Governance
- Policy
- Legal compliance
- Information security
- Management of sensitive information
- Change management process
- Personnel security
- Identity and access management
- Management of corporate and personal devices
- Management of sensitive keys and secrets
- Encryption and cryptography
- Deployment environment management
- Platform and data access
- Source repository access and usage
- Security education and awareness
- Security review and auditing
- Service engagement and assurance
- Incident management and business continuity
- Engagement with Digital Health SA