Suggested security controls and control enhancements (ITSG-33)

 

The following spreadsheet contains the suggested security control Security controlA management, operational, or technical high-level security requirement needed for an information system to protect the confidentiality, integrity, and availability of its IT assets. Security controls can be applied by using a variety of security solutions that can include security products, security policies, security practices, and security procedures. profiles from Annex 4A - Profile 1 - (PROTECTED B / Medium Integrity / Medium Availability) (ITSG-33) and Annex 4A - Profile 3 - (SECRET / Medium Integrity / Medium Availability) (ITSG-33). This spreadsheet can be used to create specific security control profile(s):

Date modified: