Search by property
From GCA ACT
Jump to navigationJump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Category:CIS - 12.5 - Protect - Network - Centralize Network Authentication, Authorization, and Auditing (AAA) + (03:24:08, 23 October 2023)
- Category:CIS - 12.3 - Protect - Network - Securely Manage Network Infrastructure + (03:24:08, 23 October 2023)
- Category:CIS - 11 - Data Recovery + (03:24:08, 23 October 2023)
- Category:CIS - 14 - Security Awareness and Skills Training + (03:24:09, 23 October 2023)
- Category:CIS - 3.8 - Identify - Data - Document Data Flows + (03:24:09, 23 October 2023)
- Category:CIS - 16.8 - Protect - Applications - Separate Production and Non-Production Systems + (03:24:09, 23 October 2023)
- Category:CIS - 14.1 - Protect - Establish and Maintain a Security Awareness Program + (03:24:09, 23 October 2023)
- Category:CIS - 14.6 - Protect - Train Workforce Members on Recognizing and Reporting Security Incidents + (03:24:10, 23 October 2023)
- Category:CIS - 8.2 - Detect - Network - Collect Audit Logs + (03:24:10, 23 October 2023)
- Category:CIS - 5.2 - Protect - Users - Use Unique Passwords + (03:24:10, 23 October 2023)
- Category:CIS - 14.4 - Protect - Train Workforce on Data Handling Best Practices + (03:24:10, 23 October 2023)
- Category:CIS - 17.6 - Respond - Define Mechanisms for Communicating During Incident Response + (03:24:10, 23 October 2023)
- Category:CIS - 16.5 - Protect - Applications - Use Up-to-Date and Trusted Third-Party Software Components + (03:24:11, 23 October 2023)
- Category:CIS - 4.12 - Protect - Devices - Separate Enterprise Workspaces on Mobile End-User Devices + (03:24:11, 23 October 2023)
- Category:CIS - 13.8 - Protect - Network - Deploy a Network Intrusion Prevention Solution + (03:24:11, 23 October 2023)
- Category:CIS - 16.2 - Protect - Applications - Establish and Maintain a Process to Accept and Address Software Vulnerabilities + (03:24:11, 23 October 2023)
- Category:CIS - 10.1 - Protect - Devices - Deploy and Maintain Anti-Malware Software + (03:24:11, 23 October 2023)
- Category:CIS - 8.7 - Detect - Network - Collect URL Request Audit Logs + (03:24:12, 23 October 2023)
- Category:CIS - 18.3 - Protect - Network - Remediate Penetration Test Findings + (03:24:12, 23 October 2023)
- Category:CIS - 3.12 - Protect - Network - Segment Data Processing and Storage Based on Sensitivity + (03:24:12, 23 October 2023)
- Category:CIS - 16.3 - Protect - Applications - Perform Root Cause Analysis on Security Vulnerabilities + (03:24:12, 23 October 2023)
- Category:CIS - 13.9 - Protect - Devices - Deploy Port-Level Access Control + (03:24:12, 23 October 2023)
- Category:CIS - 15.2 - Identify - Establish and Maintain a Service Provider Management Policy + (03:24:13, 23 October 2023)
- Category:CIS - 15.4 - Protect - Ensure Service Provider Contracts Include Security Requirements + (03:24:13, 23 October 2023)
- Category:CIS - 3.11 - Protect - Data - Encrypt Sensitive Data at Rest + (03:24:13, 23 October 2023)
- Category:CIS - 9.2 - Protect - Network - Use DNS Filtering Services + (03:24:13, 23 October 2023)
- Category:CIS - 17.3 - Respond - Establish and Maintain an Enterprise Process for Reporting Incidents + (03:24:13, 23 October 2023)
- Category:CIS - 12 - Network Infrastructure Management + (03:24:14, 23 October 2023)
- Category:CIS - 14.8 - Protect - Train Workforce on the Dangers of Connecting to and Transmitting Enterprise Data Over Insecure Networks + (03:24:14, 23 October 2023)
- Category:CIS - 17.5 - Respond - Assign Key Roles and Responsibilities + (03:24:14, 23 October 2023)
- Category:CIS - 7.4 - Protect - Applications - Perform Automated Application Patch Management + (03:24:14, 23 October 2023)
- Category:CIS - 9.1 - Protect - Applications - Ensure Use of Only Fully Supported Browsers and Email Clients + (03:24:14, 23 October 2023)
- Category:CIS - 3.6 - Protect - Devices - Encrypt Data on End-User Devices + (03:24:15, 23 October 2023)
- Category:CIS - 2.7 - Protect - Applications - Allowlist Authorized Scripts + (03:24:15, 23 October 2023)
- Category:CIS - 13.5 - Protect - Devices - Manage Access Control for Remote Assets + (03:24:15, 23 October 2023)
- Category:CIS - 3.5 - Protect - Data - Securely Dispose of Data + (03:24:15, 23 October 2023)
- Category:CIS - 17.9 - Recover - Establish and Maintain Security Incident Thresholds + (03:24:15, 23 October 2023)
- Category:CIS - 3.1 - Identify - Data - Establish and Maintain a Data Management Process + (03:24:16, 23 October 2023)
- Category:CIS - 10.3 - Protect - Devices - Disable Autorun and Autoplay for Removable Media + (03:24:16, 23 October 2023)
- Category:CIS - 14.5 - Protect - Train Workforce Members on Causes of Unintentional Data Exposure + (03:24:16, 23 October 2023)
- Category:CIS - 6.1 - Protect - Users - Establish an Access Granting Process + (03:24:16, 23 October 2023)
- Category:CIS - 4.1 - Respond - Devices - Enforce Automatic Device Lockout on Portable End-User Devices + (03:24:16, 23 October 2023)
- Category:CIS - 8 - Audit Log Management + (03:24:17, 23 October 2023)
- Category:CIS - 2.2 - Identify - Applications - Ensure Authorized Software is Currently Supported + (03:24:17, 23 October 2023)
- Category:CIS - 1.4 - Identify - Devices - Use Dynamic Host Configuration Protocol (DHCP) Logging to Update Enterprise Asset Inventory + (03:24:17, 23 October 2023)
- Category:CIS - 4.6 - Protect - Network - Securely Manage Enterprise Assets and Software + (03:24:17, 23 October 2023)
- Category:CIS - 9.5 - Protect - Network - Implement DMARC + (03:24:17, 23 October 2023)
- Category:CIS - 3.7 - Identify - Data - Establish and Maintain a Data Classification Scheme + (03:24:18, 23 October 2023)
- Category:CIS - 8.3 - Protect - Network - Ensure Adequate Audit Log Storage + (03:24:18, 23 October 2023)
- Category:CIS - 5.5 - Identify - Users - Establish and Maintain an Inventory of Service Accounts + (03:24:18, 23 October 2023)
- Category:CIS Controls - v8.0 + (03:24:18, 23 October 2023)
- Category:CIS - 12.6 - Protect - Network - Use of Secure Network Management and Communication Protocols + (03:24:18, 23 October 2023)
- Category:CIS - 2 - Inventory and Control of Software Assets + (03:24:19, 23 October 2023)
- Category:CIS - 2.3 - Respond - Applications - Address Unauthorized Software + (03:24:19, 23 October 2023)
- Category:CIS - 11.1 - Recover - Data - Establish and Maintain a Data Recovery Process + (03:24:19, 23 October 2023)