
ILT-U-3864
Cybersecurity Documentation Assessment. Based on GB 44495 (Clauses 7.1 & 8.3) Phase 1 — Foundation Level
| What is expected to be determined | Method applied |
| Completeness of cybersecurity documentation and presence of required elements | Systematic document review and checklist-based assessment |
| Correctness and adequacy of risk assessment (identification, classification, treatment) | Analysis of risk tables, consistency checks, and risk reasoning |
| Consistency between risk assessment, security concept, and system architecture | Analysis of risk tables, consistency checks, and risk reasoning |
| Adequacy of verification and validation activities | Review of test reports and coverage against identified risks |
| Identification of gaps, inconsistencies, or weak controls | Comparative analysis across documents |
| Quality and clarity of documentation | Structured review and readability assessment |
| Ability to provide justified findings and recommendations | Analytical reasoning and structured reporting |

