Most linked-to categories

From GCA ACT
Jump to navigationJump to search

Showing below up to 50 results in range #751 to #800.

View ( | ) (20 | 50 | 100 | 250 | 500)

  1. CIS - 11.2 - Recover - Data - Perform Automated Backups‏‎ (1 member)
  2. CIS - 16.14 - Protect - Applications - Conduct Threat Modeling‏‎ (1 member)
  3. CIS - 8.4 - Protect - Network - Standardize Time Synchronization‏‎ (1 member)
  4. CIS - 8.12 - Detect - Data - Collect Service Provider Logs‏‎ (1 member)
  5. CIS - 6.2 - Protect - Users - Establish an Access Revoking Process‏‎ (1 member)
  6. CIS - 2.1 - Identify - Applications - Establish and Maintain a Software Inventory‏‎ (1 member)
  7. ID.BE-3: Priorities for organizational mission, objectives, and activities are established and communicated‏‎ (1 member)
  8. PR.IP-1: A baseline configuration of information technology or industrial control systems is created and maintained incorporating security principles (e.g. concept of least functionality)‏‎ (1 member)
  9. CIS - 2.3 - Respond - Applications - Address Unauthorized Software‏‎ (1 member)
  10. CIS - 12.6 - Protect - Network - Use of Secure Network Management and Communication Protocols‏‎ (1 member)
  11. CIS - 10.3 - Protect - Devices - Disable Autorun and Autoplay for Removable Media‏‎ (1 member)
  12. CIS - 14.5 - Protect - Train Workforce Members on Causes of Unintentional Data Exposure‏‎ (1 member)
  13. CIS - 6.1 - Protect - Users - Establish an Access Granting Process‏‎ (1 member)
  14. CIS - 4.1 - Respond - Devices - Enforce Automatic Device Lockout on Portable End-User Devices‏‎ (1 member)
  15. CIS - 2.2 - Identify - Applications - Ensure Authorized Software is Currently Supported‏‎ (1 member)
  16. CIS - 1.4 - Identify - Devices - Use Dynamic Host Configuration Protocol (DHCP) Logging to Update Enterprise Asset Inventory‏‎ (1 member)
  17. CIS - 4.6 - Protect - Network - Securely Manage Enterprise Assets and Software‏‎ (1 member)
  18. CIS - 9.5 - Protect - Network - Implement DMARC‏‎ (1 member)
  19. CIS - 3.7 - Identify - Data - Establish and Maintain a Data Classification Scheme‏‎ (1 member)
  20. CIS - 8.3 - Protect - Network - Ensure Adequate Audit Log Storage‏‎ (1 member)
  21. CIS - 5.5 - Identify - Users - Establish and Maintain an Inventory of Service Accounts‏‎ (1 member)
  22. CIS Controls - v8.0‏‎ (1 member)
  23. ID.RM-3: The organization’s determination of risk tolerance is informed by its role in critical infrastructure and sector specific risk analysis‏‎ (1 member)
  24. DE.AE-5: Incident alert thresholds are established‏‎ (1 member)
  25. PR.DS-5: Protections against data leaks are implemented‏‎ (1 member)
  26. PR.AT-4: Senior executives understand their roles and responsibilities‏‎ (1 member)
  27. PR.MA-1: Maintenance and repair of organizational assets are performed and logged, with approved and controlled tools‏‎ (1 member)
  28. DE.DP-4: Event detection information is communicated‏‎ (1 member)
  29. NIST CSF v1.1‏‎ (1 member)
  30. RS.IM-2: Response strategies are updated‏‎ (1 member)
  31. RS.AN-5: Processes are established to receive, analyze and respond to vulnerabilities disclosed to the organization from internal and external sources (e.g. internal testing, security bulletins, or security researchers)‏‎ (1 member)
  32. DE.AE-2: Detected events are analyzed to understand attack targets and methods‏‎ (1 member)
  33. ID.BE-5: Resilience requirements to support delivery of critical services are established for all operating states (e.g. under duress or attack, during recovery, normal operations)‏‎ (1 member)
  34. ID.AM-2: Software platforms and applications within the organization are inventoried‏‎ (1 member)
  35. RS.AN-2: The impact of the incident is understood‏‎ (1 member)
  36. ID.RM-2: Organizational risk tolerance is determined and clearly expressed‏‎ (1 member)
  37. DE.DP-2: Detection activities comply with all applicable requirements‏‎ (1 member)
  38. RS.AN-4: Incidents are categorized consistent with response plans‏‎ (1 member)
  39. ID.SC-4: Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations to confirm they are meeting their contractual obligations.‏‎ (1 member)
  40. RS.MI-2: Incidents are mitigated‏‎ (1 member)
  41. PR.AC-2: Physical access to assets is managed and protected‏‎ (1 member)
  42. Recovery Planning (RC.RP)‏‎ (1 member)
  43. RC.RP-1: Recovery plan is executed during or after a cybersecurity incident‏‎ (1 member)
  44. PR.IP-5: Policy and regulations regarding the physical operating environment for organizational assets are met‏‎ (1 member)
  45. ID.RA-2: Cyber threat intelligence is received from information sharing forums and sources‏‎ (1 member)
  46. ID.AM-4: External information systems are catalogued‏‎ (1 member)
  47. DE.AE-4: Impact of events is determined‏‎ (1 member)
  48. PR.IP-2: A System Development Life Cycle to manage systems is implemented‏‎ (1 member)
  49. ID.GV-2: Cybersecurity roles and responsibilities are coordinated and aligned with internal roles and external partners‏‎ (1 member)
  50. PR.AT-2: Privileged users understand their roles and responsibilities‏‎ (1 member)

View ( | ) (20 | 50 | 100 | 250 | 500)