Requirement:
The cybersecurity policies and procedures must be supported by technical security standards (e.g., operating systems, databases and firewall technical security standards).
Control Implementation Guidelines:
- Define, document, and approve technical standard controls to cover the organization's information and technology assets (e.g., firewall technical security standard controls, network devices, databases, server operating systems, BYOD operating systems, secure development standard, cryptography standard, etc.).
- Communicate the technical standard controls to the relevant departments in the organization (e.g., IT department) and ensure that they are applied periodically to information and technology assets
Relevant Cybersecurity Tools:
- A template of all standard controls included in cybersecurity tools.
Expected Deliverables:
- The organization's approved technical cybersecurity standard controls documents
Quick & Simple
Discover Our Cybersecurity Compliance Solutions:
Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you