to the IT Standard Rules this time are summarized as follows: (1) Establishing IT-related risk assessment criteria to define the entity’s risk level and to specify standards of IT security controls
.cls-1 { fill: #494949; } .cls-2 { font-size: 33.26px; fill: #fff; font-family: Quicksand-Regular, Quicksand; } .cls-3 { fill: none; stroke: #fff; stroke-linecap: round; stroke-linejoin: round
.cls-1 { fill: #494949; } .cls-2 { font-size: 23.03px; fill: #fff; font-family: Quicksand-Regular, Quicksand; } .cls-3 { fill: none; stroke: #fff; stroke-linecap: round; stroke-linejoin: round
เพื่อการรักษาความมั่นคงปลอดภัยด้าน IT (organization of information technology security) &"TH Sarabun New,Regular"&14&P D2.2 # H M L S สธ. 38/2565 นป. 7/2565 การควบคุมที่ สธ. # นป. การควบคุมที่ควรมี ผลการ
with Chapter 1; (2) establishment of policies, measures, and management arrangement concerning information security in accordance with Chapter 2; (3) management of IT assets and the access control to
with Chapter 1; (2) establishment of policies, measures, and management arrangement concerning information security in accordance with Chapter 2; (3) management of IT assets and the access control to
with Chapter 1; (2) establishment of policies, measures, and management arrangement concerning information security in accordance with Chapter 2; (3) management of IT assets and the access control to
Re: Operational Control and Information Technology Security of Securities Companies Whereas in these days securities companies widely accept information technology as an instrument for securities
Re: Operational Control and Information Technology Security of Securities Companies Whereas in these days securities companies widely accept information technology as an instrument for securities
monitor key management related activities at a regular interval to ensure compliance with the established policy and guideline. 7. Physical and Environmental Security 7.1 Secure Areas Objective: To prevent