Good Practices
Source: Baseline Security Recommendations for IoT in the context of Critical Information Infrastructures November 2017
# | Good Practice | Description | Gp Cat | |
---|---|---|---|---|
1 | Trust and Integrity Management | Technical Measures {TM} | View | |
2 | Third-Party relationships | Organisational, People and Process measures (OP) | View | |
3 | System safety and reliability | Technical Measures {TM} | View | |
4 | Strong default security and privacy | Technical Measures {TM} | View | |
5 | Security by design | Policies (PS) | View | |
6 | Secure Software / Firmware updates | Technical Measures {TM} | View | |
7 | Secure Interfaces and network services | Technical Measures {TM} | View | |
8 | Secure input and output handling | Technical Measures {TM} | View | |
9 | Secure and trusted communications | Technical Measures {TM} | View | |
10 | Risk and Threat Identification and Assessment | Policies (PS) | View | |
11 | Proven solutions | Organisational, People and Process measures (OP) | View | |
12 | Privacy by design | Policies (PS) | View | |
13 | Monitoring and Auditing | Technical Measures {TM} | View | |
14 | Management of security vulnerabilities and/or incidents | Organisational, People and Process measures (OP) | View | |
15 | Logging | Technical Measures {TM} | View | |
16 | Human Resources Security Training and Awareness | Organisational, People and Process measures (OP) | View | |
17 | Hardware security | Technical Measures {TM} | View | |
18 | End-of-life support | Organisational, People and Process measures (OP) | View | |
19 | Data protection and compliance | Technical Measures {TM} | View | |
20 | Cryptography | Technical Measures {TM} | View | |
21 | Authorisation | Technical easures {TM} | View | |
22 | Authentication | Technical Measures {TM} | View | |
23 | Asset Management | Policies (PS) | View | |
24 | Access Control - Physical and Environmental security | Technical Measures {TM} | View | |
Loading...
Saving...
Loading...