0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
A.12.3.1: Information Backup
Infrastructure, Operations, Backup, Disaster Recovery, DR Jeremy Pickett 12/26/24 Infrastructure, Operations, Backup, Disaster Recovery, DR Jeremy Pickett 12/26/24

A.12.3.1: Information Backup

Implement procedures to back up information and test them regularly.

Read More
A.12.2.1: Controls Against Malware
Infrastructure, Operations, Malware Jeremy Pickett 12/24/24 Infrastructure, Operations, Malware Jeremy Pickett 12/24/24

A.12.2.1: Controls Against Malware

Implement controls to protect against malware.

Read More
A.12.1.4: Separation of Development, Testing, and Operational Environments
Change, Procedure, Infrastructure, Development, Testing, Operations Jeremy Pickett 12/23/24 Change, Procedure, Infrastructure, Development, Testing, Operations Jeremy Pickett 12/23/24

A.12.1.4: Separation of Development, Testing, and Operational Environments

Implement separation of development, testing, and operational environments to reduce risks from unauthorized access or changes.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC