0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
A.14.3.1: Protection of Test Data
Development, CI/CD, Software, Review, Test Jeremy Pickett 2/3/25 Development, CI/CD, Software, Review, Test Jeremy Pickett 2/3/25

A.14.3.1: Protection of Test Data

Ensure that test data is protected and controlled.

Read More
A.14.2.9: System Acceptance Testing
Development, CI/CD, Software, Review, Test, Upgrade, Acceptance Jeremy Pickett 1/31/25 Development, CI/CD, Software, Review, Test, Upgrade, Acceptance Jeremy Pickett 1/31/25

A.14.2.9: System Acceptance Testing

Ensure that acceptance criteria for new information systems, upgrades, and new versions are established and suitable tests of the system(s) carried out prior to acceptance.

Read More
A.14.2.8: System Security Testing
Development, CI/CD, Software, Review, Test Jeremy Pickett 1/30/25 Development, CI/CD, Software, Review, Test Jeremy Pickett 1/30/25

A.14.2.8: System Security Testing

Establish a testing process to ensure security functionality is verified and that testing does not introduce new vulnerabilities.

Read More
A.14.2.7: Outsourced Development
Development, CI/CD, Software, Review, Test Jeremy Pickett 1/29/25 Development, CI/CD, Software, Review, Test Jeremy Pickett 1/29/25

A.14.2.7: Outsourced Development

Supervise and monitor outsourced system development to ensure that it meets the organization’s security requirements.

Read More
A.14.2.6: Secure Development Environment
Development, CI/CD, Software, Review, Test Jeremy Pickett 1/28/25 Development, CI/CD, Software, Review, Test Jeremy Pickett 1/28/25

A.14.2.6: Secure Development Environment

Establish and manage a secure development environment for system development and integration.

Read More
A.14.2.5: Secure System Engineering Principles
Development, CI/CD, Software, Review, Test Jeremy Pickett 1/27/25 Development, CI/CD, Software, Review, Test Jeremy Pickett 1/27/25

A.14.2.5: Secure System Engineering Principles

Apply security principles to system engineering efforts.

Read More
A.14.2.4: Restrictions on Changes to Software Packages
Development, CI/CD, Software, Review, Test Jeremy Pickett 1/24/25 Development, CI/CD, Software, Review, Test Jeremy Pickett 1/24/25

A.14.2.4: Restrictions on Changes to Software Packages

Limit changes to software packages to necessary changes and all changes should be strictly controlled.

Read More
A.14.2.3: Technical Review of Applications After Operating Platform Changes
Development, CI/CD, Software, Review, Test Jeremy Pickett 1/23/25 Development, CI/CD, Software, Review, Test Jeremy Pickett 1/23/25

A.14.2.3: Technical Review of Applications After Operating Platform Changes

Review and test application systems when operating systems change.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC