Annex A.8 Flashcards
A.8.1
User Endpoint Devices
A.8.2
Privileged Access Rights
A.8.3
Information Access Restriction
A.8.4
Access to source code
A.8.5
Secure Authentication
A.8.6
Capacity Management
A.8.7
Protection against Malware
A.8.8
Management of technical vulnerabilities
A.8.9
Configuration Management
A.8.10
Information Deletion
A.8.11
Data Masking
A.8.12
Data Leakage Prevention
A.8.13
Information Backup
A.8.14
Redundancy of Information processing facilities
A.8.15
Logging
A.8.16
Monitoring activities
A.8.17
Clock Synchronization
A.8.18
Use of privileged utility programs
A.8.19
Installation of software on operational systems
A.8.20
Network Security
A.8.21
Security of Network Services
A.8.22
Segregation of Networks
A.8.23
Web filtering
A.8.24
Use of cryptography