⚜️
DFS CheckList
CtrlK
  • What is DFS Checklist?
  • Scope
    • What is a scope?
    • How to define a scope for DeFi app?
  • Checklist
    • Scope is defined
      • Scope is described
      • Personnel is listed
    • Network security
      • Network rules defined and saved
      • Network rules implemented
    • Third party software security
      • Software listed
      • Software configured
    • Inhouse software security
      • Software listed
      • Software configured
    • Access Control Measures
      • Identify Users and Authenticate Access to System Components
      • Restrict Access to System Components by Business Need to Know
    • Monitoring and Alerting
      • Log and Monitor All Access to the Scope
      • Setup alerting for critical events
    • Security routines
      • Complience controls
Powered by GitBook
On this page
  1. Checklist
  2. Access Control Measures

Restrict Access to System Components by Business Need to Know

1

Processes and mechanisms for restricting access to system components in scope are defined and understood.

2

principle of minimal privilege is implemented.

3

Access to system components and data is appropriately defined and assigned.

4

Access to system components and data is managed via an access control system(s).

PreviousIdentify Users and Authenticate Access to System ComponentsNextMonitoring and Alerting

Last updated 1 year ago