The statement of the types and levels of security over information technology resources and capabilities which must be
established and operated in order for those items to be considered as 'secure'. It provides management direction into
the allowable behaviors of the actors working with the resources and exercising the capabilities. It defines the scope
of management and specifies the requirements for the security controls.
|