0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
A.18.1.3: Protection of Records
Records, Access, Authorization, Control, Procedure, Process Jeremy Pickett 2/27/25 Records, Access, Authorization, Control, Procedure, Process Jeremy Pickett 2/27/25

A.18.1.3: Protection of Records

Ensure that records are protected from loss, destruction, falsification, unauthorized access, and unauthorized release.

Read More
A.13.1.2: Security of Network Services
Network, NOC, Systems, Access Jeremy Pickett 1/9/25 Network, NOC, Systems, Access Jeremy Pickett 1/9/25

A.13.1.2: Security of Network Services

Ensure that security features, service levels, and management requirements of all network services are identified and included in network services agreements, whether these services are provided in-house or outsourced.

Read More
A.13.1.1: Network Controls
Network, NOC, Systems, Access Jeremy Pickett 1/8/25 Network, NOC, Systems, Access Jeremy Pickett 1/8/25

A.13.1.1: Network Controls

Implement network controls to manage and control the network, including any remote access.

Read More
A.7.1.1: Screening
Policy, Access, Background Check, Screen Jeremy Pickett 10/15/24 Policy, Access, Background Check, Screen Jeremy Pickett 10/15/24

A.7.1.1: Screening

Ensure that background verification checks on all candidates for employment, contractors, and third-party users are carried out.

Read More
Teleworking
Telework, Remote Work, Policy, Access Jeremy Pickett 10/14/24 Telework, Remote Work, Policy, Access Jeremy Pickett 10/14/24

Teleworking

Develop a policy and supporting security measures to protect information accessed, processed, or stored at teleworking sites.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC