|
1. Políticas de Análise de Riscos e Segurança
Avaliação regular de riscos e medidas de segurança
|
- 5.1 - Policies for Information Security
- 5.7 - Threat Intelligence (NOVO 2022)
- 8.8 - Management of Technical Vulnerabilities
- 5.35 - Independent Review of Information Security
|
- GV.RM - Risk Management Strategy
- GV.PO - Policy
- ID.RA - Risk Assessment
- GV.OV - Oversight
|
|
2. Tratamento de Incidentes
Gestão e notificação de incidentes (24h/72h/30d)
|
- 5.24 - Incident Management Planning and Preparation
- 5.25 - Assessment and Decision on Information Security Events
- 5.26 - Response to Information Security Incidents
- 5.27 - Learning from Information Security Incidents
- 5.28 - Collection of Evidence
- 6.8 - Information Security Event Reporting
|
- DE.CM - Continuous Monitoring
- DE.AE - Adverse Event Analysis
- RS.MA - Incident Management
- RS.AN - Incident Analysis
- RS.CO - Incident Response Reporting
- RS.MI - Incident Mitigation
|
|
3. Continuidade de Negócio e Gestão de Crises
Planos de continuidade, backup e recuperação
|
- 5.29 - Information Security During Disruption
- 5.30 - ICT Readiness for Business Continuity (NOVO 2022)
- 8.13 - Information Backup
- 8.14 - Redundancy of Information Processing Facilities
|
- PR.IR - Technology Infrastructure Resilience
- RC.RP - Incident Recovery Plan Execution
- RC.CO - Incident Recovery Communication
|
|
4. Segurança da Cadeia de Abastecimento
Avaliação de segurança de fornecedores e supply chain
|
- 5.19 - Information Security in Supplier Relationships
- 5.20 - Addressing Information Security Within Supplier Agreements
- 5.21 - Managing Information Security in the ICT Supply Chain
- 5.22 - Monitoring, Review and Change Management of Supplier Services
- 5.23 - Information Security for Use of Cloud Services (NOVO 2022)
|
- GV.SC - Cybersecurity Supply Chain Risk Management
- ID.AM - Asset Management
- ID.RA - Risk Assessment
|
|
5. Segurança na Aquisição e Desenvolvimento
Secure by design, SDLC seguro
|
- 8.25 - Secure Development Life Cycle
- 8.26 - Application Security Requirements
- 8.27 - Secure System Architecture and Engineering Principles
- 8.28 - Secure Coding (NOVO 2022)
- 8.29 - Security Testing in Development and Acceptance
- 8.30 - Outsourced Development
- 8.31 - Separation of Development, Test and Production
|
- PR.PS - Platform Security
- GV.SC - Supply Chain Risk Management
- ID.IM - Improvement
|
|
6. Gestão de Vulnerabilidades
Identificação, avaliação e correção de vulnerabilidades
|
- 8.8 - Management of Technical Vulnerabilities
- 8.19 - Installation of Software on Operational Systems
- 8.32 - Change Management
- 5.7 - Threat Intelligence (NOVO 2022)
|
- ID.RA - Risk Assessment
- DE.CM - Continuous Monitoring
- RS.MI - Incident Mitigation
- ID.IM - Improvement
|
|
7. Políticas e Procedimentos (Higiene Cibernética)
Boas práticas básicas de segurança
|
- 5.36 - Compliance with Policies, Rules and Standards
- 5.37 - Documented Operating Procedures
- 6.3 - Information Security Awareness, Education and Training
- 7.7 - Clear Desk and Clear Screen
- 8.1 - User Endpoint Devices
- 8.7 - Protection Against Malware
|
- GV.PO - Policy
- PR.AT - Awareness and Training
- PR.PS - Platform Security
- PR.DS - Data Security
|
|
8. Criptografia
Proteção de dados em trânsito e em repouso
|
- 8.24 - Use of Cryptography
- 5.14 - Information Transfer
- 8.11 - Data Masking (NOVO 2022)
|
- PR.DS - Data Security
- PR.PS - Platform Security
|
|
9. Segurança de Recursos Humanos
Controlo de acesso e formação de colaboradores
|
- 6.1 - Screening
- 6.2 - Terms and Conditions of Employment
- 6.3 - Information Security Awareness, Education and Training
- 6.4 - Disciplinary Process
- 6.5 - Responsibilities After Termination
- 6.6 - Confidentiality or Non-Disclosure Agreements
- 6.7 - Remote Working
|
- GV.RR - Roles, Responsibilities, and Authorities
- PR.AT - Awareness and Training
- PR.AA - Identity Management and Access Control
|
|
10. Controlo de Acesso e Gestão de Ativos
MFA, gestão de identidades, inventário de ativos
|
- 5.9 - Inventory of Information and Other Associated Assets
- 5.15 - Access Control
- 5.16 - Identity Management
- 5.17 - Authentication Information
- 5.18 - Access Rights
- 8.2 - Privileged Access Rights
- 8.3 - Information Access Restriction
- 8.5 - Secure Authentication
- 8.10 - Information Deletion (NOVO 2022)
- 8.12 - Data Leakage Prevention (NOVO 2022)
|
- ID.AM - Asset Management
- PR.AA - Identity Management, Authentication and Access Control
- PR.DS - Data Security
|