Data Classification & Handling

Mechanisms exist to restrict and govern the transfer of sensitive and/or regulated data to third-countries or international organizations.


Login

Data Classification & Handling

Mechanisms exist to establish organization-defined "normal business activities" to identify anomalous transaction activities that can reduce the opportunity for sending (outbound) and/or receiving (inbound) fraudulent actions.


Login

Data Classification & Handling

Level N/A

Mechanisms exist to constrain the impact of "digital sovereignty laws," that require localized data within the host country, where data and processes may be subjected to arbitrary enforcement actions that potentially violate other applicable statutory, regulatory and/or contractual obligations.


Login

Embedded Technology

Mechanisms exist to facilitate the implementation of embedded technology controls.


Login

Embedded Technology

Mechanisms exist to proactively manage the cybersecurity & data privacy risks associated with Internet of Things (IoT).


Login

Embedded Technology

Mechanisms exist to proactively manage the cybersecurity & data privacy risks associated with Operational Technology (OT).


Login

Embedded Technology

Level N/A

Mechanisms exist to protect embedded devices against unauthorized use of the physical factory diagnostic and test interface(s).


Login

Embedded Technology

Mechanisms exist to generate log entries on embedded devices when configuration changes or attempts to access interfaces are detected.


Login

Embedded Technology

Mechanisms exist to protect embedded devices by preventing the unauthorized installation and execution of software.


Login

Embedded Technology

Mechanisms exist to securely update software and upgrade functionality on embedded devices.


Login