Requirement:
The cybersecurity requirements for physical protection of information and technology assets must be reviewed periodically.
Control Implementation Guidelines:
- Review the implementation of cybersecurity requirements for the organization's information and technology assets protection against unauthorized physical access, loss, theft, and vandalism by conducting a periodic assessment (as per a documented and approved audit plan, and based on a planned interval ("e.g., quarterly") to protect the information and technology assets against unauthorized physical access, loss, theft and vandalism by the cybersecurity function and in cooperation with relevant departments (such as the Security and Safety Department)
- Conduct application review through traditional channels (e.g., email) or automated channels using a compliance management system. The organization may develop a review plan explaining the implementation review schedule for the organization's information and technology assets protection against unauthorized physical access, loss, theft, and vandalism
- Review and update cybersecurity requirements for information and technology assets protection against unauthorized physical access, loss, theft, and vandalism in the organization periodically according to a documented and approved plan for review and based on a planned interval or in the event of changes in relevant laws and regulations
- Document the review and changes to the cybersecurity requirements for the information and technology assets protection against unauthorized physical access, loss, theft, and vandalism in the organization and approve them by the head of the organization or his/her deputy
Expected Deliverables:
- Results of information and technology assets protection against unauthorized physical access, loss, theft, and vandalism requirements implementation review in the organization
- a document that defines the cybersecurity requirements implementation review cycle for information and technology assets protection against unauthorized physical access, loss, theft, and vandalism requirements implementation review in the organization (Compliance Assessment Schedule)
- A compliance assessment report that shows the assessment of the implementation of cybersecurity requirements for information and technology assets protection against unauthorized physical access, loss, theft, and vandalism
- An approved document that sets the policy's review schedule
- Policy indicating that it has been reviewed and updated, and that changes have been documented and approved by the head of the organization or his/her deputy
- Formal approval by the head of the organization or his/her deputy on the updated policy (e.g., via the organization's official e-mail, paper or electronic signature)
Quick & Simple
Discover Our Cybersecurity Compliance Solutions:
Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you