Search by property
From GCA ACT
Jump to navigationJump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Category:CIS - 16.3 - Protect - Applications - Perform Root Cause Analysis on Security Vulnerabilities + (03:24:12, 23 October 2023)
- Category:CIS - 13.9 - Protect - Devices - Deploy Port-Level Access Control + (03:24:12, 23 October 2023)
- Category:CIS - 15.2 - Identify - Establish and Maintain a Service Provider Management Policy + (03:24:13, 23 October 2023)
- Category:CIS - 15.4 - Protect - Ensure Service Provider Contracts Include Security Requirements + (03:24:13, 23 October 2023)
- Category:CIS - 3.11 - Protect - Data - Encrypt Sensitive Data at Rest + (03:24:13, 23 October 2023)
- Category:CIS - 9.2 - Protect - Network - Use DNS Filtering Services + (03:24:13, 23 October 2023)
- Category:CIS - 17.3 - Respond - Establish and Maintain an Enterprise Process for Reporting Incidents + (03:24:13, 23 October 2023)
- Category:CIS - 9.1 - Protect - Applications - Ensure Use of Only Fully Supported Browsers and Email Clients + (03:24:14, 23 October 2023)
- Category:CIS - 12 - Network Infrastructure Management + (03:24:14, 23 October 2023)
- Category:CIS - 7.4 - Protect - Applications - Perform Automated Application Patch Management + (03:24:14, 23 October 2023)
- Category:CIS - 14.8 - Protect - Train Workforce on the Dangers of Connecting to and Transmitting Enterprise Data Over Insecure Networks + (03:24:14, 23 October 2023)
- Category:CIS - 17.5 - Respond - Assign Key Roles and Responsibilities + (03:24:14, 23 October 2023)
- Category:CIS - 3.6 - Protect - Devices - Encrypt Data on End-User Devices + (03:24:15, 23 October 2023)
- Category:CIS - 2.7 - Protect - Applications - Allowlist Authorized Scripts + (03:24:15, 23 October 2023)
- Category:CIS - 13.5 - Protect - Devices - Manage Access Control for Remote Assets + (03:24:15, 23 October 2023)
- Category:CIS - 3.5 - Protect - Data - Securely Dispose of Data + (03:24:15, 23 October 2023)
- Category:CIS - 17.9 - Recover - Establish and Maintain Security Incident Thresholds + (03:24:15, 23 October 2023)
- Category:CIS - 3.1 - Identify - Data - Establish and Maintain a Data Management Process + (03:24:16, 23 October 2023)
- Category:CIS - 10.3 - Protect - Devices - Disable Autorun and Autoplay for Removable Media + (03:24:16, 23 October 2023)
- Category:CIS - 14.5 - Protect - Train Workforce Members on Causes of Unintentional Data Exposure + (03:24:16, 23 October 2023)
- Category:CIS - 6.1 - Protect - Users - Establish an Access Granting Process + (03:24:16, 23 October 2023)
- Category:CIS - 4.1 - Respond - Devices - Enforce Automatic Device Lockout on Portable End-User Devices + (03:24:16, 23 October 2023)
- Category:CIS - 8 - Audit Log Management + (03:24:17, 23 October 2023)
- Category:CIS - 2.2 - Identify - Applications - Ensure Authorized Software is Currently Supported + (03:24:17, 23 October 2023)
- Category:CIS - 1.4 - Identify - Devices - Use Dynamic Host Configuration Protocol (DHCP) Logging to Update Enterprise Asset Inventory + (03:24:17, 23 October 2023)
- Category:CIS - 4.6 - Protect - Network - Securely Manage Enterprise Assets and Software + (03:24:17, 23 October 2023)
- Category:CIS - 9.5 - Protect - Network - Implement DMARC + (03:24:17, 23 October 2023)
- Category:CIS - 12.6 - Protect - Network - Use of Secure Network Management and Communication Protocols + (03:24:18, 23 October 2023)
- Category:CIS - 3.7 - Identify - Data - Establish and Maintain a Data Classification Scheme + (03:24:18, 23 October 2023)
- Category:CIS - 5.5 - Identify - Users - Establish and Maintain an Inventory of Service Accounts + (03:24:18, 23 October 2023)
- Category:CIS - 8.3 - Protect - Network - Ensure Adequate Audit Log Storage + (03:24:18, 23 October 2023)
- Category:CIS Controls - v8.0 + (03:24:18, 23 October 2023)
- Category:CIS - 2 - Inventory and Control of Software Assets + (03:24:19, 23 October 2023)
- Category:CIS - 2.3 - Respond - Applications - Address Unauthorized Software + (03:24:19, 23 October 2023)
- Category:CIS - 11.1 - Recover - Data - Establish and Maintain a Data Recovery Process + (03:24:19, 23 October 2023)
- Category:CIS - 18.1 - Identify - Establish and Maintain a Penetration Testing Program + (03:24:19, 23 October 2023)
- Category:CIS - 12.1 - Protect - Network - Ensure Network Infrastructure is Up-to-Date + (03:24:19, 23 October 2023)
- Category:CIS - 1 - Inventory and Control of Enterprise Assets + (03:24:20, 23 October 2023)
- Category:CIS - 16.11 - Protect - Applications - Leverage Vetted Modules or Services for Application Security Components + (03:24:20, 23 October 2023)
- Category:CIS - 11.2 - Recover - Data - Perform Automated Backups + (03:24:20, 23 October 2023)
- Category:CIS - 16.14 - Protect - Applications - Conduct Threat Modeling + (03:24:20, 23 October 2023)
- Category:CIS - 8.4 - Protect - Network - Standardize Time Synchronization + (03:24:20, 23 October 2023)
- Category:CIS - 18 - Penetration Testing + (03:24:21, 23 October 2023)
- Category:CIS - 8.12 - Detect - Data - Collect Service Provider Logs + (03:24:21, 23 October 2023)
- Category:CIS - 6.2 - Protect - Users - Establish an Access Revoking Process + (03:24:21, 23 October 2023)
- Category:CIS - 2.1 - Identify - Applications - Establish and Maintain a Software Inventory + (03:24:21, 23 October 2023)
- Category:ID.BE-3: Priorities for organizational mission, objectives, and activities are established and communicated + (03:24:42, 23 October 2023)
- Category:PR.IP-1: A baseline configuration of information technology or industrial control systems is created and maintained incorporating security principles (e.g. concept of least functionality) + (03:24:42, 23 October 2023)
- Category:ID.RM-3: The organization’s determination of risk tolerance is informed by its role in critical infrastructure and sector specific risk analysis + (03:24:42, 23 October 2023)
- Category:DE.AE-5: Incident alert thresholds are established + (03:24:42, 23 October 2023)
- Category:PR.DS-5: Protections against data leaks are implemented + (03:24:43, 23 October 2023)
- Category:Mitigation (RS.MI) + (03:24:43, 23 October 2023)
- Category:RS.MI-2: Incidents are mitigated + (03:24:43, 23 October 2023)
- Category:DETECT (DE) + (03:24:43, 23 October 2023)
- Category:PR.AC-2: Physical access to assets is managed and protected + (03:24:43, 23 October 2023)