Date: Jan 4, 2024, 11:17:16 AM
Date: Jan 4, 2024, 11:19:41 AM
Name: TKG-SiKa2.0
Name: TKG-SiKa2.0
Description: Catalogue of security requirements for the operation of
telecommunications and data processing systems and for
the processing of personal data in Germany
Description: Catalogue of security requirements for the operation of
telecommunications and data processing systems and for
the processing of personal data in Germany
| f | 1 | { | f | 1 | { |
| 2 | "label": "TKG-SiKa2.0", | 2 | "label": "TKG-SiKa2.0", | ||
| 3 | "language": "DE", | 3 | "language": "DE", | ||
| 4 | "uuid": "3547ca1d-abbf-42e3-8a43-b5afbee19595", | 4 | "uuid": "3547ca1d-abbf-42e3-8a43-b5afbee19595", | ||
| 5 | "values": [ | 5 | "values": [ | ||
| t | 6 | { | t | ||
| 7 | "category": "2.1 Routing und Protokolle", | ||||
| 8 | "code": "SK2.1x", | ||||
| 9 | "label": "Es ist immer von verschiedenen Optionen immer die am sichersten einzuschätzende Lösung von Standards und Protokollen zu implementieren", | ||||
| 10 | "referential": "ca9262c7-08a5-4817-8693-c2ec6bf0e1103", | ||||
| 11 | "referential_label": "", | ||||
| 12 | "uuid": "9fdde5e2-0246-49fe-ace8-f7697da12ed182" | ||||
| 13 | }, | ||||
| 14 | { | ||||
| 15 | "category": "2.1.1 Verschlüsselungstechnik", | ||||
| 16 | "code": "SK2.1.1.1x", | ||||
| 17 | "label": "Der TK-Anbieter muss an sicherheitsrelevanten Stellen eine Verschlüsselung von Daten nach Stand der Technik vornehmen oder des Transportweges (z.B. über TLS). -> technische Richtlinie TR-02102", | ||||
| 18 | "referential": "ca9262c7-08a5-4817-8693-c2ec6bf0e1104", | ||||
| 19 | "referential_label": "", | ||||
| 20 | "uuid": "9fdde5e2-0246-49fe-ace8-f7697da12ed183" | ||||
| 21 | }, | ||||
| 22 | { | 6 | { | ||
| 23 | "category": "2.1.1 Verschlüsselungstechnik", | 7 | "category": "2.1.1 Verschlüsselungstechnik", | ||
| 24 | "code": "SK2.1.1.2x", | 8 | "code": "SK2.1.1.2x", | ||
| 25 | "label": "Passwörter müssen nach aktuellem Stand der Technik zumindest gehasht und mit einem Salt versehen und gespeichert werden.", | 9 | "label": "Passwörter müssen nach aktuellem Stand der Technik zumindest gehasht und mit einem Salt versehen und gespeichert werden.", | ||
| 26 | "referential": "ca9262c7-08a5-4817-8693-c2ec6bf0e1105", | 10 | "referential": "ca9262c7-08a5-4817-8693-c2ec6bf0e1105", | ||
| 27 | "referential_label": "", | 11 | "referential_label": "", | ||
| 28 | "uuid": "9fdde5e2-0246-49fe-ace8-f7697da12ed184" | 12 | "uuid": "9fdde5e2-0246-49fe-ace8-f7697da12ed184" | ||
| 29 | } | 13 | } | ||
| 30 | ], | 14 | ], | ||
| 31 | "version": 0 | 15 | "version": 0 | ||
| 32 | } | 16 | } |