Identify information processing and data flow. Map the flow of information between work processes, users, devices and services and use the results to establish a secure ICT architecture, see principle 2.2 – Establish a secure ICT architecture.
Organisation must maintain a listing of used data systems and their owners. Owner is responsible for completing the related documentation and possible other security actions directly related to the data system.
Data system documentation must include at least:
Organisation must maintain a listing of controlled data stores and their owners. Owner is responsible for completing the documentation and other possible security actions directly related to the data store.
Data store documentation must include at least:
The organization shall maintain a list of data sets contained in the data stores it manages.
The documentation shall include at least the following information:
Map the flow of information between work processes, users, devices and services. This mapping helps the organisation to understand the flow of information better.
The organization maintains documentation of interfaces and other connections between data system and the data transmission methods used in the interfaces.
The documentation concerning the interfaces shall be reviewed regularly and after significant changes to data systems.