IT Examiner School
Encryption
Data in Transit
Data at Rest
Data in Use
Remote Access Control remote access through approvals & periodic audits
Limit applications available for remote access, restrict their access during specific times & disable remote communications if no business need exists Use robust authentication methods for access & encryption to secure communications
Log & monitor all remote access communications
Secure remote access devices
Made with FlippingBook Digital Publishing Software