Context Research

Summary

This component allows the auditor to identify the relevant regional and technological context needed to provide a safe and informed SAFETAG audit. This component consists of desk research that is collected and analyzed by the auditor, as well as inputs from the Interview component.

Purpose

Analysis of context is the foundation of effective risk management. Both at-risk organizations and auditors will develop assumptions based upon their experience. It is important that an audit is based on information that is current and accurate.

Checking the assumptions both of the organization and of the auditor by researching the current regional and technological context will ensure that an auditor is basing their work on accurate assessments of the conditions the organization faces and that they are making informed operational security considerations.

The Flow of Information

Information Flow

Guiding Questions

Approaches

Outputs

Operational Security

Preparation

Resources

Other Context Analysis Methodologies

Threats to the Auditor

Have aid workers faced retribution for their work in the region?

Is it safe to do digital security work in the region?

Is the area safe to travel to?

Targeted Threats for the organization

Is the group facing any legal threats because of its work?

Does the organization face any targeted threats because of their work?

General Threats for the organization

What general non-governmental threats does the organization face?

What cyber-security practices is the government using?

What general cyber-security threats is the organization facing?

What level of technology is available in the region?

Activities

undefined

Activities

 

Developed with ❤ by

Information Innovation Lab

Applied research and development of public interest technology.