Requires IT systems to be assessed by an independent third-party

Improves how security controls are managed within the State’s shared-service environment. The Security Control Policy addresses this business challenge by establishing clearer lines of delineation between security controls, ownership and the overall responsibility of execution.

Requirements for creating an information security program and infrastructure