Information Security Management System Policies
| # | Policy Name | Action |
|---|---|---|
| 1 | Acceptable Use Policy | |
| 2 | Access Control Policy | |
| 3 | Business Continuity Policy | |
| 4 | Change Management Policy | |
| 5 | Clear Desk And Clear Screen Policy | |
| 6 | Clock Synchronization Policy | |
| 7 | Cloud Services Information Security Policy | |
| 8 | Compliance Policy | |
| 9 | Configuration Management Policy | |
| 10 | Cryptographic Controls Policy | |
| 11 | Data Leakage Prevention Policy | |
| 12 | Data Masking Policy | |
| 13 | Human Resource Security Policy | |
| 14 | ICT Readiness For Business Continuity Policy | |
| 15 | ICT Supply Chain Security Policy | |
| 16 | Incident Management Policy | |
| 17 | Information Backup Policy | |
| 18 | Information Classification And Handling Policy | |
| 19 | Information Deletion Policy | |
| 20 | Information Security Policy | |
| 21 | Mobile Device And Teleworking Policy | |
| 22 | Monitoring Activities Policy | |
| 23 | Network Security Policy | |
| 24 | Password Policy | |
| 25 | Physical Security Monitoring Policy | |
| 26 | Physical And Environmental Security Policy | |
| 27 | Risk Management Policy | |
| 28 | Secure Development Policy | |
| 29 | Supplier Relationship Security Policy | |
| 30 | Threat Intelligence Policy | |
| 31 | Web Filtering Policy | |
| 32 | E Waste Management Policy |