1. Attempting to make framework compliant policies is a difficult task for cybersecurity experts. However, it is well known that implementing these policies is an even more difficult task, as it takes stakeholder buy-in and understanding in order for policies to be fully realized parts of the infrastructure. Knowing this, research and discuss implementation strategies that you would use in order to ensure that the security policies that have been set are being followed and that compliance levels remain well within the standards set forth in the framework.
2. There are many ways of going about assessing the overall framework and structure of a secure information environment. Research and discuss at least one tried and true method that allows for both the building and vetting of a strong and protected computing environment that can pass compliance inspections, and still serve its stakeholders efficiently.