Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. personnel - trained in data security; signed AUP or Statement of Confidentiality concerning personal data
  2. access management - strong password or 2-factor authentication are used for authorization; access to data and data modifications are logged
  3. access protection - firewall or ACL protection
  4. stored data protection - pseudonymisation; anonymisation; database encryption; hard disk and removable media encryption; other forms of data encryption
  5. data transfer protection - during transfer data are protected with secure versions of encryption methods such as TLS, VPN, WPA2, SSH
  6. vulnerability management - software are timely patched; regular vulnerability scanning or penetration testing of applications or systems
  7. malware protection - end-station malware protection; email malware protection; education of personnel
  8. data leak protection - IDS; continuous monitoring; removable media policy
  9. regular backups - stored on safe place; encrypted; restore regularly checked
  10. incident management - incident response; timely reporting all incident to data controller
  11. (D)DOS protection - on network, system or application level


CIAAreaItemOrganizationSystem
admin.
Network
admin.
Applications
development



security policyappropriate security policy






personneltrained in (personal) data security







signed AUP or Statement of Confidentiality for (personal) data






access managementstrong password or 2 factor authentication







logging of data modification






access protectionfirewall, ACL, …






stored data protectionpseudonymisation







anonymisation







database encryption







hard disk and removable media encryption







other forms of data encryption






data transfer protectionsecure transport (IPsec, VPN, wireless, …)







remote system access (TLS, RDP, SSH, …)







remote application access (TLS, SSH, …)






vulnerability managementtimely patching







regular vulnerability scanning of applications or systems







regular penetration testing of applications and systems








malware protectionend-station malware protection







email malware protection







education of personnel






data leak protectionIDS







continuous monitoring







removable media policy







personnel education






regular backupsbackup policy







stored on safe place







encrypted







restore regularly checked






incident managementincident response procedure







timely reporting all incident to data controller






(D)DOS protectionon network, system or application level




Annex 4 - data transfers outside EU

...