Information Security Management System Procedures
| # | Procedures | Action |
|---|---|---|
| 1 | Access Control Matrix | |
| 2 | Asset Management Procedure | |
| 3 | Corrective Action Procedure | |
| 4 | Document Control Procedure | |
| 5 | Internal Audit Procedure | |
| 6 | Log Management Standard | |
| 7 | Management Review Procedure | |
| 8 | Privileged Access Management Procedure | |
| 9 | Procedure For Corrective Action | |
| 10 | Procedure For Preventive Action | |
| 11 | Risk Assessment And Treatment Methodology | |
| 12 | Security Patch Management Procedure | |
| 13 | System Access Request And Authorization Procedure | |
| 14 | System Acquisition, Development And Maintenance Procedures | |
| 15 | User Registration And Deregistration Process | |
| 16 | Vulnerability Management Procedure |