1. Properly identifying and valuing a company's assets
2. Implementing security policies, procedures, standards, and guidelines to provide integrity, confidentiality, and availability
3. Using various management tools to classify data and perform risk analysis and assessments
4. Identifying vulnerabilities and exposure rates and ranking the severity of identified vulnerabilities
5. Implementing effective countermeasures to mitigate risk in a cost-effective manner
6. Providing protection for the resources it is responsible for and the company overall
7. Ensuring that a security program is set up that recognizes the threats that can affect these resources and putting the necessary protective measures into effect
8. Assigning responsibility and identifying the roles necessary to get the security program off the ground and to keep it thriving and evolving as the environment changes
9. Integrating the program into the current business environment and monitoring its accomplishments