0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
A.13.2.3: Electronic Messaging
Messaging, Policy, Software, Administration Jeremy Pickett 1/14/25 Messaging, Policy, Software, Administration Jeremy Pickett 1/14/25

A.13.2.3: Electronic Messaging

Implement controls to protect the information involved in electronic messaging.

Read More
A.12.6.2: Restrictions on Software Installation
System, Administration, Software, Installation Jeremy Pickett 1/7/25 System, Administration, Software, Installation Jeremy Pickett 1/7/25

A.12.6.2: Restrictions on Software Installation

Implement policies and procedures to control the installation of software.

Read More
A.12.6.1: Management of Technical Vulnerabilities
System, Administration, Vulnerabilities Jeremy Pickett 1/6/25 System, Administration, Vulnerabilities Jeremy Pickett 1/6/25

A.12.6.1: Management of Technical Vulnerabilities

Obtain information on technical vulnerabilities and establish procedures to manage associated risks.

Read More
A.12.5.1: Installation of Software on Operational Systems
Clock, Time, System, Administration Jeremy Pickett 1/3/25 Clock, Time, System, Administration Jeremy Pickett 1/3/25

A.12.5.1: Installation of Software on Operational Systems

Implement procedures to control the installation of software on operational systems.

Read More
A.12.4.4: Clock Synchronization
Clock, Time, System, Administration Jeremy Pickett 1/2/25 Clock, Time, System, Administration Jeremy Pickett 1/2/25

A.12.4.4: Clock Synchronization

Synchronize the clocks of all relevant information processing systems within the organization.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC