Num. | Title | Impact | Priority | Subject Area |
---|---|---|---|---|
AC-1 | ACCESS CONTROL POLICY AND PROCEDURES | LOW | P1 | Access Control |
AC-2 | ACCOUNT MANAGEMENT | LOW | P1 | Access Control |
AC-3 | ACCESS ENFORCEMENT | LOW | P1 | Access Control |
AC-4 | INFORMATION FLOW ENFORCEMENT | MODERATE | P1 | Access Control |
AC-5 | SEPARATION OF DUTIES | MODERATE | P1 | Access Control |
AC-6 | LEAST PRIVILEGE | MODERATE | P1 | Access Control |
AC-7 | UNSUCCESSFUL LOGON ATTEMPTS | LOW | P2 | Access Control |
AC-8 | SYSTEM USE NOTIFICATION | LOW | P1 | Access Control |
AC-9 | PREVIOUS LOGON (ACCESS) NOTIFICATION | P0 | Access Control | |
AC-10 | CONCURRENT SESSION CONTROL | HIGH | P3 | Access Control |
AC-11 | SESSION LOCK | MODERATE | P3 | Access Control |
AC-12 | SESSION TERMINATION | MODERATE | P2 | Access Control |
AC-13 | SUPERVISION AND REVIEW � ACCESS CONTROL | Access Control | ||
AC-14 | PERMITTED ACTIONS WITHOUT IDENTIFICATION OR AUTHENTICATION | LOW | P3 | Access Control |
AC-15 | AUTOMATED MARKING | Access Control | ||
AC-16 | SECURITY ATTRIBUTES | P0 | Access Control | |
AC-17 | REMOTE ACCESS | LOW | P1 | Access Control |
AC-18 | WIRELESS ACCESS | LOW | P1 | Access Control |
AC-19 | ACCESS CONTROL FOR MOBILE DEVICES | LOW | P1 | Access Control |
AC-20 | USE OF EXTERNAL INFORMATION SYSTEMS | LOW | P1 | Access Control |
AC-21 | INFORMATION SHARING | MODERATE | P2 | Access Control |
AC-22 | PUBLICLY ACCESSIBLE CONTENT | LOW | P3 | Access Control |
AC-23 | DATA MINING PROTECTION | P0 | Access Control | |
AC-24 | ACCESS CONTROL DECISIONS | P0 | Access Control | |
AC-25 | REFERENCE MONITOR | P0 | Access Control | |
AT-1 | SECURITY AWARENESS AND TRAINING POLICY AND PROCEDURES | LOW | P1 | Awareness And Training |
AT-2 | SECURITY AWARENESS TRAINING | LOW | P1 | Awareness And Training |
AT-3 | ROLE-BASED SECURITY TRAINING | LOW | P1 | Awareness And Training |
AT-4 | SECURITY TRAINING RECORDS | LOW | P3 | Awareness And Training |
AT-5 | CONTACTS WITH SECURITY GROUPS AND ASSOCIATIONS | Awareness And Training | ||
AU-1 | AUDIT AND ACCOUNTABILITY POLICY AND PROCEDURES | LOW | P1 | Audit And Accountability |
AU-2 | AUDIT EVENTS | LOW | P1 | Audit And Accountability |
AU-3 | CONTENT OF AUDIT RECORDS | LOW | P1 | Audit And Accountability |
AU-4 | AUDIT STORAGE CAPACITY | LOW | P1 | Audit And Accountability |
AU-5 | RESPONSE TO AUDIT PROCESSING FAILURES | LOW | P1 | Audit And Accountability |
AU-6 | AUDIT REVIEW, ANALYSIS, AND REPORTING | LOW | P1 | Audit And Accountability |
AU-7 | AUDIT REDUCTION AND REPORT GENERATION | MODERATE | P2 | Audit And Accountability |
AU-8 | TIME STAMPS | LOW | P1 | Audit And Accountability |
AU-9 | PROTECTION OF AUDIT INFORMATION | LOW | P1 | Audit And Accountability |
AU-10 | NON-REPUDIATION | HIGH | P2 | Audit And Accountability |
AU-11 | AUDIT RECORD RETENTION | LOW | P3 | Audit And Accountability |
AU-12 | AUDIT GENERATION | LOW | P1 | Audit And Accountability |
AU-13 | MONITORING FOR INFORMATION DISCLOSURE | P0 | Audit And Accountability | |
AU-14 | SESSION AUDIT | P0 | Audit And Accountability | |
AU-15 | ALTERNATE AUDIT CAPABILITY | P0 | Audit And Accountability | |
AU-16 | CROSS-ORGANIZATIONAL AUDITING | P0 | Audit And Accountability | |
CA-1 | SECURITY ASSESSMENT AND AUTHORIZATION POLICY AND PROCEDURES | LOW | P1 | Security Assessment And Authorization |
CA-2 | SECURITY ASSESSMENTS | LOW | P2 | Security Assessment And Authorization |
CA-3 | SYSTEM INTERCONNECTIONS | LOW | P1 | Security Assessment And Authorization |
CA-4 | SECURITY CERTIFICATION | Security Assessment And Authorization | ||
CA-5 | PLAN OF ACTION AND MILESTONES | LOW | P3 | Security Assessment And Authorization |
CA-6 | SECURITY AUTHORIZATION | LOW | P2 | Security Assessment And Authorization |
CA-7 | CONTINUOUS MONITORING | LOW | P2 | Security Assessment And Authorization |
CA-8 | PENETRATION TESTING | HIGH | P2 | Security Assessment And Authorization |
CA-9 | INTERNAL SYSTEM CONNECTIONS | LOW | P2 | Security Assessment And Authorization |
CM-1 | CONFIGURATION MANAGEMENT POLICY AND PROCEDURES | LOW | P1 | Configuration Management |
CM-2 | BASELINE CONFIGURATION | LOW | P1 | Configuration Management |
CM-3 | CONFIGURATION CHANGE CONTROL | MODERATE | P1 | Configuration Management |
CM-4 | SECURITY IMPACT ANALYSIS | LOW | P2 | Configuration Management |
CM-5 | ACCESS RESTRICTIONS FOR CHANGE | MODERATE | P1 | Configuration Management |
CM-6 | CONFIGURATION SETTINGS | LOW | P1 | Configuration Management |
CM-7 | LEAST FUNCTIONALITY | LOW | P1 | Configuration Management |
CM-8 | INFORMATION SYSTEM COMPONENT INVENTORY | LOW | P1 | Configuration Management |
CM-9 | CONFIGURATION MANAGEMENT PLAN | MODERATE | P1 | Configuration Management |
CM-10 | SOFTWARE USAGE RESTRICTIONS | LOW | P2 | Configuration Management |
CM-11 | USER-INSTALLED SOFTWARE | LOW | P1 | Configuration Management |
CP-1 | CONTINGENCY PLANNING POLICY AND PROCEDURES | LOW | P1 | Contingency Planning |
CP-2 | CONTINGENCY PLAN | LOW | P1 | Contingency Planning |
CP-3 | CONTINGENCY TRAINING | LOW | P2 | Contingency Planning |
CP-4 | CONTINGENCY PLAN TESTING | LOW | P2 | Contingency Planning |
CP-5 | CONTINGENCY PLAN UPDATE | Contingency Planning | ||
CP-6 | ALTERNATE STORAGE SITE | MODERATE | P1 | Contingency Planning |
CP-7 | ALTERNATE PROCESSING SITE | MODERATE | P1 | Contingency Planning |
CP-8 | TELECOMMUNICATIONS SERVICES | MODERATE | P1 | Contingency Planning |
CP-9 | INFORMATION SYSTEM BACKUP | LOW | P1 | Contingency Planning |
CP-10 | INFORMATION SYSTEM RECOVERY AND RECONSTITUTION | LOW | P1 | Contingency Planning |
CP-11 | ALTERNATE COMMUNICATIONS PROTOCOLS | P0 | Contingency Planning | |
CP-12 | SAFE MODE | P0 | Contingency Planning | |
CP-13 | ALTERNATIVE SECURITY MECHANISMS | P0 | Contingency Planning | |
IA-1 | IDENTIFICATION AND AUTHENTICATION POLICY AND PROCEDURES | LOW | P1 | Identification And Authentication |
IA-2 | IDENTIFICATION AND AUTHENTICATION (ORGANIZATIONAL USERS) | LOW | P1 | Identification And Authentication |
IA-3 | DEVICE IDENTIFICATION AND AUTHENTICATION | MODERATE | P1 | Identification And Authentication |
IA-4 | IDENTIFIER MANAGEMENT | LOW | P1 | Identification And Authentication |
IA-5 | AUTHENTICATOR MANAGEMENT | LOW | P1 | Identification And Authentication |
IA-6 | AUTHENTICATOR FEEDBACK | LOW | P2 | Identification And Authentication |
