Requirement:
The cybersecurity requirements for network security management must be reviewed periodically
Control Implementation Guidelines:
- Review the cybersecurity requirements of network security in the organization by conducting a periodic assessment (according to a documented and approved plan for review, and based on a planned interval "e.g., quarterly") to implement network security management requirements by the Cybersecurity function and in cooperation with relevant departments (such as IT Department)
- Conduct application review through traditional channels (e.g., email) or automated channels using a compliance management system. The organization may develop a review plan explaining the implementation of cybersecurity requirements to network security management in the organization
- Review and update cybersecurity requirements for network security management in the organization periodically according to a documented and approved plan for review and based on a planned interval or in the event of changes in relevant laws and regulations
- Document the review and changes to the cybersecurity requirements for network security in the organization and approve them by the head of the organization or his/her deputy
Expected Deliverables:
- Results of network security cybersecurity requirements implementation review in the organization
- An approved document that defines the cybersecurity requirements implementation review cycle to manage the organization's network security (Compliance Assessment Schedule)
- Compliance assessment report that outlines the assessment of the implementation of cybersecurity requirements for the organization's network security
- An approved document that sets the policy's review schedule
- Policy indicating that it has been reviewed and updated, and that changes have been documented and approved by the head of the organization or his/her deputy
- Formal approval by the head of the organization or his/her deputy on the updated policy (e.g., via the organization's official e-mail, paper or electronic signature)
Quick & Simple
Discover Our Cybersecurity Compliance Solutions:
Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you