Skip to main content

๐Ÿ’ผ 51 Controls, commensurate with the sensitivity and criticality of the data, would typically be implemented where sensitive data is at risk of leakage. Examples of data leakage methods include the misuse of portable computing devices (e.g. laptops, tablets, mobile phones), portable storage devices (e.g. USB flash drives, portable hard drives, writable disks), electronic transfer mechanisms (e.g. email, instant messaging) and hard copy.

  • Contextual name: ๐Ÿ’ผ 51 Controls, commensurate with the sensitivity and criticality of the data, would typically be implemented where sensitive data is at risk of leakage. Examples of data leakage methods include the misuse of portable computing devices (e.g. laptops, tablets, mobile phones), portable storage devices (e.g. USB flash drives, portable hard drives, writable disks), electronic transfer mechanisms (e.g. email, instant messaging) and hard copy.
  • ID: /frameworks/apra-cpg-234/20/51
  • Located in: ๐Ÿ’ผ 20 Implementation of controls - Data leakage

Descriptionโ€‹

Empty...

Similarโ€‹

  • Internal
    • ID: dec-c-b823ae8a

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags