Under active development Content is continuously updated and improved

NO-12Trusted Connections

>Control Description

All trusted connections are documented and approved by authorized personnel; management ensures the following documentation is in place prior to approval: • agreement with vendor • security requirements • nature of transmitted information

Theme

Process

Type

Preventive

Policy/Standard

Network Security Standard

>Implementation Guidance

1. Ensure that a process is defined and documented for managing trusted connections. 2. Ensure that all trusted connections are documented and approved by authorized personnel. 3. Ensure that appropriate agreements with vendors exist before establishing trusted connection.

>Testing Procedure

1. Inspect and validate whether a process is defined and documented for managing trusted connections. 2. Validate for a sample trusted connections that it was documented and approved by authorized personnel. 3. Validate whether appropriate agreement with vendors existed before establishing trusted connection.

>Audit Artifacts

E-NO-01
E-NO-13

>Framework Mappings

Cross-framework mappings provided by Adobe CCF Open Source under Creative Commons License.

Ask AI

Configure your API key to use AI features.