Information and Communication Technology - Guideline 40. Security in database systems
The institution incorporates security measures in its database systems, especially those storing critical data.
This involves: database administration procedures and practices; system accounts, privileges and roles; identification of users of applications; and database infrastructure.
This content is available for ISSA members only.
Please login to your My ISSA to access this page.
Login