Find Tools by Community
From GCA ACT
Revision as of 01:35, 26 June 2023 by
Globalcyberalliance
(
talk
|
contribs
)
(
diff
)
← Older revision
|
Latest revision
(
diff
) |
Newer revision →
(
diff
)
Jump to navigation
Jump to search
Navigate by:
CIS Controls - v8.0
CIS - 1 - Inventory and Control of Enterprise Assets
CIS - 10 - Malware Defenses
CIS - 11 - Data Recovery
CIS - 12 - Network Infrastructure Management
CIS - 13 - Network Monitoring and Defense
CIS - 14 - Security Awareness and Skills Training
CIS - 15 - Service Provider Management
CIS - 16 - Application Software Security
CIS - 17 - Incident Response Management
CIS - 18 - Penetration Testing
CIS - 2 - Inventory and Control of Software Assets
CIS - 3 - Data Protection
CIS - 4 - Secure Configuration of Enterprise Assets and Software
CIS - 5 - Account Management
CIS - 6 - Access Control Management
CIS - 7 - Continuous Vulnerability Management
CIS - 8 - Audit Log Management
CIS - 9 - Email and Web Browser Protections
NIST CSF v1.1
DETECT (DE)
IDENTIFY (ID)
PROTECT (PR)
RECOVER (RC)
RESPOND (RS)
Category
SMB - Protection Needs & Approaches
not found
Category
Nonprofit - Protection Needs & Approaches
not found
Navigation menu
Page actions
Page
Discussion
Read
View source
History
Page actions
Page
Discussion
More
Tools
Personal tools
Create account
Log in
Navigation
ACT Home
Find Your Community
Find Tools
Report Cybercrime
Top Threats
Enhanced Protection
Advanced Security
Get Help
GET INVOLVED
Terms of Use
UCoC
Disclaimers
Privacy Policy
Help about MediaWiki
Search
Tools
What links here
Related changes
Special pages
Printable version
Permanent link
Page information
Browse properties