Table of Contents Table of Contents
Previous Page  626-627 / 1143 Next Page
Information
Show Menu
Previous Page 626-627 / 1143 Next Page
Page Background

What does it cover

Specific, short concise document on

proportionate approach for managing risk from

cyber threats to MAH scenarios.

Covers risk identification, and its management

including design, maintenance, operation,

management systems and competency of staff.

Once published it will form part of the EC&I

operational delivery guide in CEMHD consistent

with other similar operational guides.