|
gptkb:System_and_Services_Acquisition
|
SA-15 Development Process, Standards, and Tools
|
|
gptkb:System_and_Information_Integrity_(SI)
|
gptkb:SI-10_Information_Input_Validation
|
|
gptkb:Audit_and_Accountability_(AU)
|
gptkb:AU-10_Non-repudiation
|
|
gptkb:HTC_Vive_Pro_2
|
No (headset-only package)
|
|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Penetration Tests and Red Team Exercises
|
|
gptkb:Security_Assessment_and_Authorization
|
gptkb:CA-6_Authorization
|
|
gptkb:System_and_Communications_Protection_(SC)
|
gptkb:SC-23_Session_Authenticity
|
|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Controlled Use of Administrative Privileges
|
|
gptkb:Physical_and_Environmental_Protection_(PE)
|
gptkb:PE-14_Temperature_and_Humidity_Controls
|
|
gptkb:Audit_and_Accountability_(AU)
|
gptkb:AU-5_Response_to_Audit_Processing_Failures
|
|
gptkb:Physical_and_Environmental_Protection_(PE)
|
gptkb:PE-2_Physical_Access_Authorizations
|
|
gptkb:Physical_and_Environmental_Protection_(PE)
|
gptkb:PE-15_Water_Damage_Protection
|
|
gptkb:Audit_and_Accountability_(AU)
|
gptkb:AU-12_Audit_Generation
|
|
gptkb:Security_Assessment_and_Authorization_(CA)
|
gptkb:CA-3_System_Interconnections
|
|
gptkb:System_and_Communications_Protection_(SC)
|
gptkb:SC-5_Denial_of_Service_Protection
|
|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Application Software Security
|
|
gptkb:Audit_and_Accountability_(AU)
|
gptkb:AU-2_Event_Logging
|
|
gptkb:Physical_and_Environmental_Protection_(PE)
|
gptkb:PE-4_Access_Control_for_Transmission_Medium
|
|
gptkb:System_and_Communications_Protection_(SC)
|
gptkb:SC-15_Collaborative_Computing_Devices
|
|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Inventory and Control of Software Assets
|