application risk profile

Application Identification and Description

Application Vulnerabilities and Threats

Application Security Controls

Application Data Classification and Protection

Application Development and Maintenance Practices

Application Access and Authentication

Application Incident Response and Recovery

Application Compliance and Governance

Application Vendor and Third-Party Risk

Application Risk Mitigation and Remediation

Related Checklists