1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
1. Access Control
How the organization manages access to systems to ensure only authorized users have appropriate permissions
2. Awareness and Training
How the organization delivers privacy training to employees to raise awareness of risks and proper behaviors
Audit and Accountability
How the organization tracks and monitors system activities to detect and respond to security events
Assessment, Authorization, and Monitoring
How the organization assess security controls, authorizes systems for operation, and continuously monitors for threats
Configuration Management
How assets and software are securely configured and maintained to prevent vulnerabilities
Contingency Planning
How the organization prepares for and recovers from system outages and disasters
Identification and Authentication
How users and devices are identified and authenticated before accessing systems
Incident Response
How the organization prepares for, detects, responds to, and recovers from security incidents
Maintenance
How the organization ensures secure maintenance of hardware and software components
Media Protection
How information stored on Physical media is protected from unauthorized access or damage
Physical and Environmental Protection
How physical facilities and equipment are secured against unauthorized access or environmental hazards
Planning
How the organization manages information security planning and integrates it into business processes
Program Management
How the organization manages its overall information security and privacy program
Personnel Security
How employees and contractors are screened and managed to reduce insider threats
PII and Transparency
How PII is managed, processed, and protected with transparency
Risk Assessment
How the organization identifies and evaluates risks to its information systems and data
System and Services Acquisition
How systems and services are securely acquired, developed, and integrated
System and Communications Protection
How data is securely transmitted and protected during communication
System and Information Integrity
How the organization ensures the integrity of data and systems by detecting and correcting errors or malicious changes
Supply Chain Risk Management
How the organization manages risks related to its supply chain, including third-party vendors and service providers