Remote access to the organisation’s critical systems shall be monitored and cryptographic mechanisms shall be implemented where determined necessary.
Remote access to the organisation’s critical systems shall be monitored and cryptographic mechanisms shall be implemented where determined necessary.
The security for connections with external systems shall be verified and framed by documented agreements.
The security for connections with external systems shall be verified and framed by documented agreements.