Most linked-to categories
From GCA ACT
Jump to navigationJump to search
Showing below up to 50 results in range #851 to #900.
- CIS - 9.2 - Protect - Network - Use DNS Filtering Services (1 member)
- PR.DS-5: Protections against data leaks are implemented (1 member)
- CIS - 2.1 - Identify - Applications - Establish and Maintain a Software Inventory (1 member)
- Business Accounts with Suppliers (1 member)
- SMS or Text Messaging to Receive Codes (1 member)
- CIS - 6.2 - Protect - Users - Establish an Access Revoking Process (1 member)
- CIS - 8.12 - Detect - Data - Collect Service Provider Logs (1 member)
- CIS - 8.4 - Protect - Network - Standardize Time Synchronization (1 member)
- CIS - 16.14 - Protect - Applications - Conduct Threat Modeling (1 member)
- CIS - 11.2 - Recover - Data - Perform Automated Backups (1 member)
- CIS - 16.11 - Protect - Applications - Leverage Vetted Modules or Services for Application Security Components (1 member)
- CIS - 12.1 - Protect - Network - Ensure Network Infrastructure is Up-to-Date (1 member)
- Identity as a Service (IDaaS) (1 member)
- What is Digital Currency? (1 member)
- Online Reputation Management (1 member)
- DE.AE-5: Incident alert thresholds are established (1 member)
- Removing Data from the Internet (1 member)
- Centralized Exchange Account Recovery (1 member)
- ID.RM-3: The organization’s determination of risk tolerance is informed by its role in critical infrastructure and sector specific risk analysis (1 member)
- PR.IP-1: A baseline configuration of information technology or industrial control systems is created and maintained incorporating security principles (e.g. concept of least functionality) (1 member)
- Donation Card Dip Stations (1 member)
- What are Digital Wallets? (1 member)
- Debit Cards (1 member)
- ID.BE-3: Priorities for organizational mission, objectives, and activities are established and communicated (1 member)
- Legal Considerations in Incident Response (1 member)
- CIS - 18.1 - Identify - Establish and Maintain a Penetration Testing Program (1 member)
- CIS - 11.1 - Recover - Data - Establish and Maintain a Data Recovery Process (1 member)
- CIS - 2.3 - Respond - Applications - Address Unauthorized Software (1 member)
- CIS - 3.1 - Identify - Data - Establish and Maintain a Data Management Process (1 member)
- CIS - 17.9 - Recover - Establish and Maintain Security Incident Thresholds (1 member)
- CIS - 3.5 - Protect - Data - Securely Dispose of Data (1 member)
- CIS - 13.5 - Protect - Devices - Manage Access Control for Remote Assets (1 member)
- CIS - 2.7 - Protect - Applications - Allowlist Authorized Scripts (1 member)
- CIS - 3.6 - Protect - Devices - Encrypt Data on End-User Devices (1 member)
- CIS - 17.5 - Respond - Assign Key Roles and Responsibilities (1 member)
- CIS - 14.8 - Protect - Train Workforce on the Dangers of Connecting to and Transmitting Enterprise Data Over Insecure Networks (1 member)
- CIS - 7.4 - Protect - Applications - Perform Automated Application Patch Management (1 member)
- CIS - 9.1 - Protect - Applications - Ensure Use of Only Fully Supported Browsers and Email Clients (1 member)
- CIS - 10.3 - Protect - Devices - Disable Autorun and Autoplay for Removable Media (1 member)
- CIS - 14.5 - Protect - Train Workforce Members on Causes of Unintentional Data Exposure (1 member)
- CIS - 6.1 - Protect - Users - Establish an Access Granting Process (1 member)
- CIS - 12.6 - Protect - Network - Use of Secure Network Management and Communication Protocols (1 member)
- CIS Controls - v8.0 (1 member)
- CIS - 5.5 - Identify - Users - Establish and Maintain an Inventory of Service Accounts (1 member)
- CIS - 8.3 - Protect - Network - Ensure Adequate Audit Log Storage (1 member)
- CIS - 3.7 - Identify - Data - Establish and Maintain a Data Classification Scheme (1 member)
- CIS - 9.5 - Protect - Network - Implement DMARC (1 member)
- CIS - 4.6 - Protect - Network - Securely Manage Enterprise Assets and Software (1 member)
- CIS - 1.4 - Identify - Devices - Use Dynamic Host Configuration Protocol (DHCP) Logging to Update Enterprise Asset Inventory (1 member)
- CIS - 2.2 - Identify - Applications - Ensure Authorized Software is Currently Supported (1 member)