A vulnerability management plan is developed and implemented
A vulnerability management plan is developed and implemented
A System Development Life Cycle to manage systems is implemented
Configuration change control processes are in place
Backups of information are conducted, maintained, and tested
Policy and regulations regarding the physical operating environment for organizational assets are met
Data is destroyed according to policy
Protection processes are improved
Effectiveness of protection technologies is shared
Response plans (Incident Response and Business Continuity) and recovery plans (Incident Recovery and Disaster Recovery) are in place and managed
Maintenance and repair of organizational assets are performed and logged, with approved and controlled tools