0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
PR.IP-10: Information Protection Processes and Procedures
Configuration, Protection Processes, Incident Response, Business continuity Jeremy Pickett 12/24/24 Configuration, Protection Processes, Incident Response, Business continuity Jeremy Pickett 12/24/24

PR.IP-10: Information Protection Processes and Procedures

Response and recovery plans are tested.

Read More
PR.IP-9: Information Protection Processes and Procedures
Configuration, Process, Procedures, Protection Processes, Incident Response, Business continuity Jeremy Pickett 12/23/24 Configuration, Process, Procedures, Protection Processes, Incident Response, Business continuity Jeremy Pickett 12/23/24

PR.IP-9: Information Protection Processes and Procedures

Response plans (Incident Response and Business Continuity) and recovery plans (Incident Recovery and Disaster Recovery) are in place and managed.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC