EXPLOITS
A Journey to the Highest Cybersecurity Maturity: Compliance, Part 8 | by Vicente Aceituno Canal

Compliance Management

Press enter or click to view image in full size
![]()
Previously in this series:
The inputs of this cycle are:
- Certification Report (for the last period)
- Audit Report (for the last period)
- List of Requirements from Best Practices and Standards (for the last period)
- List of Requirements from Laws and Regulations (for the last period)
- Information Security Meeting Minutes (with investigation of reports and agreed actions) (for the last period)
The outputs of this cycle are:
- Certification Report (for the last period)
- Audit Report (for the last period)
- List of Requirements from Best Practices and Standards (for the last period)
- List of Requirements from Laws and Regulations (for the last period)