GRCA Planeth
You are not logged in
Login
Change Design (current Design: automatic)
Change Design (current Design: light)
Change Design (current Design: dark)
Start
Sources
›
DORA in Control Framework
›
Standard - Security Management
+Security Management
---+Architectural and Network Security
------+Network Design and Segmentation
------+Network Security
------+Session Management
---+Security Monitoring & Log Management
------+Security Monitoring (SIEM)
------+Event Identification for Logging
------+Secure Handling of Log Data
---+Data and (Legacy) System Security
------+ICT (Security) Systems, tools, and solutions
------+Data Protection Practices
------+Vendor Recommended Security Settings
------+Endpoint Devices
------+Secure Data Deletion and Disposal
---+Encryption and Cryptography
------+Data Encryption
------+Cryptographic Key Management and Lifecycle
---+Identity and Access Management
------+Authentication Methods
------+Identity Management
------+Privilige Access Management
------+Account Management
---+Physical and Environmental Security
------+Physical and Environmental Security
---+Security Awareness
------+Resilience Training Programs
------+Inclusion of Third-Party Providers
---+Vulnerability and Patch Management
------+Resource Management
------+Vulnerability Management
------+Patch Management
1. Overview
Security Management
Summary
Standard
Architectural and Network Security
Security Monitoring & Log Management
Data and (Legacy) System Security
Encryption and Cryptography
Identity and Access Management
Physical and Environmental Security
Security Awareness
Vulnerability and Patch Management
1.1 References
1.2 Identified Requirements
1.2 Related Regulation
2. Identified Requirements
Requirements
Source
Requirement
3. Related Regulations
Regulations
Source
Regulation
NOREA
-
NOREA, de beroepsorganisatie van IT-auditors
-
DORA in Control Framework
Impressum