Skip to main content

๐Ÿ’ผ 36 Acquisition and implementation controls would typically be in place to ensure that information security is not compromised by the introduction of new information assets. Ongoing support and maintenance controls would typically be in place to ensure that information assets continue to meet the information security requirements of the APRAregulated entity

  • Contextual name: ๐Ÿ’ผ 36 Acquisition and implementation controls would typically be in place to ensure that information security is not compromised by the introduction of new information assets. Ongoing support and maintenance controls would typically be in place to ensure that information assets continue to meet the information security requirements of the APRAregulated entity
  • ID: /frameworks/apra-cpg-234/13/36
  • Located in: ๐Ÿ’ผ 13 Implementation of controls - Information security controls implemented at all stages

Descriptionโ€‹

Empty...

Similarโ€‹

  • Internal
    • ID: dec-c-b200b8ff

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ 36a change management โ€”information security is addressed as part of the change management process and the information asset inventory is updated;78
๐Ÿ’ผ 36b configuration management โ€”the configuration of information assets minimises vulnerabilities and is defined, assessed, registered, maintained, including when new vulnerabilities and threats are discovered, and applied consistently;11
๐Ÿ’ผ 36c deployment and environment management โ€”development, test and production environments are appropriately segregated and enforce segregation of duties;22
๐Ÿ’ผ 36d access management controls โ€”only authorised users, software and hardware are able to access information assets (refer to Attachment B for further guidance);1313
๐Ÿ’ผ 36e hardware and software asset controls โ€”appropriate authorisation to prevent security compromises from unauthorised hardware and software assets;1515
๐Ÿ’ผ 36f network design โ€” to ensure authorised network traffic flows and to reduce the impact of security compromises;2829
๐Ÿ’ผ 36g vulnerability management controls โ€” which identify and address information security vulnerabilities in a timely manner;1111
๐Ÿ’ผ 36h patch management controls โ€” to manage the assessment and application of patches and other updates that address known vulnerabilities in a timely manner;55
๐Ÿ’ผ 36i service level management mechanisms โ€” to monitor, manage and align information security with business objectives;22
๐Ÿ’ผ 36j monitoring controls โ€” for timely detection of compromises to information security;911
๐Ÿ’ผ 36k response controls โ€” to manage information security incidents and feedback mechanisms to address control deficiencies;1010
๐Ÿ’ผ 36l capacity and performance management controls โ€” to ensure that availability is not compromised by current or projected business volumes;
๐Ÿ’ผ 36m service provider management controls โ€” to ensure that a regulated entityโ€™s information security requirements are met.