-
## Overview
As part of the risk assessment for ISO27001, the possibility of users taking screen captures of the android phone was recognised as a possible risk.
## Control
A possible control of this…
-
### No Code Nedir? :
**temel düzeyde veya hiç kod yazmadan uygulama geliştirmek ve hızlıca kullanıma sunulabilmek için güzel bir yapı. Bu yeni yazılım geliştirme yaklaşımı günümüzde kullanım alanını…
-
**Solicitação da trilha de Cibersegurança/Segurança da Informação**
Acredito que possa ser essencial o TrilhaInfo ter uma trilha dedicada para cibersegurança/segurança da informação, pois apesar de t…
-
**Is your feature request related to a problem? Please describe.**
We have recently introduced automatic secrets scanning with Gitleaks as part of our CI pipelines. Our developers are instructed to r…
ghost updated
3 months ago
-
### ⚠️ Please verify that this feature request has NOT been suggested before.
- [X] I checked and didn't find similar feature request
### 🏷️ Feature Request Type
UI Feature, Other
### 🔖 Feature de…
-
## Overview
One of the risks identified in risk assessment for ISO27001 is the possibility of logging exposing user sensitive data on the phone.
## Control
The control for this risk would be to not …
-
### Summary
SATRE Working group meeting 27th Feb
### Source
Personal Collaboration Cafe input
### Detail
Hope this input helps:
**In summary**
• Accreditation requires this to be recognised…
-
### Summary
Citing how we have formulated the spec from literature
### Source
Convo with stakeholders
### Detail
On a call with a stakeholder today, a good point was raised - if this is…
-
For some use cases it is important to know whether the wallet/agent is released and kept secure in an information security management system (ISMS) with secure wallet delivery as its objective. The mo…
-
# Goal Title
A clear list of requirements and necessary steps that DSH would need to take to be ISO027001 compliant
## Description
This work will include pulling a list of requirements for the specif…