Все публикации

ISO 27001 Risk Assessment Documentation

Specify Objectives for Risk Assessments

PCI v4.0 - 12.10.4.1: Use Targeted Risk Analysis to Determine Incident Response Training Frequency

PCI v4.0 - 12.10.1: Establish a Comprehensive Incident Response Plan

PCI v4.0 - 12.8.5: Detail Responsibilities Held by Third-Party Service Providers

PCI v4.0 - 12.6.3.2: Include Acceptable Use Policies in Security Awareness Trainings

PCI v4.0 - 12.8.2: Maintain Written Requirements with Third-Party Service Providers

PCI v4.0 - 12.6.3: Hold Information Security Awareness Trainings Regularly

PCI v4.0 - 12.3.2: Perform Targeted Risk Analyses for Customized Approach

PCI v4.0 - 12.3.3: Document and Review Cryptographic Cipher Suites and Protocols in Use

PCI v4.0 - 12.1.2: Review and Update Your Information Security Policy Regularly

PCI v4.0 - 12.1.3: Ensure Your Information Security Policy Defines Roles and Responsibilities

PCI v4.0 - 10.7.1: (Service Providers) Critical Security Control System Failures Are Addressed

PCI v4.0 - 10.4.2 & 10.4.2.1: Periodically Perform Other Audit Log Reviews

PCI v4.0 - 10.4.3: Address Identified Exceptions and Anomalies

PCI v4.0 - 10.3.1: Read Access to Audit Log FIles Is Limited

PCI v4.0 - 10.2.1.6: Logs Capture All Initialization, Starting, Stopping, and Pausing of Audit Logs

PCI v4.0 - 10.2.1: Audit Logs Are Enabled and Active

PCI v4.0 - 9.4.5 & 9.4.5.1: Inventory Logs of Electronic Media with Cardholder Data Are Maintained

PCI v4.0 - 9.4.1, 9.4.1.1, & 9.4.1.2: Media with Cardholder Data Is Physically Secured

PCI v4.0 - 9.2.3: Access to Network Access Points Is Restricted

PCI v4.0 - 9.3.1.1: Physical Access to Sensitive Areas Within the CDE Is Controlled

PCI v4.0 - 8.4.2: Multi-Factor Authentication Applied for All Access to Cardholder Data Environment

PCI v4.0 - 8.6.1: Interactive Logins Are Managed Properly