Most linked-to categories
From GCA ACT
Jump to navigationJump to search
Showing below up to 50 results in range #901 to #950.
- RS.IM-2: Response strategies are updated (1 member)
- NIST CSF v1.1 (1 member)
- Iceland (1 member)
- DE.DP-4: Event detection information is communicated (1 member)
- ID.AM-4: External information systems are catalogued (1 member)
- BYOD Policy Implmentation (1 member)
- ID.SC-5: Response and recovery planning and testing are conducted with suppliers and third-party providers (1 member)
- ID.BE-2: The organization’s place in critical infrastructure and its industry sector is identified and communicated (1 member)
- ID.AM-6: Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, partners) are established (1 member)
- PR.IP-7: Protection processes are improved (1 member)
- ID.GV-3: Legal and regulatory requirements regarding cybersecurity, including privacy and civil liberties obligations, are understood and managed (1 member)
- PR.AT-5: Physical and cybersecurity personnel understand their roles and responsibilities (1 member)
- DE.CM-2: The physical environment is monitored to detect potential cybersecurity events (1 member)
- PR.DS-8: Integrity checking mechanisms are used to verify hardware integrity (1 member)
- DE.CM-6: External service provider activity is monitored to detect potential cybersecurity events (1 member)
- PR.AT-3: Third-party stakeholders (e.g., suppliers, customers, partners) understand their roles and responsibilities (1 member)
- RC.IM-1: Recovery plans incorporate lessons learned (1 member)
- Wallet Private Key Protection (Storage - Retrieval - Use) (1 member)
- Volunteer Authentication (1 member)
- PR.PT-5: Mechanisms (e.g., failsafe, load balancing, hot swap) are implemented to achieve resilience requirements in normal and adverse situations (1 member)
- RS.CO-1: Personnel know their roles and order of operations when a response is needed (1 member)
- Centralized Transaction Mixer (1 member)
- RC.CO-1: Public relations are managed (1 member)
- Captcha (1 member)
- PR.PT-1: Audit or log records are determined, documented, implemented, and reviewed in accordance with policy (1 member)
- DE.CM-4: Malicious code is detected (1 member)
- Asset Collocation Risk Reduction Techniques (1 member)
- DE.CM-3: Personnel activity is monitored to detect potential cybersecurity events (1 member)
- PR.PT-2: Removable media is protected and its use restricted according to policy (1 member)
- Political and Social-1.5 (1 member)
- Journalists-6 (1 member)
- DE.CM-1: The network is monitored to detect potential cybersecurity events (1 member)
- PR.AC-4: Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties (1 member)
- Political and Social-8.7 (1 member)
- Journalists-8.7 (1 member)
- PR.MA-2: Remote maintenance of organizational assets is approved, logged, and performed in a manner that prevents unauthorized access (1 member)
- PR.PT-3: The principle of least functionality is incorporated by configuring systems to provide only essential capabilities (1 member)
- PR.DS-1: Data-at-rest is protected (1 member)
- DE.CM-5: Unauthorized mobile code is detected (1 member)
- Political and Social-6 (1 member)
- ID.BE-1: The organization’s role in the supply chain is identified and communicated (1 member)
- ID.AM-1: Physical devices and systems within the organization are inventoried (1 member)
- Journalists-1.5 (1 member)
- Protecting Sensitive Sudent Information (1 member)
- DE.AE-3: Event data are collected and correlated from multiple sources and sensors (1 member)
- PR.PT-4: Communications and control networks are protected (1 member)
- RS.RP-1: Response plan is executed during or after an incident (1 member)
- PR.AC-6: Identities are proofed and bound to credentials and asserted in interactions (1 member)
- Election Officials-1 (1 member)
- Voters-1 (1 member)