|
gptkb:Audit_and_Accountability_(AU)
|
gptkb:AU-7_Audit_Reduction_and_Report_Generation
|
|
gptkb:Security_Assessment_and_Authorization_(CA)
|
gptkb:CA-3_System_Interconnections
|
|
gptkb:Audit_and_Accountability_(AU)
|
gptkb:AU-3_Content_of_Audit_Records
|
|
gptkb:System_and_Communications_Protection_(SC)
|
gptkb:SC-21_Secure_Name/Address_Resolution_Service_(Recursive_or_Caching_Resolver)
|
|
gptkb:System_and_Communications_Protection_(SC)
|
gptkb:SC-12_Cryptographic_Key_Establishment_and_Management
|
|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Data Recovery Capabilities
|
|
gptkb:System_and_Information_Integrity_(SI)
|
gptkb:SI-8_Spam_Protection
|
|
gptkb:System_and_Communications_Protection_(SC)
|
gptkb:SC-2_Application_Partitioning
|
|
gptkb:System_and_Services_Acquisition
|
SA-2 Allocation of Resources
|
|
gptkb:System_and_Services_Acquisition
|
SA-10 Developer Configuration Management
|
|
gptkb:Media_Protection_(MP)
|
gptkb:MP-6_Media_Sanitization
|
|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Application Software Security
|
|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Malware Defenses
|
|
gptkb:Audit_and_Accountability_(AU)
|
gptkb:AU-1_Policy_and_Procedures
|
|
gptkb:Audit_and_Accountability_(AU)
|
gptkb:AU-4_Audit_Storage_Capacity
|
|
gptkb:Physical_and_Environmental_Protection_(PE)
|
gptkb:PE-4_Access_Control_for_Transmission_Medium
|
|
gptkb:Physical_and_Environmental_Protection_(PE)
|
PE-18 Location of Information System Components
|
|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Account Monitoring and Control
|
|
gptkb:Physical_and_Environmental_Protection_(PE)
|
gptkb:PE-8_Visitor_Access_Records
|
|
gptkb:System_and_Information_Integrity
|
gptkb:SI-2_Flaw_Remediation
|