Controls
People and Access
STATUS
CONTROL
Clear Access Permission Policy
Changes to personnel access permissions must be created and approved by a manager or the security department. Access must be revoked when no longer needed.
Device Usage Policy
Devices provided to employees must be configured according to the company's security standards, including disk encryption, firewall activation, antivirus software, etc.
Multi-Factor Authentication (MFA) Usage
The organization must enable MFA for critical systems or for SSO.
Password Management
The organization has a password management policy for employees, including length, complexity, password lifespan; or uses password management software within the organization.
Restricted Access to Critical Systems
Access to critical systems and/or data must be requested, reviewed, and approved on a case-by-case basis. Access is granted temporarily, usually for no more than 24 hours.
Secret Key Management
Keys and confidential data for the software development process must be securely stored and protected; or use secret management software during development.
Restricted Access to Production Data
Access to production data must be restricted and should only be reviewed and approved on a case-by-case basis.
Role-Based Access Control (RBAC) Usage
Access to systems and applications is granted based on the user's role.
Centralized Login (SSO) Usage
The organization establishes SSO for internal systems to centrally manage accounts and identity access for each employee.
VPN Usage for Remote Access
Remote access from outside the office to internal systems must be via a VPN channel.
Office Network and Wi-Fi Access
The office network, including wireless access, is protected for internal business purposes only. Guest Wi-Fi access is provided on a separate network segment.
Security Role Assignment
Roles and responsibilities for security matters must be clearly defined in writing within the organization.
Security Awareness Training
Employees and partners must receive regular security awareness training, at least once a year.
Security Policy Training
Employees, partners, and contractors must be trained on the organization's security policies and procedures.