This activity addresses reviewing security controls and mechanisms and determining whether they appropriately and effectively implement security policies and procedures as described in the Security Management Framework and the Security Plan.
©Copyright IBM Corp. 2005, 2008. All Rights Reserved.