Requirement:
The cybersecurity requirements related to the use of hosting and cloud computing services must be reviewed periodically.
Control Implementation Guidelines:
- Review and update the cybersecurity policy that covers the requirements of using cloud computing and hosting services periodically according to a documented and approved plan for review based on a planned interval (e.g., periodic review must be conducted annually).
- Review and update the cybersecurity policy covering the requirements of using cloud computing and hosting services in the event of changes in the relevant laws and regulations (for example, when a new cybersecurity law is issued that applies to the organization).
- Document the review and changes to the cybersecurity requirements for cloud computing and hosting services in the organization and approve them by the head of the organization or his/her deputy.
Expected Deliverables:
- An approved document that sets the policy's review schedule
- Policy indicating that it is up to date and the changes to the cybersecurity requirements for cloud computing and hosting services have been documented and approved by the head of the organization or his/her deputy.
- Formal approval by the head of the organization or his/her deputy on the updated policy (e.g., via the organization's official e-mail, paper or electronic signature).
Quick & Simple
Discover Our Cybersecurity Compliance Solutions:
Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you