·
Enable
and ensure that:
·
Security
controls are implemented and maintained to address changing circumstances such as changed business needs and
threats
·
Security
Incidents are managed
·
Auditing
processes record the adequacy of security controls and measures taken
·
Reports
are produced to show the status of information security
|