Book traversal links for 3.3 Cyber Security Operations and Technology
3.3 Cyber Security Operations and Technology
No: 381000091275 | Date(g): 24/5/2017 | Date(h): 28/8/1438 |
Versions (3 versions) |
Effective from May 24 2017 - May 23 2017
To view other versions open the versions tab on the right
In order to safeguard the protection of the operations and technology of the Member Organization’s information assets and its staff, third parties and customers, the Member Organizations have to ensure that security requirements for their information assets and the supporting processes are defined, approved and implemented.
The compliance with these cyber security requirements should be monitored and the effectiveness of the cyber security controls should be periodically measured and evaluated in order to identify potential revisions of the controls or measurements.