The following pages link to 5.2.2 Implemented controls to adequately address each of the defined security risks: