0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
A.17.2.1: Availability of Information Processing Facilities
Verify, Review, Evaluate, Continuity Jeremy Pickett 2/24/25 Verify, Review, Evaluate, Continuity Jeremy Pickett 2/24/25

A.17.2.1: Availability of Information Processing Facilities

Implement redundancy and ensure the availability of information processing facilities.

Read More
A.17.1.3: Verify, Review and Evaluate Information Security Continuity
Verify, Review, Evaluate, Continuity Jeremy Pickett 2/21/25 Verify, Review, Evaluate, Continuity Jeremy Pickett 2/21/25

A.17.1.3: Verify, Review and Evaluate Information Security Continuity

Verify the established and implemented information security continuity controls at regular intervals to ensure they are effective during adverse situations.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC