Watch this video on YouTube
What ensures that procedures are correctly aligned with information security policy requirements?