Category
Guidance Document
Type
Standard
Access
Open
Status
Active
Updated
Jun-24
This manual provides strategic guidance for organisations to protect their information technology and operational technology systems, applications and data from cyber threats. It outlines a cyber security framework that provides practical guidance relevant to specific systems an organisation may operate.
Main sections:
· Cyber security principles
· Guidelines for cyber security roles
· Guidelines for cyber security incidents
· Guidelines for procurement and outsourcing
· Guidelines for security documentation
· Guidelines for physical security
· Guidelines for personnel security
· Guidelines for communications infrastructure
· Guidelines for communications systems
· Guidelines for enterprise mobility
· Guidelines for evaluated products
· Guidelines for information technology equipment
· Guidelines for media
· Guidelines for system hardening
· Guidelines for system management
· Guidelines for system monitoring
· Guidelines for software development
· Guidelines for database systems
· Guidelines for email
· Guidelines for networking
· Guidelines for cryptography
· Guidelines for gateways
· Guidelines for data transfers
· Cyber security terminology
Main sections:
· Cyber security principles
· Guidelines for cyber security roles
· Guidelines for cyber security incidents
· Guidelines for procurement and outsourcing
· Guidelines for security documentation
· Guidelines for physical security
· Guidelines for personnel security
· Guidelines for communications infrastructure
· Guidelines for communications systems
· Guidelines for enterprise mobility
· Guidelines for evaluated products
· Guidelines for information technology equipment
· Guidelines for media
· Guidelines for system hardening
· Guidelines for system management
· Guidelines for system monitoring
· Guidelines for software development
· Guidelines for database systems
· Guidelines for email
· Guidelines for networking
· Guidelines for cryptography
· Guidelines for gateways
· Guidelines for data transfers
· Cyber security terminology
Access Information Security Manual
By accessing this content, you are leaving this website. The Agency takes no responsibility for the accuracy of content on the destination page.