Annex A.8 Flashcards
1
Q
A.8.1
A
User Endpoint Devices
2
Q
A.8.2
A
Privileged Access Rights
3
Q
A.8.3
A
Information Access Restriction
4
Q
A.8.4
A
Access to source code
5
Q
A.8.5
A
Secure Authentication
6
Q
A.8.6
A
Capacity Management
7
Q
A.8.7
A
Protection against Malware
8
Q
A.8.8
A
Management of technical vulnerabilities
9
Q
A.8.9
A
Configuration Management
10
Q
A.8.10
A
Information Deletion
11
Q
A.8.11
A
Data Masking
12
Q
A.8.12
A
Data Leakage Prevention
13
Q
A.8.13
A
Information Backup
14
Q
A.8.14
A
Redundancy of Information processing facilities
15
Q
A.8.15
A
Logging