0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
A.16.1.1: Responsibilities and Procedures
Suppliers, 3rd Parties, External, Controls, Procedures Jeremy Pickett 2/11/25 Suppliers, 3rd Parties, External, Controls, Procedures Jeremy Pickett 2/11/25

A.16.1.1: Responsibilities and Procedures

Establish responsibilities and procedures to ensure a quick, effective, and orderly response to information security incidents.

Read More
A.15.2.2: Managing Changes to Supplier Services
Suppliers, 3rd Parties, External, Controls Jeremy Pickett 2/10/25 Suppliers, 3rd Parties, External, Controls Jeremy Pickett 2/10/25

A.15.2.2: Managing Changes to Supplier Services

Manage changes to supplier services, including maintaining and improving existing information security policies, procedures, and controls.

Read More
A.15.2.1: Monitoring and Review of Supplier Services
Suppliers, 3rd Parties, External, Controls Jeremy Pickett 2/7/25 Suppliers, 3rd Parties, External, Controls Jeremy Pickett 2/7/25

A.15.2.1: Monitoring and Review of Supplier Services

Regularly monitor, review, and audit supplier service delivery to ensure information security requirements are being met.

Read More
A.15.1.3: Information and Communication Technology Supply Chain
Suppliers, 3rd Parties, External, Controls Jeremy Pickett 2/6/25 Suppliers, 3rd Parties, External, Controls Jeremy Pickett 2/6/25

A.15.1.3: Information and Communication Technology Supply Chain

Address information security within the information and communication technology supply chain.

Read More
A.15.1.2: Addressing Security in Supplier Agreements
Suppliers, 3rd Parties, External, Controls Jeremy Pickett 2/5/25 Suppliers, 3rd Parties, External, Controls Jeremy Pickett 2/5/25

A.15.1.2: Addressing Security in Supplier Agreements

Ensure that agreements with suppliers include requirements to address the information security risks associated with information and communications technology services and product supply chain.

Read More
A.15.1.1: Information Security Policy for Supplier Relationships
Suppliers, 3rd Parties, External, Controls Jeremy Pickett 2/4/25 Suppliers, 3rd Parties, External, Controls Jeremy Pickett 2/4/25

A.15.1.1: Information Security Policy for Supplier Relationships

Ensure that suppliers agree and can demonstrate they provide appropriate security controls.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC