Is the access to assets and associated facilities limited to authorized users, processes, or devices, and to authorized activities and transactions?
Are the organization's personnel and partners provided cybersecurity awareness education and adequately trained to perform their information security-related duties and responsibilities consistent with related policies, procedures, and agreements?
Are information and records (data) managed consistent with the organization's risk strategy to protect the confidentiality, integrity, and availability of information?
Are security policies, processes and procedures constantly implemented and updated to manage the security of information systems and assets?
Is maintenance and repairs of industrial control and information system components performed consistent with policies and procedures?
Are technical security solutions managed to ensure the security and resilience of systems and assets, consistent with related policies, procedures, and agreement?