logo

Database

Security

Requirements

Security Requirements are technology-independent objectives that define the standards and controls to protect systems and data. They establish what is tested, what is considered a weakness, and serve as the basis for evaluating the rigor of a pentest.

21 requirements

Authentication

Standards to ensure secure identity and access management.

Explore requirements

7 requirements

Authorization

Requirements to enforce role-based and least-privilege access.

Explore requirements

17 requirements

Cryptography

Requirements for encryption, hashing, and key management.

Explore requirements

16 requirements

Data

Standards to ensure secure data storage, transfer, and processing.

Explore requirements

13 requirements

Networks

Requirements for segmentation, firewalls, and secure communications.

Explore requirements

12 requirements

Privacy

Requirements to ensure protection of personal and sensitive data.

Explore requirements

2 requirements

Social

Policies to mitigate risks in social engineering and external platforms.

Explore requirements

6 requirements

System

General requirements for OS, middleware, and infrastructure security.

Explore requirements

2 requirements

Virtualization

Standards for securing VMs, hypervisors, and virtual environments.

Explore requirements