
A.18.2.3: Technical Compliance Review
Perform regular reviews of information systems for compliance with the organization’s information security policies and standards.

A.18.2.2: Compliance with Security Policies and Standards
Ensure that managers regularly review the compliance of information processing and procedures within their area of responsibility with the appropriate security policies, standards, and any other security requirements.

A.18.2.1: Independent Review of Information Security
Conduct an independent review of the information security policy and its implementation at planned intervals or when significant changes occur.

A.18.1.5: Regulation of Cryptographic Controls
Ensure compliance with all relevant legislative, regulatory, and contractual requirements for the use of cryptographic controls.