IA-7 | CRYPTOGRAPHIC MODULE AUTHENTICATION | LOW | P1 | Identification And Authentication |
IA-8 | IDENTIFICATION AND AUTHENTICATION (NON-ORGANIZATIONAL USERS) | LOW | P1 | Identification And Authentication |
IA-9 | SERVICE IDENTIFICATION AND AUTHENTICATION | P0 | Identification And Authentication | |
IA-10 | ADAPTIVE IDENTIFICATION AND AUTHENTICATION | P0 | Identification And Authentication | |
IA-11 | RE-AUTHENTICATION | P0 | Identification And Authentication | |
IR-1 | INCIDENT RESPONSE POLICY AND PROCEDURES | LOW | P1 | Incident Response |
IR-2 | INCIDENT RESPONSE TRAINING | LOW | P2 | Incident Response |
IR-3 | INCIDENT RESPONSE TESTING | MODERATE | P2 | Incident Response |
IR-4 | INCIDENT HANDLING | LOW | P1 | Incident Response |
IR-5 | INCIDENT MONITORING | LOW | P1 | Incident Response |
IR-6 | INCIDENT REPORTING | LOW | P1 | Incident Response |
IR-7 | INCIDENT RESPONSE ASSISTANCE | LOW | P2 | Incident Response |
IR-8 | INCIDENT RESPONSE PLAN | LOW | P1 | Incident Response |
IR-9 | INFORMATION SPILLAGE RESPONSE | P0 | Incident Response | |
IR-10 | INTEGRATED INFORMATION SECURITY ANALYSIS TEAM | P0 | Incident Response | |
MA-1 | SYSTEM MAINTENANCE POLICY AND PROCEDURES | LOW | P1 | Maintenance |
MA-2 | CONTROLLED MAINTENANCE | LOW | P2 | Maintenance |
MA-3 | MAINTENANCE TOOLS | MODERATE | P3 | Maintenance |
MA-4 | NONLOCAL MAINTENANCE | LOW | P2 | Maintenance |
MA-5 | MAINTENANCE PERSONNEL | LOW | P2 | Maintenance |
MA-6 | TIMELY MAINTENANCE | MODERATE | P2 | Maintenance |
MP-1 | MEDIA PROTECTION POLICY AND PROCEDURES | LOW | P1 | Media Protection |
MP-2 | MEDIA ACCESS | LOW | P1 | Media Protection |
MP-3 | MEDIA MARKING | MODERATE | P2 | Media Protection |
MP-4 | MEDIA STORAGE | MODERATE | P1 | Media Protection |
MP-5 | MEDIA TRANSPORT | MODERATE | P1 | Media Protection |
MP-6 | MEDIA SANITIZATION | LOW | P1 | Media Protection |
MP-7 | MEDIA USE | LOW | P1 | Media Protection |
MP-8 | MEDIA DOWNGRADING | P0 | Media Protection | |
PE-1 | PHYSICAL AND ENVIRONMENTAL PROTECTION POLICY AND PROCEDURES | LOW | P1 | Physical And Environmental Protection |
PE-2 | PHYSICAL ACCESS AUTHORIZATIONS | LOW | P1 | Physical And Environmental Protection |
PE-3 | PHYSICAL ACCESS CONTROL | LOW | P1 | Physical And Environmental Protection |
PE-4 | ACCESS CONTROL FOR TRANSMISSION MEDIUM | MODERATE | P1 | Physical And Environmental Protection |
PE-5 | ACCESS CONTROL FOR OUTPUT DEVICES | MODERATE | P2 | Physical And Environmental Protection |
PE-6 | MONITORING PHYSICAL ACCESS | LOW | P1 | Physical And Environmental Protection |
PE-7 | VISITOR CONTROL | Physical And Environmental Protection | ||
PE-8 | VISITOR ACCESS RECORDS | LOW | P3 | Physical And Environmental Protection |
PE-9 | POWER EQUIPMENT AND CABLING | MODERATE | P1 | Physical And Environmental Protection |
PE-10 | EMERGENCY SHUTOFF | MODERATE | P1 | Physical And Environmental Protection |
PE-11 | EMERGENCY POWER | MODERATE | P1 | Physical And Environmental Protection |
PE-12 | EMERGENCY LIGHTING | LOW | P1 | Physical And Environmental Protection |
PE-13 | FIRE PROTECTION | LOW | P1 | Physical And Environmental Protection |
PE-14 | TEMPERATURE AND HUMIDITY CONTROLS | LOW | P1 | Physical And Environmental Protection |
