Direct links from the subject.
| Property | Value |
|---|---|
|
The subject is an instance of a class. |
|
|
The subject is an instance of a class. |
An idea or notion; a unit of thought. |
|
A human-readable name for the subject. |
PR.DS-01.6: The organisation shall protect the confidentiality of its critical assets while at rest. |
|
PR.DS-01.6 |
|
|
http://cyfun.data.gift/data/loc_CyFun2025_Booklet_ESSENTIAL_E_p112 |
|
|
Relates a concept to a concept that is more general in meaning. |
|
|
A general note, for any purpose. |
The goal of this control is to ensure that sensitive operational and business data stored on systems, servers, or devices remains protected from unauthorised access, even if physical or logical security is compromised. In OT environments, where legacy systems and shared infrastructure are common, protecting data-at-rest is critical to prevent exposure of configuration files, process data, or credentials that could be exploited to disrupt operations or gain lateral access. This control builds further on PR.DS-01.1. To enable the protection of the organisation' s critical assets at-rest, the following techniques should be con- sidered: • Encryption: Encrypt data-at-rest, on hard drives, on external media, in stored files, in configuration files and stored in the cloud, using strong encryption algorithms to prevent unauthorised access and protect the data against tampering. • Access Controls: Implement strict access controls to ensure only authorised personnel can access sensitive information. • Regular Audits: Conduct regular security audits to identify and address vulnerabilities. • Data Masking: Use data masking techniques to obscure sensitive information in non-production environ- ments (For example, GDPR-sensitive data from the production environment may not be copied to a test environment without randomisation to prevent unauthorised access to data). |
|
A general note, for any purpose. |
The goal of this control is to ensure that sensitive operational and business data stored on systems, servers, or devices remains protected from unauthorised access, even if physical or logical security is compromised. In OT environments, where legacy systems and shared infrastructure are common, protecting data-at-rest is critical to prevent exposure of configuration files, process data, or credentials that could be exploited to disrupt operations or gain lateral access. This control builds further on PR.DS-01.1. To enable the protection of the organisation' s critical assets at-rest, the following techniques should be con- sidered: - Encryption: Encrypt data-at-rest, on hard drives, on external media, in stored files, in configuration files and stored in the cloud, using strong encryption algorithms to prevent unauthorised access and protect the data against tampering. - Access Controls: Implement strict access controls to ensure only authorised personnel can access sensitive information. - Regular Audits: Conduct regular security audits to identify and address vulnerabilities. - Data Masking: Use data masking techniques to obscure sensitive information in non-production environ- ments (For example, GDPR-sensitive data from the production environment may not be copied to a test environment without randomisation to prevent unauthorised access to data). |
|
A general note, for any purpose. |
<div><p>The goal of this control is to ensure that sensitive operational and business data stored on systems, servers, or devices remains protected from unauthorised access, even if physical or logical security is compromised. In OT environments, where legacy systems and shared infrastructure are common, protecting data-at-rest is critical to prevent exposure of configuration files, process data, or credentials that could be exploited to disrupt operations or gain lateral access. This control builds further on PR.DS-01.1. To enable the protection of the organisation' s critical assets at-rest, the following techniques should be con- sidered:</p><ul><li>Encryption: Encrypt data-at-rest, on hard drives, on external media, in stored files, in configuration files and stored in the cloud, using strong encryption algorithms to prevent unauthorised access and protect the data against tampering.</li><li>Access Controls: Implement strict access controls to ensure only authorised personnel can access sensitive information.</li><li>Regular Audits: Conduct regular security audits to identify and address vulnerabilities.</li><li>Data Masking: Use data masking techniques to obscure sensitive information in non-production environ- ments (For example, GDPR-sensitive data from the production environment may not be copied to a test environment without randomisation to prevent unauthorised access to data).</li></ul></div> |
|
A general note, for any purpose. |
The goal of this control is to ensure that sensitive operational and business data stored on systems, servers, or devices remains protected from unauthorised access, even if physical or logical security is compromised. In OT environments, where legacy systems and shared infrastructure are common, protecting data-at-rest is critical to prevent exposure of configuration files, process data, or credentials that could be exploited to disrupt operations or gain lateral access. This control builds further on PR.DS-01.1. To enable the protection of the organisation' s critical assets at-rest, the following techniques should be con- sidered: - Encryption: Encrypt data-at-rest, on hard drives, on external media, in stored files, in configuration files and stored in the cloud, using strong encryption algorithms to prevent unauthorised access and protect the data against tampering. - Access Controls: Implement strict access controls to ensure only authorised personnel can access sensitive information. - Regular Audits: Conduct regular security audits to identify and address vulnerabilities. - Data Masking: Use data masking techniques to obscure sensitive information in non-production environ- ments (For example, GDPR-sensitive data from the production environment may not be copied to a test environment without randomisation to prevent unauthorised access to data). |
|
A notation, also known as classification code, is a string of characters such as "T58.5" or "303.4833" used to uniquely identify a concept within the scope of a given concept scheme. |
PR.DS-01.6 |
|
skos:prefLabel, skos:altLabel and skos:hiddenLabel are pairwise disjoint properties. |
Data at rest confidentiality |
|
A resource has no more than one value of skos:prefLabel per language tag, and no more than one value of skos:prefLabel without language tag. |
The organisation shall protect the confidentiality of its critical assets while at rest. |
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
http://cyfun.data.gift/data/CyFun2025_delta_IMPORTANT_to_ESSENTIAL |
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
The number of triples associated with the subject. |
17 |
|
Specifies the dataset the subject is part of. |
Resultaten 1 - 19 of 19
Inverse links to the subject.
| Property | Subject |
|---|---|
|
Relates a concept to a concept that is more specific in meaning. |
Resultaten 1 - 1 of 1