8 — Technological Controls
34 controls in the Technological Controls theme
8.1User endpoint devices
8.2Privileged access rights
8.3Information access restriction
8.4Access to source code
8.5Secure authentication
8.6Capacity management
8.7Protection against malware
8.8Management of technical vulnerabilities
8.9Configuration management
8.10Information deletion
8.11Data masking
8.12Data leakage prevention
8.13Information backup
8.14Redundancy of information processing facilities
8.15Logging
8.16Monitoring activities
8.17Clock synchronization
8.18Use of privileged utility programs
8.19Installation of software on operational systems
8.20Networks security
8.21Security of network services
8.22Segregation of networks
8.23Web filtering
8.24Use of cryptography
8.25Secure development life cycle
8.26Application security requirements
8.27Secure system architecture and engineering principles
8.28Secure coding
8.29Security testing in development and acceptance
8.30Outsourced development
8.31Separation of development, test and production environments
8.32Change management
8.33Test information
8.34Protection of information systems during audit testing