Execution Excellence
by Ceer Vee
1. Improvements Incident Response (Practices)
2. Data Security (Policies)
3. Information Protection Processes and Procedures (Practices)
4. Protective Technology (Policies & Practice)
5. Security Continuous Monitoring (Practices)
6. Communications (Policies)
7. Incident Response Analysis (Policies)
8. asdf
9. Org Role in suppply chain is identified and communicated
10. Cybersecurity roles and responsibilities (Practice)
11. Resource prioritization based on criticality (Practice)
12. Communication and data flows
13. Software
14. Physical assets
15. Asset Management (Practices)
16. Business Environment (Practices)
17. Risk Assessment (Policies)
18. Risk Management Strategy (Practice)
19. Supply Chain Risk Management (Policies)
20. Identity Access Management (Practice)
21. Detection Processes (Policies)
22. Response Planning (Practices)
23. Response Mitigation (Practices)
24. Improvement Recovery Procedures (Policies)
25. Catalogued Exeternal Information systems