Security Policy: Difference between revisions
Jump to navigation
Jump to search
| Line 91: | Line 91: | ||
* how to: | * how to: | ||
:(a) integrate and implement the actions into its information security management system processes; and | :(a) integrate and implement the actions into its information security management system processes; and | ||
:(b) evaluate the effectiveness of these actions. | |||
====Information security risk assessment==== | ====Information security risk assessment==== | ||