Skip to main content

๐Ÿ’ผ 2.1 Processes and mechanisms for applying secure configurations to all system components are defined and understood.

Descriptionโ€‹

Empty...

Similarโ€‹

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ 2.1.1 All security policies and operational procedures identified in Requirement 2 are documented, kept up to date, in use, and known to all affected parties.
๐Ÿ’ผ 2.1.2 Roles and responsibilities for performing activities in Requirement 2 are documented, assigned, and understood.