Under active development Content is continuously updated and improved

Article 6.2Article 6.2

>Control Description

The ICT risk management framework shall include at least strategies, policies, procedures, ICT protocols and tools that are necessary to duly and adequately protect all information assets and ICT assets, including computer software, hardware, servers, as well as to protect all relevant physical components and infrastructures, such as premises, data centres and sensitive designated areas, to ensure that all information assets and ICT assets are adequately protected from risks including damage and unauthorised access or usage.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.