0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
DE.AE-5: Anomalies and Events
Control networks, Protective Technology, Anomalies, Events, Incidents Jeremy Pickett 1/14/25 Control networks, Protective Technology, Anomalies, Events, Incidents Jeremy Pickett 1/14/25

DE.AE-5: Anomalies and Events

Incident alert thresholds are established.

Read More
DE.AE-4: Anomalies and Events
Control networks, Protective Technology, Anomalies, Events, Incidents Jeremy Pickett 1/13/25 Control networks, Protective Technology, Anomalies, Events, Incidents Jeremy Pickett 1/13/25

DE.AE-4: Anomalies and Events

Impact of events is determined.

Read More
DE.AE-3: Anomalies and Events
Control networks, Protective Technology, Anomalies, Events, Incidents Jeremy Pickett 1/10/25 Control networks, Protective Technology, Anomalies, Events, Incidents Jeremy Pickett 1/10/25

DE.AE-3: Anomalies and Events

Event data are collected and correlated from multiple sources and sensors.

Read More
DE.AE-2: Anomalies and Events
Control networks, Protective Technology, Anomalies, Events, Incidents Jeremy Pickett 1/9/25 Control networks, Protective Technology, Anomalies, Events, Incidents Jeremy Pickett 1/9/25

DE.AE-2: Anomalies and Events

Detected events are analyzed to understand attack targets and methods.

Read More
DE.AE-1: Anomalies and Events
Control networks, Protective Technology, Anomalies, Events, Incidents Jeremy Pickett 1/8/25 Control networks, Protective Technology, Anomalies, Events, Incidents Jeremy Pickett 1/8/25

DE.AE-1: Anomalies and Events

A baseline of network operations and expected data flows for users and systems is established and managed.

Read More
PR.PT-4: Protective Technology
Control networks, Protective Technology Jeremy Pickett 1/7/25 Control networks, Protective Technology Jeremy Pickett 1/7/25

PR.PT-4: Protective Technology

Communications and control networks are protected.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC