Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. personnel - trained in data security; signed AUP or Statement of Confidentiality concerning personal data
  2. access management - strong password or 2-factor authentication are used for authorization; access to data and data modifications are logged
  3. access protection - firewall or ACL protection
  4. stored data protection - pseudonymisation; anonymisation; database encryption; hard disk and removable media encryption; other forms of data encryption
  5. data transfer protection - during transfer data are protected with secure versions of encryption methods such as TLS, VPN, WPA2, SSH
  6. vulnerability management - software are timely patched; regular vulnerability scanning or penetration testing of applications or systems
  7. malware protection - end-station malware protection; email malware protection; education of personnel
  8. data leak protection - IDS; continuous monitoring; removable media policy
  9. regular backups - stored on safe place; encrypted; restore regularly checked
  10. incident management - incident response; timely reporting all incident to data controller
  11. (D)DOS protection - on network, system or application level

...