PE-15 | WATER DAMAGE PROTECTION | LOW | P1 | Physical And Environmental Protection |
PE-16 | DELIVERY AND REMOVAL | LOW | P2 | Physical And Environmental Protection |
PE-17 | ALTERNATE WORK SITE | MODERATE | P2 | Physical And Environmental Protection |
PE-18 | LOCATION OF INFORMATION SYSTEM COMPONENTS | HIGH | P3 | Physical And Environmental Protection |
PE-19 | INFORMATION LEAKAGE | P0 | Physical And Environmental Protection | |
PE-20 | ASSET MONITORING AND TRACKING | P0 | Physical And Environmental Protection | |
PL-1 | SECURITY PLANNING POLICY AND PROCEDURES | LOW | P1 | Planning |
PL-2 | SYSTEM SECURITY PLAN | LOW | P1 | Planning |
PL-3 | SYSTEM SECURITY PLAN UPDATE | Planning | ||
PL-4 | RULES OF BEHAVIOR | LOW | P2 | Planning |
PL-5 | PRIVACY IMPACT ASSESSMENT | Planning | ||
PL-6 | SECURITY-RELATED ACTIVITY PLANNING | Planning | ||
PL-7 | SECURITY CONCEPT OF OPERATIONS | P0 | Planning | |
PL-8 | INFORMATION SECURITY ARCHITECTURE | MODERATE | P1 | Planning |
PL-9 | CENTRAL MANAGEMENT | P0 | Planning | |
PS-1 | PERSONNEL SECURITY POLICY AND PROCEDURES | LOW | P1 | Personnel Security |
PS-2 | POSITION RISK DESIGNATION | LOW | P1 | Personnel Security |
PS-3 | PERSONNEL SCREENING | LOW | P1 | Personnel Security |
PS-4 | PERSONNEL TERMINATION | LOW | P1 | Personnel Security |
PS-5 | PERSONNEL TRANSFER | LOW | P2 | Personnel Security |
PS-6 | ACCESS AGREEMENTS | LOW | P3 | Personnel Security |
PS-7 | THIRD-PARTY PERSONNEL SECURITY | LOW | P1 | Personnel Security |
PS-8 | PERSONNEL SANCTIONS | LOW | P3 | Personnel Security |
RA-1 | RISK ASSESSMENT POLICY AND PROCEDURES | LOW | P1 | Risk Assessment |
RA-2 | SECURITY CATEGORIZATION | LOW | P1 | Risk Assessment |
RA-3 | RISK ASSESSMENT | LOW | P1 | Risk Assessment |
RA-4 | RISK ASSESSMENT UPDATE | Risk Assessment | ||
RA-5 | VULNERABILITY SCANNING | LOW | P1 | Risk Assessment |
RA-6 | TECHNICAL SURVEILLANCE COUNTERMEASURES SURVEY | P0 | Risk Assessment | |
SA-1 | SYSTEM AND SERVICES ACQUISITION POLICY AND PROCEDURES | LOW | P1 | System And Services Acquisition |
SA-2 | ALLOCATION OF RESOURCES | LOW | P1 | System And Services Acquisition |
SA-3 | SYSTEM DEVELOPMENT LIFE CYCLE | LOW | P1 | System And Services Acquisition |
SA-4 | ACQUISITION PROCESS | LOW | P1 | System And Services Acquisition |
SA-5 | INFORMATION SYSTEM DOCUMENTATION | LOW | P2 | System And Services Acquisition |
SA-6 | SOFTWARE USAGE RESTRICTIONS | System And Services Acquisition | ||
SA-7 | USER-INSTALLED SOFTWARE | System And Services Acquisition | ||
SA-8 | SECURITY ENGINEERING PRINCIPLES | MODERATE | P1 | System And Services Acquisition |
SA-9 | EXTERNAL INFORMATION SYSTEM SERVICES | LOW | P1 | System And Services Acquisition |
SA-10 | DEVELOPER CONFIGURATION MANAGEMENT | MODERATE | P1 | System And Services Acquisition |
SA-11 | DEVELOPER SECURITY TESTING AND EVALUATION | MODERATE | P1 | System And Services Acquisition |
SA-12 | SUPPLY CHAIN PROTECTION | HIGH | P1 | System And Services Acquisition |
SA-13 | TRUSTWORTHINESS | P0 | System And Services Acquisition | |
SA-14 | CRITICALITY ANALYSIS | P0 | System And Services Acquisition | |
SA-15 | DEVELOPMENT PROCESS, STANDARDS, AND TOOLS | HIGH | P2 | System And Services Acquisition |
