0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
A.11.2.9: Clear Desk and Clear Screen Policy
Policy, Physical, Workforce, Clear Workspace Jeremy Pickett 12/17/24 Policy, Physical, Workforce, Clear Workspace Jeremy Pickett 12/17/24

A.11.2.9: Clear Desk and Clear Screen Policy

Adopt a clear desk policy for papers and removable storage media and a clear screen policy for information processing facilities.

Read More
A.11.2.8: Unattended User Equipment
Policy, Physical, Workforce Jeremy Pickett 12/16/24 Policy, Physical, Workforce Jeremy Pickett 12/16/24

A.11.2.8: Unattended User Equipment

Develop and implement procedures to protect unattended user equipment.

Read More
—A.7.2.1: Management Responsibilities
Employment, Workforce, Management Jeremy Pickett 10/17/24 Employment, Workforce, Management Jeremy Pickett 10/17/24

—A.7.2.1: Management Responsibilities

Require management to ensure that employees and contractors apply information security in accordance with established policies and procedures.

Read More
—A.7.1.2: Terms and Conditions of Employment
Employment, Workforce Jeremy Pickett 10/16/24 Employment, Workforce Jeremy Pickett 10/16/24

—A.7.1.2: Terms and Conditions of Employment

Ensure that employees, contractors, and third-party users agree to and sign the terms and conditions of their employment contract, which states their and the organization’s responsibilities for information security.

Read More
Contact with Special Interest Groups
Policy, Workforce, Law Enforcement, Authorities Jeremy Pickett 10/9/24 Policy, Workforce, Law Enforcement, Authorities Jeremy Pickett 10/9/24

Contact with Special Interest Groups

Establish connections with special interest groups or other specialist security forums and professional associations.

Read More
Contact with Authorities
Policy, Workforce, Law Enforcement, Authorities Jeremy Pickett 10/7/24 Policy, Workforce, Law Enforcement, Authorities Jeremy Pickett 10/7/24

Contact with Authorities

Maintain appropriate contacts with relevant authorities.

Read More
Segregation of Duties
Policy, Roles, Responsibilities, Workforce, Duties Jeremy Pickett 10/4/24 Policy, Roles, Responsibilities, Workforce, Duties Jeremy Pickett 10/4/24

Segregation of Duties

Reduce the risk of accidental or deliberate misuse of information system by segregating duties.

Read More
Information Security Roles and Responsibilities
Policy, Roles, Responsibilities, Workforce Jeremy Pickett 10/3/24 Policy, Roles, Responsibilities, Workforce Jeremy Pickett 10/3/24

Information Security Roles and Responsibilities

Ensure that policies for information security are reviewed at planned intervals or when significant changes occur.

Read More
Policy Review for Information Security
Policy, Roles, Responsibilities, Workforce Jeremy Pickett 10/2/24 Policy, Roles, Responsibilities, Workforce Jeremy Pickett 10/2/24

Policy Review for Information Security

Ensure that policies for information security are reviewed at planned intervals or when significant changes occur.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC