0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
A.14.3.1: Protection of Test Data
Development, CI/CD, Software, Review, Test Jeremy Pickett 2/3/25 Development, CI/CD, Software, Review, Test Jeremy Pickett 2/3/25

A.14.3.1: Protection of Test Data

Ensure that test data is protected and controlled.

Read More
A.14.2.9: System Acceptance Testing
Development, CI/CD, Software, Review, Test, Upgrade, Acceptance Jeremy Pickett 1/31/25 Development, CI/CD, Software, Review, Test, Upgrade, Acceptance Jeremy Pickett 1/31/25

A.14.2.9: System Acceptance Testing

Ensure that acceptance criteria for new information systems, upgrades, and new versions are established and suitable tests of the system(s) carried out prior to acceptance.

Read More
A.14.2.8: System Security Testing
Development, CI/CD, Software, Review, Test Jeremy Pickett 1/30/25 Development, CI/CD, Software, Review, Test Jeremy Pickett 1/30/25

A.14.2.8: System Security Testing

Establish a testing process to ensure security functionality is verified and that testing does not introduce new vulnerabilities.

Read More
A.14.2.7: Outsourced Development
Development, CI/CD, Software, Review, Test Jeremy Pickett 1/29/25 Development, CI/CD, Software, Review, Test Jeremy Pickett 1/29/25

A.14.2.7: Outsourced Development

Supervise and monitor outsourced system development to ensure that it meets the organization’s security requirements.

Read More
A.14.2.6: Secure Development Environment
Development, CI/CD, Software, Review, Test Jeremy Pickett 1/28/25 Development, CI/CD, Software, Review, Test Jeremy Pickett 1/28/25

A.14.2.6: Secure Development Environment

Establish and manage a secure development environment for system development and integration.

Read More
A.14.2.5: Secure System Engineering Principles
Development, CI/CD, Software, Review, Test Jeremy Pickett 1/27/25 Development, CI/CD, Software, Review, Test Jeremy Pickett 1/27/25

A.14.2.5: Secure System Engineering Principles

Apply security principles to system engineering efforts.

Read More
A.14.2.4: Restrictions on Changes to Software Packages
Development, CI/CD, Software, Review, Test Jeremy Pickett 1/24/25 Development, CI/CD, Software, Review, Test Jeremy Pickett 1/24/25

A.14.2.4: Restrictions on Changes to Software Packages

Limit changes to software packages to necessary changes and all changes should be strictly controlled.

Read More
A.14.2.3: Technical Review of Applications After Operating Platform Changes
Development, CI/CD, Software, Review, Test Jeremy Pickett 1/23/25 Development, CI/CD, Software, Review, Test Jeremy Pickett 1/23/25

A.14.2.3: Technical Review of Applications After Operating Platform Changes

Review and test application systems when operating systems change.

Read More
A.14.2.2: System Change Control Procedures
Development, CI/CD, Software Jeremy Pickett 1/22/25 Development, CI/CD, Software Jeremy Pickett 1/22/25

A.14.2.2: System Change Control Procedures

Implement procedures to control changes to information systems to minimize the possibility of corruption of information systems.

Read More
A.14.2.1: Secure Development Policy
Development, CI/CD, Software, Testing, QA Jeremy Pickett 1/21/25 Development, CI/CD, Software, Testing, QA Jeremy Pickett 1/21/25

A.14.2.1: Secure Development Policy

Establish a secure development policy, including security requirements for information systems.

Read More
A.13.2.3: Electronic Messaging
Messaging, Policy, Software, Administration Jeremy Pickett 1/14/25 Messaging, Policy, Software, Administration Jeremy Pickett 1/14/25

A.13.2.3: Electronic Messaging

Implement controls to protect the information involved in electronic messaging.

Read More
A.12.6.2: Restrictions on Software Installation
System, Administration, Software, Installation Jeremy Pickett 1/7/25 System, Administration, Software, Installation Jeremy Pickett 1/7/25

A.12.6.2: Restrictions on Software Installation

Implement policies and procedures to control the installation of software.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC