View: Recently Updated · Alphabetical · Tree
  1. Prev
  2. 1
  3. 2
  4. 3
  5. 4
  6. 5
  7. 6
  8. 7
  9. 23
  10. Next
Title Last Updated By Updated
Page: .brikit.mobile Dee Evans Aug 27, 2018
Page: 14 Cloud Security Principles Murad Khan Aug 15, 2019
Page: 3.1.13 Employ cryptographic mechanisms to protect remote sessions Murad Khan Jul 19, 2019
Page: 3.1.17 Protect wireless access using authentication and encryption Murad Khan Jul 19, 2019
Page: 3.1.18 Control connection of mobile devices Murad Khan Jul 19, 2019
Page: 3.1.19 Encrypt CUI on mobile devices Murad Khan Jul 19, 2019
Page: 3.1.20 Verify and control/limit connections to and use of external systems Murad Khan Jul 19, 2019
Page: 3.1.6 Accessing Non-Security Functions Murad Khan Jul 19, 2019
Page: 3.1.8 Limit unsuccessful logon attempts Murad Khan Jul 19, 2019
Page: 3.1.9 Provide privacy and security notices consistent with applicable CUI rules Murad Khan Jul 19, 2019
Page: 3.10.1 Limit physical access to organizational information systems Murad Khan Jul 19, 2019
Page: 3.10.5 Managing Physical Access Devices Murad Khan Jul 19, 2019
Page: 3.10.6 Enforce safeguarding measures for CUI at alternate work sites Murad Khan Jul 19, 2019
Page: 3.11.1 Assess Risk to Organizational Operations Murad Khan Jul 19, 2019
Page: 3.11.2 Scan for Vulnerabilities Murad Khan Jul 19, 2019
Page: 3.12.2 Develop and implement plans of action Murad Khan Jul 19, 2019
Page: 3.12.3 Monitor security controls on an ongoing basis Murad Khan Jul 19, 2019
Page: 3.12.4 Develop, document, periodically update, and implement system security plans Murad Khan Jul 19, 2019
Page: 3.13.1 Monitor, control, and protect communications Murad Khan Jul 19, 2019
Page: 3.13.11 FIPS-Validated Cryptography Murad Khan Jul 19, 2019
Page: 3.13.12 Prohibit remote activation of collaborative computing devices Murad Khan Jul 19, 2019
Page: 3.13.15 Protect the Authenticity of Communications Sessions Murad Khan Jul 19, 2019
Page: 3.13.4 Prevent Unintended Information Transfer Murad Khan Jul 19, 2019
Page: 3.13.5 Sub-Networks for Publicly Accessible System Components Murad Khan Jul 19, 2019
Page: 3.13.7 Preventing Simultaneous Remote Connections from Devices Murad Khan Jul 19, 2019
Page: 3.13.8 Implement cryptographic mechanisms to prevent unauthorized disclosure of CUI Murad Khan Jul 19, 2019
Page: 3.14.1 Reporting Information and System Flaws Murad Khan Jul 19, 2019
Page: 3.14.2 Provide protection from malicious code Murad Khan Jul 19, 2019
Page: 3.14.5 Perform periodic scans of the information systems Murad Khan Jul 19, 2019
Page: 3.2.2 Personnel Adequately Trained to Carry out Duties Murad Khan Jul 19, 2019
  1. Prev
  2. 1
  3. 2
  4. 3
  5. 4
  6. 5
  7. 6
  8. 7
  9. 23
  10. Next