Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including inter alia as appropriate: (a) the pseudonymisation and encryption of personal data; (b) the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services; (c) the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident; (d) a process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing.
- AST-01 - Asset Governance
- BCD-01 - Business Continuity Management System (BCMS)
- CAP-01 - Capacity & Performance Management
- CFG-01 - Configuration Management Program
- CHG-01 - Change Management Program
- CLD-01 - Cloud Services
- CPL-01 - Statutory, Regulatory & Contractual Compliance
- CRY-01 - Use of Cryptographic Controls
- DCH-01 - Data Protection
- EMB-01 - Embedded Technology Security Program
- END-01 - Endpoint Security
- GOV-01 - Cybersecurity & Data Protection Governance Program
- GOV-02 - Publishing Cybersecurity & Data Protection Documentation
- GOV-03 - Periodic Review & Update of Cybersecurity & Data Protection Program
- HRS-01 - Human Resources Security Management
- HRS-04 - Personnel Screening
- IAC-01 - Identity & Access Management (IAM)
- IAO-01 - Information Assurance (IA) Operations
- IRO-01 - Incident Response Operations
- MNT-01 - Maintenance Operations
- MON-01 - Continuous Monitoring
- NET-01 - Network Security Controls (NSC)
- OPS-01 - Operations Security
- PES-01 - Physical & Environmental Protections
- PRI-01 - Data Privacy Program
- PRI-08 - Testing, Training & Monitoring
- PRM-01 - Cybersecurity & Data Privacy Portfolio Management
- RSK-01 - Risk Management Program
- SAT-01 - Cybersecurity & Data Privacy-Minded Workforce
- SEA-01 - Secure Engineering Principles
- SEA-01.1 - Centralized Management of Cybersecurity & Data Privacy Controls
- TDA-01 - Technology Development & Acquisition
- THR-01 - Threat Intelligence Program
- TPM-01 - Third-Party Management
- VPM-01 - Vulnerability & Patch Management Program (VPMP)
- WEB-01 - Web Security
- WEB-02 - Use of Demilitarized Zones (DMZ)
In assessing the appropriate level of security account shall be taken in particular of the risks that are presented by processing, in particular from accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to personal data transmitted, stored or otherwise processed.
- AST-01 - Asset Governance
- BCD-01 - Business Continuity Management System (BCMS)
- CAP-01 - Capacity & Performance Management
- CFG-01 - Configuration Management Program
- CHG-01 - Change Management Program
- CLD-01 - Cloud Services
- CPL-01 - Statutory, Regulatory & Contractual Compliance
- CRY-01 - Use of Cryptographic Controls
- DCH-01 - Data Protection
- EMB-01 - Embedded Technology Security Program
- END-01 - Endpoint Security
- GOV-01 - Cybersecurity & Data Protection Governance Program
- GOV-02 - Publishing Cybersecurity & Data Protection Documentation
- GOV-03 - Periodic Review & Update of Cybersecurity & Data Protection Program
- HRS-01 - Human Resources Security Management
- HRS-04 - Personnel Screening
- IAC-01 - Identity & Access Management (IAM)
- IAO-01 - Information Assurance (IA) Operations
- IRO-01 - Incident Response Operations
- MNT-01 - Maintenance Operations
- MON-01 - Continuous Monitoring
- NET-01 - Network Security Controls (NSC)
- OPS-01 - Operations Security
- PES-01 - Physical & Environmental Protections
- PRI-01 - Data Privacy Program
- PRI-08 - Testing, Training & Monitoring
- PRM-01 - Cybersecurity & Data Privacy Portfolio Management
- RSK-01 - Risk Management Program
- SAT-01 - Cybersecurity & Data Privacy-Minded Workforce
- SEA-01 - Secure Engineering Principles
- SEA-01.1 - Centralized Management of Cybersecurity & Data Privacy Controls
- TDA-01 - Technology Development & Acquisition
- THR-01 - Threat Intelligence Program
- TPM-01 - Third-Party Management
- VPM-01 - Vulnerability & Patch Management Program (VPMP)
- WEB-01 - Web Security
- WEB-02 - Use of Demilitarized Zones (DMZ)
Adherence to an approved code of conduct as referred to in Article 40 or an approved certification mechanism as referred to in Article 42 may be used as an element by which to demonstrate compliance with the requirements set out in paragraph 1 of this Article.
- CPL-01 - Statutory, Regulatory & Contractual Compliance
- CPL-03 - Cybersecurity & Data Protection Assessments
- GOV-01 - Cybersecurity & Data Protection Governance Program
- GOV-02 - Publishing Cybersecurity & Data Protection Documentation
- GOV-03 - Periodic Review & Update of Cybersecurity & Data Protection Program
- IAO-01 - Information Assurance (IA) Operations
- PRI-01 - Data Privacy Program
The controller and processor shall take steps to ensure that any natural person acting under the authority of the controller or the processor who has access to personal data does not process them except on instructions from the controller, unless he or she is required to do so by Union or Member State law.
- CPL-01 - Statutory, Regulatory & Contractual Compliance
- GOV-01 - Cybersecurity & Data Protection Governance Program
- GOV-02 - Publishing Cybersecurity & Data Protection Documentation
- GOV-03 - Periodic Review & Update of Cybersecurity & Data Protection Program
- HRS-01 - Human Resources Security Management
- HRS-04 - Personnel Screening
- PRI-01 - Data Privacy Program
- SAT-01 - Cybersecurity & Data Privacy-Minded Workforce