DE | EN

Certification of the

Information Security

for more security for companies and end users.

Requirement catalogue

Hardware

    The hardware is put through his paces. The test consists of several parts which examine technical, logical and functional factors.

    The considered areas include among others: used software, communication, access types, patch management as well as storage of data.

Software

    The software is tested analogous to the hardware. Besides the communication and the storage of the data also important aspects from the law are considered. The conformity with the general data protection regulation plays an important part in the test. Here the principles ‘Privacy by Default’ (pre-set) and ‘Privacy by Design’ (technical design) play a large role.

Cloud

    At a central administration of the data in a cloud all relevant aspects of the general data protection regulation have to be considered. During this test the focus is on the availability, authenticity and integrity of the data. Here, besides the documentation of the cloud its vulnerability is checked in a pen test.

The three pillars of the requirement catalogue are based on the currently available technical specifications and recommendations.
They are regularly adjusted to the state of technology.
© Obering. Berg & Lukowiak GmbH 2020