Security Measures
1. Measures of Pseudonymization and Encryption of Personal Data
2. Measures for Ensuring Ongoing Confidentiality, Integrity, Availability, and Resilience of Processing Systems and Services
3. Measures for Ensuring the Ability to Restore Availability and Access to Personal Data in a Timely Manner in the Event of a Physical or Technical Incident
4. Processes for Testing, Assessing, and Evaluating the Effectiveness of Technical and Organizational Security Measures
5. Measures for User Identification and Authorization
6. Measures for the Protection of Data During Transmission
7. Measures for the Protection of Data During Storage
8. Measures for Ensuring Physical Security of Locations Processing Personal Data
9. Measures for Ensuring Events Logging
10. Measures for Ensuring System Configuration, Including Default Configuration
11. Measures for IT Security Governance and Management
12. Measures for Certification/Assurance of Processes and Products
13. Measures for Ensuring Data Minimization
14. Measures for Ensuring Data Quality
15. Measures for Allowing Data Portability and Ensuring Erasure
16. Data Center Security
17. Access Control
18. Transmission Control
19. Input Control
20. Availability Control
Last updated
Was this helpful?

