NERC CIP-002 through CIP-014 Revision 6_CIP-008-5 R3

NERC CIP-002 through CIP-014 Revision 6 Cyber Security Incident Response Plan Review, Update, and Communication CIP-008-5 R3 R3. Each Responsible Entity shall maintain each of its Cyber Security Incident response plans according to each of the applicable requirement parts in CIP-008-5 Table R3 ? Cyber Security Incident Response Plan Review Update and Communication. [Violation Risk Factor: Lower] [Time Horizon: Operations Assessment]. M3. Evidence must include but is not limited to documentation that…

Read More

CIS Framework Controls V8_11.3

CIS Framework Controls V8 Data Recovery 11.3 Protect Recovery Data Protect recovery data with equivalent controls to the original data. Reference encryption or data separation based on requirements.   Click here to Start your FREE trial today! Explainer video   What is a Cybersecurity Compliance Framework? You don’t need to clutter your security and privacy programs with an ever-increasing number of tools as they become more sophisticated. The Lionfish platform offers a…

Read More

PCI (Payment Card Industry Security Standard)_Req 6.5.2

PCI (Payment Card Industry Security Standard) Develop and maintain secure systems and applications Req 6.5.2 6.5.2 Buffer overflows Buffer overflows occur when an application does not have appropriate bounds checking on its buffer space. This can cause the information in the buffer to be pushed out of the buffer’s memory space and into executable memory space. When this occurs the attacker has the ability to insert malicious code at the end of…

Read More

NIST 800-53_SC-7(17)

NIST 800-53 System and Communications Protection SC-7(17) Boundary Protection Automated Enforcement of Protocol Formats Enforce adherence to protocol formats.   Click here to Start your FREE trial today! Explainer video   What is a Cybersecurity Compliance Framework? You don’t need to clutter your security and privacy programs with an ever-increasing number of tools as they become more sophisticated. The Lionfish platform offers a one-stop solution to track progress and monitor any framework,…

Read More

NIST 800-53_PE-14(2)

NIST 800-53 Physical and Environmental Protection PE-14(2) Environmental Controls Monitoring with Alarms and Notifications Employ environmental control monitoring that provides an alarm or notification of changes potentially harmful to personnel or equipment to [Assignment: organization-defined personnel or roles].   Click here to Start your FREE trial today! Explainer video   What is a Cybersecurity Compliance Framework? You don’t need to clutter your security and privacy programs with an ever-increasing number of tools…

Read More

PCI (Payment Card Industry Security Standard)_Test 9.10

PCI (Payment Card Industry Security Standard) Restrict physical access to cardholder data Test 9.10 9.10 Examine documentation and interview personnel to verify that security policies and operational procedures for restricting physical access to cardholder data are: – documented – in use and – known to all affected parties. Personnel need to be aware of and following security policies and operational procedures for restricting physical access to cardholder data and CDE systems on…

Read More

NIST 800-53_SR-6(1)

NIST 800-53 Supply Chain Risk Management SR-6(1) Supplier Assessments and Reviews Testing and Analysis Employ [Selection (one or more): organizational analysis; independent third-party analysis; organizational testing; independent third-party testing] of the following supply chain elements processes and actors associated with the system system component or system service: [Assignment: organization-defined supply chain elements processes and actors].   Click here to Start your FREE trial today! Explainer video   What is a Cybersecurity Compliance…

Read More

NERC CIP-002 through CIP-014 Revision 6_CIP-007-6 3.1

NERC CIP-002 through CIP-014 Revision 6 Malicious Code Prevention CIP-007-6 3.1 3.1 Deploy method(s) to deter detect or prevent malicious code. M3. Evidence must include each of the documented processes that collectively include each of the applicable requirement parts in CIP-007-6 Table R3– Malicious Code Prevention and additional evidence to demonstrate implementation as described in the Measures column of the table.CIP-007-6 Table R3– Malicious Code Prevention Part Applicable Systems Requirements Measures 3.1…

Read More

NIST 800-53_MP-8(3)

NIST 800-53 Media Protection MP-8(3) Media Downgrading Controlled Unclassified Information Downgrade system media containing controlled unclassified information prior to public release.   Click here to Start your FREE trial today! Explainer video   What is a Cybersecurity Compliance Framework? You don’t need to clutter your security and privacy programs with an ever-increasing number of tools as they become more sophisticated. The Lionfish platform offers a one-stop solution to track progress and monitor…

Read More

NIST 800-53_MA-5(3)

NIST 800-53 Maintenance MA-5(3) Maintenance Personnel Citizenship Requirements for Classified Systems Verify that personnel performing maintenance and diagnostic activities on a system processing storing or transmitting classified information are U.S. citizens.   Click here to Start your FREE trial today! Explainer video   What is a Cybersecurity Compliance Framework? You don’t need to clutter your security and privacy programs with an ever-increasing number of tools as they become more sophisticated. The Lionfish…

Read More

NIST-CSF_RS.CO-5

NIST-CSF Communications (RS.CO) RS.CO-5 RS.CO-5: Voluntary information sharing occurs with external stakeholders to achieve broader cybersecurity situational awareness NULL   Click here to Start your FREE trial today! Explainer video   What is a Cybersecurity Compliance Framework? You don’t need to clutter your security and privacy programs with an ever-increasing number of tools as they become more sophisticated. The Lionfish platform offers a one-stop solution to track progress and monitor any framework,…

Read More

NIST 800-53_SA-8(24)

NIST 800-53 System and Services Acquisitions SA-8(24) Security and Privacy Engineering Principles Secure Failure and Recovery Implement the security design principle of secure failure and recovery in [Assignment: organization-defined systems or system components].   Click here to Start your FREE trial today! Explainer video   What is a Cybersecurity Compliance Framework? You don’t need to clutter your security and privacy programs with an ever-increasing number of tools as they become more sophisticated.…

Read More

CIS Framework Controls V8_6.7

CIS Framework Controls V8 Access Control Management 6.7 Centralize Access Control Centralize access control for all enterprise assets through a directory service or SSO provider where supported.   Click here to Start your FREE trial today! Explainer video   What is a Cybersecurity Compliance Framework? You don’t need to clutter your security and privacy programs with an ever-increasing number of tools as they become more sophisticated. The Lionfish platform offers a one-stop…

Read More

NIST 800-53_AC-6(8)

NIST 800-53 Access Control AC-6(8) Least Privilege Privilege Levels for Code Execution Prevent the following software from executing at higher privilege levels than users executing the software: [Assignment: organization-defined software].   Click here to Start your FREE trial today! Explainer video   What is a Cybersecurity Compliance Framework? You don’t need to clutter your security and privacy programs with an ever-increasing number of tools as they become more sophisticated. The Lionfish platform…

Read More

PCI (Payment Card Industry Security Standard)_Test 8.8

PCI (Payment Card Industry Security Standard) Identify and authenticate access to system components Test 8.8 8.8 Examine documentation and interview personnel to verify that security policies and operational procedures for identification and authentication are: – documented – in use and – known to all affected parties. Personnel need to be aware of and following security policies and operational procedures for managing identification and authorization on a continuous basis. Requirement 9: Restrict physical…

Read More

NIST 800-53_CP-11

NIST 800-53 Contingency Planning CP-11 Alternate Communications Protocols Provide the capability to employ [Assignment: organization-defined alternative communications protocols] in support of maintaining continuity of operations.   Click here to Start your FREE trial today! Explainer video   What is a Cybersecurity Compliance Framework? You don’t need to clutter your security and privacy programs with an ever-increasing number of tools as they become more sophisticated. The Lionfish platform offers a one-stop solution to…

Read More

NIST 800-53_SI-14(3)

NIST 800-53 System and Information Integrity SI-14(3) Non-persistence Non-persistent Connectivity Establish connections to the system on demand and terminate connections after [Selection: completion of a request; a period of non-use].   Click here to Start your FREE trial today! Explainer video   What is a Cybersecurity Compliance Framework? You don’t need to clutter your security and privacy programs with an ever-increasing number of tools as they become more sophisticated. The Lionfish platform…

Read More

NIST-CSF_PR.DS-3

NIST-CSF Data Security (PR.DS) PR.DS-3 PR.DS-3: Assets are formally managed throughout removal transfers and disposition NULL   Click here to Start your FREE trial today! Explainer video   What is a Cybersecurity Compliance Framework? You don’t need to clutter your security and privacy programs with an ever-increasing number of tools as they become more sophisticated. The Lionfish platform offers a one-stop solution to track progress and monitor any framework, from custom-built ones…

Read More

NIST-CSF_RS.MI-3

NIST-CSF Mitigation (RS.MI) RS.MI-3 RS.MI-3: Newly identified vulnerabilities are mitigated or documented as accepted risks NULL   Click here to Start your FREE trial today! Explainer video   What is a Cybersecurity Compliance Framework? You don’t need to clutter your security and privacy programs with an ever-increasing number of tools as they become more sophisticated. The Lionfish platform offers a one-stop solution to track progress and monitor any framework, from custom-built ones…

Read More

PCI (Payment Card Industry Security Standard)_Test 1.3.2

PCI (Payment Card Industry Security Standard) Install and maintain a firewall configuration to protect cardholder data Test 1.3.2 1.3.2 Examine firewall and router configurations to verify that inbound internet traffic is limited to IP addresses within the DMZ. The DMZ is that part of the network that manages connections between the Internet (or other untrusted networks) and services that an organization needs to have available to the public (like a web server).…

Read More