| 
    The statement of the types and levels of security over information technology resources and capabilities which must be
    established and operated in order for those items to be considered as 'secure'. It provides management direction into
    the allowable behaviors of the actors working with the resources and exercising the capabilities. It defines the scope
    of management and specifies the requirements for the security controls.
 |