Essential Cybersecurity Controls (ECC – 2 : 2024) - 1-5-1
Cybersecurity Risk Management Methodology And Procedures Must Be Defined, Documented
And Approved As Per Confidentiality, Integrity And Availability Considerations Of Information And
Technology Assets.
Essential Cybersecurity Controls (ECC – 2 : 2024) - 1-5-2
The Cybersecurity Risk Management Methodology And Procedures Must Be Implemented By The
Cybersecurity Function.
Essential Cybersecurity Controls (ECC – 2 : 2024) - 1-5-3
- The cybersecurity risk assessment procedures must be implemented at least in the following cases:
- Early stages of technology projects
- Before making major changes to technology infrastructure.
- During the planning phase of obtaining third party services.
- During the planning phase and before going live for new technology services and products.
Essential Cybersecurity Controls (ECC – 2 : 2024) - 1-5-4
The Cybersecurity Risk Management Methodology And Procedures Must Be Reviewed Periodically
According To Planned Intervals Or Upon Changes To Related Laws And Regulations. Changes And Reviews
Must Be Approved And Documented.