diff --git a/C16-Security.md b/C16-Security.md index 48c9073..a707a77 100644 --- a/C16-Security.md +++ b/C16-Security.md @@ -1,3 +1,5 @@ +## Technical Infrastructure +## C16.1 the levels of security required for differnt data and metadata and environments, and how these are supportet For supporting the levels of the required security for data, metadata and environments we have implemented a multi-layered approach to security, which includes physical, technical and administrative controls. Physical controls involve securing access points, restricting visitor access, and monitoring who enters the premises. Strong encryption, a firewall and an antivirus software are used for technical control to secure networks. Administrative controls involve developing security policies and procedures, training employees, and conducting regular security audits.