SAMMY UI is optimized for resolutions with a width 1024px and higher.
Information Security Program
GRC-05: Has an information security program (including programs of all relevant CCM domains) been developed and implemented?
The program should identify and assign roles, responsibilities, and management commitment.

The CCM domains to address within the information security governance program include, but are not limited to:
a. Audit and assurance
b. Application and interface security
c. Business continuity management and operational resilience
d. Change control and configuration management
e. Cryptography, encryption, and key management
f. Datacenter security
g. Data security and privacy lifecycle management
h. Governance, risk management, and compliance
i. Human resources
j. Identity and access management
k. Interoperability and portability
l. Infrastructure and virtualization security
m. Logging and monitoring
n. Security incident management, e-discovery, and cloud forensics
o. Supply chain management, transparency, and accountability
p. Threat and vulnerability management
q. Universal endpoint management

Management should promote coordination among organizational entities responsible for the different aspects of cloud security and privacy risks. Review the program as required to address threat landscape changes and substantial organization changes.
Control implemented
Control ownership
Description

Develop and implement an Information Security Program, which includes programs for all the relevant domains of the CCM.