Categories
From GCA ACT
Jump to navigationJump to search
The following categories exist on the wiki, and may or may not be unused. Also see wanted categories.
- Business Continuity & Resumption (3 members)
- Business Environment (ID.BE) (5 members)
- C2 Detection (1 member)
- C2 Server Tracking (1 member)
- CEX Best Practices (1 member)
- CIS - 1.1 - Identify - Devices - Establish and Maintain Detailed Enterprise Asset Inventory (1 member)
- CIS - 1.2 - Respond - Devices - Address Unauthorized Assets (1 member)
- CIS - 1.3 - Detect - Devices - Utilize an Active Discovery Tool (1 member)
- CIS - 1.4 - Identify - Devices - Use Dynamic Host Configuration Protocol (DHCP) Logging to Update Enterprise Asset Inventory (1 member)
- CIS - 1.5 - Detect - Devices - Use a Passive Asset Discovery Tool (1 member)
- CIS - 10.1 - Protect - Devices - Deploy and Maintain Anti-Malware Software (1 member)
- CIS - 10.2 - Protect - Devices - Configure Automatic Anti-Malware Signature Updates (1 member)
- CIS - 10.3 - Protect - Devices - Disable Autorun and Autoplay for Removable Media (1 member)
- CIS - 10.4 - Detect - Devices - Configure Automatic Anti-Malware Scanning of Removable Media (1 member)
- CIS - 10.5 - Protect - Devices - Enable Anti-Exploitation Features (1 member)
- CIS - 10.6 - Protect - Devices - Centrally Manage Anti-Malware Software (1 member)
- CIS - 10.7 - Detect - Devices - Use Behavior-Based Anti-Malware Software (1 member)
- CIS - 10 - Malware Defenses (15 members)
- CIS - 11.1 - Recover - Data - Establish and Maintain a Data Recovery Process (1 member)
- CIS - 11.2 - Recover - Data - Perform Automated Backups (1 member)
- CIS - 11.3 - Protect - Data - Protect Recovery Data (1 member)
- CIS - 11.4 - Recover - Data - Establish and Maintain an Isolated Instance of Recovery Data (1 member)
- CIS - 11.5 - Recover - Data - Test Data Recovery (1 member)
- CIS - 11 - Data Recovery (6 members)
- CIS - 12.1 - Protect - Network - Ensure Network Infrastructure is Up-to-Date (1 member)
- CIS - 12.2 - Protect - Network - Establish and Maintain a Secure Network Architecture (1 member)
- CIS - 12.3 - Protect - Network - Securely Manage Network Infrastructure (1 member)
- CIS - 12.4 - Identify - Network - Establish and Maintain Architecture Diagram(s) (1 member)
- CIS - 12.5 - Protect - Network - Centralize Network Authentication, Authorization, and Auditing (AAA) (1 member)
- CIS - 12.6 - Protect - Network - Use of Secure Network Management and Communication Protocols (1 member)
- CIS - 12.7 - Protect - Devices - Ensure Remote Devices Utilize a VPN and are Connecting to an Enterprise’s AAA Infrastructure (1 member)
- CIS - 12.8 - Protect - Devices - Establish and Maintain Dedicated Computing Resources for All Administrative Work (1 member)
- CIS - 12 - Network Infrastructure Management (10 members)
- CIS - 13.11 - Detect - Network - Tune Security Event Alerting Thresholds (1 member)
- CIS - 13.1 - Detect - Network - Centralize Security Event Alerting (1 member)
- CIS - 13.1 - Protect - Network - Perform Application Layer Filtering (1 member)
- CIS - 13.2 - Detect - Devices - Deploy a Host-Based Intrusion Detection Solution (1 member)
- CIS - 13.3 - Detect - Network - Deploy a Network Intrusion Detection Solution (1 member)
- CIS - 13.4 - Protect - Network - Perform Traffic Filtering Between Network Segments (1 member)
- CIS - 13.5 - Protect - Devices - Manage Access Control for Remote Assets (1 member)
- CIS - 13.6 - Detect - Network - Collect Network Traffic Flow Logs (1 member)
- CIS - 13.7 - Protect - Devices - Deploy a Host-Based Intrusion Prevention Solution (1 member)
- CIS - 13.8 - Protect - Network - Deploy a Network Intrusion Prevention Solution (1 member)
- CIS - 13.9 - Protect - Devices - Deploy Port-Level Access Control (1 member)
- CIS - 13 - Network Monitoring and Defense (14 members)
- CIS - 14.1 - Protect - Establish and Maintain a Security Awareness Program (1 member)
- CIS - 14.2 - Protect - Train Workforce Members to Recognize Social Engineering Attacks (1 member)
- CIS - 14.3 - Protect - Train Workforce Members on Authentication Best Practices (1 member)
- CIS - 14.4 - Protect - Train Workforce on Data Handling Best Practices (1 member)
- CIS - 14.5 - Protect - Train Workforce Members on Causes of Unintentional Data Exposure (1 member)