Information Security Policy
Provide your information security policy.
The evidence should demonstrate:
Rules and requirements for the in-scope service environment
Roles and responsibilities of users supporting the in-scope service
Requirement for the policy to be reviewed and approved on an annual basis
Information Security Policy Repository
Provide a screenshot of the policy repository showing where your Information Security Policy is stored and shared with the organization (or a selected group of authorized users).
Associated Unified Control ID | Associated Framework Control |
CTRL-431 | LCL-25 |