The organization has defined a process for addressing identified technical vulnerabilities.
Some vulnerabilities can be fixed directly, but vulnerabilities that have a significant impact should also be documented as security incidents. Once a vulnerability with significant impacts has been identified:
When the confidentiality of backups is important, backups are protected by encryption. The need to encrypt backups may become highlighted when backups are stored in a physical location where security policies are unknown.
The employment contracts specify the responsibilities of the employee and the organization for cyber security.
Contracts should include e.g.:
All employees handling confidential information should sign a confidentiality or non-disclosure agreement before processing confidential information.
The confidentiality commitment should include, among other things:
The requirements and needs for confidentiality agreements are reviewed and updated at regular intervals.
The employment contract should distinguish between cyber security responsibilities and obligations that remain in force after the termination of the employment relationship. The employee should also be reminded of these at the end of the employment relationship to ensure compliance.
Data Loss Prevention (DLP) policies can be used to protect sensitive data from accidental or intentional disclosure. Policies can alert, for example, when they detect sensitive data (such as personal identification numbers or credit card numbers) in email or another data system to which they would not belong.
The organization defines DLP policies related to endpoints in a risk-based manner, taking into account the data classification of the processed data.