Cybersecurity Principles In Neotrans Solution

Principle of Minimization
- Reduction of Attack Surface
- Effective Update & monitoring
- Reduction of the number of components
Principle of Least Privilege
- Access control management
- Partitioning
Defense in Depth Principle
- Securing Access
- Firewall Data
- Encryption
Monitoring & Maintenance
- Audit and Logging
- Up to date system

CONFIDENTIALITY, INTEGRITY AND AVAILABILITY
SECURE AND HARDENED OS
SECURE CODING RULES
SECURE SOFTWARE LICECYCLE
SECURE PROTOCOLS
TRUSTED CHIPER SUITES
AUTHENTICATION BASED ON ASYMETRIC KEYS AND CERTIFICATES