Elements and Performance Criteria
- Identify appropriate security for digital devices
- Create and maintain register of digital devices on organisation’s network
- Confirm what information is held on the registered devices
- Categorise level of risk associated with each device based on sensitivity of information stored
- Select required security protocol to manage level of risk associated with each device
- Apply protection strategies to digital devices
- Evaluate effectiveness of applied protection strategies
- Patch software across multiple devices