Skip to main content

πŸ’Ό 16 The current threat landscape has necessitated information security capabilities that extend beyond information technology general controls to more specialised information security capabilities.

Description​

Empty...

Similar​

  • Internal
    • ID: dec-c-7cfab24f

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό 16a vulnerability and threat management;1111
πŸ’Ό 16b situational awareness and intelligence;67
πŸ’Ό 16c information security operations and administration;22
πŸ’Ό 16d secure design, architecture and consultation;11
πŸ’Ό 16e security testing, including penetration testing;1010
πŸ’Ό 16f information security reporting and analytics;911
πŸ’Ό 16g incident detection and response, including recovery, notification and communication;22
πŸ’Ό 16h information security investigation, including preservation of evidence and forensic analysis;
πŸ’Ό 16i information security assurance.