Technological Controls (Clause 8)

Data leakage prevention measures should be applied to systems, networks and any other devices that process, store or transmit sensitive information.


Login

Technological Controls (Clause 8)

Level N/A

Backup copies of information, software and systems should be maintained and regularly tested in accordance with the agreed topic-specific policy on backup.


Login

Technological Controls (Clause 8)

Information processing facilities should be implemented with redundancy sufficient to meet availability requirements.


Login

Technological Controls (Clause 8)

Level N/A

Logs that record activities, exceptions, faults and other relevant events should be produced, stored, protected and analysed.


Login

Technological Controls (Clause 8)

Networks, systems and applications should be monitored for anomalous behaviour and appropriate actions taken to evaluate potential information security incidents.


Login

Technological Controls (Clause 8)

The clocks of information processing systems used by the organization should be synchronized to approved time sources.


Login

Technological Controls (Clause 8)

The use of utility programs that can be capable of overriding system and application controls should be restricted and tightly controlled.


Login

Technological Controls (Clause 8)

Procedures and measures should be implemented to securely manage software installation on operational systems.


Login

Technological Controls (Clause 8)

Level N/A

Networks and network devices should be secured, managed and controlled to protect information in systems and applications.


Login

Technological Controls (Clause 8)

Security mechanisms, service levels and service requirements of network services should be identified, implemented and monitored.


Login