O4.6 Use an established cybersecurity framework

Practices

  • Implement adequate and effective safeguards against unauthorized access, tampering (alteration or other unauthorized changes to data or credentials), identity theft, misuse of data, cybercrime, and other threats occurring throughout the DPI life cycle.

Resources

Last updated