Under active development Content is continuously updated and improved

Article 16.1Article 16.1

>Control Description

The security of information systems will be attended to and will be reviewed and audited by qualified, dedicated and instructed personnel in all phases of their life cycle: planning, design, acquisition, construction, deployment, exploitation, maintenance, incident management and dismantling.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.