0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
A.18.2.3: Technical Compliance Review
Compliance, Regulations, Contracts, Policy Jeremy Pickett 3/6/25 Compliance, Regulations, Contracts, Policy Jeremy Pickett 3/6/25

A.18.2.3: Technical Compliance Review

Perform regular reviews of information systems for compliance with the organization’s information security policies and standards.

Read More
A.18.2.2: Compliance with Security Policies and Standards
Compliance, Regulations, Contracts, Policy Jeremy Pickett 3/5/25 Compliance, Regulations, Contracts, Policy Jeremy Pickett 3/5/25

A.18.2.2: Compliance with Security Policies and Standards

Ensure that managers regularly review the compliance of information processing and procedures within their area of responsibility with the appropriate security policies, standards, and any other security requirements.

Read More
A.18.2.1: Independent Review of Information Security
Compliance, Regulations, Contracts, Policy, Review Jeremy Pickett 3/4/25 Compliance, Regulations, Contracts, Policy, Review Jeremy Pickett 3/4/25

A.18.2.1: Independent Review of Information Security

Conduct an independent review of the information security policy and its implementation at planned intervals or when significant changes occur.

Read More
A.18.1.5: Regulation of Cryptographic Controls
Cryptography, Compliance, Regulations, Contracts Jeremy Pickett 3/3/25 Cryptography, Compliance, Regulations, Contracts Jeremy Pickett 3/3/25

A.18.1.5: Regulation of Cryptographic Controls

Ensure compliance with all relevant legislative, regulatory, and contractual requirements for the use of cryptographic controls.

Read More
A.18.1.4: Privacy and Protection of Personally Identifiable Information
Privacy, PII, Regulations, Contracts, Legislation Jeremy Pickett 2/28/25 Privacy, PII, Regulations, Contracts, Legislation Jeremy Pickett 2/28/25

A.18.1.4: Privacy and Protection of Personally Identifiable Information

Ensure compliance with relevant legislative, regulatory, and contractual requirements for privacy and the protection of personally identifiable information.

Read More
A.18.1.2: Intellectual Property Rights
Legal, Contracts, Government, Regulation, Intellectual Property, Copyright Jeremy Pickett 2/26/25 Legal, Contracts, Government, Regulation, Intellectual Property, Copyright Jeremy Pickett 2/26/25

A.18.1.2: Intellectual Property Rights

Ensure compliance with all relevant legislative, regulatory, and contractual requirements for the use of intellectual property.

Read More
A.18.1.1: Identification of Applicable Legislation and Contractual Requirements
Legal, Contracts, Government, Legislation, Regulation Jeremy Pickett 2/25/25 Legal, Contracts, Government, Legislation, Regulation Jeremy Pickett 2/25/25

A.18.1.1: Identification of Applicable Legislation and Contractual Requirements

Identify and document the legislative, regulatory, and contractual requirements related to information security and the organization’s approach to meet these requirements.

Read More
A.13.2.4: Confidentiality or Non-Disclosure Agreements
Legal, Contracts, Disclosure Jeremy Pickett 1/15/25 Legal, Contracts, Disclosure Jeremy Pickett 1/15/25

A.13.2.4: Confidentiality or Non-Disclosure Agreements

Ensure that confidentiality or non-disclosure agreements reflect the organization’s needs for the protection of information.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC