Category: Controls
Vendor Risk Management
In today’s business hustle, teaming up with external vendors is common. Picture this: you’re a company working…
Monitoring activities
In a world driven by digital interactions and data flows, information security stands as a paramount concern….
Data Logging
In our interconnected world, where the flow of information never seems to cease, safeguarding sensitive data has…
Information backup
In our increasingly digital world, the importance of information backup cannot be overstated. Whether you’re a tech-savvy…
Information deletion
In today’s interconnected digital age, information has become an invaluable asset. From personal records to business transactions,…
Configuration management
Management of configuration refers to the process of identifying, organizing, documenting, and controlling the components and settings…
Management of technical vulnerabilities
Management of technical vulnerabilities is a process used to identify, assess, and control the potential security risks…
Protection against malware
Malware, or malicious software, is an increasingly prevalent threat to organizations of all sizes. It is a…
Secure authentication
Authentication is all about validating the identity of an entity like a user or system. The authentication…
Classification of information
To ensure the correct level of protection is set for a certain information asset, the information needs…
Access to source code
In the resent years, attacks on source code has been increasing. Examples are Microsoft, Lastpass and Samsung….
Data masking
When talking about data masking, most people think about encryption, or pseudonymization. These are just two of…
Physical security perimeters
Phisical perimeters are the surroundings of your office buildings, data centers or any other location your employees…
Information access restriction
Access restrictions prevent unauthorized reading, adjusting, copying, using or deleting of information and information processing systems or…
Data leakage prevention
Nowadays a lot of people work from their home instead of the office. And almost everyone has…
Capacity management
According to Wikipedia, capacity management ensures “that information technology resources are sufficient to meet upcoming business requirements…
Privileged access rights
Privileged access rights, sometimes called elevated rights or high level access rights, are used to access important…
User endpoint devices
Endpoint devices are all devices users use to view digital information, like a personal computer, laptop, smartphone…
Segregation of networks
When managing large networks, it can help to devide them into segments. Each segment can have it’s…
Clock synchronization
When you need to analyse logs, it will help you when all the time settings are equal….