- Your filed self-assessment and all documentary and implemented evidences such as:
- Current cybersecurity policies and procedures
- Evidence of technical measures (firewalls, backups, monitoring logs)
- Incident response and business continuity plans
- Access control and user management documentation
- Any useful reports