(v1.0 – 1st Aug 2017) This procedure defines the controls established and implemented to ensure the protection of information in networks and its supporting information processing facilities.