After reviewing the results of security risk assessment, safeguards will be identified and evaluated for their effectiveness in reducing the likelihood and impact of identified threats and vulnerabilities to an acceptable level.
Safeguards can be technical or procedural controls. Some safeguards examples:
Re-configure operating systems, network components and devices to patch up the weaknesses identified during the security assessment;
Implement password control or authentication software;
Implement encryption or authentication technology to protect data transmission;
Develop / Enhance the security policy, guidelines or procedures to ensure effective security.