Объединенная экспертная группа по инициативе преобразования



страница38/48
Дата09.05.2018
Размер6.15 Mb.
1   ...   34   35   36   37   38   39   40   41   ...   48

Withdrawn

---

SC-34

Non-Modifiable Executable Programs

None

SC-35

Honeyclients

None

SC-36

Distributed Processing and Storage

None

SC-37

Out-of-Band Channels

None

SC-38

Operations Security

A.12.x

SC-39

Process Isolation

None

SC-40

Wireless Link Protection

None

SC-41

Port and I/O Device Access

None

SC-42

Sensor Capability and Data

None

SC-43

Usage Restrictions

None

SC-44

Detonation Chambers

None

SI-1

System and Information Integrity Policy and Procedures

A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2

SI-2

Flaw Remediation

A.12.6.1, A.14.2.2, A.14.2.3, A.16.1.3

SI-3

Malicious Code Protection

A.12.2.1

SI-4

Information System Monitoring

None

SI-5

Security Alerts, Advisories, and Directives

A.6.1.4*

SI-6

Security Function Verification

None

SI-7

Software, Firmware, and Information Integrity

None

SI-8

Spam Protection

None

SI-9

Withdrawn

---

SI-10

Information Input Validation

None

SI-11

Error Handling

None

SI-12

Information Handling and Retention

None

SI-13

Predictable Failure Prevention

None

SI-14

Non-Persistence

None

SI-15

Information Output Filtering

None

SI-16

Memory Protection

None

SI-17

Fail-Safe Procedures

None

PM-1

Information Security Program Plan

A.5.1.1, A.5.1.2, A.6.1.1, A.18.1.1, A.18.2.2

PM-2

Senior Information Security Officer

A.6.1.1*

PM-3

Information Security Resources

None

PM-4

Plan of Action and Milestones Process

None

PM-5

Information System Inventory

None

PM-6

Information Security Measures of Performance

None

PM-7

Enterprise Architecture

None

PM-8

Critical Infrastructure Plan

None

PM-9

Risk Management Strategy

None

PM-10

Security Authorization Process

A.6.1.1*

PM-11

Mission/Business Process Definition

None

PM-12

Insider Threat Program

None

PM-13

Information Security Workforce

A.7.2.2*

PM-14

Testing, Training, and Monitoring

None

PM-15

Contacts with Security Groups and Associations

A.6.1.4

PM-16

Threat Awareness Program

None



Поделитесь с Вашими друзьями:
1   ...   34   35   36   37   38   39   40   41   ...   48


База данных защищена авторским правом ©vossta.ru 2019
обратиться к администрации

    Главная страница
Автореферат
Анализ
Анкета
Бизнес-план
Биография
Бюллетень
Викторина
Выпускная работа
Глава
Диплом
Дипломная работа