Article 9.4(a)—Article 9.4(a)
>Control Description
develop and document an information security policy defining rules to protect the availability, authenticity, integrity and confidentiality of data, information assets and ICT assets, including those of their customers, where applicable;
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.