![]() ![]() Sensitive Data Discovery and Classification Certified protection of encryption keys.Encryption of data-at-rest and data-in-motion. ![]() Sensitive data discovery and classification.Thales has a comprehensive set of solutions that can help organizations prepare for and comply with DEFCON 658 across all areas where data needs to be protected - at rest, in motion and in use, including: L.12 Define and implement a policy to manage the access rights of user accounts. M.06 Ensure the organisation has identified asset owners and asset owners control access to their assets. L.07 Define and implement a policy to control access to information and information processing facilities. Note that while the controls are defined based on the risks associated with the contract (Low, Medium or High), Thales’s solutions apply across similar controls simultaneously, and are therefore consolidated below. Thales provides data security solutions that help address these controls, as indicated. DEF STAN 05-138, which specifies the measures that defence suppliers are required to achieve at each of the five levels of cyber risk that a contract can be assessed as carrying, includes several controls specific to the protection of sensitive information, as outlined below.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |