Confidentiality
SB.10.009 Password Monitoring
There is security monitoring on organisational credentials appearing in (publicized) data-breaches. If there are indications of compromise of passwords, or risks that the credentials of individuals are compromised, passwords will be forcibly changed and the users informed.
Lees meerSB.10.008 Risk Monitoring
Event data is aggregated from multiple sources. Accepted organisational risks are monitored through defined abuse cases. Personnel security and awareness is monitored and periodically tested.
Lees meerSB.10.007 Access and authentication attempts
Authentication attempts are logged including originating IP and attempted user. Passwords are not logged. Access to the network is logged.
Lees meerSB.10.006 Mutation and Data Access Logs
Applications log access (attempts) to sensitive data. Applications log mutations of system configurations and sensitive data. Original values are recommended but not necessitated to be stored.
Lees meerSB.10.004 Logging events
Description Events potentially relevant to the security of systems are logged in a central logging system (different from the originating system) with timestamps synchronised to official timeservers in UTC. Logs are protected from modification. Logs are reviewed periodically.
Lees meerSB.10.003 Session and Identity monitoring
Protections are in place to detect and prevent unauthorised user activity based on context and behaviour.
Lees meerSB.10.002 Account monitoring
At least every month for all current accounts the number of lock-outs, current account status, account end-date and account-deletion date (if relevant) is reported.
Lees meerSB.10.001 Privilege account monitoring
Creation of new accounts with privileged authorisations, mutations in user groups through which privileged authorisations can be obtained and changes in passwords for non-personal privileged accounts are approved Potential abuse cases for the (attempted) use of privileged authorisations are defined and monitoring impemented for these cases. False positive situations are approved by the System Owner before being allowed.
Lees meerSB.9.016 Authorization Matrix
Process owners are responsible for an authorization matrix listing who has what access to data and functionality in relevant systems, in what capacity. The authorisation matrix includes roles, the authorisations in roles, individuals and which roles the individuals are allowed to have. Optionally, job functions can be used to identify which roles belong to those functions. If there conflicts between certain authorisations that cannot be given simultaneously, the authorisation matrix identifies which combinations of authorisations are not allowed. Template-AutorisatiematrixDownload
Lees meerSB.9.015 Joiner/Mover/Leaver
Process approve users getting authorisations to the data in the process. The requests of individuals that want access to information assets or authorisations to do so, are logged and retained for at least 1 year. It includes the requester, and the approval (or rejection) of the appropriate data owner. Revocation requests, end of employment notifications and changes are recorded and retained for at least 1 year. After role changes or upon termination of contractual or formal relations between the organisation and the individual, access to data that is no longer part of your role is revoked at first opportunity. If...
Lees meer