(IS) and cyber security policies, procedures, and systems, including access management for hardware, firmware, and software. Ensure... that IS and cyber security designs, plans, controls, and processes are aligned with IS standards and overall IS and cyber security...