Skip to main content
Data Source
Sheet
10 sheets available
Search & Filter
Search controls and filter by compliance status
28 controls found
Results: 28(from sheet: Acceptable Use)
Use ministry information systems only for authorized official purposes
CHK-AU-001

5.1 Authorized and Responsible Use

Ensure individual accountability for all actions performed using ministry systems
CHK-AU-002

4 Policy Principles – Individual Accountability

Apply least privilege access to all ministry systems and information
CHK-AU-003

4 Policy Principles – Least Privilege

Protect confidentiality, integrity, and availability of ministry information assets
CHK-AU-004

4 Policy Principles – Protection of Information Assets

Prohibit bypassing or disabling security controls
CHK-AU-005

5.3 Prohibition of Security Control Circumvention

Report cybersecurity incidents immediately
CHK-AU-006

5.4 Incident Reporting and Cooperation

Ensure all system usage is logged and auditable
CHK-AU-007

5.5 Accountability and Auditability

Require users to acknowledge acceptable use policy and security awareness training
CHK-AU-008

5.6 Policy Awareness and Acknowledgment

Allow access only from ministry-issued or authorized endpoint devices
CHK-AU-009

6.1 Authorized Devices

Lock or log off endpoint devices when unattended
CHK-AU-010

6.2 Endpoint Security and User Responsibilities

Prevent installation or use of unauthorized software and hardware
CHK-AU-011

6.3 Software and Hardware Restrictions

Report loss or theft of endpoint devices immediately
CHK-AU-012

6.4 Loss, Theft, and Compromise

Protect authentication credentials and prohibit sharing
CHK-AU-013

7 Passwords and Credentials Use

Use internet and email services for authorized professional purposes only
CHK-AU-014

8.1 Authorized and Professional Use

Block access to illegal or inappropriate online content
CHK-AU-015

8.2 Prohibited Activities

Report phishing or suspicious messages immediately
CHK-AU-016

8.3 Email and Messaging Security

Monitor communication systems for compliance and security
CHK-AU-017

8.4 Monitoring and Auditability

Prevent activities that degrade system performance
CHK-AU-018

8.5 Performance and Resource Protection

Restrict use of unapproved cloud services
CHK-AU-019

9 Cloud Services and External Hosting Use

Authorize and encrypt removable media before use
CHK-AU-020

10 Removable Media and Data Transfer

Prevent unauthorized data transfer to external devices
CHK-AU-021

10.3 Data Transfer Restrictions

Securely handle and dispose of printed or physical information
CHK-AU-022

13 Printing and Physical Handling

Apply clean desk and secure office practices
CHK-AU-023

14 Clean Desk and Secure Office Behavior

Use only ministry-approved video conferencing and communication tools
CHK-AU-024

15 Video Conferencing and Approved Communication Tools

Showing 1 to 24 of 28 results

Page 1 of 2