0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
PR.IP-9: Information Protection Processes and Procedures
Configuration, Process, Procedures, Protection Processes, Incident Response, Business continuity Jeremy Pickett 12/23/24 Configuration, Process, Procedures, Protection Processes, Incident Response, Business continuity Jeremy Pickett 12/23/24

PR.IP-9: Information Protection Processes and Procedures

Response plans (Incident Response and Business Continuity) and recovery plans (Incident Recovery and Disaster Recovery) are in place and managed.

Read More
PR.IP-8: Information Protection Processes and Procedures
Configuration, Process, Procedures, Protection Processes Jeremy Pickett 12/20/24 Configuration, Process, Procedures, Protection Processes Jeremy Pickett 12/20/24

PR.IP-8: Information Protection Processes and Procedures

Effectiveness of protection technologies is shared and analyzed.

Read More
PR.IP-7: Information Protection Processes and Procedures
Configuration, Process, Procedures, Data Destruction Jeremy Pickett 12/19/24 Configuration, Process, Procedures, Data Destruction Jeremy Pickett 12/19/24

PR.IP-7: Information Protection Processes and Procedures

Protection processes are improved.

Read More
PR.IP-6: Information Protection Processes and Procedures
Configuration, Process, Procedures, Data Destruction Jeremy Pickett 12/18/24 Configuration, Process, Procedures, Data Destruction Jeremy Pickett 12/18/24

PR.IP-6: Information Protection Processes and Procedures

Data is destroyed according to policy.

Read More
PR.IP-5: Information Protection Processes and Procedures
Configuration, Change Control, Process, Procedures, Backups Jeremy Pickett 12/17/24 Configuration, Change Control, Process, Procedures, Backups Jeremy Pickett 12/17/24

PR.IP-5: Information Protection Processes and Procedures

Policy and regulations regarding the physical operating environment for organizational assets are met.

Read More
PR.IP-4: Information Protection Processes and Procedures
Configuration, Change Control, Process, Procedures, Backups Jeremy Pickett 12/16/24 Configuration, Change Control, Process, Procedures, Backups Jeremy Pickett 12/16/24

PR.IP-4: Information Protection Processes and Procedures

Backups of information are conducted, maintained, and tested periodically.

Read More
PR.IP-3: Information Protection Processes and Procedures
Configuration, Change Control, Process, Procedures Jeremy Pickett 12/13/24 Configuration, Change Control, Process, Procedures Jeremy Pickett 12/13/24

PR.IP-3: Information Protection Processes and Procedures

Configuration change control processes are in place.

Read More
PR.IP-2: Information Protection Processes and Procedures
Process, Procedures, SDLC, CI/CD Jeremy Pickett 12/12/24 Process, Procedures, SDLC, CI/CD Jeremy Pickett 12/12/24

PR.IP-2: Information Protection Processes and Procedures

A System Development Life Cycle to manage systems is implemented.

Read More
PR.IP-1: Information Protection Processes and Procedures
Integrity, Hardware, Industrial Control, Process, Procedures Jeremy Pickett 12/11/24 Integrity, Hardware, Industrial Control, Process, Procedures Jeremy Pickett 12/11/24

PR.IP-1: Information Protection Processes and Procedures

A baseline configuration of information technology/industrial control systems is created and maintained.

Read More
ID.SC-2: Supply Chain Risk Management
Risk, Management, Process, Stakeholders Jeremy Pickett 11/11/24 Risk, Management, Process, Stakeholders Jeremy Pickett 11/11/24

ID.SC-2: Supply Chain Risk Management

Cyber supply chain risk management processes are identified, established, assessed, managed, and agreed to by organizational stakeholders.

Read More
ID.SC-1: Supply Chain Risk Management
Risk, Management, Process, Stakeholders Jeremy Pickett 11/8/24 Risk, Management, Process, Stakeholders Jeremy Pickett 11/8/24

ID.SC-1: Supply Chain Risk Management

Cybersecurity risks to organizational assets are identified and managed.

Read More
ID.RM-3: Risk Management Strategy
Risk, Management, Process, Stakeholders Jeremy Pickett 11/7/24 Risk, Management, Process, Stakeholders Jeremy Pickett 11/7/24

ID.RM-3: Risk Management Strategy

The organization’s determination of risk tolerance is informed by its role in critical infrastructure and sector-specific risk analysis.

Read More
ID.RM-2: Risk Management Strategy
Risk, Management, Process, Stakeholders, Tolerance Jeremy Pickett 11/6/24 Risk, Management, Process, Stakeholders, Tolerance Jeremy Pickett 11/6/24

ID.RM-2: Risk Management Strategy

Organizational risk tolerance is determined and clearly expressed.

Read More
ID.RM-1: Risk Management Strategy
Risk, Management, Process, Stakeholders Jeremy Pickett 11/5/24 Risk, Management, Process, Stakeholders Jeremy Pickett 11/5/24

ID.RM-1: Risk Management Strategy

Risk management processes are established, managed, and agreed to by organizational stakeholders.

Read More
—ID.GV-4: Governance
Governance, Risk, Process Jeremy Pickett 10/25/24 Governance, Risk, Process Jeremy Pickett 10/25/24

—ID.GV-4: Governance

Governance and risk management processes address cybersecurity risks.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC