MIL1 requirements
a. Cybersecurity responsibilities for the function are identified, at least in an ad hoc manner
b. Cybersecurity responsibilities are assigned to specific people, at least in an ad hoc manner
MIL2 requirements
c. Cybersecurity responsibilities are assigned to specific roles, including external service providers
d. Cybersecurity responsibilities are documented
MIL3 requirements
e. Cybersecurity responsibilities and job requirements are reviewed and updated periodically and according to defined triggers, such as system changes and changes to organizational structure
f. Assigned cybersecurity responsibilities are managed to ensure adequacy and redundancy of coverage, including succession planning
The organization must operate, maintain, and continuously develop a security management system.
The boundaries and scope, contents, role, cumulative implementation information and other necessary descriptive information related to the management system must be clearly documented.
Top management must ensure clear responsibilities / authority on at least the following themes:
The ISMS theme owners are presented on the desktop of the management system and in the Information security policy report.
In addition, top management shall ensure that all roles relevant to information security, as well as related responsibilities and authorities, are defined and communicated. It is also important to recognize the roles and responsibilities of external partners and providers.