EXPLOITS

A Journey to the Highest Cybersecurity Maturity: Compliance, Part 8 | by Vicente Aceituno Canal

Compliance Management

Press enter or click to view image in full size

Photo by Anne Nygård on Unsplash

Previously in this series:

The inputs of this cycle are:

  • Certification Report (for the last period)
  • Audit Report (for the last period)
  • List of Requirements from Best Practices and Standards (for the last period)
  • List of Requirements from Laws and Regulations (for the last period)
  • Information Security Meeting Minutes (with investigation of reports and agreed actions) (for the last period)

The outputs of this cycle are:

  • Certification Report (for the last period)
  • Audit Report (for the last period)
  • List of Requirements from Best Practices and Standards (for the last period)
  • List of Requirements from Laws and Regulations (for the last period)

Related Articles

Back to top button