Date: Jan 4, 2024, 8:41:18 AM
Date: Jan 4, 2024, 8:48:44 AM
Name: TKG-SiKa2.0
Name: TKG-SiKa2.0
Description: Catalogue of security requirements for the operation of
telecommunications and data processing systems and for
the processing of personal data in Germany
Description: Catalogue of security requirements for the operation of
telecommunications and data processing systems and for
the processing of personal data in Germany
f | 1 | { | f | 1 | { |
2 | "label": "TKG-SiKa2.0", | 2 | "label": "TKG-SiKa2.0", | ||
3 | "language": "DE", | 3 | "language": "DE", | ||
4 | "uuid": "3547ca1d-abbf-42e3-8a43-b5afbee19595", | 4 | "uuid": "3547ca1d-abbf-42e3-8a43-b5afbee19595", | ||
5 | "values": [ | 5 | "values": [ | ||
6 | { | 6 | { | ||
7 | "category": "3.1.1 Organisations- und Risikomanagement", | 7 | "category": "3.1.1 Organisations- und Risikomanagement", | ||
8 | "code": "SK.3.1.1-1", | 8 | "code": "SK.3.1.1-1", | ||
9 | "label": "verbindliches Verfahren, um Risiken für Netzwerke, Dienste und die Verarbeitung personenbezogener Daten zu erkennen", | 9 | "label": "verbindliches Verfahren, um Risiken für Netzwerke, Dienste und die Verarbeitung personenbezogener Daten zu erkennen", | ||
10 | "referential": "da9049cd-ddc6-4efd-abac-375987e2e4ef", | 10 | "referential": "da9049cd-ddc6-4efd-abac-375987e2e4ef", | ||
11 | "referential_label": "", | 11 | "referential_label": "", | ||
12 | "uuid": "9108ec85-c6d4-437a-b73b-52aa661c6398" | 12 | "uuid": "9108ec85-c6d4-437a-b73b-52aa661c6398" | ||
13 | }, | 13 | }, | ||
14 | { | 14 | { | ||
15 | "category": "3.1.2 Sicherheitsrollen und Verantwortlichkeiten", | 15 | "category": "3.1.2 Sicherheitsrollen und Verantwortlichkeiten", | ||
16 | "code": "SK.3.1.2-1", | 16 | "code": "SK.3.1.2-1", | ||
17 | "label": "Benennung des Sicherheitsbeauftragten nach § 109 Abs. 4 TKG", | 17 | "label": "Benennung des Sicherheitsbeauftragten nach § 109 Abs. 4 TKG", | ||
18 | "referential": "eee4f162-2a0e-4906-ad47-d077e44c90bc", | 18 | "referential": "eee4f162-2a0e-4906-ad47-d077e44c90bc", | ||
19 | "referential_label": "", | 19 | "referential_label": "", | ||
20 | "uuid": "42bd212e-d5fb-4b0b-8ab4-73b798cfd01e" | 20 | "uuid": "42bd212e-d5fb-4b0b-8ab4-73b798cfd01e" | ||
t | t | 21 | }, | ||
22 | { | ||||
23 | "category": "3.1.3 Lieferantenmanagement", | ||||
24 | "code": "9c0df781-c64c-4726-9d6a-9f911310c50f", | ||||
25 | "label": "initiale und regelmässige Prüfung und Bewertung der Zuverlässigkeit, Vertrauenswürdigkeit und Qualität des Erfüllungsgehilfen oder Lieferanten", | ||||
26 | "referential": "a8cdbc59-b2cc-434d-b277-770b4e4dcabe", | ||||
27 | "referential_label": "", | ||||
28 | "uuid": "28177b3c-da8b-44b9-be86-0184aecbe7b4" | ||||
21 | } | 29 | } | ||
22 | ], | 30 | ], | ||
23 | "version": 0 | 31 | "version": 0 | ||
24 | } | 32 | } |