Category
Guidance Document
Type
Standard
Access
Open
Status
Active
Updated
Jun 2024
This manual provides strategic guidance for organisations to protect their information technology and operational technology systems, applications and data from cyber threats. It outlines a cyber security framework that provides practical guidance relevant to specific systems an organisation may operate.
Main sections:
· Cyber security principles
· Guidelines for cyber security roles
· Guidelines for cyber security incidents
· Guidelines for procurement and outsourcing
· Guidelines for security documentation
· Guidelines for physical security
· Guidelines for personnel security
· Guidelines for communications infrastructure
· Guidelines for communications systems
· Guidelines for enterprise mobility
· Guidelines for evaluated products
· Guidelines for information technology equipment
· Guidelines for media
· Guidelines for system hardening
· Guidelines for system management
· Guidelines for system monitoring
· Guidelines for software development
· Guidelines for database systems
· Guidelines for email
· Guidelines for networking
· Guidelines for cryptography
· Guidelines for gateways
· Guidelines for data transfers
· Cyber security terminology
Main sections:
· Cyber security principles
· Guidelines for cyber security roles
· Guidelines for cyber security incidents
· Guidelines for procurement and outsourcing
· Guidelines for security documentation
· Guidelines for physical security
· Guidelines for personnel security
· Guidelines for communications infrastructure
· Guidelines for communications systems
· Guidelines for enterprise mobility
· Guidelines for evaluated products
· Guidelines for information technology equipment
· Guidelines for media
· Guidelines for system hardening
· Guidelines for system management
· Guidelines for system monitoring
· Guidelines for software development
· Guidelines for database systems
· Guidelines for email
· Guidelines for networking
· Guidelines for cryptography
· Guidelines for gateways
· Guidelines for data transfers
· Cyber security terminology
Access Information Security Manual
By accessing this content, you are leaving this website. The Agency takes no responsibility for the accuracy of content on the destination page.