Direct links from the subject.
| Property | Value |
|---|---|
|
The subject is an instance of a class. |
|
|
The subject is an instance of a class. |
An idea or notion; a unit of thought. |
|
A human-readable name for the subject. |
PR.DS-02.1: Portable storage devices containing system data shall be controlled and protected while in transit and in storage. |
|
PR.DS-02.1 |
|
|
http://cyfun.data.gift/data/loc_CyFun2025_Booklet_ESSENTIAL_E_p114 |
|
|
Relates a concept to a concept that is more general in meaning. |
|
|
A general note, for any purpose. |
<div><p>The goal of this control is to prevent unauthorised access, tampering, or loss of critical system data when port- able storage devices are moved between locations or stored outside secure environments. In OT environments, where data may be transferred between isolated systems or remote sites using physical media, protecting these devices is essential to maintain system integrity and confidentiality. To achieve this goal, the organisation should:</p><ul><li>Scan all portable storage devices for malicious code before use on organisational systems.</li><li>Encrypt data to ensure confidentiality if a device is lost or stolen.</li><li>Use tamper-evident seals and locked containers during transport.</li><li>Rely on trusted couriers or secure transport services, and avoid leaving devices unattended.</li><li>Limit access to stored devices to authorised personnel, supported by documented access control policies.</li><li>Store devices in secure, climate-controlled environments to prevent physical damage.</li><li>Conduct regular audits and inventory checks to ensure devices are accounted for and properly secured.</li></ul></div> |
|
A general note, for any purpose. |
The goal of this control is to prevent unauthorised access, tampering, or loss of critical system data when port- able storage devices are moved between locations or stored outside secure environments. In OT environments, where data may be transferred between isolated systems or remote sites using physical media, protecting these devices is essential to maintain system integrity and confidentiality. To achieve this goal, the organisation should: - Scan all portable storage devices for malicious code before use on organisational systems. - Encrypt data to ensure confidentiality if a device is lost or stolen. - Use tamper-evident seals and locked containers during transport. - Rely on trusted couriers or secure transport services, and avoid leaving devices unattended. - Limit access to stored devices to authorised personnel, supported by documented access control policies. - Store devices in secure, climate-controlled environments to prevent physical damage. - Conduct regular audits and inventory checks to ensure devices are accounted for and properly secured. |
|
A general note, for any purpose. |
The goal of this control is to prevent unauthorised access, tampering, or loss of critical system data when port- able storage devices are moved between locations or stored outside secure environments. In OT environments, where data may be transferred between isolated systems or remote sites using physical media, protecting these devices is essential to maintain system integrity and confidentiality. To achieve this goal, the organisation should: - Scan all portable storage devices for malicious code before use on organisational systems. - Encrypt data to ensure confidentiality if a device is lost or stolen. - Use tamper-evident seals and locked containers during transport. - Rely on trusted couriers or secure transport services, and avoid leaving devices unattended. - Limit access to stored devices to authorised personnel, supported by documented access control policies. - Store devices in secure, climate-controlled environments to prevent physical damage. - Conduct regular audits and inventory checks to ensure devices are accounted for and properly secured. |
|
A general note, for any purpose. |
The goal of this control is to prevent unauthorised access, tampering, or loss of critical system data when port- able storage devices are moved between locations or stored outside secure environments. In OT environments, where data may be transferred between isolated systems or remote sites using physical media, protecting these devices is essential to maintain system integrity and confidentiality. To achieve this goal, the organisation should: • Scan all portable storage devices for malicious code before use on organisational systems. • Encrypt data to ensure confidentiality if a device is lost or stolen. • Use tamper-evident seals and locked containers during transport. • Rely on trusted couriers or secure transport services, and avoid leaving devices unattended. • Limit access to stored devices to authorised personnel, supported by documented access control policies. • Store devices in secure, climate-controlled environments to prevent physical damage. • Conduct regular audits and inventory checks to ensure devices are accounted for and properly secured. |
|
A notation, also known as classification code, is a string of characters such as "T58.5" or "303.4833" used to uniquely identify a concept within the scope of a given concept scheme. |
PR.DS-02.1 |
|
skos:prefLabel, skos:altLabel and skos:hiddenLabel are pairwise disjoint properties. |
Portable storage device protection in transit |
|
A resource has no more than one value of skos:prefLabel per language tag, and no more than one value of skos:prefLabel without language tag. |
Portable storage devices containing system data shall be controlled and protected while in transit and in storage. |
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
http://cyfun.data.gift/data/CyFun2025_delta_IMPORTANT_to_ESSENTIAL |
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
1 |
|
|
The number of triples associated with the subject. |
19 |
|
Specifies the dataset the subject is part of. |
Resultaten 1 - 21 of 21
Inverse links to the subject.
| Property | Subject |
|---|---|
|
Relates a concept to a concept that is more specific in meaning. |
Resultaten 1 - 1 of 1