Category
          Guidance Document
              Type
          Standard
              Access
              Open
          Status
              Active
          Updated
              June 2024
          
          This manual provides strategic guidance for organisations to protect their information technology and operational technology systems, applications and data from cyber threats. It outlines a cyber security framework that provides practical guidance relevant to specific systems an organisation may operate.
Main sections:
· Cyber security principles
· Guidelines for cyber security roles
· Guidelines for cyber security incidents
· Guidelines for procurement and outsourcing
· Guidelines for security documentation
· Guidelines for physical security
· Guidelines for personnel security
· Guidelines for communications infrastructure
· Guidelines for communications systems
· Guidelines for enterprise mobility
· Guidelines for evaluated products
· Guidelines for information technology equipment
· Guidelines for media
· Guidelines for system hardening
· Guidelines for system management
· Guidelines for system monitoring
· Guidelines for software development
· Guidelines for database systems
· Guidelines for email
· Guidelines for networking
· Guidelines for cryptography
· Guidelines for gateways
· Guidelines for data transfers
· Cyber security terminology
Main sections:
· Cyber security principles
· Guidelines for cyber security roles
· Guidelines for cyber security incidents
· Guidelines for procurement and outsourcing
· Guidelines for security documentation
· Guidelines for physical security
· Guidelines for personnel security
· Guidelines for communications infrastructure
· Guidelines for communications systems
· Guidelines for enterprise mobility
· Guidelines for evaluated products
· Guidelines for information technology equipment
· Guidelines for media
· Guidelines for system hardening
· Guidelines for system management
· Guidelines for system monitoring
· Guidelines for software development
· Guidelines for database systems
· Guidelines for email
· Guidelines for networking
· Guidelines for cryptography
· Guidelines for gateways
· Guidelines for data transfers
· Cyber security terminology
Access Information Security Manual
By accessing this content, you are leaving this website. The Agency takes no responsibility for the accuracy of content on the destination page.