The Policy is available in AzureUSGovernment cloud. Version: '1.*.*'
Additional metadata
Name/Id: CMA_0124 / CMA_0124 Category: Operational Title: Define performance metrics Ownership: Customer Description: Microsoft recommends that your organization identify performance metrics for organizational processes, activities, and structures including organizational personnel. It is recommended that your organization measure and track these metrics over time in order to drive performance goals. Requirements: The customer is responsible for implementing this recommendation.
Use the filters above each column to filter and limit table data. Advanced searches can be performed by using the following operators: <, <=, >, >=, =, *, !, {, }, ||,&&, [empty], [nonempty], rgx: Learn more
Top management shall demonstrate leadership and commitment with respect to the information
security management system by:
e) ensuring that the information security management system achieves its intended outcome(s).
Top management shall demonstrate leadership and commitment with respect to the information
security management system by:
g) promoting continual improvement.
Organizational roles, responsibilities and authorities
Shared
n/a
Top management shall ensure that the responsibilities and authorities for roles relevant to information
security are assigned and communicated.
Top management shall assign the responsibility and authority for:
b) reporting on the performance of the information security management system to top management.
NOTE Top management may also assign responsibilities and authorities for reporting performance of the
information security management system within the organization.
Top management shall review the organization’s information security management system at planned
intervals to ensure its continuing suitability, adequacy and effectiveness.
The management review shall include consideration of:
c) feedback on the information security performance, including trends in:
- 1) nonconformities and corrective actions.
The outputs of the management review shall include decisions related to continual improvement
opportunities and any needs for changes to the information security management system.
The organization shall retain documented information as evidence of the results of management reviews.
Top management shall review the organization’s information security management system at planned
intervals to ensure its continuing suitability, adequacy and effectiveness.
The management review shall include consideration of:
c) feedback on the information security performance, including trends in:
- 3) audit results.
The outputs of the management review shall include decisions related to continual improvement
opportunities and any needs for changes to the information security management system.
The organization shall retain documented information as evidence of the results of management reviews.
Top management shall review the organization’s information security management system at planned
intervals to ensure its continuing suitability, adequacy and effectiveness.
The management review shall include consideration of:
c) feedback on the information security performance, including trends in:
- 4) fulfilment of information security objectives;
The outputs of the management review shall include decisions related to continual improvement
opportunities and any needs for changes to the information security management system.
The organization shall retain documented information as evidence of the results of management reviews.
Use the filters above each column to filter and limit table data. Advanced searches can be performed by using the following operators: <, <=, >, >=, =, *, !, {, }, ||,&&, [empty], [nonempty], rgx: Learn more