Search by property
From GCA ACT
Jump to navigationJump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Category:PR.PT-2: Removable media is protected and its use restricted according to policy + (03:25:06, 23 October 2023)
- Category:PR.AT-3: Third-party stakeholders (e.g., suppliers, customers, partners) understand their roles and responsibilities + (03:25:06, 23 October 2023)
- Category:DE.CM-6: External service provider activity is monitored to detect potential cybersecurity events + (03:25:07, 23 October 2023)
- Category:PR.DS-8: Integrity checking mechanisms are used to verify hardware integrity + (03:25:07, 23 October 2023)
- Category:DE.CM-2: The physical environment is monitored to detect potential cybersecurity events + (03:25:07, 23 October 2023)
- Category:PR.AT-5: Physical and cybersecurity personnel understand their roles and responsibilities + (03:25:07, 23 October 2023)
- Category:Anomolies and Events (DE.AE) + (03:25:07, 23 October 2023)
- Category:ID.GV-3: Legal and regulatory requirements regarding cybersecurity, including privacy and civil liberties obligations, are understood and managed + (03:25:08, 23 October 2023)
- Category:PR.IP-7: Protection processes are improved + (03:25:08, 23 October 2023)
- Category:ID.AM-6: Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, partners) are established + (03:25:08, 23 October 2023)
- Category:ID.BE-2: The organization’s place in critical infrastructure and its industry sector is identified and communicated + (03:25:08, 23 October 2023)
- Category:Identity Management, Authentication and Access Control (PR.AC) + (03:25:08, 23 October 2023)
- Category:RC.IM-1: Recovery plans incorporate lessons learned + (03:25:09, 23 October 2023)
- Category:DE.CM-3: Personnel activity is monitored to detect potential cybersecurity events + (03:25:09, 23 October 2023)
- Category:DE.CM-4: Malicious code is detected + (03:25:09, 23 October 2023)
- Category:PR.PT-1: Audit or log records are determined, documented, implemented, and reviewed in accordance with policy + (03:25:09, 23 October 2023)
- Category:RC.CO-1: Public relations are managed + (03:25:09, 23 October 2023)
- Category:RS.CO-1: Personnel know their roles and order of operations when a response is needed + (03:25:10, 23 October 2023)
- Category:PR.PT-5: Mechanisms (e.g., failsafe, load balancing, hot swap) are implemented to achieve resilience requirements in normal and adverse situations + (03:25:10, 23 October 2023)
- Category:ID.SC-5: Response and recovery planning and testing are conducted with suppliers and third-party providers + (03:25:10, 23 October 2023)
- Category:ID.BE-4: Dependencies and critical functions for delivery of critical services are established + (03:25:10, 23 October 2023)
- Category:RC.IM-2: Recovery strategies are updated + (03:25:10, 23 October 2023)
- Category:DE.CM-7: Monitoring for unauthorized personnel, connections, devices, and software is performed + (03:25:11, 23 October 2023)
- Category:Maintenance (PR.MA) + (03:25:11, 23 October 2023)
- Category:Small & Medium Sized Businesses + (03:26:59, 23 October 2023)
- Category:Beyond Simple Passwords + (04:10:48, 23 October 2023)
- Category:CIS Controls - v8.0 + (04:11:25, 23 October 2023)
- Category:Prevention + (04:29:55, 23 October 2023)
- Category:Smart TVs + (05:10:13, 23 October 2023)
- Category:Cable Modems + (05:10:13, 23 October 2023)
- Category:ChromeOS + (05:10:14, 23 October 2023)
- Category:Digital Etiquette + (05:10:14, 23 October 2023)
- Category:Removing Your Data from the Internet or Devices + (05:10:14, 23 October 2023)
- Category:Volunteer Information + (05:10:15, 23 October 2023)
- Category:Laws About Your Personal Information + (05:10:15, 23 October 2023)
- Category:System or Device Theft + (05:10:15, 23 October 2023)
- Category:Account Protection + (05:10:16, 23 October 2023)
- Category:Payroll + (05:10:16, 23 October 2023)
- Category:Security Devices + (05:10:16, 23 October 2023)
- Category:Procurement Cards + (05:10:17, 23 October 2023)
- Category:Security Questions + (05:10:17, 23 October 2023)
- Category:Online Predators + (05:10:18, 23 October 2023)
- Category:Computers (Laptops & Desktops) + (05:10:18, 23 October 2023)
- Category:Cryptocurrency + (05:10:19, 23 October 2023)
- Category:Security Awareness Testing + (05:10:20, 23 October 2023)
- Category:Infrastructure as a Service (IaaS) + (05:10:20, 23 October 2023)
- Category:IoT Device Management + (05:10:20, 23 October 2023)
- Category:Mobile-Friendly Applications + (05:10:20, 23 October 2023)
- Category:Donor Information + (05:10:20, 23 October 2023)
- Category:Financial Data + (05:10:21, 23 October 2023)
- Category:Physical Device Security + (05:10:21, 23 October 2023)