SA-16 | DEVELOPER-PROVIDED TRAINING | HIGH | P2 | System And Services Acquisition |
SA-17 | DEVELOPER SECURITY ARCHITECTURE AND DESIGN | HIGH | P1 | System And Services Acquisition |
SA-18 | TAMPER RESISTANCE AND DETECTION | P0 | System And Services Acquisition | |
SA-19 | COMPONENT AUTHENTICITY | P0 | System And Services Acquisition | |
SA-20 | CUSTOMIZED DEVELOPMENT OF CRITICAL COMPONENTS | P0 | System And Services Acquisition | |
SA-21 | DEVELOPER SCREENING | P0 | System And Services Acquisition | |
SA-22 | UNSUPPORTED SYSTEM COMPONENTS | P0 | System And Services Acquisition | |
SC-1 | SYSTEM AND COMMUNICATIONS PROTECTION POLICY AND PROCEDURES | LOW | P1 | System And Communications Protection |
SC-2 | APPLICATION PARTITIONING | MODERATE | P1 | System And Communications Protection |
SC-3 | SECURITY FUNCTION ISOLATION | HIGH | P1 | System And Communications Protection |
SC-4 | INFORMATION IN SHARED RESOURCES | MODERATE | P1 | System And Communications Protection |
SC-5 | DENIAL OF SERVICE PROTECTION | LOW | P1 | System And Communications Protection |
SC-6 | RESOURCE AVAILABILITY | P0 | System And Communications Protection | |
SC-7 | BOUNDARY PROTECTION | LOW | P1 | System And Communications Protection |
SC-8 | TRANSMISSION CONFIDENTIALITY AND INTEGRITY | MODERATE | P1 | System And Communications Protection |
SC-9 | TRANSMISSION CONFIDENTIALITY | System And Communications Protection | ||
SC-10 | NETWORK DISCONNECT | MODERATE | P2 | System And Communications Protection |
SC-11 | TRUSTED PATH | P0 | System And Communications Protection | |
SC-12 | CRYPTOGRAPHIC KEY ESTABLISHMENT AND MANAGEMENT | LOW | P1 | System And Communications Protection |
SC-13 | CRYPTOGRAPHIC PROTECTION | LOW | P1 | System And Communications Protection |
SC-14 | PUBLIC ACCESS PROTECTIONS | System And Communications Protection | ||
SC-15 | COLLABORATIVE COMPUTING DEVICES | LOW | P1 | System And Communications Protection |
SC-16 | TRANSMISSION OF SECURITY ATTRIBUTES | P0 | System And Communications Protection | |
SC-17 | PUBLIC KEY INFRASTRUCTURE CERTIFICATES | MODERATE | P1 | System And Communications Protection |
SC-18 | MOBILE CODE | MODERATE | P2 | System And Communications Protection |
SC-19 | VOICE OVER INTERNET PROTOCOL | MODERATE | P1 | System And Communications Protection |
SC-20 | SECURE NAME / ADDRESS RESOLUTION SERVICE (AUTHORITATIVE SOURCE) | LOW | P1 | System And Communications Protection |
SC-21 | SECURE NAME / ADDRESS RESOLUTION SERVICE (RECURSIVE OR CACHING RESOLVER) | LOW | P1 | System And Communications Protection |
SC-22 | ARCHITECTURE AND PROVISIONING FOR NAME / ADDRESS RESOLUTION SERVICE | LOW | P1 | System And Communications Protection |
SC-23 | SESSION AUTHENTICITY | MODERATE | P1 | System And Communications Protection |
SC-24 | FAIL IN KNOWN STATE | HIGH | P1 | System And Communications Protection |
SC-25 | THIN NODES | P0 | System And Communications Protection | |
SC-26 | HONEYPOTS | P0 | System And Communications Protection | |
SC-27 | PLATFORM-INDEPENDENT APPLICATIONS | P0 | System And Communications Protection | |
SC-28 | PROTECTION OF INFORMATION AT REST | MODERATE | P1 | System And Communications Protection |
SC-29 | HETEROGENEITY | P0 | System And Communications Protection | |
SC-30 | CONCEALMENT AND MISDIRECTION | P0 | System And Communications Protection | |
SC-31 | COVERT CHANNEL ANALYSIS | P0 | System And Communications Protection | |
SC-32 | INFORMATION SYSTEM PARTITIONING | P0 | System And Communications Protection | |
SC-33 | TRANSMISSION PREPARATION INTEGRITY | System And Communications Protection | ||
SC-34 | NON-MODIFIABLE EXECUTABLE PROGRAMS | P0 | System And Communications Protection | |
SC-35 | HONEYCLIENTS | P0 | System And Communications Protection | |
SC-36 | DISTRIBUTED PROCESSING AND STORAGE | P0 | System And Communications Protection | |
SC-37 | OUT-OF-BAND CHANNELS | P0 | System And Communications Protection | |
SC-38 | OPERATIONS SECURITY | P0 | System And Communications Protection | |
SC-39 | PROCESS ISOLATION | LOW | P1 | System And Communications Protection |
SC-40 | WIRELESS LINK PROTECTION | P0 | System And Communications Protection | |
SC-41 | PORT AND I/O DEVICE ACCESS | P0 | System And Communications Protection | |
SC-42 | SENSOR CAPABILITY AND DATA | P0 | System And Communications Protection | |
SC-43 | USAGE RESTRICTIONS | P0 | System And Communications Protection | |
SC-44 | DETONATION CHAMBERS | P0 | System And Communications Protection | |
SI-1 | SYSTEM AND INFORMATION INTEGRITY POLICY AND PROCEDURES | LOW | P1 | System And Information Integrity |
SI-2 | FLAW REMEDIATION | LOW | P1 | System And Information Integrity |
SI-3 | MALICIOUS CODE PROTECTION | LOW | P1 | System And Information Integrity |
SI-4 | INFORMATION SYSTEM MONITORING | LOW | P1 | System And Information Integrity |
SI-5 | SECURITY ALERTS, ADVISORIES, AND DIRECTIVES | LOW | P1 | System And Information Integrity |
SI-6 | SECURITY FUNCTION VERIFICATION | HIGH | P1 | System And Information Integrity |
SI-7 | SOFTWARE, FIRMWARE, AND INFORMATION INTEGRITY | MODERATE | P1 | System And Information Integrity |
SI-8 | SPAM PROTECTION | MODERATE | P2 | System And Information Integrity |
SI-9 | INFORMATION INPUT RESTRICTIONS | System And Information Integrity | ||
SI-10 | INFORMATION INPUT VALIDATION | MODERATE | P1 | System And Information Integrity |
SI-11 | ERROR HANDLING | MODERATE | P2 | System And Information Integrity |
SI-12 | INFORMATION HANDLING AND RETENTION | LOW | P2 | System And Information Integrity |
SI-13 | PREDICTABLE FAILURE PREVENTION | P0 | System And Information Integrity | |
SI-14 | NON-PERSISTENCE | P0 | System And Information Integrity | |
SI-15 | INFORMATION OUTPUT FILTERING | P0 | System And Information Integrity | |
SI-16 | MEMORY PROTECTION | MODERATE | P1 | System And Information Integrity |
SI-17 | FAIL-SAFE PROCEDURES | P0 | System And Information Integrity | |
PM-1 | INFORMATION SECURITY PROGRAM PLAN | Program Management | ||
PM-2 | SENIOR INFORMATION SECURITY OFFICER | Program Management | ||
PM-3 | INFORMATION SECURITY RESOURCES | Program Management | ||
PM-4 | PLAN OF ACTION AND MILESTONES PROCESS | Program Management | ||
PM-5 | INFORMATION SYSTEM INVENTORY | Program Management | ||
PM-6 | INFORMATION SECURITY MEASURES OF PERFORMANCE | Program Management | ||
PM-7 | ENTERPRISE ARCHITECTURE | Program Management | ||
