0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
A.11.1.3: Securing Offices, Rooms, and Facilities
Policy, Audit, Physical, Perimeter Jeremy Pickett 12/2/24 Policy, Audit, Physical, Perimeter Jeremy Pickett 12/2/24

A.11.1.3: Securing Offices, Rooms, and Facilities

Ensure that offices, rooms, and facilities are physically secure.

Read More
A.11.1.2: Physical Entry Controls
Policy, Audit, Physical, Perimeter Jeremy Pickett 11/29/24 Policy, Audit, Physical, Perimeter Jeremy Pickett 11/29/24

A.11.1.2: Physical Entry Controls

Protect secure areas by appropriate entry controls.

Read More
A.11.1.1: Physical Security Perimeter
Policy, Audit, Physical, Perimeter Jeremy Pickett 11/28/24 Policy, Audit, Physical, Perimeter Jeremy Pickett 11/28/24

A.11.1.1: Physical Security Perimeter

Establish physical security perimeters to protect areas that contain information and information processing facilities.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC