Glossary

No. Type of Malicious Descriptions
1 XSS

Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.

When a malicious script is injected into the code of an otherwise trusted website, allowing potentially sensitive user data such as cookies to be accessed.

2 SQL Injection

SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution.

A successful SQL injection exploit can extract sensitive information like read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system

3 Clickjacking

Clickjacking is a malicious technique of tricking a user into clicking on something different from what the user perceives, thus potentially revealing confidential information.

The attacker can take control of the user computer which can turn system features on and off, such as enabling your microphone and camera when a Javascript prompt asks for permission to access this information. It could also pull location data from your computer or other details that could facilitate future crimes.

4 High Expose to the vulnerability, quite easy to penetrate and compromise, need a skill to perform the attack
5 DDoS

A Distributed Denial-of-Service (DDoS) attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. A DDoS attack uses more than one unique IP address or machines, often from thousands of hosts infected with malware

Simply, the attack will exhaust network resources unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

5 Credential Stuffing

Credential stuffing is a type of cyberattack in which stolen account credentials, typically consisting of lists of usernames and/or email addresses and the corresponding passwords, are used to gain unauthorized access to user accounts through large-scale automated login requests directed against a web application

6 Social Engineering

Social engineering is the psychological manipulation of people into performing actions or divulging confidential information.

These human hacking scams lure unsuspecting users into exposing data, spreading malware infections, or giving access to restricted systems.

Compliance Mapping

NIST

Compliance Best Practises Recommend Document
Policy & Procedure AC - Access Control AT - Awareness & Training AU - Audit & Accountability CA - Assessment, Authorization & Monitoring CM - Configuration Management CP - Contigency Planning IA - Identification & Authentication IR - Incident Response MA - Maintenance PE - Physical & Environmental Protection PL - Planning PM - Project Management PS - Personnel Security PT - PII Processing & Transparency RA - Risk Assessment SA - System & Services Acquisition SC - System & Communication Protection SI - System & Information Integrity SR - Supply Chain Risk Management The organization shall determine duties and areas of responsibility to avoid conflict for unauthorized or unintentional modification or misuse the organization asset. Information security shall be addressed in project management regardless of the type of the project Information Security Policy
Management Involvement PM - Project Management All information security responsibilities shall be defined and allocated. Organization Chart Definition of Security Roles and Responsibilities List of Interested Parties, Legal and Other Requirements Mobile Device Policy Teleworking Policy
Human Resource Security PS - Personnel Security Background verification checks on all candidate for employment shall be carried out accordance with relevant laws, regulations and ethics. The contractual agreements with employees and contractors shall state their and the organizations responsibilities for information security. Management shall require all employees and contractors to apply information security accordance to established policies Human Resource Procedure Human Resource Handbook Job Application Form Employee Application Form
Asset Management CP - Contigency Planning The organization shall identify organizational assets to ensure that information receives an appropriate level of protection in accordance with its improtance to the organization Information Classification and Handling Procedure Media Handling Procedure Asset Inventory List Information/Media Removal Form
Risk Management RA - Risk Assessment The organization shall define and apply information security risk assessment process to ensure the information security management system can achieved its intended outcomes. Risk Assessment and Risk Treatment methodology Risk Treatment Plan Risk Assessment Report
Access Control AC - Access Control The organization shall limit access to information and information processing facilities for safeguarding their authentication information. Access Control Policy Password Policy Access Register Form
Operations CA - Assessment, Authorization, and Monitoring The organization need to establish proper IT Operation Procedure. All the access and backup need to be recorded. Operating procedures for IT management Change Management Process Change Management Form Logs of user activities, exceptions, and security events Logs of System Administrator & System user activities, exceptions, faults and security events Security Metrics Operation Form
Cryptography SC - System & Communication Protection The organization shall ensure proper and effective use of cryptography to protect the confidentiality, authenticity and/or integrity of information. Cryptography policy
Communication Security SC - System & Communication Protection Network access between staff and visitor need to be separated The organization must use email disclaimer in email footer for information transfer security Information Transfer Policy
Application Security SA - System & Services Acquisition SC - System & Communication Protection SI - System & Information Integrity The organization shall ensure that information security is designed and implemented within development lifecycle of information systems. Secure Development Policy Secure System Engineering Principles User Acceptance Testing
Incident Management SC - System & Communication Protection The organization shall established procedures to ensure a quick, effective and orderly response to information security events and weaknesses. Incident management procedure Incident Response Form
Business Continuity IR - Incident Response The organization need to stablish proper backup to ensure information secured and business can continue Business continuity procedures
Physical & Enivironmental Security IR - Incident Response The organization shall prevents an unauthorized physical access to the organizations information that can lead to loss, damage, theft or compromise of assets and interuption to the organizations information Clear desk and clear screen policy Visitor Logbook
Supplier Management PE - Physical & Environmental Protection The organization shall maintain and agreed level of information security and service delivery in line with supplier agreements to ensure protection of the organization assets. NDA Template SLA Agreement Contractor Performance Evaluation Form
Awareness & Training SR - Supply Chain Risk Management All employees of the organization, where relevant, contractors shall receive appropriate awareness education and traing and regular update in organizational policies and procedures as relevant for their job function Training Request Form Security Metric Awareness Form Evidence Competence
Compliance AT - Awareness & Training List out all Malaysia Act that organization need to follow: - Personal Data Protection Act - Minimum Wages Order - Contract Act - Employee Provident Fund - Employee Social Security The policy and procedure need to be reviewed periodically by the organization. Statutory, regulatory, and contractual requirements All policy and procedure

