Categories
From GCA ACT
Jump to navigationJump to search
The following categories exist on the wiki, and may or may not be unused. Also see wanted categories.
- CIS - 14.6 - Protect - Train Workforce Members on Recognizing and Reporting Security Incidents (1 member)
- CIS - 14.7 - Protect - Train Workforce on How to Identify and Report if Their Enterprise Assets are Missing Security Updates (1 member)
- CIS - 14.8 - Protect - Train Workforce on the Dangers of Connecting to and Transmitting Enterprise Data Over Insecure Networks (1 member)
- CIS - 14.9 - Protect - Conduct Role-Specific Security Awareness and Skills Training (1 member)
- CIS - 14 - Security Awareness and Skills Training (22 members)
- CIS - 15.1 - Identify - Establish and Maintain an Inventory of Service Providers (1 member)
- CIS - 15.2 - Identify - Establish and Maintain a Service Provider Management Policy (1 member)
- CIS - 15.3 - Identify - Classify Service Providers (1 member)
- CIS - 15.4 - Protect - Ensure Service Provider Contracts Include Security Requirements (1 member)
- CIS - 15.5 - Identify - Assess Service Providers (1 member)
- CIS - 15.6 - Detect - Data - Monitor Service Providers (1 member)
- CIS - 15.7 - Protect - Data - Securely Decommission Service Providers (1 member)
- CIS - 15 - Service Provider Management (9 members)
- CIS - 16.11 - Protect - Applications - Leverage Vetted Modules or Services for Application Security Components (1 member)
- CIS - 16.12 - Protect - Applications - Implement Code-Level Security Checks (1 member)
- CIS - 16.13 - Protect - Applications - Conduct Application Penetration Testing (1 member)
- CIS - 16.14 - Protect - Applications - Conduct Threat Modeling (1 member)
- CIS - 16.1 - Protect - Applications - Apply Secure Design Principles in Application Architectures (1 member)
- CIS - 16.1 - Protect - Applications - Establish and Maintain a Secure Application Development Process (1 member)
- CIS - 16.2 - Protect - Applications - Establish and Maintain a Process to Accept and Address Software Vulnerabilities (1 member)
- CIS - 16.3 - Protect - Applications - Perform Root Cause Analysis on Security Vulnerabilities (1 member)
- CIS - 16.4 - Protect - Applications - Establish and Manage an Inventory of Third-Party Software Components (1 member)
- CIS - 16.5 - Protect - Applications - Use Up-to-Date and Trusted Third-Party Software Components (1 member)
- CIS - 16.6 - Protect - Applications - Establish and Maintain a Severity Rating System and Process for Application Vulnerabilities (1 member)
- CIS - 16.7 - Protect - Applications - Use Standard Hardening Configuration Templates for Application Infrastructure (1 member)
- CIS - 16.8 - Protect - Applications - Separate Production and Non-Production Systems (1 member)
- CIS - 16.9 - Protect - Applications - Train Developers in Application Security Concepts and Secure Coding (1 member)
- CIS - 16 - Application Software Security (27 members)
- CIS - 17.1 - Respond - Designate Personnel to Manage Incident Handling (1 member)
- CIS - 17.2 - Respond - Establish and Maintain Contact Information for Reporting Security Incidents (1 member)
- CIS - 17.3 - Respond - Establish and Maintain an Enterprise Process for Reporting Incidents (1 member)
- CIS - 17.4 - Respond - Establish and Maintain an Incident Response Process (1 member)
- CIS - 17.5 - Respond - Assign Key Roles and Responsibilities (1 member)
- CIS - 17.6 - Respond - Define Mechanisms for Communicating During Incident Response (1 member)
- CIS - 17.7 - Recover - Conduct Routine Incident Response Exercises (1 member)
- CIS - 17.8 - Recover - Conduct Post-Incident Reviews (1 member)
- CIS - 17.9 - Recover - Establish and Maintain Security Incident Thresholds (1 member)
- CIS - 17 - Incident Response Management (11 members)
- CIS - 18.1 - Identify - Establish and Maintain a Penetration Testing Program (1 member)
- CIS - 18.2 - Identify - Network - Perform Periodic External Penetration Tests (1 member)
- CIS - 18.3 - Protect - Network - Remediate Penetration Test Findings (1 member)
- CIS - 18.4 - Protect - Network - Validate Security Measures (1 member)
- CIS - 18.5 - Identify - Perform Periodic Internal Penetration Tests (1 member)
- CIS - 18 - Penetration Testing (8 members)
- CIS - 1 - Inventory and Control of Enterprise Assets (10 members)
- CIS - 2.1 - Identify - Applications - Establish and Maintain a Software Inventory (1 member)
- CIS - 2.2 - Identify - Applications - Ensure Authorized Software is Currently Supported (1 member)
- CIS - 2.3 - Respond - Applications - Address Unauthorized Software (1 member)
- CIS - 2.4 - Detect - Applications - Utilize Automated Software Inventory Tools (1 member)
- CIS - 2.5 - Protect - Applications - Allowlist Authorized Software (1 member)