|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Data Protection
|
|
gptkb:Physical_and_Environmental_Protection_(PE)
|
gptkb:PE-6_Monitoring_Physical_Access
|
|
gptkb:System_and_Services_Acquisition
|
SA-3 System Development Life Cycle
|
|
gptkb:Media_Protection_(MP)
|
gptkb:MP-2_Media_Access
|
|
gptkb:Audit_and_Accountability_(AU)
|
gptkb:AU-6_Audit_Review,_Analysis,_and_Reporting
|
|
gptkb:System_and_Communications_Protection_(SC)
|
gptkb:SC-1_Policy_and_Procedures
|
|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Account Monitoring and Control
|
|
gptkb:Audit_and_Accountability_(AU)
|
gptkb:AU-1_Policy_and_Procedures
|
|
gptkb:Physical_and_Environmental_Protection_(PE)
|
gptkb:PE-3_Physical_Access_Control
|
|
gptkb:System_and_Services_Acquisition
|
SA-9 External Information System Services
|
|
gptkb:Audit_and_Accountability_(AU)
|
gptkb:AU-3_Content_of_Audit_Records
|
|
gptkb:Asus_Windows_Mixed_Reality_Headset
|
motion controllers
|
|
gptkb:System_and_Information_Integrity_(SI)
|
gptkb:SI-5_Security_Alerts,_Advisories,_and_Directives
|
|
gptkb:System_and_Communications_Protection_(SC)
|
gptkb:SC-4_Information_in_Shared_Resources
|
|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Email and Web Browser Protections
|
|
gptkb:System_and_Communications_Protection_(SC)
|
gptkb:SC-19_Voice_Over_Internet_Protocol
|
|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Boundary Defense
|
|
gptkb:Audit_and_Accountability_(AU)
|
gptkb:AU-4_Audit_Storage_Capacity
|
|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Penetration Tests and Red Team Exercises
|
|
gptkb:System_and_Services_Acquisition
|
SA-10 Developer Configuration Management
|