Governance, Compliance, and Risk
search
Ctrlk
BlogInterviewing GuideGovernance Guide
  • Home
  • Governance
    • Policies, Procedures, and Guidelineschevron-right
    • Businesschevron-right
  • Compliance
    • Frameworkschevron-right
    • Security Controlschevron-right
    • Auditingchevron-right
  • Risk
    • Frameworks
  • Customer Security
    • What is Customer Security
    • Security Questionnaires: Questionschevron-right
      • Security Governancechevron-right
        • Does your organization conduct an annual independent information security review and act upon the fi
        • Does your organization have a documented Cybersecurity Policy or Information Security Policy?
        • Does your organization have a formal policy on the use of mobile devices?
        • Does your organization have a formal policy for remote working that includes security?
        • Does your organization have a documented Acceptable Use Policy
        • Does your organization have a documented Data Classification Policy?
        • Does your organization have a documented Access Control Policy?
        • Does your organization have a Password Policy?
        • Does your organization have a documented Backup Policy?
        • Does your organization enforce a Clear Desk and Screen Policy?
        • Are your organization's information security policies available to all employees?
      • Risk Assessment and Treatmentchevron-right
      • Asset and Information Managementchevron-right
      • HR and Personnel Security
      • Operation Managementchevron-right
      • Access Controlchevron-right
      • Application Securitychevron-right
      • Incident Event and Communications Managementchevron-right
      • Business Resiliencychevron-right
      • Compliance
      • End User Device Security
      • Network Security
      • Privacy
      • Threat Management
      • Server Security
      • Cloud Hosting
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Customer Securitychevron-right
  2. Security Questionnaires: Questions

Security Governance

Does your organization conduct an annual independent information security review and act upon the fichevron-rightDoes your organization have a documented Cybersecurity Policy or Information Security Policy?chevron-rightDoes your organization have a formal policy on the use of mobile devices?chevron-rightDoes your organization have a formal policy for remote working that includes security?chevron-rightDoes your organization have a documented Acceptable Use Policychevron-rightDoes your organization have a documented Data Classification Policy?chevron-rightDoes your organization have a documented Access Control Policy?chevron-rightDoes your organization have a Password Policy?chevron-rightDoes your organization have a documented Backup Policy?chevron-rightDoes your organization enforce a Clear Desk and Screen Policy?chevron-rightAre your organization's information security policies available to all employees?chevron-right
PreviousSecurity Questionnaires: Questionschevron-leftNextDoes your organization conduct an annual independent information security review and act upon the fichevron-right

Last updated 3 years ago