Information Security Policy is documented and approved.
Asset inventory is maintained and up to date.
Access controls (Multi-Factor Authentication (MFA), Role-Based Access Control (RBAC)) are implemented.
Risk assessments conducted at regular intervals.
Incident response and business continuity plans tested.
Staff trained on security awareness.
Last updated 5 months ago