Most linked-to categories
From GCA ACT
Jump to navigationJump to search
Showing below up to 50 results in range #651 to #700.
- PR.IP-1: A baseline configuration of information technology or industrial control systems is created and maintained incorporating security principles (e.g. concept of least functionality) (1 member)
- ID.RM-3: The organization’s determination of risk tolerance is informed by its role in critical infrastructure and sector specific risk analysis (1 member)
- DE.AE-5: Incident alert thresholds are established (1 member)
- PR.DS-5: Protections against data leaks are implemented (1 member)
- RS.MI-2: Incidents are mitigated (1 member)
- PR.AC-2: Physical access to assets is managed and protected (1 member)
- SMS or Text Messaging to Receive Codes (1 member)
- Business Accounts with Suppliers (1 member)
- Recovery Planning (RC.RP) (1 member)
- Identity as a Service (IDaaS) (1 member)
- What is Digital Currency? (1 member)
- Online Reputation Management (1 member)
- RC.RP-1: Recovery plan is executed during or after a cybersecurity incident (1 member)
- Legal Considerations in Incident Response (1 member)
- PR.IP-5: Policy and regulations regarding the physical operating environment for organizational assets are met (1 member)
- ID.SC-4: Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations to confirm they are meeting their contractual obligations. (1 member)
- Cash Registers (1 member)
- CIS - 1.1 - Identify - Devices - Establish and Maintain Detailed Enterprise Asset Inventory (1 member)
- CIS - 10.7 - Detect - Devices - Use Behavior-Based Anti-Malware Software (1 member)
- CIS - 3.14 - Detect - Data - Log Sensitive Data Access (1 member)
- Reporting (1 member)
- CIS - 3.9 - Protect - Data - Encrypt Data on Removable Media (1 member)
- PR.MA-1: Maintenance and repair of organizational assets are performed and logged, with approved and controlled tools (1 member)
- CIS - 5.1 - Identify - Users - Establish and Maintain an Inventory of Accounts (1 member)
- DE.DP-4: Event detection information is communicated (1 member)
- CIS - 9.3 - Protect - Network - Maintain and Enforce Network-Based URL Filters (1 member)
- Switches (1 member)
- CIS - 14.7 - Protect - Train Workforce on How to Identify and Report if Their Enterprise Assets are Missing Security Updates (1 member)
- NIST CSF v1.1 (1 member)
- CIS - 4.5 - Protect - Devices - Implement and Manage a Firewall on End-User Devices (1 member)
- Encryption Keys (1 member)
- CIS - 8.9 - Detect - Network - Centralize Audit Logs (1 member)
- CIS - 11.5 - Recover - Data - Test Data Recovery (1 member)
- PR.AT-4: Senior executives understand their roles and responsibilities (1 member)
- Supplier Authentication (1 member)
- Protecting You & Your Child's Personal Information (1 member)
- CIS - 17.2 - Respond - Establish and Maintain Contact Information for Reporting Security Incidents (1 member)
- CIS - 16.1 - Protect - Applications - Establish and Maintain a Secure Application Development Process (1 member)
- CIS - 13.3 - Detect - Network - Deploy a Network Intrusion Detection Solution (1 member)
- CIS - 18.4 - Protect - Network - Validate Security Measures (1 member)
- Decentralized Exchange Account Recovery (1 member)
- CIS - 15.3 - Identify - Classify Service Providers (1 member)
- CIS - 8.11 - Detect - Network - Conduct Audit Log Reviews (1 member)
- RS.AN-4: Incidents are categorized consistent with response plans (1 member)
- CIS - 4.8 - Protect - Devices - Uninstall or Disable Unnecessary Services on Enterprise Assets and Software (1 member)
- CIS - 12.8 - Protect - Devices - Establish and Maintain Dedicated Computing Resources for All Administrative Work (1 member)
- CIS - 4.7 - Protect - Users - Manage Default Accounts on Enterprise Assets and Software (1 member)
- CIS - 3.2 - Identify - Data - Establish and Maintain a Data Inventory (1 member)
- CIS - 5.4 - Protect - Users - Restrict Administrator Privileges to Dedicated Administrator Accounts (1 member)
- CIS - 13.4 - Protect - Network - Perform Traffic Filtering Between Network Segments (1 member)