0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
DE.CM-2: Security Continuous Monitoring
Network, Monitoring, Continuous, Physical Jeremy Pickett 1/16/25 Network, Monitoring, Continuous, Physical Jeremy Pickett 1/16/25

DE.CM-2: Security Continuous Monitoring

The physical environment is monitored to detect potential cybersecurity events.

Read More
PR.AT-5: Awareness and Training
Awareness, Training, Cybersecurity, Physical Jeremy Pickett 11/28/24 Awareness, Training, Cybersecurity, Physical Jeremy Pickett 11/28/24

PR.AT-5: Awareness and Training

Physical and cybersecurity personnel understand their roles and responsibilities.

Read More
Implementation Guide-1
Assets, Physical, Systems, Inventory Jeremy Pickett 9/6/24 Assets, Physical, Systems, Inventory Jeremy Pickett 9/6/24

Implementation Guide-1

This guide provides an actionable approach to implementing NIST ID.AM-1: "Physical devices and systems within the organization are inventoried." It outlines specific steps and best practices for organizations to effectively inventory their physical devices and systems.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC