This category establishes policies and guidelines governing the acceptable, secure, and responsible use of ICT resources. It defines user responsibilities, security requirements, and controls to protect information assets from misuse, unauthorized access, and damage.
This category provides technical standards and guidance for the secure design, configuration, and management of network infrastructure. It ensures the confidentiality, integrity, and availability of network services through standardized controls and best practices.
This category defines policies and procedures for the management of endpoint devices and domain-joined systems. It ensures consistency, security, and compliance in the configuration, operation, and maintenance of user computing devices.
This category defines policies and procedures for the management of endpoint devices and domain-joined systems. It ensures consistency, security, and compliance in the configuration, operation, and maintenance of user computing devices.
This category outlines policies and procedures for the delivery of ICT support services. It defines the use of the ICT helpdesk, ticketing systems, and customer support processes to ensure timely, effective, and measurable ICT service delivery.
This category establishes governance policies for the development, acquisition, and maintenance of information systems. It ensures that systems are developed in a controlled, secure, and standardized manner aligned with organizational objectives.