Requirement:
The cybersecurity requirements for cryptography must be reviewed periodically.
Control Implementation Guidelines:
- Review the cybersecurity requirements of cryptography by conducting a periodic assessment (according to a documented and approved plan for review, and based on a planned interval "e.g., quarterly") to implement identity and access management requirements by the Cybersecurity function and in cooperation with relevant departments (such as IT Department)
- Review and update cybersecurity requirements for cryptography in the organization periodically according to a documented and approved plan for review and based on a planned interval or in the event of changes in relevant laws and regulations
- Document the review and changes to the cybersecurity requirements for cryptography in the organization and approve them by the head of the organization or his/her deputy
Expected Deliverables:
- Results of cryptography requirements implementation review in the organization
- A document that defines the cybersecurity requirements implementation review cycle for cryptography in the organization (Compliance Assessment Schedule)
- Compliance assessment report that outlines the assessment of the implementation of cybersecurity requirements for cryptography in the organization
- An approved document that sets the policy's review schedule
- Policy indicating that it is up to date and the changes to the cybersecurity requirements for cryptography have been documented and approved by the head of the organization or his/her deputy
- Formal approval by the head of the organization or his/her deputy on the updated policy (e.g., via the organization's official e-mail, paper or electronic signature)
Quick & Simple
Discover Our Cybersecurity Compliance Solutions:
Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you