All the Controls and Frameworks hang on these two Principles

All Information Security controls and frameworks depend on [...]