0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
A.12.1.1: Documented Operating Procedures
Policy, Physical, Procedure Jeremy Pickett 12/18/24 Policy, Physical, Procedure Jeremy Pickett 12/18/24

A.12.1.1: Documented Operating Procedures

Document and maintain operating procedures for information processing facilities.

Read More
A.11.2.9: Clear Desk and Clear Screen Policy
Policy, Physical, Workforce, Clear Workspace Jeremy Pickett 12/17/24 Policy, Physical, Workforce, Clear Workspace Jeremy Pickett 12/17/24

A.11.2.9: Clear Desk and Clear Screen Policy

Adopt a clear desk policy for papers and removable storage media and a clear screen policy for information processing facilities.

Read More
A.11.2.8: Unattended User Equipment
Policy, Physical, Workforce Jeremy Pickett 12/16/24 Policy, Physical, Workforce Jeremy Pickett 12/16/24

A.11.2.8: Unattended User Equipment

Develop and implement procedures to protect unattended user equipment.

Read More
A.11.2.7: Secure Disposal or Re-Use of Equipment
Policy, Physical, Equipment, Maintenance, Disposal Jeremy Pickett 12/13/24 Policy, Physical, Equipment, Maintenance, Disposal Jeremy Pickett 12/13/24

A.11.2.7: Secure Disposal or Re-Use of Equipment

Ensure that equipment containing storage media is checked to verify that any sensitive data and licensed software has been removed or securely overwritten.

Read More
A.11.2.6: Security of Equipment and Assets Off-Premises
Policy, Physical, Equipment, Maintenance Jeremy Pickett 12/12/24 Policy, Physical, Equipment, Maintenance Jeremy Pickett 12/12/24

A.11.2.6: Security of Equipment and Assets Off-Premises

Ensure the security of equipment and assets used off-premises.

Read More
A.11.2.5: Removal of Assets
Policy, Physical, Equipment, Maintenance Jeremy Pickett 12/11/24 Policy, Physical, Equipment, Maintenance Jeremy Pickett 12/11/24

A.11.2.5: Removal of Assets

Implement policies and procedures to manage the removal of assets to ensure the protection of assets that leave the organization's premises.

Read More
A.11.2.4: Equipment Maintenance
Policy, Physical, Equipment, Maintenance Jeremy Pickett 12/10/24 Policy, Physical, Equipment, Maintenance Jeremy Pickett 12/10/24

A.11.2.4: Equipment Maintenance

Maintain equipment to ensure its continued availability and integrity.

Read More
A.11.2.3: Cabling Security
Policy, Physical Jeremy Pickett 12/9/24 Policy, Physical Jeremy Pickett 12/9/24

A.11.2.3: Cabling Security

Protect power and telecommunications cabling to prevent interception or damage.

Read More
A.11.2.1: Equipment Siting and Protection
Policy, Physical, Loading, External Jeremy Pickett 12/6/24 Policy, Physical, Loading, External Jeremy Pickett 12/6/24

A.11.2.1: Equipment Siting and Protection

Site and protect equipment to reduce risks from environmental threats and hazards, and opportunities for unauthorized access.

Read More
A.11.1.6: Delivery and Loading Areas
Policy, Physical, Loading, External Jeremy Pickett 12/5/24 Policy, Physical, Loading, External Jeremy Pickett 12/5/24

A.11.1.6: Delivery and Loading Areas

Protect delivery and loading areas to ensure that they are controlled.

Read More
A.11.1.5: Working in Secure Areas
Policy, Physical Jeremy Pickett 12/4/24 Policy, Physical Jeremy Pickett 12/4/24

A.11.1.5: Working in Secure Areas

Design and apply procedures for working in secure areas.

Read More
A.11.1.4: Protecting Against External and Environmental Threats
Policy, Physical, Disaster Recovery, DR, Emergency Jeremy Pickett 12/3/24 Policy, Physical, Disaster Recovery, DR, Emergency Jeremy Pickett 12/3/24

A.11.1.4: Protecting Against External and Environmental Threats

Protect equipment from external and environmental threats.

Read More
A.11.1.3: Securing Offices, Rooms, and Facilities
Policy, Audit, Physical, Perimeter Jeremy Pickett 12/2/24 Policy, Audit, Physical, Perimeter Jeremy Pickett 12/2/24

A.11.1.3: Securing Offices, Rooms, and Facilities

Ensure that offices, rooms, and facilities are physically secure.

Read More
A.11.1.2: Physical Entry Controls
Policy, Audit, Physical, Perimeter Jeremy Pickett 11/29/24 Policy, Audit, Physical, Perimeter Jeremy Pickett 11/29/24

A.11.1.2: Physical Entry Controls

Protect secure areas by appropriate entry controls.

Read More
A.11.1.1: Physical Security Perimeter
Policy, Audit, Physical, Perimeter Jeremy Pickett 11/28/24 Policy, Audit, Physical, Perimeter Jeremy Pickett 11/28/24

A.11.1.1: Physical Security Perimeter

Establish physical security perimeters to protect areas that contain information and information processing facilities.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC