Direct links from the subject.
| Property | Value |
|---|---|
|
The subject is an instance of a class. |
|
|
The subject is an instance of a class. |
An idea or notion; a unit of thought. |
|
A human-readable name for the subject. |
GV.RR-04.1: Personnel with access to the organisation’s most critical information or technology shall be authenticated. |
|
GV.RR-04.1 |
|
|
http://cyfun.data.gift/data/loc_CyFun2025_Booklet_BASIC_E_p11 |
|
|
http://cyfun.data.gift/data/loc_CyFun2025_Booklet_ESSENTIAL_E_p27 |
|
|
http://cyfun.data.gift/data/loc_CyFun2025_Booklet_IMPORTANT_E_p23 |
|
|
Relates a concept to a concept that is more general in meaning. |
|
|
A general note, for any purpose. |
The goal of this control is protecting critical assets by ensuring only authenticated personnel can access them. To achieve this, the following should be considered: - “Authenticated” means the usermust technicallyprove theiridentityat the point ofaccess, ideallyusing MFA or stronger methods, not just be validated during onboarding. - The access to critical information or technology should be considered during recruitment, onboarding, during employment, change of function and when offboarding (termination of employment). - Background verification checks should be conducted prior to onboarding new personnel for sensitive roles, and background checks should be periodicallyrepeated forpersonnelwith such roles. Backgroundverification checks should howevertake into account applicable laws, regulations, and ethics in proportion to the business requirements, the classification of the information to be accessed and the perceived risks. - Cybersecurity expertise should be recognised as avaluable asset in recruitment, training, and retention decisions. |
|
A general note, for any purpose. |
The goal of this control is protecting critical assets by ensuring only authenticated personnel can access them. To achieve this, the following should be considered: - “Authenticated” means the usermust technicallyprove theiridentityat the point ofaccess, ideallyusing MFA or stronger methods, not just be validated during onboarding. - The access to critical information or technology should be considered during recruitment, onboarding, during employment, change of function and when offboarding (termination of employment). - Background verification checks should be conducted prior to onboarding new personnel for sensitive roles, and background checks should be periodicallyrepeated forpersonnelwith such roles. Backgroundverification checks should howevertake into account applicable laws, regulations, and ethics in proportion to the business requirements, the classification of the information to be accessed and the perceived risks. - Cybersecurity expertise should be recognised as avaluable asset in recruitment, training, and retention decisions. |
|
A general note, for any purpose. |
The goal of this control is protecting critical assets by ensuring only authenticated personnel can access them. To achieve this, the following should be considered: • “Authenticated” means the usermust technicallyprove theiridentityat the point ofaccess, ideallyusing MFA or stronger methods, not just be validated during onboarding. • The access to critical information or technology should be considered during recruitment, onboarding, during employment, change of function and when offboarding (termination of employment). • Background verification checks should be conducted prior to onboarding new personnel for sensitive roles, and background checks should be periodicallyrepeated forpersonnelwith such roles. Backgroundverification checks should howevertake into account applicable laws, regulations, and ethics in proportion to the business requirements, the classification of the information to be accessed and the perceived risks. • Cybersecurity expertise should be recognised as avaluable asset in recruitment, training, and retention decisions. |
|
A general note, for any purpose. |
<div><p>The goal of this control is protecting critical assets by ensuring only authenticated personnel can access them. To achieve this, the following should be considered:</p><ul><li>“Authenticated” means the usermust technicallyprove theiridentityat the point ofaccess, ideallyusing MFA or stronger methods, not just be validated during onboarding.</li><li>The access to critical information or technology should be considered during recruitment, onboarding, during employment, change of function and when offboarding (termination of employment).</li><li>Background verification checks should be conducted prior to onboarding new personnel for sensitive roles, and background checks should be periodicallyrepeated forpersonnelwith such roles. Backgroundverification checks should howevertake into account applicable laws, regulations, and ethics in proportion to the business requirements, the classification of the information to be accessed and the perceived risks.</li><li>Cybersecurity expertise should be recognised as avaluable asset in recruitment, training, and retention decisions.</li></ul></div> |
|
A notation, also known as classification code, is a string of characters such as "T58.5" or "303.4833" used to uniquely identify a concept within the scope of a given concept scheme. |
GV.RR-04.1 |
|
skos:prefLabel, skos:altLabel and skos:hiddenLabel are pairwise disjoint properties. |
Critical personnel authentication |
|
A resource has no more than one value of skos:prefLabel per language tag, and no more than one value of skos:prefLabel without language tag. |
Personnel with access to the organisation’s most critical information or technology shall be authenticated. |
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
The number of triples associated with the subject. |
21 |
|
Specifies the dataset the subject is part of. |
Resultaten 1 - 23 of 23
Inverse links to the subject.
| Property | Subject |
|---|---|
|
Relates a concept to a concept that is more specific in meaning. |
Resultaten 1 - 1 of 1