Goal: Access the relative criticality of specific applications and data in support of other contingency plan components.
The purpose of this policy is to review what the organization should do to have a formal process for defining and identifying the criticality of its information systems.
Procedure: The Security Manager shall prepare a data criticality log where available systems shall be ranked.