Categories
From GCA ACT
Jump to navigationJump to search
The following categories exist on the wiki, and may or may not be unused. Also see wanted categories.
- CIS - 2.6 - Protect - Applications - Allowlist Authorized Libraries (1 member)
- CIS - 2.7 - Protect - Applications - Allowlist Authorized Scripts (1 member)
- CIS - 2 - Inventory and Control of Software Assets (12 members)
- CIS - 3.11 - Protect - Data - Encrypt Sensitive Data at Rest (1 member)
- CIS - 3.12 - Protect - Network - Segment Data Processing and Storage Based on Sensitivity (1 member)
- CIS - 3.13 - Protect - Data - Deploy a Data Loss Prevention Solution (1 member)
- CIS - 3.14 - Detect - Data - Log Sensitive Data Access (1 member)
- CIS - 3.1 - Identify - Data - Establish and Maintain a Data Management Process (1 member)
- CIS - 3.1 - Protect - Data - Encrypt Sensitive Data in Transit (1 member)
- CIS - 3.2 - Identify - Data - Establish and Maintain a Data Inventory (1 member)
- CIS - 3.3 - Protect - Data - Configure Data Access Control Lists (1 member)
- CIS - 3.4 - Protect - Data - Enforce Data Retention (1 member)
- CIS - 3.5 - Protect - Data - Securely Dispose of Data (1 member)
- CIS - 3.6 - Protect - Devices - Encrypt Data on End-User Devices (1 member)
- CIS - 3.7 - Identify - Data - Establish and Maintain a Data Classification Scheme (1 member)
- CIS - 3.8 - Identify - Data - Document Data Flows (1 member)
- CIS - 3.9 - Protect - Data - Encrypt Data on Removable Media (1 member)
- CIS - 3 - Data Protection (16 members)
- CIS - 4.11 - Protect - Devices - Enforce Remote Wipe Capability on Portable End-User Devices (1 member)
- CIS - 4.12 - Protect - Devices - Separate Enterprise Workspaces on Mobile End-User Devices (1 member)
- CIS - 4.1 - Protect - Applications - Establish and Maintain a Secure Configuration Process (1 member)
- CIS - 4.1 - Respond - Devices - Enforce Automatic Device Lockout on Portable End-User Devices (1 member)
- CIS - 4.2 - Protect - Network - Establish and Maintain a Secure Configuration Process for Network Infrastructure (1 member)
- CIS - 4.3 - Protect - Users - Configure Automatic Session Locking on Enterprise Assets (1 member)
- CIS - 4.4 - Protect - Devices - Implement and Manage a Firewall on Servers (1 member)
- CIS - 4.5 - Protect - Devices - Implement and Manage a Firewall on End-User Devices (1 member)
- CIS - 4.6 - Protect - Network - Securely Manage Enterprise Assets and Software (1 member)
- CIS - 4.7 - Protect - Users - Manage Default Accounts on Enterprise Assets and Software (1 member)
- CIS - 4.8 - Protect - Devices - Uninstall or Disable Unnecessary Services on Enterprise Assets and Software (1 member)
- CIS - 4.9 - Protect - Devices - Configure Trusted DNS Servers on Enterprise Assets (1 member)
- CIS - 4 - Secure Configuration of Enterprise Assets and Software (16 members)
- CIS - 5.1 - Identify - Users - Establish and Maintain an Inventory of Accounts (1 member)
- CIS - 5.2 - Protect - Users - Use Unique Passwords (1 member)
- CIS - 5.3 - Respond - Users - Disable Dormant Accounts (1 member)
- CIS - 5.4 - Protect - Users - Restrict Administrator Privileges to Dedicated Administrator Accounts (1 member)
- CIS - 5.5 - Identify - Users - Establish and Maintain an Inventory of Service Accounts (1 member)
- CIS - 5.6 - Protect - Users - Centralize Account Management (1 member)
- CIS - 5 - Account Management (8 members)
- CIS - 6.1 - Protect - Users - Establish an Access Granting Process (1 member)
- CIS - 6.2 - Protect - Users - Establish an Access Revoking Process (1 member)
- CIS - 6.3 - Protect - Users - Require MFA for Externally-Exposed Applications (1 member)
- CIS - 6.4 - Protect - Users - Require MFA for Remote Network Access (1 member)
- CIS - 6.5 - Protect - Users - Require MFA for Administrative Access (1 member)
- CIS - 6.6 - Identify - Users - Establish and Maintain an Inventory of Authentication and Authorization Systems (1 member)
- CIS - 6.7 - Protect - Users - Centralize Access Control (1 member)
- CIS - 6.8 - Protect - Data - Define and Maintain Role-Based Access Control (1 member)
- CIS - 6 - Access Control Management (14 members)
- CIS - 7.1 - Protect - Applications - Establish and Maintain a Vulnerability Management Process (1 member)
- CIS - 7.2 - Respond - Applications - Establish and Maintain a Remediation Process (1 member)
- CIS - 7.3 - Protect - Applications - Perform Automated Operating System Patch Management (1 member)