Category
Guidance Document
Type
Standard
Access
Open
Status
Active
Updated
Jun-24
This manual provides strategic guidance for organisations to protect their information technology and operational technology systems, applications and data from cyber threats. It outlines a cyber security framework that provides practical guidance relevant to specific systems an organisation may operate.
Main sections:
� Cyber security principles
� Guidelines for cyber security roles
� Guidelines for cyber security incidents
� Guidelines for procurement and outsourcing
� Guidelines for security documentation
� Guidelines for physical security
� Guidelines for personnel security
� Guidelines for communications infrastructure
� Guidelines for communications systems
� Guidelines for enterprise mobility
� Guidelines for evaluated products
� Guidelines for information technology equipment
� Guidelines for media
� Guidelines for system hardening
� Guidelines for system management
� Guidelines for system monitoring
� Guidelines for software development
� Guidelines for database systems
� Guidelines for email
� Guidelines for networking
� Guidelines for cryptography
� Guidelines for gateways
� Guidelines for data transfers
� Cyber security terminology
Main sections:
� Cyber security principles
� Guidelines for cyber security roles
� Guidelines for cyber security incidents
� Guidelines for procurement and outsourcing
� Guidelines for security documentation
� Guidelines for physical security
� Guidelines for personnel security
� Guidelines for communications infrastructure
� Guidelines for communications systems
� Guidelines for enterprise mobility
� Guidelines for evaluated products
� Guidelines for information technology equipment
� Guidelines for media
� Guidelines for system hardening
� Guidelines for system management
� Guidelines for system monitoring
� Guidelines for software development
� Guidelines for database systems
� Guidelines for email
� Guidelines for networking
� Guidelines for cryptography
� Guidelines for gateways
� Guidelines for data transfers
� Cyber security terminology
Access Information Security Manual
By accessing this content, you are leaving this website. The Agency takes no responsibility for the accuracy of content on the destination page.