Search by property
From GCA ACT
Jump to navigationJump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Category:CIS - 11.1 - Recover - Data - Establish and Maintain a Data Recovery Process + (03:24:19, 23 October 2023)
- Category:CIS - 18.1 - Identify - Establish and Maintain a Penetration Testing Program + (03:24:19, 23 October 2023)
- Category:CIS - 12.1 - Protect - Network - Ensure Network Infrastructure is Up-to-Date + (03:24:19, 23 October 2023)
- Category:CIS - 1 - Inventory and Control of Enterprise Assets + (03:24:20, 23 October 2023)
- Category:CIS - 16.11 - Protect - Applications - Leverage Vetted Modules or Services for Application Security Components + (03:24:20, 23 October 2023)
- Category:CIS - 11.2 - Recover - Data - Perform Automated Backups + (03:24:20, 23 October 2023)
- Category:CIS - 16.14 - Protect - Applications - Conduct Threat Modeling + (03:24:20, 23 October 2023)
- Category:CIS - 8.4 - Protect - Network - Standardize Time Synchronization + (03:24:20, 23 October 2023)
- Category:CIS - 18 - Penetration Testing + (03:24:21, 23 October 2023)
- Category:CIS - 8.12 - Detect - Data - Collect Service Provider Logs + (03:24:21, 23 October 2023)
- Category:CIS - 6.2 - Protect - Users - Establish an Access Revoking Process + (03:24:21, 23 October 2023)
- Category:CIS - 2.1 - Identify - Applications - Establish and Maintain a Software Inventory + (03:24:21, 23 October 2023)
- Category:ID.BE-3: Priorities for organizational mission, objectives, and activities are established and communicated + (03:24:42, 23 October 2023)
- Category:PR.IP-1: A baseline configuration of information technology or industrial control systems is created and maintained incorporating security principles (e.g. concept of least functionality) + (03:24:42, 23 October 2023)
- Category:ID.RM-3: The organization’s determination of risk tolerance is informed by its role in critical infrastructure and sector specific risk analysis + (03:24:42, 23 October 2023)
- Category:DE.AE-5: Incident alert thresholds are established + (03:24:42, 23 October 2023)
- Category:PR.DS-5: Protections against data leaks are implemented + (03:24:43, 23 October 2023)
- Category:Mitigation (RS.MI) + (03:24:43, 23 October 2023)
- Category:RS.MI-2: Incidents are mitigated + (03:24:43, 23 October 2023)
- Category:DETECT (DE) + (03:24:43, 23 October 2023)
- Category:PR.AC-2: Physical access to assets is managed and protected + (03:24:43, 23 October 2023)
- Category:RC.RP-1: Recovery plan is executed during or after a cybersecurity incident + (03:24:43, 23 October 2023)
- Category:PR.IP-5: Policy and regulations regarding the physical operating environment for organizational assets are met + (03:24:44, 23 October 2023)
- Category:ID.RA-2: Cyber threat intelligence is received from information sharing forums and sources + (03:24:44, 23 October 2023)
- Category:ID.AM-4: External information systems are catalogued + (03:24:44, 23 October 2023)
- Category:DE.AE-4: Impact of events is determined + (03:24:44, 23 October 2023)
- Category:PR.IP-2: A System Development Life Cycle to manage systems is implemented + (03:24:44, 23 October 2023)
- Category:Analysis (RS.AN) + (03:24:45, 23 October 2023)
- Category:ID.GV-2: Cybersecurity roles and responsibilities are coordinated and aligned with internal roles and external partners + (03:24:45, 23 October 2023)
- Category:PR.AT-2: Privileged users understand their roles and responsibilities + (03:24:45, 23 October 2023)
- Category:PR.DS-7: The development and testing environment(s) are separate from the production environment + (03:24:45, 23 October 2023)
- Category:Risk Management Strategy (ID.RM) + (03:24:45, 23 October 2023)
- Category:ID.SC-4: Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations to confirm they are meeting their contractual obligations. + (03:24:46, 23 October 2023)
- Category:RS.AN-4: Incidents are categorized consistent with response plans + (03:24:46, 23 October 2023)
- Category:PR.AT-4: Senior executives understand their roles and responsibilities + (03:24:46, 23 October 2023)
- Category:Governance (ID.GV) + (03:24:46, 23 October 2023)
- Category:PR.MA-1: Maintenance and repair of organizational assets are performed and logged, with approved and controlled tools + (03:24:46, 23 October 2023)
- Category:Supply Chain Risk Management (ID.SC) + (03:24:47, 23 October 2023)
- Category:IDENTIFY (ID) + (03:24:47, 23 October 2023)
- Category:DE.DP-4: Event detection information is communicated + (03:24:47, 23 October 2023)
- Category:NIST CSF v1.1 + (03:24:47, 23 October 2023)
- Category:RS.IM-2: Response strategies are updated + (03:24:47, 23 October 2023)
- Category:RS.AN-5: Processes are established to receive, analyze and respond to vulnerabilities disclosed to the organization from internal and external sources (e.g. internal testing, security bulletins, or security researchers) + (03:24:47, 23 October 2023)
- Category:DE.AE-2: Detected events are analyzed to understand attack targets and methods + (03:24:48, 23 October 2023)
- Category:ID.BE-5: Resilience requirements to support delivery of critical services are established for all operating states (e.g. under duress or attack, during recovery, normal operations) + (03:24:48, 23 October 2023)
- Category:Awareness Training (PR.AT) + (03:24:48, 23 October 2023)
- Category:ID.AM-2: Software platforms and applications within the organization are inventoried + (03:24:48, 23 October 2023)
- Category:RS.AN-2: The impact of the incident is understood + (03:24:48, 23 October 2023)
- Category:ID.RM-2: Organizational risk tolerance is determined and clearly expressed + (03:24:49, 23 October 2023)
- Category:DE.DP-2: Detection activities comply with all applicable requirements + (03:24:49, 23 October 2023)
- Category:PR.DS-4: Adequate capacity to ensure availability is maintained + (03:24:49, 23 October 2023)
- Category:RS.CO-3: Information is shared consistent with response plans + (03:24:49, 23 October 2023)
- Category:PR.IP-11: Cybersecurity is included in human resources practices (e.g., deprovisioning, personnel screening) + (03:24:49, 23 October 2023)
- Category:ID.RM-1: Risk management processes are established, managed, and agreed to by organizational stakeholders + (03:24:50, 23 October 2023)
- Category:Response Planning (RS.RP) + (03:24:50, 23 October 2023)