Physical and Environmental Protection Policy and ProceduresIncident Response and Advanced Forensics

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATION
Already a Member Login Here

Home Forums Courses Incident Response and Advanced Forensics Physical and Environmental Protection Policy and Procedures

This topic contains 3 replies, has 2 voices, and was last updated by  cybermo 3 years ago.

Viewing 4 posts - 1 through 4 (of 4 total)
  • Author
    Posts
  • #78908

    Ludgenstein
    Participant

    Assessment Objective:

    Determine if the organization develops and documents a physical and environmental protection policy that addresses purpose, scope, roles, responsabilities, management commitment, coordination among organizational entities, and compliance.

    Defines personnel or roles to whom the physical and environmental protection policy is to be disseminated.

    Disseminates the physical and environmental protection policy to organization –defined personnel or roles.

    Develops and documents procedures to facilitate the implementation of the physical and environmental protection policy and associated physical and environmental planning controls.

    Defines personnel or roles to whom the procedures are to be disseminated.

    #78909

    Ludgenstein
    Participant

    – Reviews and updates the current planning policy and procedures with the organization-defined frequency.

    – Defines the frequency to review and update the current planning procedures and policy.

    #80519

    cybermo
    Participant

    Thanks.

    #98027

    cybermo
    Participant

Viewing 4 posts - 1 through 4 (of 4 total)

You must be logged in to reply to this topic.

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel