iv (b) | Media handling | -Secure deletion -Destroying or degaussing physical media -Secure disposal or re-use of media | Capturing, Processing, Storage, Transmission | Technical control | √ | √ | √ | √ |
v. 5 | Access control | Access control policy in place. | Capturing, Processing, Storage, Transmission | Administrative control | √ | √ | √ | √ |
v (a) | Business requirements of access | -Clearly documented -Restrict network access and connections | Capturing, Processing, Storage, Transmission | Technical control | √ | √ | √ | √ |
vi. 6 | Cryptography | Cryptographic policy in place. | Capturing, Processing, Storage, Transmission | Administrative control | √ | √ | √ | √ |
vi (a) | Encryption | Encryption ofdata/information | Capturing, Processing, Storage, Transmission | Technical control | √ | √ | √ | √ |
vi (b) | Cryptographic authentication and integrity | -Digital signature; -Message authentication code; -Checksum (cryptographic hash function); -Non-repudiation; -Cryptographic key management. | Capturing, Processing, Storage, Transmission | Technical control | √ | √ | √ | √ |
vii. 7 | Physical and environmental security | Physical security policy in place. | Capturing, Processing, Storage, Transmission | Administrative control | √ | √ | √ | √ |
vii (a) | Physical security perimeter | -Securing offices, rooms and facilities. -Public access, delivery and loading areas; doors, lock, electric fence, CCTV, smartcard, biometric (e.g. fingerprint). | Capturing, Processing, Storage, Transmission | Physical control | √ | √ | √ | √ |
vii (b) | Protecting against external and environmental threats | -Protecting against fires, floods, earthquakes, bombs, etc. -Climate protecting system, fire suppression system | Capturing, Processing, Storage, Transmission | Physical control | √ | √ | √ | √ |
vii (c) | Equipment maintenance | Equipment shall be correctly maintained to ensure its continued availability and integrity. | Capturing, Processing, Storage, Transmission | Physical control | √ | √ | √ | √ |
viii. 8 | Operations Security | Operations security policy in place | Capturing, Processing, Storage, Transmission | Administrative control | √ | √ | √ | √ |
viii (a) | Multi-factor authentication | Something you know (PIN/Password)/ something you have (ATM/Smartcard)/ something you are (Biometric, e.g. fingerprint). | Capturing, Processing, Storage, Transmission | Technical control | √ | √ | √ | √ |
ix. 9 | Communications and operations management | Communications and operations policy in place. | Capturing, Processing, Storage, Transmission | Administrative control | √ | √ | √ | √ |
ix (a) | Network security management | -Networks and network services should be secured; -Network segmentation/segregation. | Capturing, Processing, Storage, Transmission | Technical control | √ | √ | √ | √ |
ix (b) | Information transfer
| Policies, procedures and agreements in place (e.g. non-disclosure agreements) for information transfer to/from third parties, including electronic messaging. | Capturing, Processing, Storage, Transmission | Administrative control | √ | √ | √ | √ |
x. 10 | System acquisition, development and maintenance | System acquisition, development and maintenance policy in place. | Capturing, Processing, Storage, Transmission | Administrative control | √ | √ | √ | √ |
x (a) | Security requirements of information systems | Security control requirements should be analysed and specified. | Capturing, Processing, Storage, Transmission | Administrative control | √ | √ | √ | √ |