0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
A.18.2.3: Technical Compliance Review
Compliance, Regulations, Contracts, Policy Jeremy Pickett 3/6/25 Compliance, Regulations, Contracts, Policy Jeremy Pickett 3/6/25

A.18.2.3: Technical Compliance Review

Perform regular reviews of information systems for compliance with the organization’s information security policies and standards.

Read More
A.18.2.2: Compliance with Security Policies and Standards
Compliance, Regulations, Contracts, Policy Jeremy Pickett 3/5/25 Compliance, Regulations, Contracts, Policy Jeremy Pickett 3/5/25

A.18.2.2: Compliance with Security Policies and Standards

Ensure that managers regularly review the compliance of information processing and procedures within their area of responsibility with the appropriate security policies, standards, and any other security requirements.

Read More
A.18.2.1: Independent Review of Information Security
Compliance, Regulations, Contracts, Policy, Review Jeremy Pickett 3/4/25 Compliance, Regulations, Contracts, Policy, Review Jeremy Pickett 3/4/25

A.18.2.1: Independent Review of Information Security

Conduct an independent review of the information security policy and its implementation at planned intervals or when significant changes occur.

Read More
A.18.1.5: Regulation of Cryptographic Controls
Cryptography, Compliance, Regulations, Contracts Jeremy Pickett 3/3/25 Cryptography, Compliance, Regulations, Contracts Jeremy Pickett 3/3/25

A.18.1.5: Regulation of Cryptographic Controls

Ensure compliance with all relevant legislative, regulatory, and contractual requirements for the use of cryptographic controls.

Read More
A.18.1.4: Privacy and Protection of Personally Identifiable Information
Privacy, PII, Regulations, Contracts, Legislation Jeremy Pickett 2/28/25 Privacy, PII, Regulations, Contracts, Legislation Jeremy Pickett 2/28/25

A.18.1.4: Privacy and Protection of Personally Identifiable Information

Ensure compliance with relevant legislative, regulatory, and contractual requirements for privacy and the protection of personally identifiable information.

Read More
A.18.1.3: Protection of Records
Records, Access, Authorization, Control, Procedure, Process Jeremy Pickett 2/27/25 Records, Access, Authorization, Control, Procedure, Process Jeremy Pickett 2/27/25

A.18.1.3: Protection of Records

Ensure that records are protected from loss, destruction, falsification, unauthorized access, and unauthorized release.

Read More
A.18.1.2: Intellectual Property Rights
Legal, Contracts, Government, Regulation, Intellectual Property, Copyright Jeremy Pickett 2/26/25 Legal, Contracts, Government, Regulation, Intellectual Property, Copyright Jeremy Pickett 2/26/25

A.18.1.2: Intellectual Property Rights

Ensure compliance with all relevant legislative, regulatory, and contractual requirements for the use of intellectual property.

Read More
A.18.1.1: Identification of Applicable Legislation and Contractual Requirements
Legal, Contracts, Government, Legislation, Regulation Jeremy Pickett 2/25/25 Legal, Contracts, Government, Legislation, Regulation Jeremy Pickett 2/25/25

A.18.1.1: Identification of Applicable Legislation and Contractual Requirements

Identify and document the legislative, regulatory, and contractual requirements related to information security and the organization’s approach to meet these requirements.

Read More
A.17.2.1: Availability of Information Processing Facilities
Verify, Review, Evaluate, Continuity Jeremy Pickett 2/24/25 Verify, Review, Evaluate, Continuity Jeremy Pickett 2/24/25

A.17.2.1: Availability of Information Processing Facilities

Implement redundancy and ensure the availability of information processing facilities.

Read More
A.17.1.3: Verify, Review and Evaluate Information Security Continuity
Verify, Review, Evaluate, Continuity Jeremy Pickett 2/21/25 Verify, Review, Evaluate, Continuity Jeremy Pickett 2/21/25

A.17.1.3: Verify, Review and Evaluate Information Security Continuity

Verify the established and implemented information security continuity controls at regular intervals to ensure they are effective during adverse situations.

