Content library
CyberFundamentals (Belgium)
PR.DS-2: Data-in-transit is protected.

How to fill the requirement

CyberFundamentals (Belgium)

PR.DS-2: Data-in-transit is protected.

Task name
Priority
Status
Theme
Policy
Other requirements
Defining the types of removable media used
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Management of data sets
Removable media
requirements

Task is fulfilling also these other security requirements

8.3.1: Management of removable media
ISO27 Full
8.3.3: Physical media transfer
ISO27 Full
A.11.4: Protecting data on storage media leaving the premises
ISO 27018
13.2.1: Information transfer policies and procedures
ISO27 Full
13: Communications security
ISO 27018
1. Task description

Removable media includes e.g. flash memories, SD memories, removable storage drives, USB sticks and DVDs.

The organization has defined which removable media is allowed to be used.

Protection of data in transit
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Encryption
requirements

Task is fulfilling also these other security requirements

PR.DS-2: Data-in-transit
NIST
21.2.h: Encryption
NIS2
Article 9: Protection
DORA
5.1.2: Information transfer
TISAX
9.8 §: Salaus
KyberTL
1. Task description

The data to be transmitted must be protected using cryptographic methods. The protection of the confidentiality and integrity of the data transmitted applies to the internal and external network and to all systems that can transmit data. These include:

  • Servers
  • Computers
  • Mobile devices
  • Printers

The data to be transferred can be protected by physical or logical means.

  • Physical protection is obtained from a protected distribution system, for example an optical fiber line, which has sufficient protection to prevent, for example, electromagnetic leakage and controls to prevent its unauthorized use.
  • Logical protection is achieved with strong encryption of communications.
Secure transfer of confidential data outside the organization
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Management of data sets
Management of data sets
requirements

Task is fulfilling also these other security requirements

A.11.6: Encryption of PII transmitted over public data-transmission networks
ISO 27018
TEK-16: Tiedon salaaminen
Julkri
PR.DS-2: Data-in-transit is protected.
CyFun
1. Task description

The organization has to execute data transfers in public network using encrypted or otherwise protected data transfer connection or procedure, if the data is confidential.

The data transfer also has to be set up in a way where recipient can be identified securely enough before recipient can access any confidential data.

Encryption of public network traffic for application services
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Secure development
requirements

Task is fulfilling also these other security requirements

13.2.3: Electronic messaging
ISO27 Full
14.1.2: Securing application services on public networks
ISO27 Full
14.1.3: Protecting application services transactions
ISO27 Full
14.2.5: Secure system engineering principles
ISO27 Full
A.11.6: Encryption of PII transmitted over public data-transmission networks
ISO 27018
1. Task description

Information included in application services transmitted over public networks must be protected against fraudulent and non-contractual activity and against unauthorized disclosure and alteration.

We use strong encryption and security protocols (eg TLS, IPSEC, SSH) to protect confidential information when it is transmitted over public networks in connection with the IT services we develop.

Electromagnetic data breach management
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Physical security
Equipment maintenance and safety
requirements

Task is fulfilling also these other security requirements

I14: Hajasäteily (TEMPEST)
Katakri
11.1.3: Securing offices, rooms and facilities
ISO27 Full
11.2.1: Equipment siting and protection
ISO27 Full
PR.DS-2: Data-in-transit
NIST
FYY-01.1: Fyysisen turvallisuuden riskien arviointi - TEMPEST - TL III
Julkri
1. Task description

Electronic devices such as cables, monitors, copiers, tablets and smartphones leak electromagnetic radiation, from which it is possible to find out the original transmitted data with the right hardware and, for example, steal the entered username and password.

Openings in the premises' structures (windows, doors, air conditioning) are protected to prevent radiation from escaping. In addition, equipment handling confidential data is located so as to minimize the risk of leakage due to electromagnetic leakage.

No items found.