0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
A.14.1.2: Securing Application Services on Public Networks
Requirements, Process, Policy, Development, Infrastructure Jeremy Pickett 1/17/25 Requirements, Process, Policy, Development, Infrastructure Jeremy Pickett 1/17/25

A.14.1.2: Securing Application Services on Public Networks

Ensure that information involved in application services passing over public networks is protected from fraudulent activity, contract dispute, and unauthorized disclosure and modification.

Read More
A.14.1.1: Information Security Requirements Analysis and Specification
Requirements, Process, Policy, Development, Infrastructure Jeremy Pickett 1/16/25 Requirements, Process, Policy, Development, Infrastructure Jeremy Pickett 1/16/25

A.14.1.1: Information Security Requirements Analysis and Specification

Ensure that information security requirements are included in the requirements for new information systems or enhancements to existing information systems.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC