data.gift
  • Datasets

http://cyfun.data.gift/data/requirement_PR_IR_01_9

http://cyfun.data.gift/data/requirement_PR_IR_01_9
Concept

  • http://cyfun.data.gift/data/CyFun2025

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_delta_IMPORTANT_to_ESSENTIAL

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_ESSENTIAL

    • External link
    • Internal link

  • http://cyfun.data.gift/data/subcategory_PR.IR-01

    • External link
    • Internal link

Properties and relations

Direct links from the subject.

Property Value

type

The subject is an instance of a class.

  • External link
  • Internal link

http://cyfun.data.gift/ontology#Requirement

  • External link
  • Internal link

type

The subject is an instance of a class.

  • External link
  • Internal link

Concept

An idea or notion; a unit of thought.

  • External link
  • Internal link

label

A human-readable name for the subject.

  • External link
  • Internal link

PR.IR-01.9: The organisation shall manage interfaces with external telecommunications services as part of its broader network security policy, by defining how traffic is controlled, ensuring the confidentiality and integrity of transmitted information, and reviewing and documenting any exceptions to established rules.

http://cyfun.data.gift/ontology#requirementId

  • External link
  • Internal link

PR.IR-01.9

http://cyfun.data.gift/ontology#foundIn

  • External link
  • Internal link

http://cyfun.data.gift/data/loc_CyFun2025_Booklet_ESSENTIAL_E_p139

  • External link
  • Internal link

has broader

Relates a concept to a concept that is more general in meaning.

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_PR.IR-01

  • External link
  • Internal link

note

A general note, for any purpose.

  • External link
  • Internal link

This control builds on PR.IR-01.8 by focusing specifically on how external communications are governed within the organisation’s network security policy. While firewall configurations and baseline security settings provide technical enforcement, this requirement emphasises the policy and oversight layer. To implement this effectively, the organisation should: - Integrate Traffic Flow Management into the Network Security Policy Thenetworksecuritypolicyshouldincludeclearrulesforhowdataandvoicetrafficisallowedtoflowbetween internal systems and external telecommunications services. - Define Security Objectives and Scope The policy should outline the goals for protecting external communications and specify which systems and services are covered. - Control and Monitor Traffic Network traffic should be continuously monitored to ensure it complies with defined rules. Suspicious or unauthorised flows should trigger alerts and be investigated. - Protect Data in Transit Confidentiality and integrity of transmitted data should be protected using encryption protocols such as TLS/SSL. - Document and Review Exceptions Any exceptions to the traffic flow rules (e.g., temporary access for a third party) should be formally docu- mented, justified, and regularly reviewed. - Respond to Incidents The organisation should be prepared to isolate and respond to abnormal ormalicious traffic patterns quickly. - Maintain PolicyAlignment The traffic flow component should align with other elements of the network security policy, including access control, VPN usage, patch management, and incident response.

note

A general note, for any purpose.

  • External link
  • Internal link

This control builds on PR.IR-01.8 by focusing specifically on how external communications are governed within the organisation’s network security policy. While firewall configurations and baseline security settings provide technical enforcement, this requirement emphasises the policy and oversight layer. To implement this effectively, the organisation should: • Integrate Traffic Flow Management into the Network Security Policy Thenetworksecuritypolicyshouldincludeclearrulesforhowdataandvoicetrafficisallowedtoflowbetween internal systems and external telecommunications services. • Define Security Objectives and Scope The policy should outline the goals for protecting external communications and specify which systems and services are covered. • Control and Monitor Traffic Network traffic should be continuously monitored to ensure it complies with defined rules. Suspicious or unauthorised flows should trigger alerts and be investigated. • Protect Data in Transit Confidentiality and integrity of transmitted data should be protected using encryption protocols such as TLS/SSL. • Document and Review Exceptions Any exceptions to the traffic flow rules (e.g., temporary access for a third party) should be formally docu- mented, justified, and regularly reviewed. • Respond to Incidents The organisation should be prepared to isolate and respond to abnormal ormalicious traffic patterns quickly. • Maintain PolicyAlignment The traffic flow component should align with other elements of the network security policy, including access control, VPN usage, patch management, and incident response.

note

A general note, for any purpose.

