Categories
From GCA ACT
Jump to navigationJump to search
The following categories exist on the wiki, and may or may not be unused. Also see wanted categories.
- CIS - 7.4 - Protect - Applications - Perform Automated Application Patch Management (1 member)
- CIS - 7.5 - Identify - Applications - Perform Automated Vulnerability Scans of Internal Enterprise Assets (1 member)
- CIS - 7.6 - Identify - Applications - Perform Automated Vulnerability Scans of Externally-Exposed Enterprise Assets (1 member)
- CIS - 7.7 - Respond - Applications - Remediate Detected Vulnerabilities (1 member)
- CIS - 7 - Continuous Vulnerability Management (12 members)
- CIS - 8.11 - Detect - Network - Conduct Audit Log Reviews (1 member)
- CIS - 8.12 - Detect - Data - Collect Service Provider Logs (1 member)
- CIS - 8.1 - Protect - Network - Establish and Maintain an Audit Log Management Process (1 member)
- CIS - 8.1 - Protect - Network - Retain Audit Logs (1 member)
- CIS - 8.2 - Detect - Network - Collect Audit Logs (1 member)
- CIS - 8.3 - Protect - Network - Ensure Adequate Audit Log Storage (1 member)
- CIS - 8.4 - Protect - Network - Standardize Time Synchronization (1 member)
- CIS - 8.5 - Detect - Network - Collect Detailed Audit Logs (1 member)
- CIS - 8.6 - Detect - Network - Collect DNS Query Audit Logs (1 member)
- CIS - 8.7 - Detect - Network - Collect URL Request Audit Logs (1 member)
- CIS - 8.8 - Detect - Devices - Collect Command-Line Audit Logs (1 member)
- CIS - 8.9 - Detect - Network - Centralize Audit Logs (1 member)
- CIS - 8 - Audit Log Management (13 members)
- CIS - 9.1 - Protect - Applications - Ensure Use of Only Fully Supported Browsers and Email Clients (1 member)
- CIS - 9.2 - Protect - Network - Use DNS Filtering Services (1 member)
- CIS - 9.3 - Protect - Network - Maintain and Enforce Network-Based URL Filters (1 member)
- CIS - 9.4 - Protect - Applications - Restrict Unnecessary or Unauthorized Browser and Email Client Extensions (1 member)
- CIS - 9.5 - Protect - Network - Implement DMARC (1 member)
- CIS - 9.6 - Protect - Network - Block Unnecessary File Types (1 member)
- CIS - 9.7 - Protect - Network - Deploy and Maintain Email Server Anti-Malware Protections (1 member)
- CIS - 9 - Email and Web Browser Protections (14 members)
- CIS Controls - v8.0 (18 members)
- CTI (1 member)
- Cable Modems (1 member)
- California (12 members)
- Cambodia (4 members)
- Campus Network (2 members)
- Canada (8 members)
- Captcha (1 member)
- Carriers & Communications (5 members)
- Cash Registers (1 member)
- Centralized Exchange (4 members)
- Centralized Exchange (CEX) Account Protection (9 members)
- Centralized Exchange (CEX) Risk Intelligence and Management (2 members)
- Centralized Exchange Account Recovery (1 member)
- Centralized Exchange Withdrawal Policies (1 member)
- Centralized Transaction Mixer (1 member)
- Certificate Monitoring (1 member)
- Chaining Wallets for NFTs (1 member)
- Change Management (1 member)
- Child (0 members)
- Child Monitors & Cameras (2 members)
- Choosing a Secure Password (5 members)
- ChromeOS (1 member)
- Cloud Security (51 members)