0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
A.14.3.1: Protection of Test Data
Development, CI/CD, Software, Review, Test Jeremy Pickett 2/3/25 Development, CI/CD, Software, Review, Test Jeremy Pickett 2/3/25

A.14.3.1: Protection of Test Data

Ensure that test data is protected and controlled.

Read More
A.14.2.9: System Acceptance Testing
Development, CI/CD, Software, Review, Test, Upgrade, Acceptance Jeremy Pickett 1/31/25 Development, CI/CD, Software, Review, Test, Upgrade, Acceptance Jeremy Pickett 1/31/25

A.14.2.9: System Acceptance Testing

Ensure that acceptance criteria for new information systems, upgrades, and new versions are established and suitable tests of the system(s) carried out prior to acceptance.

Read More
A.14.2.8: System Security Testing
Development, CI/CD, Software, Review, Test Jeremy Pickett 1/30/25 Development, CI/CD, Software, Review, Test Jeremy Pickett 1/30/25

A.14.2.8: System Security Testing

Establish a testing process to ensure security functionality is verified and that testing does not introduce new vulnerabilities.

Read More
A.14.2.7: Outsourced Development
Development, CI/CD, Software, Review, Test Jeremy Pickett 1/29/25 Development, CI/CD, Software, Review, Test Jeremy Pickett 1/29/25

A.14.2.7: Outsourced Development

Supervise and monitor outsourced system development to ensure that it meets the organization’s security requirements.

Read More
A.14.2.6: Secure Development Environment
Development, CI/CD, Software, Review, Test Jeremy Pickett 1/28/25 Development, CI/CD, Software, Review, Test Jeremy Pickett 1/28/25

A.14.2.6: Secure Development Environment

Establish and manage a secure development environment for system development and integration.

Read More
A.14.2.5: Secure System Engineering Principles
Development, CI/CD, Software, Review, Test Jeremy Pickett 1/27/25 Development, CI/CD, Software, Review, Test Jeremy Pickett 1/27/25

A.14.2.5: Secure System Engineering Principles

Apply security principles to system engineering efforts.

Read More
A.14.2.4: Restrictions on Changes to Software Packages
Development, CI/CD, Software, Review, Test Jeremy Pickett 1/24/25 Development, CI/CD, Software, Review, Test Jeremy Pickett 1/24/25

A.14.2.4: Restrictions on Changes to Software Packages

Limit changes to software packages to necessary changes and all changes should be strictly controlled.

Read More
A.14.2.3: Technical Review of Applications After Operating Platform Changes
Development, CI/CD, Software, Review, Test Jeremy Pickett 1/23/25 Development, CI/CD, Software, Review, Test Jeremy Pickett 1/23/25

A.14.2.3: Technical Review of Applications After Operating Platform Changes

Review and test application systems when operating systems change.

Read More
A.14.2.2: System Change Control Procedures
Development, CI/CD, Software Jeremy Pickett 1/22/25 Development, CI/CD, Software Jeremy Pickett 1/22/25

A.14.2.2: System Change Control Procedures

Implement procedures to control changes to information systems to minimize the possibility of corruption of information systems.

Read More
A.14.2.1: Secure Development Policy
Development, CI/CD, Software, Testing, QA Jeremy Pickett 1/21/25 Development, CI/CD, Software, Testing, QA Jeremy Pickett 1/21/25

A.14.2.1: Secure Development Policy

Establish a secure development policy, including security requirements for information systems.

Read More
A.12.1.2: Change Management
Change, Procedure, CI/CD, Build, Infrastructure Jeremy Pickett 12/19/24 Change, Procedure, CI/CD, Build, Infrastructure Jeremy Pickett 12/19/24

A.12.1.2: Change Management

Implement change management procedures to ensure that changes to information processing facilities and systems are controlled.

Read More
A.9.4.5: Access Control to Program Source Code
Policy, IAM, Accounts, Provision, Audit, CI/CD Jeremy Pickett 11/25/24 Policy, IAM, Accounts, Provision, Audit, CI/CD Jeremy Pickett 11/25/24

A.9.4.5: Access Control to Program Source Code

Control access to program source code.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC