includesControl

120 triples
GPTKB property

Alternative names (2)
containsControl controllersIncluded

Random triples
Subject Object
gptkb:SANS_Top_20_Critical_Security_Controls Application Software Security
gptkb:Audit_and_Accountability_(AU) gptkb:AU-10_Non-repudiation
gptkb:SANS_Top_20_Critical_Security_Controls Wireless Access Control
gptkb:Security_Assessment_and_Authorization_(CA) gptkb:CA-1_Security_Assessment_and_Authorization_Policies_and_Procedures
gptkb:System_and_Information_Integrity_(SI) gptkb:SI-5_Security_Alerts,_Advisories,_and_Directives
gptkb:System_and_Services_Acquisition SA-1 Policy and Procedures
gptkb:SANS_Top_20_Critical_Security_Controls Limitation and Control of Network Ports, Protocols, and Services
gptkb:Security_Assessment_and_Authorization_(CA) gptkb:CA-3_System_Interconnections
gptkb:Physical_and_Environmental_Protection_(PE) gptkb:PE-11_Emergency_Power
gptkb:SANS_Top_20_Critical_Security_Controls Inventory and Control of Hardware Assets
gptkb:Physical_and_Environmental_Protection_(PE) gptkb:PE-19_Information_Leakage
gptkb:SANS_Top_20_Critical_Security_Controls Maintenance, Monitoring, and Analysis of Audit Logs
gptkb:System_and_Information_Integrity gptkb:SI-3_Malicious_Code_Protection
gptkb:System_and_Information_Integrity_(SI) gptkb:SI-7_Software,_Firmware,_and_Information_Integrity
gptkb:System_and_Communications_Protection_(SC) gptkb:SC-22_Architecture_and_Provisioning_for_Name/Address_Resolution_Service
gptkb:System_and_Communications_Protection_(SC) gptkb:SC-13_Cryptographic_Protection
gptkb:SANS_Top_20_Critical_Security_Controls Secure Configuration for Network Devices
gptkb:Security_Assessment_and_Authorization gptkb:CA-5_Plan_of_Action_and_Milestones
gptkb:Security_Assessment_and_Authorization_(CA) gptkb:CA-7_Continuous_Monitoring
gptkb:Dell_Visor Yes

Please wait…