Barriers Library
Reusable barriers — prevention barriers sit on threat paths, mitigation barriers on consequence paths.
Add Barrier
Tags:
clear tags
8 barriers — page 1 of 1
| Name | Type | Category | Tags | Description | |
|---|---|---|---|---|---|
| 6.1 – Screening | prevention | People | Carry out background verification checks on all candidates for employment in accordance with applica… | Edit | |
| 6.2 – Terms and Conditions of Employment | prevention | People | Employment contracts shall state the employee's and the organisation's responsibilities for informat… | Edit | |
| 6.3 – Information Security Awareness, Education and Training | prevention | People | All personnel and, where relevant, contractors shall receive appropriate information security awaren… | Edit | |
| 6.4 – Disciplinary Process | mitigation | People | Implement a formal and communicated disciplinary process to take action against personnel who commit… | Edit | |
| 6.5 – Responsibilities After Termination or Change of Employment | prevention | People | Define, communicate, and enforce information security responsibilities and duties that remain valid … | Edit | |
| 6.6 – Confidentiality or Non-Disclosure Agreements | prevention | People | Identify, regularly review, and document requirements for confidentiality or non-disclosure agreemen… | Edit | |
| 6.7 – Remote Working | prevention | People | Implement security measures to protect information accessed, processed, or stored at remote working … | Edit | |
| 6.8 – Information Security Event Reporting | mitigation | People | Provide personnel with a mechanism to report observed or suspected information security events throu… | Edit |