0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
ID.SC-5: Supply Chain Risk Management
Risk, Supply Chain Jeremy Pickett 11/14/24 Risk, Supply Chain Jeremy Pickett 11/14/24

ID.SC-5: Supply Chain Risk Management

Response and recovery planning and testing are conducted with suppliers and third-party providers.

Read More
ID.SC-4: Supply Chain Risk Management
Risk, Supply Chain Jeremy Pickett 11/13/24 Risk, Supply Chain Jeremy Pickett 11/13/24

ID.SC-4: Supply Chain Risk Management

Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations to confirm they are meeting their contractual obligations.

Read More
ID.SC-3: Supply Chain Risk Management
Risk, Supply Chain Jeremy Pickett 11/12/24 Risk, Supply Chain Jeremy Pickett 11/12/24

ID.SC-3: Supply Chain Risk Management

Suppliers and third-party partners are identified, prioritized, and assessed using a cybersecurity risk assessment process.

Read More
ID.BE-2 Business Environment-2
Policy, Procedure, Supply Chain, Critical Infrastructure Jeremy Pickett 10/16/24 Policy, Procedure, Supply Chain, Critical Infrastructure Jeremy Pickett 10/16/24

ID.BE-2 Business Environment-2

The organization’s place in critical infrastructure and its industry sector is identified and communicated.

Read More
Identity Management, Authentication and Access Control
Policy, Procedure, Supply Chain Jeremy Pickett 10/15/24 Policy, Procedure, Supply Chain Jeremy Pickett 10/15/24

Identity Management, Authentication and Access Control

The organization’s role in the supply chain is identified and communicated.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC