💼 56a guidelines outlining when information security-specific technology solutions should be used;
- Contextual name: 💼 56a guidelines outlining when information security-specific technology solutions should be used;
- ID:
/frameworks/apra-cpg-234/22/56/a
- Located in: 💼 56 An APRA-regulated entity would typically deploy appropriate information security technology solutions which maintain the security of information assets. Examples include firewalls, network access control, intrusion detection/prevention devices, anti-malware, encryption and monitoring/log analysis tools. The degree of reliance placed on technology solutions for information security could necessitate a heightened set of lifecycle controls, including but not limited to:
Description​
Empty...
Similar​
- Internal
- ID:
dec-c-2833bce4
- ID:
Sub Sections​
Section | Sub Sections | Internal Rules | Policies | Flags |
---|