0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
A.14.3.1: Protection of Test Data
Development, CI/CD, Software, Review, Test Jeremy Pickett 2/3/25 Development, CI/CD, Software, Review, Test Jeremy Pickett 2/3/25

A.14.3.1: Protection of Test Data

Ensure that test data is protected and controlled.

Read More
A.14.2.9: System Acceptance Testing
Development, CI/CD, Software, Review, Test, Upgrade, Acceptance Jeremy Pickett 1/31/25 Development, CI/CD, Software, Review, Test, Upgrade, Acceptance Jeremy Pickett 1/31/25

A.14.2.9: System Acceptance Testing

Ensure that acceptance criteria for new information systems, upgrades, and new versions are established and suitable tests of the system(s) carried out prior to acceptance.

Read More
A.14.2.8: System Security Testing
Development, CI/CD, Software, Review, Test Jeremy Pickett 1/30/25 Development, CI/CD, Software, Review, Test Jeremy Pickett 1/30/25

A.14.2.8: System Security Testing

Establish a testing process to ensure security functionality is verified and that testing does not introduce new vulnerabilities.

Read More
A.14.2.7: Outsourced Development
Development, CI/CD, Software, Review, Test Jeremy Pickett 1/29/25 Development, CI/CD, Software, Review, Test Jeremy Pickett 1/29/25

A.14.2.7: Outsourced Development

Supervise and monitor outsourced system development to ensure that it meets the organization’s security requirements.

Read More
A.14.2.6: Secure Development Environment
Development, CI/CD, Software, Review, Test Jeremy Pickett 1/28/25 Development, CI/CD, Software, Review, Test Jeremy Pickett 1/28/25

A.14.2.6: Secure Development Environment

Establish and manage a secure development environment for system development and integration.

Read More
A.14.2.5: Secure System Engineering Principles
Development, CI/CD, Software, Review, Test Jeremy Pickett 1/27/25 Development, CI/CD, Software, Review, Test Jeremy Pickett 1/27/25

A.14.2.5: Secure System Engineering Principles

Apply security principles to system engineering efforts.

Read More
A.14.2.4: Restrictions on Changes to Software Packages
Development, CI/CD, Software, Review, Test Jeremy Pickett 1/24/25 Development, CI/CD, Software, Review, Test Jeremy Pickett 1/24/25

A.14.2.4: Restrictions on Changes to Software Packages

Limit changes to software packages to necessary changes and all changes should be strictly controlled.

Read More
A.14.2.3: Technical Review of Applications After Operating Platform Changes
Development, CI/CD, Software, Review, Test Jeremy Pickett 1/23/25 Development, CI/CD, Software, Review, Test Jeremy Pickett 1/23/25

A.14.2.3: Technical Review of Applications After Operating Platform Changes

Review and test application systems when operating systems change.

Read More
A.14.2.2: System Change Control Procedures
Development, CI/CD, Software Jeremy Pickett 1/22/25 Development, CI/CD, Software Jeremy Pickett 1/22/25

A.14.2.2: System Change Control Procedures

Implement procedures to control changes to information systems to minimize the possibility of corruption of information systems.

Read More
A.14.2.1: Secure Development Policy
Development, CI/CD, Software, Testing, QA Jeremy Pickett 1/21/25 Development, CI/CD, Software, Testing, QA Jeremy Pickett 1/21/25

A.14.2.1: Secure Development Policy

Establish a secure development policy, including security requirements for information systems.

Read More
A.14.1.2: Securing Application Services on Public Networks
Requirements, Process, Policy, Development, Infrastructure Jeremy Pickett 1/17/25 Requirements, Process, Policy, Development, Infrastructure Jeremy Pickett 1/17/25

A.14.1.2: Securing Application Services on Public Networks

Ensure that information involved in application services passing over public networks is protected from fraudulent activity, contract dispute, and unauthorized disclosure and modification.

Read More
A.14.1.1: Information Security Requirements Analysis and Specification
Requirements, Process, Policy, Development, Infrastructure Jeremy Pickett 1/16/25 Requirements, Process, Policy, Development, Infrastructure Jeremy Pickett 1/16/25

A.14.1.1: Information Security Requirements Analysis and Specification

Ensure that information security requirements are included in the requirements for new information systems or enhancements to existing information systems.

Read More
A.12.1.4: Separation of Development, Testing, and Operational Environments
Change, Procedure, Infrastructure, Development, Testing, Operations Jeremy Pickett 12/23/24 Change, Procedure, Infrastructure, Development, Testing, Operations Jeremy Pickett 12/23/24

A.12.1.4: Separation of Development, Testing, and Operational Environments

Implement separation of development, testing, and operational environments to reduce risks from unauthorized access or changes.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC