|
gptkb:Audit_and_Accountability_(AU)
|
gptkb:AU-5_Response_to_Audit_Processing_Failures
|
|
gptkb:Security_Assessment_and_Authorization
|
gptkb:CA-1_Security_Assessment_and_Authorization_Policies_and_Procedures
|
|
gptkb:Media_Protection_(MP)
|
gptkb:MP-1_Media_Protection_Policy_and_Procedures
|
|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Controlled Access Based on the Need to Know
|
|
gptkb:Physical_and_Environmental_Protection_(PE)
|
gptkb:PE-9_Power_Equipment_and_Cabling
|
|
gptkb:System_and_Information_Integrity_(SI)
|
gptkb:SI-5_Security_Alerts,_Advisories,_and_Directives
|
|
gptkb:Security_Assessment_and_Authorization_(CA)
|
gptkb:CA-7_Continuous_Monitoring
|
|
gptkb:System_and_Communications_Protection_(SC)
|
gptkb:SC-22_Architecture_and_Provisioning_for_Name/Address_Resolution_Service
|
|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Secure Configuration for Network Devices
|
|
gptkb:Physical_and_Environmental_Protection_(PE)
|
gptkb:PE-5_Access_Control_for_Output_Devices
|
|
gptkb:System_and_Communications_Protection_(SC)
|
gptkb:SC-15_Collaborative_Computing_Devices
|
|
gptkb:System_and_Services_Acquisition
|
SA-12 Supply Chain Protection
|
|
gptkb:System_and_Information_Integrity
|
gptkb:SI-4_Information_System_Monitoring
|
|
gptkb:Security_Assessment_and_Authorization
|
gptkb:CA-5_Plan_of_Action_and_Milestones
|
|
gptkb:System_and_Information_Integrity_(SI)
|
gptkb:SI-3_Malicious_Code_Protection
|
|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Application Software Security
|
|
gptkb:Media_Protection_(MP)
|
gptkb:MP-5_Media_Transport
|
|
gptkb:System_and_Information_Integrity
|
gptkb:SI-2_Flaw_Remediation
|
|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Secure Configuration for Hardware and Software
|
|
gptkb:Physical_and_Environmental_Protection_(PE)
|
gptkb:PE-2_Physical_Access_Authorizations
|