  • External link
  • Internal link

<div><p>This control builds on PR.IR-01.8 by focusing specifically on how external communications are governed within the organisation’s network security policy. While firewall configurations and baseline security settings provide technical enforcement, this requirement emphasises the policy and oversight layer. To implement this effectively, the organisation should:</p><ul><li>Integrate Traffic Flow Management into the Network Security Policy Thenetworksecuritypolicyshouldincludeclearrulesforhowdataandvoicetrafficisallowedtoflowbetween internal systems and external telecommunications services.</li><li>Define Security Objectives and Scope The policy should outline the goals for protecting external communications and specify which systems and services are covered.</li><li>Control and Monitor Traffic Network traffic should be continuously monitored to ensure it complies with defined rules. Suspicious or unauthorised flows should trigger alerts and be investigated.</li><li>Protect Data in Transit Confidentiality and integrity of transmitted data should be protected using encryption protocols such as TLS/SSL.</li><li>Document and Review Exceptions Any exceptions to the traffic flow rules (e.g., temporary access for a third party) should be formally docu- mented, justified, and regularly reviewed.</li><li>Respond to Incidents The organisation should be prepared to isolate and respond to abnormal ormalicious traffic patterns quickly.</li><li>Maintain PolicyAlignment The traffic flow component should align with other elements of the network security policy, including access control, VPN usage, patch management, and incident response.</li></ul></div>

note

A general note, for any purpose.

  • External link
  • Internal link

This control builds on PR.IR-01.8 by focusing specifically on how external communications are governed within the organisation’s network security policy. While firewall configurations and baseline security settings provide technical enforcement, this requirement emphasises the policy and oversight layer. To implement this effectively, the organisation should: - Integrate Traffic Flow Management into the Network Security Policy Thenetworksecuritypolicyshouldincludeclearrulesforhowdataandvoicetrafficisallowedtoflowbetween internal systems and external telecommunications services. - Define Security Objectives and Scope The policy should outline the goals for protecting external communications and specify which systems and services are covered. - Control and Monitor Traffic Network traffic should be continuously monitored to ensure it complies with defined rules. Suspicious or unauthorised flows should trigger alerts and be investigated. - Protect Data in Transit Confidentiality and integrity of transmitted data should be protected using encryption protocols such as TLS/SSL. - Document and Review Exceptions Any exceptions to the traffic flow rules (e.g., temporary access for a third party) should be formally docu- mented, justified, and regularly reviewed. - Respond to Incidents The organisation should be prepared to isolate and respond to abnormal ormalicious traffic patterns quickly. - Maintain PolicyAlignment The traffic flow component should align with other elements of the network security policy, including access control, VPN usage, patch management, and incident response.

notation

A notation, also known as classification code, is a string of characters such as "T58.5" or "303.4833" used to uniquely identify a concept within the scope of a given concept scheme.

  • External link
  • Internal link

PR.IR-01.9

alternative label

skos:prefLabel, skos:altLabel and skos:hiddenLabel are pairwise disjoint properties.

  • External link
  • Internal link

External telecommunications security

preferred label

A resource has no more than one value of skos:prefLabel per language tag, and no more than one value of skos:prefLabel without language tag.

  • External link
  • Internal link

The organisation shall manage interfaces with external telecommunications services as part of its broader network security policy, by defining how traffic is controlled, ensuring the confidentiality and integrity of transmitted information, and reviewing and documenting any exceptions to established rules.

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_delta_IMPORTANT_to_ESSENTIAL

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_ESSENTIAL

  • External link
  • Internal link

http://cyfun.data.gift/ontology#level

  • External link
  • Internal link

http://cyfun.data.gift/data/level_ESSENTIAL

  • External link
  • Internal link

triple count

The number of triples associated with the subject.

  • External link
  • Internal link

17

in dataset

Specifies the dataset the subject is part of.

  • External link
  • Internal link

http://data.gift/d/datasets/69E8863AA6CE46D9ACD13109

  • External link
  • Internal link

Resultaten 1 - 19 of 19

References

Inverse links to the subject.

Property Subject

http://cyfun.data.gift/ontology#hasRequirement

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_PR.IR-01

  • External link
  • Internal link

has narrower

Relates a concept to a concept that is more specific in meaning.

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_PR.IR-01

  • External link
  • Internal link

Resultaten 1 - 1 of 1

© 2024 redpencil.io. All rights reserved.