Cyber Security Controls
- Preventive security controls 
- Security Policies 
- Physical security policies 
- Do we have security awareness training 
- On boarding training 
- Quarterly training 
 
- Data encryption 
- Writing weak passwords 
 
- Deterrent Security controls 
- Firewalls 
- Encryption 
 
- Technical/logical controls 
- Encryption 
- TPM on assets 
 
- Detective security controls 
- Log management 
- SIEM/SOC/SOAR 
 
- Honey Pots/deception technology 
 
- Corrective security controls 
- Antivirus/endpoint 
- IDS/IPS 
- Business continuity plans 
 
- Recovery controls 
- Backup copies 
- Sever clustering 
 
- Privacy controls 
- Privacy Policies 
 
- Data protection 
- Standards 
- Procedures 
- Baselines 
- Guidelines 
 
- Data Classification 
- Data Lifecycle 
- Data creation 
- Data Storage 
- Data in use 
- Data sharing 
- Data Archive 
- Data Destroy 
 
- OECD Guidelines 
- Data collection limitation 
- Data quality 
- Data collection purpose specification 
- Use limitation 
- Security safeguards 
- Openness 
- Individual participation 
- Accountability 
- Supervisory Authority (SA) 
 
- Privacy standards 
- GDPR 
 
- • 
- Following SMART approach to build polices 
- Developing and communicating acceptable use case policies 
- Periodical Review and assessment of the policies 
 
- Organization policies: 
- Vulnerability Policy 
- Cloud computing policy 
- Incident reporting policy 
- Cloud storage policy 
- Business continuity policy 
- Disaster Recovery 
- Developing and communicating acceptable use case policies 
- Following SMART approach to build polices 
 
Last updated
Was this helpful?