Mechanisms exist to conduct periodic audits of cybersecurity and data protection controls to evaluate conformity with the organization's documented policies, standards and procedures.
Does the organization conduct periodic audits of cybersecurity and data protection controls to evaluate conformity with its documented policies, standards and procedures?