Resourcing

Adequate resources are allocated and in place to manage information security systems access including permanent roles and external service providers