The data controller establishes the functions for which as well as indicates by which individual information is processed. Build firewalls and router requirements, which established procedures for allowing and denying access to your methods. Firewall configurations really should be reviewed bi-each year to ensure there isn't any faulty access policies, https://www.nathanlabsadvisory.com/blog/nathan/mas-technology-risk-management-in-singapore-ensuring-cyber-hygiene-and-compliance/