Objectives of Protective Technology
Technical security solutions are managed to ensure the security and resilience of systems and assets, consistent with related policies, procedures, and agreements.
- PR.PT-1: Audit/log records are determined, documented, implemented, and reviewed in accordance with policy
- PR.PT-2: Removable media is protected and its use restricted according to policy
- PR.PT-3: Access to systems and assets is controlled, incorporating the principle of least functionality
- PR.PT-4: Communications and control networks are protected