Gathering Information, Analyzing Gap,
Identifying the Security Requirements (is based on
CRM security policy and gap analysis report), Making
Decision for the Baseline or Detailed Risk Assessment,
Assessing the Baseline, Assessing the Detailed Risk,
Selecting the Controls and finally Reviewing and
reforming CRM security policy and strategy are The
steps of my suggested methodology.