0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
RS.RP-1: Response Planning
Network, Monitoring, Roles, Responsibilities Jeremy Pickett 2/3/25 Network, Monitoring, Roles, Responsibilities Jeremy Pickett 2/3/25

RS.RP-1: Response Planning

Response plan is executed during or after an event.

Read More
DE.DP-5: Detection Processes
Network, Monitoring, Roles, Responsibilities Jeremy Pickett 1/31/25 Network, Monitoring, Roles, Responsibilities Jeremy Pickett 1/31/25

DE.DP-5: Detection Processes

Detection processes are continuously improved.

Read More
DE.DP-4: Detection Processes
Network, Monitoring, Roles, Responsibilities Jeremy Pickett 1/30/25 Network, Monitoring, Roles, Responsibilities Jeremy Pickett 1/30/25

DE.DP-4: Detection Processes

Event detection information is communicated to appropriate parties.

Read More
DE.DP-3: Detection Processes
Network, Monitoring, Roles, Responsibilities Jeremy Pickett 1/29/25 Network, Monitoring, Roles, Responsibilities Jeremy Pickett 1/29/25

DE.DP-3: Detection Processes

Detection processes are tested.

Read More
DE.DP-2: Detection Processes
Network, Monitoring, Roles, Responsibilities Jeremy Pickett 1/28/25 Network, Monitoring, Roles, Responsibilities Jeremy Pickett 1/28/25

DE.DP-2: Detection Processes

Detection activities comply with all applicable requirements.

Read More
DE.DP-1: Detection Processes
Network, Monitoring, Roles, Responsibilities Jeremy Pickett 1/27/25 Network, Monitoring, Roles, Responsibilities Jeremy Pickett 1/27/25

DE.DP-1: Detection Processes

Roles and responsibilities for detection are well defined to ensure accountability.

Read More
—ID.GV-2: Governance
Roles, Responsibilities, Partners Jeremy Pickett 10/23/24 Roles, Responsibilities, Partners Jeremy Pickett 10/23/24

—ID.GV-2: Governance

Information security roles and responsibilities are coordinated and aligned with internal roles and external partners.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC