Categories
From GCA ACT
Jump to navigationJump to search
The following categories exist on the wiki, and may or may not be unused. Also see wanted categories.
- PR.DS-2: Data-in-transit is protected (1 member)
- PR.DS-3: Assets are formally managed throughout removal, transfers, and disposition (1 member)
- PR.DS-4: Adequate capacity to ensure availability is maintained (1 member)
- PR.DS-5: Protections against data leaks are implemented (1 member)
- PR.DS-6: Integrity checking mechanisms are used to verify software, firmware, and information integrity (1 member)
- PR.DS-7: The development and testing environment(s) are separate from the production environment (1 member)
- PR.DS-8: Integrity checking mechanisms are used to verify hardware integrity (1 member)
- PR.IP-10: Response and recovery plans are tested (1 member)
- PR.IP-11: Cybersecurity is included in human resources practices (e.g., deprovisioning, personnel screening) (1 member)
- PR.IP-12: A vulnerability management plan is developed and implemented (1 member)
- PR.IP-1: A baseline configuration of information technology or industrial control systems is created and maintained incorporating security principles (e.g. concept of least functionality) (1 member)
- PR.IP-2: A System Development Life Cycle to manage systems is implemented (1 member)
- PR.IP-3: Configuration change control processes are in place (1 member)
- PR.IP-4: Backups of information are conducted, maintained, and tested (1 member)
- PR.IP-5: Policy and regulations regarding the physical operating environment for organizational assets are met (1 member)
- PR.IP-6: Data is destroyed according to policy (1 member)
- PR.IP-7: Protection processes are improved (1 member)
- PR.IP-8: Effectiveness of protection technologies is shared (1 member)
- PR.IP-9: Response plans (Incident Response and Business Continuity) and recovery plans (Incident Recovery and Disaster Recovery) are in place and managed (1 member)
- PR.MA-1: Maintenance and repair of organizational assets are performed and logged, with approved and controlled tools (1 member)
- PR.MA-2: Remote maintenance of organizational assets is approved, logged, and performed in a manner that prevents unauthorized access (1 member)
- PR.PT-1: Audit or log records are determined, documented, implemented, and reviewed in accordance with policy (1 member)
- PR.PT-2: Removable media is protected and its use restricted according to policy (1 member)
- PR.PT-3: The principle of least functionality is incorporated by configuring systems to provide only essential capabilities (1 member)
- PR.PT-4: Communications and control networks are protected (1 member)
- PR.PT-5: Mechanisms (e.g., failsafe, load balancing, hot swap) are implemented to achieve resilience requirements in normal and adverse situations (1 member)
- PROTECT (PR) (6 members)
- Packet Replay (1 member)
- Pages with broken file links (1 member)
- Pages with ignored display titles (4 members)
- Pakistan (2 members)
- Panama (2 members)
- Paraguay (1 member)
- Parental Controls (4 members)
- Parents & Families (14 members)
- Partner Authentication (1 member)
- Partner Information (1 member)
- Partner Relationships (1 member)
- Passive DNS (2 members)
- Passive SSL (1 member)
- Password Managers (76 members)
- Passwords (14 members)
- Patch Management (4 members)
- Payment Devices (3 members)
- Payment Processors (1 member)
- Payroll (1 member)
- Pennsylvania (8 members)
- Performance - AI (5 members)
- Performance - AI Management (1 member)
- Periodic Know Your Users Reviews (4 members)