Level N/A
Define, implement and evaluate processes, procedures and technical measures that ensure any transfer of personal or sensitive data is protected from unauthorized access and only processed within scope as permitted by the respective laws and regulations.
Parent
Compliance Framework
CCM v4.0.10
Control Number
DSP-10
Related
Compliance Framework
CIS v8.0
CIS v8.0
CIS v8.0
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST CSF v1.1
NIST CSF v1.1
NIST CSF v1.1
Secure Controls Framework 2023.4
Secure Controls Framework 2023.4
Secure Controls Framework 2023.4
Secure Controls Framework 2023.4
Secure Controls Framework 2023.4
Secure Controls Framework 2023.4
Secure Controls Framework 2023.4
CIS v8.0