0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
A.13.1.3: Segregation in Networks
Network, Architecture, NOC Jeremy Pickett 1/10/25 Network, Architecture, NOC Jeremy Pickett 1/10/25

A.13.1.3: Segregation in Networks

Implement segregation in networks to ensure that groups of information services, users, and information systems are segregated based on the organization's risk assessment.

Read More
A.13.1.2: Security of Network Services
Network, NOC, Systems, Access Jeremy Pickett 1/9/25 Network, NOC, Systems, Access Jeremy Pickett 1/9/25

A.13.1.2: Security of Network Services

Ensure that security features, service levels, and management requirements of all network services are identified and included in network services agreements, whether these services are provided in-house or outsourced.

Read More
A.13.1.1: Network Controls
Network, NOC, Systems, Access Jeremy Pickett 1/8/25 Network, NOC, Systems, Access Jeremy Pickett 1/8/25

A.13.1.1: Network Controls

Implement network controls to manage and control the network, including any remote access.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC