Most linked-to categories

From GCA ACT
Jump to navigationJump to search

Showing below up to 50 results in range #651 to #700.

View ( | ) (20 | 50 | 100 | 250 | 500)

  1. PR.IP-1: A baseline configuration of information technology or industrial control systems is created and maintained incorporating security principles (e.g. concept of least functionality)‏‎ (1 member)
  2. ID.RM-3: The organization’s determination of risk tolerance is informed by its role in critical infrastructure and sector specific risk analysis‏‎ (1 member)
  3. DE.AE-5: Incident alert thresholds are established‏‎ (1 member)
  4. PR.DS-5: Protections against data leaks are implemented‏‎ (1 member)
  5. RS.MI-2: Incidents are mitigated‏‎ (1 member)
  6. PR.AC-2: Physical access to assets is managed and protected‏‎ (1 member)
  7. SMS or Text Messaging to Receive Codes‏‎ (1 member)
  8. Business Accounts with Suppliers‏‎ (1 member)
  9. Recovery Planning (RC.RP)‏‎ (1 member)
  10. Identity as a Service (IDaaS)‏‎ (1 member)
  11. What is Digital Currency?‏‎ (1 member)
  12. Online Reputation Management‏‎ (1 member)
  13. RC.RP-1: Recovery plan is executed during or after a cybersecurity incident‏‎ (1 member)
  14. Legal Considerations in Incident Response‏‎ (1 member)
  15. PR.IP-5: Policy and regulations regarding the physical operating environment for organizational assets are met‏‎ (1 member)
  16. ID.SC-4: Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations to confirm they are meeting their contractual obligations.‏‎ (1 member)
  17. Cash Registers‏‎ (1 member)
  18. CIS - 1.1 - Identify - Devices - Establish and Maintain Detailed Enterprise Asset Inventory‏‎ (1 member)
  19. CIS - 10.7 - Detect - Devices - Use Behavior-Based Anti-Malware Software‏‎ (1 member)
  20. CIS - 3.14 - Detect - Data - Log Sensitive Data Access‏‎ (1 member)
  21. Reporting‏‎ (1 member)
  22. CIS - 3.9 - Protect - Data - Encrypt Data on Removable Media‏‎ (1 member)
  23. PR.MA-1: Maintenance and repair of organizational assets are performed and logged, with approved and controlled tools‏‎ (1 member)
  24. CIS - 5.1 - Identify - Users - Establish and Maintain an Inventory of Accounts‏‎ (1 member)
  25. DE.DP-4: Event detection information is communicated‏‎ (1 member)
  26. CIS - 9.3 - Protect - Network - Maintain and Enforce Network-Based URL Filters‏‎ (1 member)
  27. Switches‏‎ (1 member)
  28. CIS - 14.7 - Protect - Train Workforce on How to Identify and Report if Their Enterprise Assets are Missing Security Updates‏‎ (1 member)
  29. NIST CSF v1.1‏‎ (1 member)
  30. CIS - 4.5 - Protect - Devices - Implement and Manage a Firewall on End-User Devices‏‎ (1 member)
  31. Encryption Keys‏‎ (1 member)
  32. CIS - 8.9 - Detect - Network - Centralize Audit Logs‏‎ (1 member)
  33. CIS - 11.5 - Recover - Data - Test Data Recovery‏‎ (1 member)
  34. PR.AT-4: Senior executives understand their roles and responsibilities‏‎ (1 member)
  35. Supplier Authentication‏‎ (1 member)
  36. Protecting You & Your Child's Personal Information‏‎ (1 member)
  37. CIS - 17.2 - Respond - Establish and Maintain Contact Information for Reporting Security Incidents‏‎ (1 member)
  38. CIS - 16.1 - Protect - Applications - Establish and Maintain a Secure Application Development Process‏‎ (1 member)
  39. CIS - 13.3 - Detect - Network - Deploy a Network Intrusion Detection Solution‏‎ (1 member)
  40. CIS - 18.4 - Protect - Network - Validate Security Measures‏‎ (1 member)
  41. Decentralized Exchange Account Recovery‏‎ (1 member)
  42. CIS - 15.3 - Identify - Classify Service Providers‏‎ (1 member)
  43. CIS - 8.11 - Detect - Network - Conduct Audit Log Reviews‏‎ (1 member)
  44. RS.AN-4: Incidents are categorized consistent with response plans‏‎ (1 member)
  45. CIS - 4.8 - Protect - Devices - Uninstall or Disable Unnecessary Services on Enterprise Assets and Software‏‎ (1 member)
  46. CIS - 12.8 - Protect - Devices - Establish and Maintain Dedicated Computing Resources for All Administrative Work‏‎ (1 member)
  47. CIS - 4.7 - Protect - Users - Manage Default Accounts on Enterprise Assets and Software‏‎ (1 member)
  48. CIS - 3.2 - Identify - Data - Establish and Maintain a Data Inventory‏‎ (1 member)
  49. CIS - 5.4 - Protect - Users - Restrict Administrator Privileges to Dedicated Administrator Accounts‏‎ (1 member)
  50. CIS - 13.4 - Protect - Network - Perform Traffic Filtering Between Network Segments‏‎ (1 member)

View ( | ) (20 | 50 | 100 | 250 | 500)