0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
PR.PT-2: Protective Technology
Policy, Audit, Logs, Removable Media, USB Drives, Phones Jeremy Pickett 1/3/25 Policy, Audit, Logs, Removable Media, USB Drives, Phones Jeremy Pickett 1/3/25

PR.PT-2: Protective Technology

Removable media is protected and its use restricted according to policy.

Read More
PR.PT-1: Protective Technology
Policy, Audit, Logs Jeremy Pickett 1/2/25 Policy, Audit, Logs Jeremy Pickett 1/2/25

PR.PT-1: Protective Technology

Audit/log records are determined, documented, implemented, and reviewed in accordance with policy.

Read More
—ID.GV-1: Governance
Policy, Procedure, Resilience Jeremy Pickett 10/22/24 Policy, Procedure, Resilience Jeremy Pickett 10/22/24

—ID.GV-1: Governance

Organizational information security policy is established.

Read More
—ID.BE-5: Business Environment
Policy, Procedure, Resilience Jeremy Pickett 10/21/24 Policy, Procedure, Resilience Jeremy Pickett 10/21/24

—ID.BE-5: Business Environment

Resilience requirements to support delivery of critical services are established.

Read More
—ID.BE-4: Business Environment
Policy, Procedure, Critical Functions, Critical Services Jeremy Pickett 10/18/24 Policy, Procedure, Critical Functions, Critical Services Jeremy Pickett 10/18/24

—ID.BE-4: Business Environment

Dependencies and critical functions for delivery of critical services are established.

Read More
ID.BE-3: Business Environment
Policy, Procedure, Mission, Objectives, Activities Jeremy Pickett 10/17/24 Policy, Procedure, Mission, Objectives, Activities Jeremy Pickett 10/17/24

ID.BE-3: Business Environment

Priorities for organizational mission, objectives, and activities are established and communicated.

Read More
ID.BE-2 Business Environment-2
Policy, Procedure, Supply Chain, Critical Infrastructure Jeremy Pickett 10/16/24 Policy, Procedure, Supply Chain, Critical Infrastructure Jeremy Pickett 10/16/24

ID.BE-2 Business Environment-2

The organization’s place in critical infrastructure and its industry sector is identified and communicated.

Read More
Identity Management, Authentication and Access Control
Policy, Procedure, Supply Chain Jeremy Pickett 10/15/24 Policy, Procedure, Supply Chain Jeremy Pickett 10/15/24

Identity Management, Authentication and Access Control

The organization’s role in the supply chain is identified and communicated.

Read More
Asset Management-6
Workforce, Stakeholders, Policy, Procedure Jeremy Pickett 10/14/24 Workforce, Stakeholders, Policy, Procedure Jeremy Pickett 10/14/24

Asset Management-6

Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders are established.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC