includesControl

120 triples
GPTKB property

Alternative names (2)
containsControl controllersIncluded

Random triples
Subject Object
gptkb:Security_Assessment_and_Authorization gptkb:CA-2_Security_Assessments
gptkb:Audit_and_Accountability_(AU) gptkb:AU-10_Non-repudiation
gptkb:SANS_Top_20_Critical_Security_Controls Boundary Defense
gptkb:Media_Protection_(MP) gptkb:MP-2_Media_Access
gptkb:System_and_Services_Acquisition SA-8 Security Engineering Principles
gptkb:Audit_and_Accountability_(AU) gptkb:AU-2_Event_Logging
gptkb:Security_Assessment_and_Authorization_(CA) gptkb:CA-2_Security_Assessments
gptkb:HTC_Vive_Pro_2 No (headset-only package)
gptkb:Audit_and_Accountability_(AU) gptkb:AU-9_Protection_of_Audit_Information
gptkb:System_and_Communications_Protection_(SC) gptkb:SC-23_Session_Authenticity
gptkb:Physical_and_Environmental_Protection_(PE) gptkb:PE-6_Monitoring_Physical_Access
gptkb:System_and_Services_Acquisition SA-15 Development Process, Standards, and Tools
gptkb:SANS_Top_20_Critical_Security_Controls Penetration Tests and Red Team Exercises
gptkb:System_and_Communications_Protection_(SC) gptkb:SC-7_Boundary_Protection
gptkb:Physical_and_Environmental_Protection_(PE) PE-18 Location of Information System Components
gptkb:System_and_Information_Integrity gptkb:SI-8_Spam_Protection
gptkb:SANS_Top_20_Critical_Security_Controls Secure Configuration for Network Devices
gptkb:SANS_Top_20_Critical_Security_Controls Limitation and Control of Network Ports, Protocols, and Services
gptkb:SANS_Top_20_Critical_Security_Controls Security Skills Assessment and Training
gptkb:System_and_Communications_Protection_(SC) gptkb:SC-20_Secure_Name/Address_Resolution_Service_(Authoritative_Source)