Ensure secure network architecture and management by implementing access controls that detect and prevent unauthorized devices or systems from connecting to the financial entity’s network.
Network connections must be encrypted across all environments whether corporate, public, domestic, third-party, or wireless using appropriate protocols. This should align with the outcomes of data classification and ICT risk assessments.
Additionally, design the network to meet the financial entity’s ICT security requirements, following leading practices that safeguard confidentiality, integrity, and availability.