ISO 27001: 2013

Compliance Best Practises Recommend Document
Policy & Procedure A5 Information Security Policies (masukkan sub) The organization shall determine duties and areas of responsibility to avoid conflict for unauthorized or unintentional modification or misuse the organization asset. Information security shall be addressed in project management regardless of the type of the project Information Security Policy
Management Involvement Clause 4 Context of the Organization Clause 5 Leadership A6 Organization of Information Security All information security responsibilities shall be defined and allocated. Organization Chart Definition of Security Roles and Responsibilities List of Interested Parties, Legal and Other Requirements Mobile Device Policy Teleworking Policy
Human Resource Security A7 Human Resource Security Background verification checks on all candidate for employment shall be carried out accordance with relevant laws, regulations and ethics. The contractual agreements with employees and contractors shall state their and the organizations responsibilities for information security. Management shall require all employees and contractors to apply information security accordance to established policies Human Resource Procedure Human Resource Handbook Job Application Form Employee Application Form
Asset Management A8 Asset Management The organization shall identify organizational assets to ensure that information receives an appropriate level of protection in accordance with its improtance to the organization Information Classification and Handling Procedure Media Handling Procedure Asset Inventory List Information/Media Removal Form
Risk Management Clause 6 Planning The organization shall define and apply information security risk assessment process to ensure the information security management system can achieved its intended outcomes. Risk Assessment and Risk Treatment methodology Risk Treatment Plan Risk Assessment Report
Access Control A9 Access Control The organization shall limit access to information and information processing facilities for safeguarding their authentication information. Access Control Policy Password Policy Access Register Form
Operations Clause 8 Operation A12 Operations Security The organization need to establish proper IT Operation Procedure. All the access and backup need to be recorded. Operating procedures for IT management Change Management Process Change Management Form Logs of user activities, exceptions, and security events Logs of System Administrator & System user activities, exceptions, faults and security events Security Metrics Operation Form
Cryptography A10 Cryptography The organization shall ensure proper and effective use of cryptography to protect the confidentiality, authenticity and/or integrity of information. Cryptography policy
Communication Security A13 Communication Security Network access between staff and visitor need to be separated The organization must use email disclaimer in email footer for information transfer security Information Transfer Policy
Application Security A14 System acquisition, development & maintenance The organization shall ensure that information security is designed and implemented within development lifecycle of information systems. Secure Development Policy Secure System Engineering Principles User Acceptance Testing
Incident Management A16 Information security incident management The organization shall established procedures to ensure a quick, effective and orderly response to information security events and weaknesses. Incident management procedure Incident Response Form
Business Continuity A17 Information security aspects of BCM The organization need to stablish proper backup to ensure information secured and business can continue Business continuity procedures
Physical & Enivironmental Security A11 Physical and environmental security The organization shall prevents an unauthorized physical access to the organizations information that can lead to loss, damage, theft or compromise of assets and interuption to the organizations information Clear desk and clear screen policy Visitor Logbook
Supplier Management A15 Supplier relationships The organization shall maintain and agreed level of information security and service delivery in line with supplier agreements to ensure protection of the organization assets. NDA Template SLA Agreement Contractor Performance Evaluation Form
Awareness & Training Clause 7 Support All employees of the organization, where relevant, contractors shall receive appropriate awareness education and traing and regular update in organizational policies and procedures as relevant for their job function Training Request Form Security Metric Awareness Form Evidence Competence
Compliance Clause 9 Performance Evaluation List out all Malaysia Act that organization need to follow: - Personal Data Protection Act - Minimum Wages Order - Contract Act - Employee Provident Fund - Employee Social Security The policy and procedure need to be reviewed periodically by the organization. Statutory, regulatory, and contractual requirements All policy and procedure

KPKT

Compliance Best Practises Recommend Document
Policy & Procedure 5.3.6 Information Security The organization shall determine duties and areas of responsibility to avoid conflict for unauthorized or unintentional modification or misuse the organization asset. Information security shall be addressed in project management regardless of the type of the project Information Security Policy
Management Involvement 5.2 Organization requirement All information security responsibilities shall be defined and allocated. Organization Chart Definition of Security Roles and Responsibilities List of Interested Parties, Legal and Other Requirements Mobile Device Policy Teleworking Policy
Human Resource Security Background verification checks on all candidate for employment shall be carried out accordance with relevant laws, regulations and ethics. The contractual agreements with employees and contractors shall state their and the organizations responsibilities for information security. Management shall require all employees and contractors to apply information security accordance to established policies Human Resource Procedure Human Resource Handbook Job Application Form Employee Application Form
Asset Management 5.3.6 (ii) Guidelines / SOP for Critical Asset 5.3.6 (x) Information classification The organization shall identify organizational assets to ensure that information receives an appropriate level of protection in accordance with its improtance to the organization Information Classification and Handling Procedure Media Handling Procedure Asset Inventory List Information/Media Removal Form
Risk Management 5.3.1 Risk Management 5.3.2 IT Operation - Defence, Security, Capacity Planning Lampiran 1(b) – 8(a) Risk Management The organization shall define and apply information security risk assessment process to ensure the information security management system can achieved its intended outcomes. Risk Assessment and Risk Treatment methodology Risk Treatment Plan Risk Assessment Report
Access Control 5.3.5 Access Control 5.3.6 (vii) Remote access with Multi Factor Authentication Lampiran 1(b) – 8(d) Access Control Lampiran 1(b) – 8(e) Application with multi factor authentication The organization shall limit access to information and information processing facilities for safeguarding their authentication information. Access Control Policy Password Policy Access Register Form
Operations 5.3.2 IT Operation - Defence, Security, Capacity Planning 5.3.6 (ii) Guidelines / SOP for Critical Asset 5.3.6 (ix) Audit Log and Log Retention 5.3.6 (xi) Latest OS and application (server hardening) 5.3.6 (v) Penetration test to System and Network Lampiran 1(b) - 7 Data retention Lampiran 1(b) – 8(c) Security Posture Assessment (SPA) The organization need to establish proper IT Operation Procedure. All the access and backup need to be recorded. Operating procedures for IT management Change Management Process Change Management Form Logs of user activities, exceptions, and security events Logs of System Administrator & System user activities, exceptions, faults and security events Security Metrics Operation Form
Cryptography 5.1.3 Digital Signature – PKI based 5.3.3 Cryptography The organization shall ensure proper and effective use of cryptography to protect the confidentiality, authenticity and/or integrity of information. Cryptography policy
Communication Security Lampiran 1(b) - 3(b) Domain info Lampiran 1(b) - 3(c) Server location Lampiran 1(b) - 7 Data retention Network access between staff and visitor need to be separated The organization must use email disclaimer in email footer for information transfer security Information Transfer Policy
Application Security 5.3.1 System development Lampiran 1(b) - 8(b) Functional Test & Performance Test The organization shall ensure that information security is designed and implemented within development lifecycle of information systems. Secure Development Policy Secure System Engineering Principles User Acceptance Testing
Incident Management 5.3.7 Continuous Monitoring / Incident Reporting / Business Continuity & Disaster Recovery The organization shall established procedures to ensure a quick, effective and orderly response to information security events and weaknesses. Incident management procedure Incident Response Form
Business Continuity 5.3.7 Continuous Monitoring / Incident Reporting / Business Continuity & Disaster Recovery The organization need to stablish proper backup to ensure information secured and business can continue Business continuity procedures
Physical & Enivironmental Security 5.3.6 (iii) Physical security The organization shall prevents an unauthorized physical access to the organizations information that can lead to loss, damage, theft or compromise of assets and interuption to the organizations information Clear desk and clear screen policy Visitor Logbook
Supplier Management 5.3.3 Supplier Management – PDPA Compliance The organization shall maintain and agreed level of information security and service delivery in line with supplier agreements to ensure protection of the organization assets. NDA Template SLA Agreement Contractor Performance Evaluation Form
Awareness & Training All employees of the organization, where relevant, contractors shall receive appropriate awareness education and traing and regular update in organizational policies and procedures as relevant for their job function Training Request Form Security Metric Awareness Form Evidence Competence
Compliance 5.4 KPKT Audit Lampiran 1(b) – 8(g) Internal Audit as ISMS compliance Lampiran 1(b) – 8(h) Risk management towards interoperability, scalability and sustainability Lampiran 1(b) – 8(f) Digital Certificates from SKMM Licensed Certification Bodies Lampiran 1(b) – 9 Personal Data Protection List out all Malaysia Act that organization need to follow: - Personal Data Protection Act - Minimum Wages Order - Contract Act - Employee Provident Fund - Employee Social Security The policy and procedure need to be reviewed periodically by the organization. Statutory, regulatory, and contractual requirements All policy and procedure

RMIT

Compliance Best Practises Recommend Document
Policy & Procedure Part B: 8 - Governance Part B: 9 - Technology Risk Management Part B: 10 - Technology Operations Management Part B: 11 - Cybersecurity Management Part B: 12 - Technology Audit Part B: 13 - Internal Awareness & Training The organization shall determine duties and areas of responsibility to avoid conflict for unauthorized or unintentional modification or misuse the organization asset. Information security shall be addressed in project management regardless of the type of the project Information Security Policy
Management Involvement Part B: 8 Governance - Responsibilities of the Board of Directors Part B: 8 Governance - Responsibilities of the senior management All information security responsibilities shall be defined and allocated. Organization Chart Definition of Security Roles and Responsibilities List of Interested Parties, Legal and Other Requirements Mobile Device Policy Teleworking Policy
Human Resource Security Part B:: 8 Governance - Responsibilities of the senior management Background verification checks on all candidate for employment shall be carried out accordance with relevant laws, regulations and ethics. The contractual agreements with employees and contractors shall state their and the organizations responsibilities for information security. Management shall require all employees and contractors to apply information security accordance to established policies Human Resource Procedure Human Resource Handbook Job Application Form Employee Application Form
Asset Management Part B: 11- Cybersecurity Management - Data Loss Prevention (DLP) Appendix 1 - Storage and Transportation of Sensitive Data in Removable Media The organization shall identify organizational assets to ensure that information receives an appropriate level of protection in accordance with its improtance to the organization Information Classification and Handling Procedure Media Handling Procedure Asset Inventory List Information/Media Removal Form
Risk Management Part B: 9 Technology Risk Management Part C: 15 Assessment & Gap Analysis Appendix 7 Risk Assessment Report The organization shall define and apply information security risk assessment process to ensure the information security management system can achieved its intended outcomes. Risk Assessment and Risk Treatment methodology Risk Treatment Plan Risk Assessment Report
Access Control Part B: 10 - Technology Operations Management - Access Control Part B: 10 - Technology Operations Management - Security of Digital Services Appendix 3 Control Measures on Internet Banking The organization shall limit access to information and information processing facilities for safeguarding their authentication information. Access Control Policy Password Policy Access Register Form
Operations Part B: 11 - Cybersecurity Management - Cybersecurity operations Part B: 10 - Technology Operations Management - Patch and End-of-Life System Management Appendix 2 Control Measures on Self-service Terminals (SSTs) Appendix 5 Control Measures on Cybersecurity Appendix 7 Risk Assessment Report The organization need to establish proper IT Operation Procedure. All the access and backup need to be recorded. Operating procedures for IT management Change Management Process Change Management Form Logs of user activities, exceptions, and security events Logs of System Administrator & System user activities, exceptions, faults and security events Security Metrics Operation Form
Cryptography Part B: 10 - Technology Operations Management - Cryptography Appendix 2 Control Measures on Self-service Terminals (SSTs) The organization shall ensure proper and effective use of cryptography to protect the confidentiality, authenticity and/or integrity of information. Cryptography policy
Communication Security Part B: 10 - Technology Operations Management - Network Resilience Network access between staff and visitor need to be separated The organization must use email disclaimer in email footer for information transfer security Information Transfer Policy
Application Security Part B: 10 - Technology Operations Management - System Development & Acquisition Appendix 4 Control Measures on Mobile Application and Devices The organization shall ensure that information security is designed and implemented within development lifecycle of information systems. Secure Development Policy Secure System Engineering Principles User Acceptance Testing
Incident Management Part B: 11- Cybersecurity Management - Cyber Response & Recovery The organization shall established procedures to ensure a quick, effective and orderly response to information security events and weaknesses. Incident management procedure Incident Response Form
Business Continuity Part B: 11- Cybersecurity Management - Cyber Response & Recovery The organization need to stablish proper backup to ensure information secured and business can continue Business continuity procedures
Physical & Enivironmental Security Part B: 10 - Technology Operations Management - Data Centre Resilience The organization shall prevents an unauthorized physical access to the organizations information that can lead to loss, damage, theft or compromise of assets and interuption to the organizations information Clear desk and clear screen policy Visitor Logbook
Supplier Management Part B: 10 - Technology Operations Management - Third Party Service Provider Management Appendix 9 Supervisory Expectations on External Party Assurance The organization shall maintain and agreed level of information security and service delivery in line with supplier agreements to ensure protection of the organization assets. NDA Template SLA Agreement Contractor Performance Evaluation Form
Awareness & Training Part B: 13 Internal Awareness and Training All employees of the organization, where relevant, contractors shall receive appropriate awareness education and traing and regular update in organizational policies and procedures as relevant for their job function Training Request Form Security Metric Awareness Form Evidence Competence
Compliance Part B: 12 Technology Audit List out all Malaysia Act that organization need to follow: - Personal Data Protection Act - Minimum Wages Order - Contract Act - Employee Provident Fund - Employee Social Security The policy and procedure need to be reviewed periodically by the organization. Statutory, regulatory, and contractual requirements All policy and procedure

PCI DSS 3.2.1

Compliance Best Practises Recommend Document
Policy & Procedure Requirement 7: Restrict access to cardholder data by business need-to-know Requirement 12: Maintain a policy that addresses information security for all personnel The organization shall determine duties and areas of responsibility to avoid conflict for unauthorized or unintentional modification or misuse the organization asset. Information security shall be addressed in project management regardless of the type of the project Information Security Policy
Management Involvement Requirement 12: Maintain a policy that addresses information security for all personnel All information security responsibilities shall be defined and allocated. Organization Chart Definition of Security Roles and Responsibilities List of Interested Parties, Legal and Other Requirements Mobile Device Policy Teleworking Policy
Human Resource Security Requirement 12: Maintain a policy that addresses information security for all personnel Background verification checks on all candidate for employment shall be carried out accordance with relevant laws, regulations and ethics. The contractual agreements with employees and contractors shall state their and the organizations responsibilities for information security. Management shall require all employees and contractors to apply information security accordance to established policies Human Resource Procedure Human Resource Handbook Job Application Form Employee Application Form
Asset Management Requirement 9: Restrict physical access to cardholder data. The organization shall identify organizational assets to ensure that information receives an appropriate level of protection in accordance with its improtance to the organization Information Classification and Handling Procedure Media Handling Procedure Asset Inventory List Information/Media Removal Form
Risk Management Requirement 11: Regularly test security systems and processes. The organization shall define and apply information security risk assessment process to ensure the information security management system can achieved its intended outcomes. Risk Assessment and Risk Treatment methodology Risk Treatment Plan Risk Assessment Report
Access Control Requirement 12: Maintain a policy that addresses information security for all personnel The organization shall limit access to information and information processing facilities for safeguarding their authentication information. Access Control Policy Password Policy Access Register Form
Operations Requirement 5: Use and regularly update anti-virus software or programs Requirement 9: Restrict physical access to cardholder data. Requirement 10: Track and monitor all access to network resources and cardholder data. Requirement 11: Regularly test security systems and processes. The organization need to establish proper IT Operation Procedure. All the access and backup need to be recorded. Operating procedures for IT management Change Management Process Change Management Form Logs of user activities, exceptions, and security events Logs of System Administrator & System user activities, exceptions, faults and security events Security Metrics Operation Form
Cryptography Requirement 4: Encrypt transmission of cardholder data across open, public networks The organization shall ensure proper and effective use of cryptography to protect the confidentiality, authenticity and/or integrity of information. Cryptography policy
Communication Security Requirement 1: Install and maintain a firewall configuration to protect cardholder data. Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters Requirement 10: Track and monitor all access to network resources and cardholder data. Network access between staff and visitor need to be separated The organization must use email disclaimer in email footer for information transfer security Information Transfer Policy
Application Security Requirement 6: Develop and maintain secure systems and applications Requirement 11: Regularly test security systems and processes. The organization shall ensure that information security is designed and implemented within development lifecycle of information systems. Secure Development Policy Secure System Engineering Principles User Acceptance Testing
Incident Management Requirement 3: Protect stored cardholder data Requirement 12: Maintain a policy that addresses information security for all personnel The organization shall established procedures to ensure a quick, effective and orderly response to information security events and weaknesses. Incident management procedure Incident Response Form
Business Continuity Requirement 12: Maintain a policy that addresses information security for all personnel The organization need to stablish proper backup to ensure information secured and business can continue Business continuity procedures
Physical & Enivironmental Security Requirement 9: Restrict physical access to cardholder data. The organization shall prevents an unauthorized physical access to the organizations information that can lead to loss, damage, theft or compromise of assets and interuption to the organizations information Clear desk and clear screen policy Visitor Logbook
Supplier Management Requirement 12: Maintain a policy that addresses information security for all personnel The organization shall maintain and agreed level of information security and service delivery in line with supplier agreements to ensure protection of the organization assets. NDA Template SLA Agreement Contractor Performance Evaluation Form
Awareness & Training Requirement 12: Maintain a policy that addresses information security for all personnel All employees of the organization, where relevant, contractors shall receive appropriate awareness education and traing and regular update in organizational policies and procedures as relevant for their job function Training Request Form Security Metric Awareness Form Evidence Competence
Compliance Requirement 3: Protect stored cardholder data List out all Malaysia Act that organization need to follow: - Personal Data Protection Act - Minimum Wages Order - Contract Act - Employee Provident Fund - Employee Social Security The policy and procedure need to be reviewed periodically by the organization. Statutory, regulatory, and contractual requirements All policy and procedure

PCI DSS 4.0

Compliance Best Practises Recommend Document
Policy & Procedure Requirement 7: Restrict Access to System Components and Cardholder Data by Business Need to Know Requirement 12: Support Information Security with Organizational Policies and Programs The organization shall determine duties and areas of responsibility to avoid conflict for unauthorized or unintentional modification or misuse the organization asset. Information security shall be addressed in project management regardless of the type of the project Information Security Policy
Management Involvement Requirement 12: Support Information Security with Organizational Policies and Programs All information security responsibilities shall be defined and allocated. Organization Chart Definition of Security Roles and Responsibilities List of Interested Parties, Legal and Other Requirements Mobile Device Policy Teleworking Policy
Human Resource Security Requirement 12: Support Information Security with Organizational Policies and Programs Background verification checks on all candidate for employment shall be carried out accordance with relevant laws, regulations and ethics. The contractual agreements with employees and contractors shall state their and the organizations responsibilities for information security. Management shall require all employees and contractors to apply information security accordance to established policies Human Resource Procedure Human Resource Handbook Job Application Form Employee Application Form
Asset Management Requirement 9: Restrict Physical Access to Cardholder Data The organization shall identify organizational assets to ensure that information receives an appropriate level of protection in accordance with its improtance to the organization Information Classification and Handling Procedure Media Handling Procedure Asset Inventory List Information/Media Removal Form
Risk Management Requirement 11: Test Security of Systems and Networks Regularly The organization shall define and apply information security risk assessment process to ensure the information security management system can achieved its intended outcomes. Risk Assessment and Risk Treatment methodology Risk Treatment Plan Risk Assessment Report
Access Control Requirement 12: Support Information Security with Organizational Policies and Programs The organization shall limit access to information and information processing facilities for safeguarding their authentication information. Access Control Policy Password Policy Access Register Form
Operations Requirement 5: Protect All Systems and Networks from Malicious Software Requirement 10: Log and Monitor All Access to System Components and Cardholder Data Requirement 11: Test Security of Systems and Networks Regularly The organization need to establish proper IT Operation Procedure. All the access and backup need to be recorded. Operating procedures for IT management Change Management Process Change Management Form Logs of user activities, exceptions, and security events Logs of System Administrator & System user activities, exceptions, faults and security events Security Metrics Operation Form
Cryptography Requirement 4: Protect Cardholder Data with Strong Cryptography During Transmission Over Open, Public Networks The organization shall ensure proper and effective use of cryptography to protect the confidentiality, authenticity and/or integrity of information. Cryptography policy
Communication Security Requirement 1: Install and maintain network security controls Requirement 2: Apply Secure Configurations to All System Components Network access between staff and visitor need to be separated The organization must use email disclaimer in email footer for information transfer security Information Transfer Policy
Application Security Requirement 6: Develop and Maintain Secure Systems and Software Requirement 11: Test Security of Systems and Networks Regularly The organization shall ensure that information security is designed and implemented within development lifecycle of information systems. Secure Development Policy Secure System Engineering Principles User Acceptance Testing
Incident Management Requirement 3: Protect Stored Account Data Requirement 12: Support Information Security with Organizational Policies and Programs The organization shall established procedures to ensure a quick, effective and orderly response to information security events and weaknesses. Incident management procedure Incident Response Form
Business Continuity Requirement 12: Support Information Security with Organizational Policies and Programs The organization need to stablish proper backup to ensure information secured and business can continue Business continuity procedures
Physical & Enivironmental Security Requirement 9: Restrict Physical Access to Cardholder Data The organization shall prevents an unauthorized physical access to the organizations information that can lead to loss, damage, theft or compromise of assets and interuption to the organizations information Clear desk and clear screen policy Visitor Logbook
Supplier Management Requirement 12: Support Information Security with Organizational Policies and Programs The organization shall maintain and agreed level of information security and service delivery in line with supplier agreements to ensure protection of the organization assets. NDA Template SLA Agreement Contractor Performance Evaluation Form
Awareness & Training Requirement 12: Support Information Security with Organizational Policies and Programs All employees of the organization, where relevant, contractors shall receive appropriate awareness education and traing and regular update in organizational policies and procedures as relevant for their job function Training Request Form Security Metric Awareness Form Evidence Competence
Compliance Requirement 3: Protect Stored Account Data List out all Malaysia Act that organization need to follow: - Personal Data Protection Act - Minimum Wages Order - Contract Act - Employee Provident Fund - Employee Social Security The policy and procedure need to be reviewed periodically by the organization. Statutory, regulatory, and contractual requirements All policy and procedure

What is Security Header?

Headers are part of the HTTP specification, defining the metadata of the message in both the HTTP request and response. While the HTTP message body is often meant to be read by the user, metadata is processed exclusively by the web browser and has been included in HTTP protocol since version 1.0.

Why is Security Header Important?

User will only see a graphical interface on any website (no.1 and no.4 in the graphic), but between your browser and web server, the HTTP Request and HTTP Response (no. 2 and no.3 in the graphic) play an important role. While request, the good web server should include proper security header in HTTP response to ensure the connection is secure and intact.

What is SSL?

SSL is a HTTP with Secure Socket Layer implemented or HTTPS. The Primary reason why SSL is used is to keep sensitive information sent across the Internet encrypted so that only the intended recipient can access it. This is important because the information you send on the Internet is passed from computer to computer to get to the destination server.

Why is SSL Important?

The primary reason why SSL is used is to keep sensitive information sent across the Internet encrypted so that only the intended recipient can access it. This is important because the information you send on the Internet is passed from computer to computer to get to the destination server.