Information security requirements shall be identified, specified, and approved when developing or acquiring applications.
Last updated 2 years ago