Data Security (DS)

Data-in-transit is protected


Login

Data Security (DS)

Assets are formally managed throughout removal, transfers, and disposition


Login

Data Security (DS)

Adequate capacity to ensure availability is maintained


Login

Data Security (DS)

Protections against data leaks are implemented


Login

Data Security (DS)

Integrity checking mechanisms are used to verify software, firmware, and information integrity


Login

Data Security (DS)

The development and testing environment(s) are separate from the production environment


Login

Data Security (DS)

Integrity checking mechanisms are used to verify hardware integrity


Login

Information Protection Processes and Procedures (IP)

A baseline configuration of information technology/industrial control systems is created and maintained incorporating security principles (e.g. concept of least functionality)


Login

Information Protection Processes and Procedures (IP)

Response and recovery plans are tested


Login

Information Protection Processes and Procedures (IP)

Cybersecurity is included in human resources practices (e.g., deprovisioning, personnel screening)


Login