0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
PR.AC-1: Identity Management, Authentication and Access Control
Risk, IAM, Authentication, Access Control Jeremy Pickett 11/15/24 Risk, IAM, Authentication, Access Control Jeremy Pickett 11/15/24

PR.AC-1: Identity Management, Authentication and Access Control

Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users, and processes.

Read More
ID.SC-5: Supply Chain Risk Management
Risk, Supply Chain Jeremy Pickett 11/14/24 Risk, Supply Chain Jeremy Pickett 11/14/24

ID.SC-5: Supply Chain Risk Management

Response and recovery planning and testing are conducted with suppliers and third-party providers.

Read More
ID.SC-4: Supply Chain Risk Management
Risk, Supply Chain Jeremy Pickett 11/13/24 Risk, Supply Chain Jeremy Pickett 11/13/24

ID.SC-4: Supply Chain Risk Management

Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations to confirm they are meeting their contractual obligations.

Read More
ID.SC-3: Supply Chain Risk Management
Risk, Supply Chain Jeremy Pickett 11/12/24 Risk, Supply Chain Jeremy Pickett 11/12/24

ID.SC-3: Supply Chain Risk Management

Suppliers and third-party partners are identified, prioritized, and assessed using a cybersecurity risk assessment process.

Read More
ID.SC-2: Supply Chain Risk Management
Risk, Management, Process, Stakeholders Jeremy Pickett 11/11/24 Risk, Management, Process, Stakeholders Jeremy Pickett 11/11/24

ID.SC-2: Supply Chain Risk Management

Cyber supply chain risk management processes are identified, established, assessed, managed, and agreed to by organizational stakeholders.

Read More
ID.SC-1: Supply Chain Risk Management
Risk, Management, Process, Stakeholders Jeremy Pickett 11/8/24 Risk, Management, Process, Stakeholders Jeremy Pickett 11/8/24

ID.SC-1: Supply Chain Risk Management

Cybersecurity risks to organizational assets are identified and managed.

Read More
ID.RM-3: Risk Management Strategy
Risk, Management, Process, Stakeholders Jeremy Pickett 11/7/24 Risk, Management, Process, Stakeholders Jeremy Pickett 11/7/24

ID.RM-3: Risk Management Strategy

The organization’s determination of risk tolerance is informed by its role in critical infrastructure and sector-specific risk analysis.

Read More
ID.RM-2: Risk Management Strategy
Risk, Management, Process, Stakeholders, Tolerance Jeremy Pickett 11/6/24 Risk, Management, Process, Stakeholders, Tolerance Jeremy Pickett 11/6/24

ID.RM-2: Risk Management Strategy

Organizational risk tolerance is determined and clearly expressed.

Read More
ID.RM-1: Risk Management Strategy
Risk, Management, Process, Stakeholders Jeremy Pickett 11/5/24 Risk, Management, Process, Stakeholders Jeremy Pickett 11/5/24

ID.RM-1: Risk Management Strategy

Risk management processes are established, managed, and agreed to by organizational stakeholders.

Read More
ID.RA-6: Risk Assessment
Impact, Threats, Vulnerabilities, Risk, Response Jeremy Pickett 11/4/24 Impact, Threats, Vulnerabilities, Risk, Response Jeremy Pickett 11/4/24

ID.RA-6: Risk Assessment

Risk responses are identified and prioritized.

Read More
ID.RA-4: Risk Assessment
Business, Risk, Impact Jeremy Pickett 10/31/24 Business, Risk, Impact Jeremy Pickett 10/31/24

ID.RA-4: Risk Assessment

Potential business impacts and likelihoods are identified.

Read More
—ID.GV-4: Governance
Governance, Risk, Process Jeremy Pickett 10/25/24 Governance, Risk, Process Jeremy Pickett 10/25/24

—ID.GV-4: Governance

Governance and risk management processes address cybersecurity risks.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC