data.gift
  • Datasets

http://cyfun.data.gift/data/requirement_PR_DS_02_1

http://cyfun.data.gift/data/requirement_PR_DS_02_1
Concept

  • http://cyfun.data.gift/data/CyFun2025

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_KeyMeasures

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_delta_IMPORTANT_to_ESSENTIAL

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_ESSENTIAL

    • External link
    • Internal link

  • http://cyfun.data.gift/data/subcategory_PR.DS-02

    • External link
    • Internal link

Properties and relations

Direct links from the subject.

Property Value

type

The subject is an instance of a class.

  • External link
  • Internal link

http://cyfun.data.gift/ontology#Requirement

  • External link
  • Internal link

type

The subject is an instance of a class.

  • External link
  • Internal link

Concept

An idea or notion; a unit of thought.

  • External link
  • Internal link

label

A human-readable name for the subject.

  • External link
  • Internal link

PR.DS-02.1: Portable storage devices containing system data shall be controlled and protected while in transit and in storage.

http://cyfun.data.gift/ontology#requirementId

  • External link
  • Internal link

PR.DS-02.1

http://cyfun.data.gift/ontology#foundIn

  • External link
  • Internal link

http://cyfun.data.gift/data/loc_CyFun2025_Booklet_ESSENTIAL_E_p114

  • External link
  • Internal link

has broader

Relates a concept to a concept that is more general in meaning.

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_PR.DS-02

  • External link
  • Internal link

note

A general note, for any purpose.

  • External link
  • Internal link

<div><p>The goal of this control is to prevent unauthorised access, tampering, or loss of critical system data when port- able storage devices are moved between locations or stored outside secure environments. In OT environments, where data may be transferred between isolated systems or remote sites using physical media, protecting these devices is essential to maintain system integrity and confidentiality. To achieve this goal, the organisation should:</p><ul><li>Scan all portable storage devices for malicious code before use on organisational systems.</li><li>Encrypt data to ensure confidentiality if a device is lost or stolen.</li><li>Use tamper-evident seals and locked containers during transport.</li><li>Rely on trusted couriers or secure transport services, and avoid leaving devices unattended.</li><li>Limit access to stored devices to authorised personnel, supported by documented access control policies.</li><li>Store devices in secure, climate-controlled environments to prevent physical damage.</li><li>Conduct regular audits and inventory checks to ensure devices are accounted for and properly secured.</li></ul></div>

note

A general note, for any purpose.

  • External link
  • Internal link

The goal of this control is to prevent unauthorised access, tampering, or loss of critical system data when port- able storage devices are moved between locations or stored outside secure environments. In OT environments, where data may be transferred between isolated systems or remote sites using physical media, protecting these devices is essential to maintain system integrity and confidentiality. To achieve this goal, the organisation should: - Scan all portable storage devices for malicious code before use on organisational systems. - Encrypt data to ensure confidentiality if a device is lost or stolen. - Use tamper-evident seals and locked containers during transport. - Rely on trusted couriers or secure transport services, and avoid leaving devices unattended. - Limit access to stored devices to authorised personnel, supported by documented access control policies. - Store devices in secure, climate-controlled environments to prevent physical damage. - Conduct regular audits and inventory checks to ensure devices are accounted for and properly secured.

note

A general note, for any purpose.

  • External link
  • Internal link

The goal of this control is to prevent unauthorised access, tampering, or loss of critical system data when port- able storage devices are moved between locations or stored outside secure environments. In OT environments, where data may be transferred between isolated systems or remote sites using physical media, protecting these devices is essential to maintain system integrity and confidentiality. To achieve this goal, the organisation should: - Scan all portable storage devices for malicious code before use on organisational systems. - Encrypt data to ensure confidentiality if a device is lost or stolen. - Use tamper-evident seals and locked containers during transport. - Rely on trusted couriers or secure transport services, and avoid leaving devices unattended. - Limit access to stored devices to authorised personnel, supported by documented access control policies. - Store devices in secure, climate-controlled environments to prevent physical damage. - Conduct regular audits and inventory checks to ensure devices are accounted for and properly secured.

note

A general note, for any purpose.

  • External link
  • Internal link

The goal of this control is to prevent unauthorised access, tampering, or loss of critical system data when port- able storage devices are moved between locations or stored outside secure environments. In OT environments, where data may be transferred between isolated systems or remote sites using physical media, protecting these devices is essential to maintain system integrity and confidentiality. To achieve this goal, the organisation should: • Scan all portable storage devices for malicious code before use on organisational systems. • Encrypt data to ensure confidentiality if a device is lost or stolen. • Use tamper-evident seals and locked containers during transport. • Rely on trusted couriers or secure transport services, and avoid leaving devices unattended. • Limit access to stored devices to authorised personnel, supported by documented access control policies. • Store devices in secure, climate-controlled environments to prevent physical damage. • Conduct regular audits and inventory checks to ensure devices are accounted for and properly secured.

notation

A notation, also known as classification code, is a string of characters such as "T58.5" or "303.4833" used to uniquely identify a concept within the scope of a given concept scheme.

  • External link
  • Internal link

PR.DS-02.1

alternative label

skos:prefLabel, skos:altLabel and skos:hiddenLabel are pairwise disjoint properties.

  • External link
  • Internal link

Portable storage device protection in transit

preferred label

A resource has no more than one value of skos:prefLabel per language tag, and no more than one value of skos:prefLabel without language tag.

  • External link
  • Internal link

Portable storage devices containing system data shall be controlled and protected while in transit and in storage.

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_KeyMeasures

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_delta_IMPORTANT_to_ESSENTIAL

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_ESSENTIAL

  • External link
  • Internal link

http://cyfun.data.gift/ontology#level

  • External link
  • Internal link

http://cyfun.data.gift/data/level_ESSENTIAL

  • External link
  • Internal link

http://cyfun.data.gift/ontology#isKeyMeasure

  • External link
  • Internal link

1

triple count

The number of triples associated with the subject.

  • External link
  • Internal link

19

in dataset

Specifies the dataset the subject is part of.

  • External link
  • Internal link

http://data.gift/d/datasets/69E8863AA6CE46D9ACD13109

  • External link
  • Internal link

Resultaten 1 - 21 of 21

References

Inverse links to the subject.

Property Subject

http://cyfun.data.gift/ontology#hasRequirement

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_PR.DS-02

  • External link
  • Internal link

has narrower

Relates a concept to a concept that is more specific in meaning.

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_PR.DS-02

  • External link
  • Internal link

Resultaten 1 - 1 of 1

© 2024 redpencil.io. All rights reserved.