Read More
A.17.1.2: Implementing Information Security Continuity
Continuity, Management, Disaster Recovery, Recovery, Emergency Jeremy Pickett 2/20/25 Continuity, Management, Disaster Recovery, Recovery, Emergency Jeremy Pickett 2/20/25

A.17.1.2: Implementing Information Security Continuity

Establish, document, implement and maintain processes, procedures and controls to ensure the required level of continuity for information security during an adverse situation.

Read More
A.17.1.1: Planning Information Security Continuity
Continuity, Management, Disaster Recovery, Recovery, Emergency Jeremy Pickett 2/19/25 Continuity, Management, Disaster Recovery, Recovery, Emergency Jeremy Pickett 2/19/25

A.17.1.1: Planning Information Security Continuity

Include information security continuity in the organization’s business continuity management systems.

Read More
A.16.1.7: Collection of Evidence
Procedures, Incident, Response, Events, Logs, Analysis, Identification, Collection Jeremy Pickett 2/18/25 Procedures, Incident, Response, Events, Logs, Analysis, Identification, Collection Jeremy Pickett 2/18/25

A.16.1.7: Collection of Evidence

Define and apply procedures for the identification, collection, acquisition, and preservation of information, which can serve as evidence.

Read More
A.16.1.6: Learning from Information Security Incidents
Procedures, Incident, Response, Events, Logs, Analysis Jeremy Pickett 2/17/25 Procedures, Incident, Response, Events, Logs, Analysis Jeremy Pickett 2/17/25

A.16.1.6: Learning from Information Security Incidents

Collect and use information about information security incidents to improve the response process.

Read More
A.16.1.5: Response to Information Security Incidents
Procedures, Incident, Response, Events, Logs, Analysis Jeremy Pickett 2/14/25 Procedures, Incident, Response, Events, Logs, Analysis Jeremy Pickett 2/14/25

A.16.1.5: Response to Information Security Incidents

Respond to information security incidents in accordance with the documented procedures.

Read More
A.16.1.4: Assessment of and Decision on Information Security Events
Procedures, Incident, Response, Events, Logs, Analysis Jeremy Pickett 2/13/25 Procedures, Incident, Response, Events, Logs, Analysis Jeremy Pickett 2/13/25

A.16.1.4: Assessment of and Decision on Information Security Events

Assess information security events and decide if they are to be classified as information security incidents.

Read More
A.16.1.2: Reporting Information Security Events
Procedures, Incident, Response, Events, Logs, Analysis Jeremy Pickett 2/12/25 Procedures, Incident, Response, Events, Logs, Analysis Jeremy Pickett 2/12/25

A.16.1.2: Reporting Information Security Events

Ensure that information security events are reported through appropriate management channels as quickly as possible.

Read More
A.16.1.1: Responsibilities and Procedures
Suppliers, 3rd Parties, External, Controls, Procedures Jeremy Pickett 2/11/25 Suppliers, 3rd Parties, External, Controls, Procedures Jeremy Pickett 2/11/25

A.16.1.1: Responsibilities and Procedures

Establish responsibilities and procedures to ensure a quick, effective, and orderly response to information security incidents.

Read More
A.15.2.2: Managing Changes to Supplier Services
Suppliers, 3rd Parties, External, Controls Jeremy Pickett 2/10/25 Suppliers, 3rd Parties, External, Controls Jeremy Pickett 2/10/25

A.15.2.2: Managing Changes to Supplier Services

Manage changes to supplier services, including maintaining and improving existing information security policies, procedures, and controls.

Read More
A.15.2.1: Monitoring and Review of Supplier Services
Suppliers, 3rd Parties, External, Controls Jeremy Pickett 2/7/25 Suppliers, 3rd Parties, External, Controls Jeremy Pickett 2/7/25

A.15.2.1: Monitoring and Review of Supplier Services

Regularly monitor, review, and audit supplier service delivery to ensure information security requirements are being met.

Read More
Older Posts

Contact: jeremy@japhontech.com : : japhontech, LLC