0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
164.308(a)(8): Evaluation
Data, Categoriztion, Evaluation Jeremy Pickett 10/16/24 Data, Categoriztion, Evaluation Jeremy Pickett 10/16/24

164.308(a)(8): Evaluation

Perform periodic technical and non-technical evaluations to ensure that security policies and procedures meet the requirements.

Read More
164.308(a)(7)(ii)(E): Applications and Data Criticality Analysis
Data, Partitioning, Labeling, Categoriztion Jeremy Pickett 10/15/24 Data, Partitioning, Labeling, Categoriztion Jeremy Pickett 10/15/24

164.308(a)(7)(ii)(E): Applications and Data Criticality Analysis

Assess the relative criticality of specific applications and data in support of other contingency plan components.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC