Information Protection Processes and Procedures (IP)

A vulnerability management plan is developed and implemented


Login

Information Protection Processes and Procedures (IP)

A System Development Life Cycle to manage systems is implemented


Login

Information Protection Processes and Procedures (IP)

Configuration change control processes are in place


Login

Information Protection Processes and Procedures (IP)

Backups of information are conducted, maintained, and tested


Login

Information Protection Processes and Procedures (IP)

Policy and regulations regarding the physical operating environment for organizational assets are met


Login

Information Protection Processes and Procedures (IP)

Data is destroyed according to policy


Login

Information Protection Processes and Procedures (IP)

Protection processes are improved


Login

Information Protection Processes and Procedures (IP)

Effectiveness of protection technologies is shared


Login

Information Protection Processes and Procedures (IP)

Response plans (Incident Response and Business Continuity) and recovery plans (Incident Recovery and Disaster Recovery) are in place and managed


Login

Maintenance (MA)

Maintenance and repair of organizational assets are performed and logged, with approved and controlled tools


Login