|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Data Recovery Capabilities
|
|
gptkb:System_and_Communications_Protection_(SC)
|
gptkb:SC-8_Transmission_Confidentiality_and_Integrity
|
|
gptkb:Security_Assessment_and_Authorization_(CA)
|
gptkb:CA-8_Penetration_Testing
|
|
gptkb:System_and_Services_Acquisition
|
SA-9 External Information System Services
|
|
gptkb:Audit_and_Accountability_(AU)
|
gptkb:AU-11_Audit_Record_Retention
|
|
gptkb:System_and_Information_Integrity_(SI)
|
gptkb:SI-4_Information_System_Monitoring
|
|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Limitation and Control of Network Ports, Protocols, and Services
|
|
gptkb:System_and_Communications_Protection_(SC)
|
gptkb:SC-18_Mobile_Code
|
|
gptkb:System_and_Communications_Protection_(SC)
|
gptkb:SC-13_Cryptographic_Protection
|
|
gptkb:Security_Assessment_and_Authorization_(CA)
|
gptkb:CA-7_Continuous_Monitoring
|
|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Continuous Vulnerability Management
|
|
gptkb:System_and_Information_Integrity
|
gptkb:SI-6_Security_Function_Verification
|
|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Account Monitoring and Control
|
|
gptkb:System_and_Communications_Protection_(SC)
|
gptkb:SC-28_Protection_of_Information_at_Rest
|
|
gptkb:System_and_Information_Integrity
|
gptkb:SI-3_Malicious_Code_Protection
|
|
gptkb:System_and_Information_Integrity
|
gptkb:SI-10_Information_Input_Validation
|
|
gptkb:System_and_Communications_Protection_(SC)
|
gptkb:SC-4_Information_in_Shared_Resources
|
|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Security Skills Assessment and Training
|
|
gptkb:System_and_Communications_Protection_(SC)
|
gptkb:SC-12_Cryptographic_Key_Establishment_and_Management
|
|
gptkb:SANS_Top_20_Critical_Security_Controls
|
Email and Web Browser Protections
|