HPH Sector Cybersecurity Framework Implementation Guide
Table of Contents
Tables and Figures
-
Table 1. Step 1: Prioritize and Scope Inputs, Activities, and Outputs
-
Table 3. Step 3: Target Profile Inputs, Activities, and Outputs
-
Table 4. Step 4: Risk Assessment Inputs, Activities, and Outputs
-
Table 5. Step 5: Current Profile Inputs, Activities, and Outputs
-
Table 6. Step 6: Gap Analysis Inputs, Activities, and Outputs
-
Table 9. Step 7: Implement Action Plan Inputs, Activities, and Outputs
-
Table 11. Relationship of Cyber Implementation and HHS Risk Analysis Elements