0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
PR.PT-3: Protective Technology
Protective, Least functionality, Configuration Jeremy Pickett 1/6/25 Protective, Least functionality, Configuration Jeremy Pickett 1/6/25

PR.PT-3: Protective Technology

The principle of least functionality is incorporated by configuring systems to provide only essential capabilities.

Read More
PR.MA-1: Maintenance
Configuration, Maintenance, Repairs Jeremy Pickett 12/30/24 Configuration, Maintenance, Repairs Jeremy Pickett 12/30/24

PR.MA-1: Maintenance

Maintenance and repair of organizational assets are performed and logged in a timely manner, with approved and controlled tools.

Read More
PR.IP-12: Information Protection Processes and Procedures
Configuration, Protection Processes, Incident Response Jeremy Pickett 12/27/24 Configuration, Protection Processes, Incident Response Jeremy Pickett 12/27/24

PR.IP-12: Information Protection Processes and Procedures

A vulnerability management plan is developed and implemented.

Read More
PR.IP-11: Information Protection Processes and Procedures
Configuration, Protection Processes, Incident Response, Human Resources Jeremy Pickett 12/26/24 Configuration, Protection Processes, Incident Response, Human Resources Jeremy Pickett 12/26/24

PR.IP-11: Information Protection Processes and Procedures

Cybersecurity is included in human resources practices (e.g., deprovisioning, personnel screening).

Read More
PR.IP-10: Information Protection Processes and Procedures
Configuration, Protection Processes, Incident Response, Business continuity Jeremy Pickett 12/24/24 Configuration, Protection Processes, Incident Response, Business continuity Jeremy Pickett 12/24/24

PR.IP-10: Information Protection Processes and Procedures

Response and recovery plans are tested.

Read More
PR.IP-9: Information Protection Processes and Procedures
Configuration, Process, Procedures, Protection Processes, Incident Response, Business continuity Jeremy Pickett 12/23/24 Configuration, Process, Procedures, Protection Processes, Incident Response, Business continuity Jeremy Pickett 12/23/24

PR.IP-9: Information Protection Processes and Procedures

Response plans (Incident Response and Business Continuity) and recovery plans (Incident Recovery and Disaster Recovery) are in place and managed.

Read More
PR.IP-8: Information Protection Processes and Procedures
Configuration, Process, Procedures, Protection Processes Jeremy Pickett 12/20/24 Configuration, Process, Procedures, Protection Processes Jeremy Pickett 12/20/24

PR.IP-8: Information Protection Processes and Procedures

Effectiveness of protection technologies is shared and analyzed.

Read More
PR.IP-7: Information Protection Processes and Procedures
Configuration, Process, Procedures, Data Destruction Jeremy Pickett 12/19/24 Configuration, Process, Procedures, Data Destruction Jeremy Pickett 12/19/24

PR.IP-7: Information Protection Processes and Procedures

Protection processes are improved.

Read More
PR.IP-6: Information Protection Processes and Procedures
Configuration, Process, Procedures, Data Destruction Jeremy Pickett 12/18/24 Configuration, Process, Procedures, Data Destruction Jeremy Pickett 12/18/24

PR.IP-6: Information Protection Processes and Procedures

Data is destroyed according to policy.

Read More
PR.IP-5: Information Protection Processes and Procedures
Configuration, Change Control, Process, Procedures, Backups Jeremy Pickett 12/17/24 Configuration, Change Control, Process, Procedures, Backups Jeremy Pickett 12/17/24

PR.IP-5: Information Protection Processes and Procedures

Policy and regulations regarding the physical operating environment for organizational assets are met.

Read More
PR.IP-4: Information Protection Processes and Procedures
Configuration, Change Control, Process, Procedures, Backups Jeremy Pickett 12/16/24 Configuration, Change Control, Process, Procedures, Backups Jeremy Pickett 12/16/24

PR.IP-4: Information Protection Processes and Procedures

Backups of information are conducted, maintained, and tested periodically.

Read More
PR.IP-3: Information Protection Processes and Procedures
Configuration, Change Control, Process, Procedures Jeremy Pickett 12/13/24 Configuration, Change Control, Process, Procedures Jeremy Pickett 12/13/24

PR.IP-3: Information Protection Processes and Procedures

Configuration change control processes are in place.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC