Line 80:
Line 80:
* <i><u> Only handle data which is essential to your service. Do not store all data that you capture unless absolutely necessary</i></u>
* <i><u> Only handle data which is essential to your service. Do not store all data that you capture unless absolutely necessary</i></u>
* Ensure data is stored in a secure manner in accordance with <I><u>CSE approved cryptographic algorithms and protocols</I></u> and <I><u>legislation such as</I></u> the Privacy Act
* Ensure data is stored in a secure manner in accordance with <I><u>CSE approved cryptographic algorithms and protocols</I></u> and <I><u>legislation such as</I></u> the Privacy Act
−
* <I><u>Retain data fro the minimum time necessary.</u></I> Follow existing retention and disposition schedules
+
* <I><u>Retain data for the minimum time necessary.</u></I> Follow existing retention and disposition schedules
* Ensure data is stored in a way to facilitate easy data discoverability, accessibility and interoperability
* Ensure data is stored in a way to facilitate easy data discoverability, accessibility and interoperability
Line 159:
Line 159:
* Apply a defense in depth approach to reduce exposure to threats and minimize the degree of compromise.
* Apply a defense in depth approach to reduce exposure to threats and minimize the degree of compromise.
* Design services that:
* Design services that:
−
i. Prioritize ease of use in security design to make security simple for users;
+
** Prioritize ease of use in security design to make security simple for users;
−
ii. Protected from common security vulnerabilities;
+
** Protected from common security vulnerabilities;
−
iii. Expose and secure only the interfaces necessary to operate the service;
+
** Expose and secure only the interfaces necessary to operate the service;
−
iv. Are resilient and can be rebuilt quickly to a known clean state in the event that a compromise is detected; and
+
** Are resilient and can be rebuilt quickly to a known clean state in the event that a compromise is detected; and
−
v. Fail secure even if the system encounters an error or crashes.
+
** Fail secure even if the system encounters an error or crashes.
* Integrate and automate security testing to validate code and address vulnerabilities prior to deployment
* Integrate and automate security testing to validate code and address vulnerabilities prior to deployment
* Reduce human intervention and maximize automation of security tasks and processes.
* Reduce human intervention and maximize automation of security tasks and processes.