Page: .brikit.mobile
|
Dee Evans |
Aug 27, 2018
|
Page: 14 Cloud Security Principles
|
Murad Khan |
Aug 15, 2019
|
Page: 3-Year Recertification - Trading Partner Manager (TPM)
|
Daniel Reid |
Oct 25, 2019
|
Page: 3.1.13 Employ cryptographic mechanisms to protect remote sessions
|
Murad Khan |
Jul 19, 2019
|
Page: 3.1.17 Protect wireless access using authentication and encryption
|
Murad Khan |
Jul 19, 2019
|
Page: 3.1.18 Control connection of mobile devices
|
Murad Khan |
Jul 19, 2019
|
Page: 3.1.19 Encrypt CUI on mobile devices
|
Murad Khan |
Jul 19, 2019
|
Page: 3.1.20 Verify and control/limit connections to and use of external systems
|
Murad Khan |
Jul 19, 2019
|
Page: 3.1.6 Accessing Non-Security Functions
|
Murad Khan |
Jul 19, 2019
|
Page: 3.1.8 Limit unsuccessful logon attempts
|
Murad Khan |
Jul 19, 2019
|
Page: 3.1.9 Provide privacy and security notices consistent with applicable CUI rules
|
Murad Khan |
Jul 19, 2019
|
Page: 3.10.1 Limit physical access to organizational information systems
|
Murad Khan |
Jul 19, 2019
|
Page: 3.10.5 Managing Physical Access Devices
|
Murad Khan |
Jul 19, 2019
|
Page: 3.10.6 Enforce safeguarding measures for CUI at alternate work sites
|
Murad Khan |
Jul 19, 2019
|
Page: 3.11.1 Assess Risk to Organizational Operations
|
Murad Khan |
Jul 19, 2019
|
Page: 3.11.2 Scan for Vulnerabilities
|
Murad Khan |
Jul 19, 2019
|
Page: 3.12.2 Develop and implement plans of action
|
Murad Khan |
Jul 19, 2019
|
Page: 3.12.3 Monitor security controls on an ongoing basis
|
Murad Khan |
Jul 19, 2019
|
Page: 3.12.4 Develop, document, periodically update, and implement system security plans
|
Murad Khan |
Jul 19, 2019
|
Page: 3.13.1 Monitor, control, and protect communications
|
Murad Khan |
Jul 19, 2019
|
Page: 3.13.11 FIPS-Validated Cryptography
|
Murad Khan |
Jul 19, 2019
|
Page: 3.13.12 Prohibit remote activation of collaborative computing devices
|
Murad Khan |
Jul 19, 2019
|
Page: 3.13.15 Protect the Authenticity of Communications Sessions
|
Murad Khan |
Jul 19, 2019
|
Page: 3.13.4 Prevent Unintended Information Transfer
|
Murad Khan |
Jul 19, 2019
|
Page: 3.13.5 Sub-Networks for Publicly Accessible System Components
|
Murad Khan |
Jul 19, 2019
|
Page: 3.13.7 Preventing Simultaneous Remote Connections from Devices
|
Murad Khan |
Jul 19, 2019
|
Page: 3.13.8 Implement cryptographic mechanisms to prevent unauthorized disclosure of CUI
|
Murad Khan |
Jul 19, 2019
|
Page: 3.14.1 Reporting Information and System Flaws
|
Murad Khan |
Jul 19, 2019
|
Page: 3.14.2 Provide protection from malicious code
|
Murad Khan |
Jul 19, 2019
|
Page: 3.14.5 Perform periodic scans of the information systems
|
Murad Khan |
Jul 19, 2019
|