:star: G14 Controlled Access (:checkered_flag: 14-4 All information stored…
:star: G14 Controlled Access
All communication of sensitive information over less-trusted networks
should be encrypted.
Whenever information flows over a network with a lower trust level
the information should be encrypted.
All information stored on systems shall be protected with
or database specific access control lists.
These controls will enforce the principal that
only authorized individuals should have access to the information
based on their need to access the information
as a part of their responsibilities.
Archived data sets or systems not regularly accessed by the organization
shall be removed from the organization's network.
These systems shall only be used as stand alone systems (disconnected from the network)
by the business unit needing to occasionally use the system
or completely virtualized
and powered off until needed.