Skip to main content

💼 c. selection and configuration — considerations when selecting and configuring vendor supplied software include due diligence as to the security testing conducted to identify vulnerabilities (either intended or deliberate); user access management capabilities (e.g. role based, support of segregation of duties); interface vulnerabilities; monitoring capabilities; encryption capabilities to protect sensitive data; ability to obtain and implement information security updates in a timely manner; compliance with the security policy framework; and configuration/implementation of the software which minimises the risk of a security compromise;

  • ID: /frameworks/apra-cpg-234/d/2/c

Description​

Empty...

Similar​

  • Internal
    • ID: dec-c-8f54da52

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance