analysis report), Making
Decision for the Baseline or Detailed Risk Assessment,
Assessing the Baseline, Assessing the Detailed Risk,
Selecting the Controls and finally Reviewing and
reforming CRM security policy and strategy are The
steps of my suggested methodology.