gptkb:Security_Assessment_and_Authorization
|
gptkb:CA-2_Security_Assessments
|
gptkb:Audit_and_Accountability_(AU)
|
gptkb:AU-10_Non-repudiation
|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Boundary Defense
|
gptkb:Media_Protection_(MP)
|
gptkb:MP-2_Media_Access
|
gptkb:System_and_Services_Acquisition
|
SA-8 Security Engineering Principles
|
gptkb:Audit_and_Accountability_(AU)
|
gptkb:AU-2_Event_Logging
|
gptkb:Security_Assessment_and_Authorization_(CA)
|
gptkb:CA-2_Security_Assessments
|
gptkb:HTC_Vive_Pro_2
|
No (headset-only package)
|
gptkb:Audit_and_Accountability_(AU)
|
gptkb:AU-9_Protection_of_Audit_Information
|
gptkb:System_and_Communications_Protection_(SC)
|
gptkb:SC-23_Session_Authenticity
|
gptkb:Physical_and_Environmental_Protection_(PE)
|
gptkb:PE-6_Monitoring_Physical_Access
|
gptkb:System_and_Services_Acquisition
|
SA-15 Development Process, Standards, and Tools
|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Penetration Tests and Red Team Exercises
|
gptkb:System_and_Communications_Protection_(SC)
|
gptkb:SC-7_Boundary_Protection
|
gptkb:Physical_and_Environmental_Protection_(PE)
|
PE-18 Location of Information System Components
|
gptkb:System_and_Information_Integrity
|
gptkb:SI-8_Spam_Protection
|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Secure Configuration for Network Devices
|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Limitation and Control of Network Ports, Protocols, and Services
|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Security Skills Assessment and Training
|
gptkb:System_and_Communications_Protection_(SC)
|
gptkb:SC-20_Secure_Name/Address_Resolution_Service_(Authoritative_Source)
|