GOV-15
Operationalizing Cybersecurity & Data Protection Practices
Description
Mechanisms exist to compel data and/or process owners to operationalize cybersecurity and data protection practices for each Technology Asset, Application and/or Service (TAAS) under their control.
Control Question
Does the organization compel data and/or process owners to operationalize cybersecurity and data protection practices for each Technology Asset, Application and/or Service (TAAS) under their control?
Control Metadata
Domain:
Cybersecurity & Data Protection Governance
Validation Cadence:
Annual
