0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
A.14.1.3: Protecting Application Services Transactions
Application, Services, In Transit, In Motion, Authentication, Encryption Jeremy Pickett 1/20/25 Application, Services, In Transit, In Motion, Authentication, Encryption Jeremy Pickett 1/20/25

A.14.1.3: Protecting Application Services Transactions

Ensure that information involved in application service transactions is protected to prevent incomplete transmission, mis-routing, unauthorized message alteration, unauthorized disclosure, and unauthorized message duplication or replay.

Read More
A.13.2.1: Information Transfer Policies and Procedures
Information, Transfer, In Transit, In Motion Jeremy Pickett 1/13/25 Information, Transfer, In Transit, In Motion Jeremy Pickett 1/13/25

A.13.2.1: Information Transfer Policies and Procedures

Implement policies and procedures for secure transfer of information, both within the organization and with external entities.

Read More
A.10.1.1: Policy on the Use of Cryptographic Controls
Policy, Audit, Encryption, At Rest, In Transit, In Motion Jeremy Pickett 11/26/24 Policy, Audit, Encryption, At Rest, In Transit, In Motion Jeremy Pickett 11/26/24

A.10.1.1: Policy on the Use of Cryptographic Controls

Develop and implement a policy on the use of cryptographic controls.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC