0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
A.14.1.2: Securing Application Services on Public Networks
Requirements, Process, Policy, Development, Infrastructure Jeremy Pickett 1/17/25 Requirements, Process, Policy, Development, Infrastructure Jeremy Pickett 1/17/25

A.14.1.2: Securing Application Services on Public Networks

Ensure that information involved in application services passing over public networks is protected from fraudulent activity, contract dispute, and unauthorized disclosure and modification.

Read More
A.14.1.1: Information Security Requirements Analysis and Specification
Requirements, Process, Policy, Development, Infrastructure Jeremy Pickett 1/16/25 Requirements, Process, Policy, Development, Infrastructure Jeremy Pickett 1/16/25

A.14.1.1: Information Security Requirements Analysis and Specification

Ensure that information security requirements are included in the requirements for new information systems or enhancements to existing information systems.

Read More
A.12.3.1: Information Backup
Infrastructure, Operations, Backup, Disaster Recovery, DR Jeremy Pickett 12/26/24 Infrastructure, Operations, Backup, Disaster Recovery, DR Jeremy Pickett 12/26/24

A.12.3.1: Information Backup

Implement procedures to back up information and test them regularly.

Read More
A.12.2.1: Controls Against Malware
Infrastructure, Operations, Malware Jeremy Pickett 12/24/24 Infrastructure, Operations, Malware Jeremy Pickett 12/24/24

A.12.2.1: Controls Against Malware

Implement controls to protect against malware.

Read More
A.12.1.4: Separation of Development, Testing, and Operational Environments
Change, Procedure, Infrastructure, Development, Testing, Operations Jeremy Pickett 12/23/24 Change, Procedure, Infrastructure, Development, Testing, Operations Jeremy Pickett 12/23/24

A.12.1.4: Separation of Development, Testing, and Operational Environments

Implement separation of development, testing, and operational environments to reduce risks from unauthorized access or changes.

Read More
A.12.1.3: Capacity Management
Change, Procedure, Infrastructure Jeremy Pickett 12/20/24 Change, Procedure, Infrastructure Jeremy Pickett 12/20/24

A.12.1.3: Capacity Management

Monitor, tune, and review capacity requirements to ensure continuous availability.

Read More
A.12.1.2: Change Management
Change, Procedure, CI/CD, Build, Infrastructure Jeremy Pickett 12/19/24 Change, Procedure, CI/CD, Build, Infrastructure Jeremy Pickett 12/19/24

A.12.1.2: Change Management

Implement change management procedures to ensure that changes to information processing facilities and systems are controlled.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC