 |
These procedures, based on the Information Security Policies, provide guidance to the security activities that need to be carried out in the engagement. These are typically contained within the Information Security And Compliance Framework. |
Work Product Kinds: Artifacts |
|