O4.2 Establish a cybersecurity framework for DPI

Practices

  • Deploy a legal cybersecurity framework that governs DPI and identify critical infrastructure needs.

  • Design effective safeguards against unauthorized access, tampering (alteration or other unauthorized changes to data or credentials), identity theft, misuse of data, cybercrime, and other threats occurring throughout the DPI life cycle.

Resources

Last updated