PM-8 | CRITICAL INFRASTRUCTURE PLAN | Program Management | ||
PM-9 | RISK MANAGEMENT STRATEGY | Program Management | ||
PM-10 | SECURITY AUTHORIZATION PROCESS | Program Management | ||
PM-11 | MISSION/BUSINESS PROCESS DEFINITION | Program Management | ||
PM-12 | INSIDER THREAT PROGRAM | Program Management | ||
PM-13 | INFORMATION SECURITY WORKFORCE | Program Management | ||
PM-14 | TESTING, TRAINING, AND MONITORING | Program Management | ||
PM-15 | CONTACTS WITH SECURITY GROUPS AND ASSOCIATIONS | Program Management | ||
PM-16 | THREAT AWARENESS PROGRAM | Program Management |
- Privatus 5 1 2 – Automated Privacy Protection System
- Privatus 5 1 2 – Automated Privacy Protection Systems
- Privatus 5 1 2 – Automated Privacy Protection System Reviews
- Privatus 5 1 2 – Automated Privacy Protection System Definition
- Privatus 5 1 2 – Automated Privacy Protection System Pdf
Welcome to Ramleague,
Ramleague - the best site for pinoy chat, games chat and mobiles chat,
Privatus 5 1 2 – Automated Privacy Protection System
Related controls: AU-6, CP-2, IR-2, IR-3, PE-6, SC-5, SC-7, SI-3, SI-4, SI-7. The organization employs automated mechanisms to support the incident handling process. An online incident management system is an example of an automated mechanism. Culture How Disney Designed a Robotic Spider-Man. The stunts we love to watch in movies like 'Spider-Man: Homecoming' usually rely on a combination of green screen, stunt performers, and computer. 'Material scope'. This Regulation applies to the processing of personal data wholly or partly by automated means and to the processing other than by automated means of personal data which form part of a filing system or are intended to form part of a filing system. NEW: The practical guide PrivazyPlan ® explains all. See IRM Exhibit 3.10.72-2, Correspondex C Letters - Routing Guide; IRM Exhibit 3.13.6-1, Appendix A - Document Types, Category Codes, IMF Domestic; IRM Exhibit 3.13.6-14, Appendix N - Document Types, Category Codes, Priority Codes, IDT - IMF; and IRM 21.5.1.4.2.3, Clerical Function for the Image Control Team (ICT) Correspondence Imaging System. TFdxs Privatus 5 1 2 – automated privacy protection systems. 'The Firmware' TNC emulator for TrueTTY. 'The Firmware' TNC emulator for TrueTTY. Freeware with source codes - 200 985 bytes.
Privatus 5 1 2 – Automated Privacy Protection Systems
Sign UpPrivatus 5 1 2 – Automated Privacy Protection System Reviews
- Hello guest Guest , Are you tired from Ads? to remove some ads you need to register and be active. :D
Discussion in 'PC Apllications' started by t0nymac, Jan 8, 2021.
Privatus 5 1 2 – Automated Privacy Protection System Definition
Similar Threads | Forum | Date |
---|---|---|
Privatus 6.3.5 – Automated privacy protection | PC Apllications | Feb 20, 2021 |
Privatus 6.3.4 – Automated privacy protection | PC Apllications | Jan 29, 2021 |
Privatus 6.3.2 – Automated privacy protection | PC Apllications | Jan 1, 2021 |
Privatus 6.3.1 – Automated privacy protection | PC Apllications | Dec 13, 2020 |
Privatus 6.3 – Automated privacy protection | PC Apllications | Nov 30, 2020 |
Privatus 6.2.7 – Automated privacy protection | PC Apllications | Sep 7, 2020 |