0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
A.11.1.3: Securing Offices, Rooms, and Facilities
Policy, Audit, Physical, Perimeter Jeremy Pickett 12/2/24 Policy, Audit, Physical, Perimeter Jeremy Pickett 12/2/24

A.11.1.3: Securing Offices, Rooms, and Facilities

Ensure that offices, rooms, and facilities are physically secure.

Read More
A.11.1.2: Physical Entry Controls
Policy, Audit, Physical, Perimeter Jeremy Pickett 11/29/24 Policy, Audit, Physical, Perimeter Jeremy Pickett 11/29/24

A.11.1.2: Physical Entry Controls

Protect secure areas by appropriate entry controls.

Read More
A.11.1.1: Physical Security Perimeter
Policy, Audit, Physical, Perimeter Jeremy Pickett 11/28/24 Policy, Audit, Physical, Perimeter Jeremy Pickett 11/28/24

A.11.1.1: Physical Security Perimeter

Establish physical security perimeters to protect areas that contain information and information processing facilities.

Read More
A.10.1.2: Key Management
Policy, Audit, Encryption, IAM, Key Management, KMS Jeremy Pickett 11/27/24 Policy, Audit, Encryption, IAM, Key Management, KMS Jeremy Pickett 11/27/24

A.10.1.2: Key Management

Develop and implement key management policies and procedures.

Read More
A.10.1.1: Policy on the Use of Cryptographic Controls
Policy, Audit, Encryption, At Rest, In Transit, In Motion Jeremy Pickett 11/26/24 Policy, Audit, Encryption, At Rest, In Transit, In Motion Jeremy Pickett 11/26/24

A.10.1.1: Policy on the Use of Cryptographic Controls

Develop and implement a policy on the use of cryptographic controls.

Read More
A.9.4.5: Access Control to Program Source Code
Policy, IAM, Accounts, Provision, Audit, CI/CD Jeremy Pickett 11/25/24 Policy, IAM, Accounts, Provision, Audit, CI/CD Jeremy Pickett 11/25/24

A.9.4.5: Access Control to Program Source Code

Control access to program source code.

Read More
A.9.4.4: Use of Privileged Utility Programs
Policy, IAM, Accounts, Provision, Audit Jeremy Pickett 11/22/24 Policy, IAM, Accounts, Provision, Audit Jeremy Pickett 11/22/24

A.9.4.4: Use of Privileged Utility Programs

Restrict and control the use of privileged utility programs.

Read More
A.9.4.3: Password Management System
Policy, IAM, Accounts, Provision, Audit Jeremy Pickett 11/21/24 Policy, IAM, Accounts, Provision, Audit Jeremy Pickett 11/21/24

A.9.4.3: Password Management System

Ensure that the password management system is interactive and ensures quality passwords.

Read More
A.9.4.2: Secure Log-on Procedures
Policy, IAM, Accounts, Provision, Audit Jeremy Pickett 11/20/24 Policy, IAM, Accounts, Provision, Audit Jeremy Pickett 11/20/24

A.9.4.2: Secure Log-on Procedures

Ensure that access to systems and applications is controlled by a secure log-on procedure.

Read More
A.9.4.1: Information Access Restriction
Policy, IAM, Accounts, Provision, Audit Jeremy Pickett 11/19/24 Policy, IAM, Accounts, Provision, Audit Jeremy Pickett 11/19/24

A.9.4.1: Information Access Restriction

Restrict access to information and application system functions in accordance with the access control policy.

Read More
A.9.3.1: Use of Secret Authentication Information
Policy, IAM, Accounts, Provision, Audit Jeremy Pickett 11/18/24 Policy, IAM, Accounts, Provision, Audit Jeremy Pickett 11/18/24

A.9.3.1: Use of Secret Authentication Information

Require users to follow the organization’s practices for the use of secret authentication information.

Read More
A.9.2.6: Removal or Adjustment of Access Rights
Policy, IAM, Accounts, Provision, Audit Jeremy Pickett 11/15/24 Policy, IAM, Accounts, Provision, Audit Jeremy Pickett 11/15/24

A.9.2.6: Removal or Adjustment of Access Rights

Ensure that access rights of all employees, contractors, and third-party users to information and information processing facilities are removed upon termination of their employment, contract, or agreement.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC