layout | title | date | categories |
---|---|---|---|
page |
General Principles |
2015-08-22 |
- Confidentiality
- Only authorized users can access data
- Enforce strong password policy
- Encrypt the data
- Integrity
- The data has not been tampered with
- Cryptographic Hash
- Use of digital signatures
- Availability
- The data is available when needed
- Backups available
- Redundant systems