Information security requirements shall be identified, specified, and approved when developing or acquiring applications.
Last updated 1 year ago