Most linked-to categories
From GCA ACT
Jump to navigationJump to search
Showing below up to 50 results in range #701 to #750.
- CIS - 11.1 - Recover - Data - Establish and Maintain a Data Recovery Process (1 member)
- CIS - 18.1 - Identify - Establish and Maintain a Penetration Testing Program (1 member)
- CIS - 12.1 - Protect - Network - Ensure Network Infrastructure is Up-to-Date (1 member)
- CIS - 16.11 - Protect - Applications - Leverage Vetted Modules or Services for Application Security Components (1 member)
- CIS - 11.2 - Recover - Data - Perform Automated Backups (1 member)
- Order Taking Devices (1 member)
- DE.AE-5: Incident alert thresholds are established (1 member)
- PR.DS-7: The development and testing environment(s) are separate from the production environment (1 member)
- CIS - 13.4 - Protect - Network - Perform Traffic Filtering Between Network Segments (1 member)
- RS.IM-2: Response strategies are updated (1 member)
- Legal Considerations in Incident Response (1 member)
- CIS - 15.3 - Identify - Classify Service Providers (1 member)
- CIS - 18.4 - Protect - Network - Validate Security Measures (1 member)
- CIS - 13.3 - Detect - Network - Deploy a Network Intrusion Detection Solution (1 member)
- CIS - 16.1 - Protect - Applications - Establish and Maintain a Secure Application Development Process (1 member)
- CIS - 17.2 - Respond - Establish and Maintain Contact Information for Reporting Security Incidents (1 member)
- CIS - 1.1 - Identify - Devices - Establish and Maintain Detailed Enterprise Asset Inventory (1 member)
- Cryptocurrency (1 member)
- CIS - 8.11 - Detect - Network - Conduct Audit Log Reviews (1 member)
- CIS - 4.8 - Protect - Devices - Uninstall or Disable Unnecessary Services on Enterprise Assets and Software (1 member)
- RS.AN-5: Processes are established to receive, analyze and respond to vulnerabilities disclosed to the organization from internal and external sources (e.g. internal testing, security bulletins, or security researchers) (1 member)
- Donation Card Dip Stations (1 member)
- CIS - 5.4 - Protect - Users - Restrict Administrator Privileges to Dedicated Administrator Accounts (1 member)
- CIS - 12.2 - Protect - Network - Establish and Maintain a Secure Network Architecture (1 member)
- CIS - 3.2 - Identify - Data - Establish and Maintain a Data Inventory (1 member)
- What are Digital Wallets? (1 member)
- CIS - 4.7 - Protect - Users - Manage Default Accounts on Enterprise Assets and Software (1 member)
- CIS - 12.8 - Protect - Devices - Establish and Maintain Dedicated Computing Resources for All Administrative Work (1 member)
- Debit Cards (1 member)
- Online Reputation Management (1 member)
- CIS - 2.1 - Identify - Applications - Establish and Maintain a Software Inventory (1 member)
- Donor Information (1 member)
- Financial Data (1 member)
- PR.AT-4: Senior executives understand their roles and responsibilities (1 member)
- Physical Device Security (1 member)
- RS.AN-4: Incidents are categorized consistent with response plans (1 member)
- Security Testing (1 member)
- Commercially Available Monitoring Software (1 member)
- Unsecured Loans (1 member)
- ID.SC-4: Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations to confirm they are meeting their contractual obligations. (1 member)
- Mobile-Friendly Applications (1 member)
- PR.MA-1: Maintenance and repair of organizational assets are performed and logged, with approved and controlled tools (1 member)
- Centralized Exchange Withdrawal Policies (1 member)
- What is Digital Currency? (1 member)
- Identity as a Service (IDaaS) (1 member)
- NIST CSF v1.1 (1 member)
- Business Accounts with Suppliers (1 member)
- Security Awareness Testing (1 member)
- Regular Software Updates (1 member)
- Infrastructure as a Service (IaaS) (1 member)