22.9 Protection of Information Technology
a) Make security-related technology or devices resistant to tampering, and do not disclose security documentation unnecessarily.
b) Secure security documentation and specifications to prevent unauthorized access.
c) Make the security design of dedicated security technology strong enough to resist exposure, even if the security design is made available to unauthorized individuals.
d) Evaluate the protection mechanisms on a regular basis at least annually and perform updates to the protection of the security technology, if necessary.
e) Deploy hardened operating systems on all IT systems and devices. Systems software and firewalls must be configured to the highest security settings consistent with the level of protection required, keeping abreast with updates, patches and enhancements recommended by system vendors. All default passwords for new systems must be change immediately upon installation.
f) Firewalls should be installed between internal and external networks as well as between geographically separate sites. Install intrusion detection-prevention devices including denial-of-service security appliances where appropriate.
g) Patch management procedure such as preventive, detective and corrective measures must be defined and in practice especially up-to-date security patches and virus control across the organization to protect information systems and technology from malware.
h) Define, implement and document all related procedure for malicious software prevention, detection and correction.
i) Regularly review and evaluate information on new potential threats.
j) Exchange sensitive transaction data only over a trusted path or medium with controls to provide authenticity of content, proof of submission, and proof of receipt and non-repudiation of origin.
k) The use of insecure internet services such as social media sites, cloud-based internet storage sites, and web-based emails to communicate or store confidential information must not be allowed.
l) Security monitoring tools which enable the detection of unauthorized changes to critical IT resources such as databases, system or data files and programs should also be implement, where applicable.
m) Data loss prevention control please refer to section 29.5
22.9 Protection of Information Technology
a) Make security-related technology or devices resistant to tampering, and do not disclose security documentation unnecessarily.
b) Secure security documentation and specifications to prevent unauthorized access.
c) Make the security design of dedicated security technology strong enough to resist exposure, even if the security design is made available to unauthorized individuals.
d) Evaluate the protection mechanisms on a regular basis at least annually and perform updates to the protection of the security technology, if necessary.
e) Deploy hardened operating systems on all IT systems and devices. Systems software and firewalls must be configured to the highest security settings consistent with the level of protection required, keeping abreast with updates, patches and enhancements recommended by system vendors. All default passwords for new systems must be change immediately upon installation.
f) Firewalls should be installed between internal and external networks as well as between geographically separate sites. Install intrusion detection-prevention devices including denial-of-service security appliances where appropriate.
g) Patch management procedure such as preventive, detective and corrective measures must be defined and in practice especially up-to-date security patches and virus control across the organization to protect information systems and technology from malware.
h) Define, implement and document all related procedure for malicious software prevention, detection and correction.
i) Regularly review and evaluate information on new potential threats.
j) Exchange sensitive transaction data only over a trusted path or medium with controls to provide authenticity of content, proof of submission, and proof of receipt and non-repudiation of origin.
k) The use of insecure internet services such as social media sites, cloud-based internet storage sites, and web-based emails to communicate or store confidential information must not be allowed.
l) Security monitoring tools which enable the detection of unauthorized changes to critical IT resources such as databases, system or data files and programs should also be implement, where applicable.
m) Data loss prevention control please refer to section 29.5
การแปล กรุณารอสักครู่..
