IT Examiner School

Encryption

Data in Transit

Data at Rest

Data in Use

Remote Access Control remote access through approvals & periodic audits

Limit applications available for remote access, restrict their access during specific times & disable remote communications if no business need exists Use robust authentication methods for access & encryption to secure communications

Log & monitor all remote access communications

Secure remote access devices

Made with FlippingBook Digital Publishing Software