This phase will take you through the following activities:
- Defining scope and controls.
- Identifying and remediating gaps.
- Obtaining and maintaining certification.
Use this phase as part of the full blueprint, Satisfy Customer Requirements for Information Security.