Refine the steps you enumerated earlier by determining prerequisites, timing and resource constraints and overall priorities. Processes are often times interconnected, and we will determine the intersections of the processes.
Document the roles that are involved in the process, and the tasks each role performs in order to complete the process.
Inventory the high level steps you currently follow. This will be a starting point, and we will include any timing components (such as when the step needs to be performed, or when data inputs to the step are provided. We will also include information about the consumer and supplier and how this step and process …
Document the purpose of this process, how often it should be used and how it fits into the overall security strategy. Rather than using process maps that are difficult to read and update, we use a format that is easily accessible and maintainable.