|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Application Software Security
|
|
gptkb:Audit_and_Accountability_(AU)
|
gptkb:AU-10_Non-repudiation
|
|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Wireless Access Control
|
|
gptkb:Security_Assessment_and_Authorization_(CA)
|
gptkb:CA-1_Security_Assessment_and_Authorization_Policies_and_Procedures
|
|
gptkb:System_and_Information_Integrity_(SI)
|
gptkb:SI-5_Security_Alerts,_Advisories,_and_Directives
|
|
gptkb:System_and_Services_Acquisition
|
SA-1 Policy and Procedures
|
|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Limitation and Control of Network Ports, Protocols, and Services
|
|
gptkb:Security_Assessment_and_Authorization_(CA)
|
gptkb:CA-3_System_Interconnections
|
|
gptkb:Physical_and_Environmental_Protection_(PE)
|
gptkb:PE-11_Emergency_Power
|
|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Inventory and Control of Hardware Assets
|
|
gptkb:Physical_and_Environmental_Protection_(PE)
|
gptkb:PE-19_Information_Leakage
|
|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Maintenance, Monitoring, and Analysis of Audit Logs
|
|
gptkb:System_and_Information_Integrity
|
gptkb:SI-3_Malicious_Code_Protection
|
|
gptkb:System_and_Information_Integrity_(SI)
|
gptkb:SI-7_Software,_Firmware,_and_Information_Integrity
|
|
gptkb:System_and_Communications_Protection_(SC)
|
gptkb:SC-22_Architecture_and_Provisioning_for_Name/Address_Resolution_Service
|
|
gptkb:System_and_Communications_Protection_(SC)
|
gptkb:SC-13_Cryptographic_Protection
|
|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Secure Configuration for Network Devices
|
|
gptkb:Security_Assessment_and_Authorization
|
gptkb:CA-5_Plan_of_Action_and_Milestones
|
|
gptkb:Security_Assessment_and_Authorization_(CA)
|
gptkb:CA-7_Continuous_Monitoring
|
|
gptkb:Dell_Visor
|
Yes
|