[go: up one dir, main page]

0% found this document useful (0 votes)
86 views1 page

Cyber Security Policy Map 2022

Uploaded by

jerry
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
86 views1 page

Cyber Security Policy Map 2022

Uploaded by

jerry
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Information Security Policies & Components

Click the name of each underlined policy to open it.

Policies Framework

Security Management
Data Protection User Access Incident Response Operations Security S-SDLC
& Governance

Multi-Factor
Data Protection Information Choosing an Monitoring
Information Security Authentication Incident Response Anti-Virus Secure Social Secure Development
& Document Security at Effective Production
Management & Conditional Process Protection Networking Lifecycle Process
Classification Conferences Password System use
Access
Access to Laptop
Intellectual Remote Support USB Media
Human Resources Handling Sensitive Personal Data Breach Information Use of System
Property for Customer Storage Policy
Security Customer Data Information by IT Procedure Security & Utilities
Protection Operations
Personnel Privacy

Intellectual Customer & 3rd Security Event Controls against Subcontractors


Security and Privacy Customer Data Access Control Security Data
Protection Property Party access to on PCs
Monitoring Malicious Service Delivery
Training and Awareness Policy Amdocs Policy Software
Awareness Protection
Information Security
Remote Management of
Managed Services PCI Clean Desk Connection to Production Cloud Security Use of Modems Vulnerability Subcontractors
Requirements Guidelines Amdocs Access Control Management & WIFI Cards Management
Network
PCI Service Provider
Access of a Quarterly Policy
Acceptable Use & Code IT Resources Encryption
Customer to Wireless Audit
of Conduct Usage Policy Policy
Amdocs Code Policy

Mobile Device Production NTP


Management Policy

You might also like