The objective of the Vulnerability Alerts Procedure is to describe the vulnerability alerts process, which sets a consistent approach for the distribution, evaluation and follow-up of vulnerability alerts regarding Information Systems within IT environment.
1.1 PROCEDURE OWNER
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
3. WORK-FLOW DESCRIPTION
4. RESPONSIBILITIES MATRIX / TASKS DETAILS
5. INDICATORS / REPORTING SYSTEM
7. FINAL CONSIDERATIONS
7.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
7.2 DOCUMENT REVISION
The Desktop Usage Policy is intended to maintain the security of Company information processing on desktop computers equipment against the risks associated with the exposure or loss of sensitive, unique or personal information.
The Public Cloud Security Standard (the Standard) establishes security requirements and controls to maintain the Confidentiality, integrity, and availability of the Company’s data in the public cloud.