0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
PR.IP-1: Information Protection Processes and Procedures
Integrity, Hardware, Industrial Control, Process, Procedures Jeremy Pickett 12/11/24 Integrity, Hardware, Industrial Control, Process, Procedures Jeremy Pickett 12/11/24

PR.IP-1: Information Protection Processes and Procedures

A baseline configuration of information technology/industrial control systems is created and maintained.

Read More
PR.DS-8: Data Security
Integrity, Hardware Jeremy Pickett 12/10/24 Integrity, Hardware Jeremy Pickett 12/10/24

PR.DS-8: Data Security

Integrity checking mechanisms are used to verify hardware integrity.

Read More
PR.DS-6: Data Security
Integrity, Software, Firmware Jeremy Pickett 12/6/24 Integrity, Software, Firmware Jeremy Pickett 12/6/24

PR.DS-6: Data Security

Integrity checking mechanisms are used to verify software, firmware, and information integrity.

Read More
PR.AC-5: Identity Management, Authentication and Access Control
IAM, Authentication, Access Control, Integrity, Segmentation Jeremy Pickett 11/21/24 IAM, Authentication, Access Control, Integrity, Segmentation Jeremy Pickett 11/21/24

PR.AC-5: Identity Management, Authentication and Access Control

Network integrity is protected (e.g., network segregation, network segmentation).

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC