This chart can be leveraged for both new and existing CLM and PKI processes. Use it to:
- Consider which people are responsible and accountable for CLM and PKI within senior management, IT and cybersecurity, and the business.
- Assign each person a level of responsibility: responsible, accountable, consulted, informed.
- Break down responsibilities for each of the four phases in the process: observe, standardize, automate, measure.