Requirement:
Cybersecurity requirements for network security management must be defined, documented and approved.
Control Implementation Guidelines:
- Develop and document cybersecurity policy for network security in the organization, including the following:
- Network Access Requirements
- Third Parties Access Requirements to the Network
- Network Protection Requirements
- Physical and environmental security requirements to ensure that network devices are stored in a secure and appropriate environment
- Security technology standard controls for all network devices used within the organization must be defined, documented and approved
- Support the organization's policy by the Executive Management. This must be done through the approval of the organization head or his/her deputy
Relevant Cybersecurity Tools:
- Network Security Policy Template
Expected Deliverables:
- Network security management policy approved by the organization (e.g., electronic copy or official hard copy)
- Cybersecurity policy that covers the requirements of technical security standard controls and network security management in the organization (e.g., electronic copy or official hard copy)
- Formal approval by the head of the organization or his/her deputy on the policy and technical standard (e.g., via the organization's official e-mail, paper or electronic signature)
Quick & Simple
Discover Our Cybersecurity Compliance Solutions:
Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you