0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
PR.DS-4: Data Security
Cybersecurity, Capacity, Availability Jeremy Pickett 12/4/24 Cybersecurity, Capacity, Availability Jeremy Pickett 12/4/24

PR.DS-4: Data Security

Adequate capacity to ensure availability is maintained.

Read More
PR.DS-3: Data Security
Cybersecurity, Encryption, Transfer, Disposition Jeremy Pickett 12/3/24 Cybersecurity, Encryption, Transfer, Disposition Jeremy Pickett 12/3/24

PR.DS-3: Data Security

Assets are formally managed throughout removal, transfers, and disposition.

Read More
PR.DS-2: Data Security
Cybersecurity, Encryption, In Transit, In Motion Jeremy Pickett 12/2/24 Cybersecurity, Encryption, In Transit, In Motion Jeremy Pickett 12/2/24

PR.DS-2: Data Security

Data-in-transit is protected.

Read More
PR.DS-1: Data Security
Cybersecurity, At Rest, Encryption Jeremy Pickett 11/29/24 Cybersecurity, At Rest, Encryption Jeremy Pickett 11/29/24

PR.DS-1: Data Security

Data-at-rest is protected.

Read More
PR.AT-5: Awareness and Training
Awareness, Training, Cybersecurity, Physical Jeremy Pickett 11/28/24 Awareness, Training, Cybersecurity, Physical Jeremy Pickett 11/28/24

PR.AT-5: Awareness and Training

Physical and cybersecurity personnel understand their roles and responsibilities.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC