Now that you are ready to dig into the data, use the skills and abilities of your team to help formulate solutions. Get the team involved. As project manager, you will be responsible for the report and its overall look and feel. Individual team members can be given responsibility for portions of the report. Assign them to the areas that they worked in or to a task that fits with their strengths. Working as a group, they can also help you analyze the findings and develop risk-ranking scores. When meeting with the team, the project manager should set the agenda. Encourage all team members to take an active role and offer input. Remind the team to stay focused on what is best for the organization. When it is time to write the report, you should also set deadlines for each team member's individual assignments, follow-ups, or additional information that you've requested. One way to work through the bulk of the findings as a team is by using a three-tiered approach:
The organization may not be able to implement all the items you recommend, so target the ones with the highest risk/highest probability. To help stay focused on what's important, keep in mind the organization's OICM and SCM. These matrixes identified what was critical for the organization's mission.
Introduction to Assessing Network Vulnerabilities
Foundations and Principles of Security
Why Risk Assessment
Risk-Assessment Methodologies
Scoping the Project
Understanding the Attacker
Performing the Assessment
Tools Used for Assessments and Evaluations
Preparing the Final Report
Post-Assessment Activities
Appendix A. Security Assessment Resources
Appendix B. Security Assessment Forms
Appendix C. Security Assessment Sample Report
Appendix D. Dealing with Consultants and Outside Vendors
Appendix E. SIRT Team Report Format Template