Risk management and compliance
If you limit yourself only to looking at what is explicitly documented in the organization already in the form of policies, procedures, and supporting documentation, you'll find that you have a good picture, but not a complete one. At this stage, the picture is incomplete in two ways. First, it's incomplete because there may be other security objectives that are themselves either presupposed (and therefore not mentioned in those documents explicitly) or that are unrealized by the authors of that documentation themselves.
Therefore, as you work to enhance your knowledge of the organization, you can round out your understanding based on your own direct experiences, institutional knowledge gained through familiarity, and other documentation that may speak to the organization's goals. You can also, where they exist, look to other sources – in particular, two critical sources – to help round out your understanding. These sources...