Security Logging Policy
The Security Logging Policy was developed by the Company in order to allow the secure and effective use of the Information Technology Asset like computer, systems or data.
The Security Logging Policy was developed by the Company in order to allow the secure and effective use of the Information Technology Asset like computer, systems or data.
The objective of the Technical Vulnerability Management and Control of Malware Standard is to set the minimum requirements for Technical Vulnerability Management and for Control of Malware.
The objective of the Equipment Hardening Procedure is to ensure that the equipment used by the Company are addressed by an equipment hardening process for securing and consequently protecting the systems against unauthorized access, modification and disclosure.
The objective of the Business Continuity Management Policy is to establish the framework for the proper business continuity management of the Company.
The objective of the Use of Network Services Policy is to establish management direction, procedural requirements, and technical guidance to ensure the appropriate protection of Company’s information handled by computer networks.