Skip to content
Snippets Groups Projects
Commit c11be73e authored by Ayodeji Rotibi's avatar Ayodeji Rotibi
Browse files

Upload New File

parent 61918fa1
No related branches found
No related tags found
No related merge requests found
Pipeline #41485 failed with stages
in 1 minute and 15 seconds
Label #,Node Name
0,Secured System
1,SPE1
2,SPE2
3,SPE3
4,SPE4
5,SPE5
6,SPE6
7,SPE7
8,SPE8
9,Security Related Organisation and Policies
10,Security Assessments and Reviews
11,Security of Physical Access
12,Information Security Management System (ISMS)
13,Background Checks
14,Security Roles and Responsibilities
15,Security Awareness Training
16,Security Responsibilities Training
17,Supply Chain Security
18,Security risk mitigation
19,Processes for discovery of security anomalies
20,Secure development and support
21,SP reviews
22,Physical access control
23,Inventory Mgt of IACS HW-SW-NW
24,Asset Inventory Baseline
25,Infrastructure Drawings/Documentation
26,Configuration Settings
27,Change Control
28,System Segmentation
29,Secure Wireless Access
30,Secure Remote Access
31,Segmentation from non-IACS Networks
32,Documentation of Network Segment Interconnections
33,Network Segmentation from Safety Systems
34,Network Autonomy
35,Network Disconnection from External Networks
36,Internal Network Access Control
37,Device Connections
38,Network Accessible Services
39,User Messaging
40,Network Time Distribution
41,Wireless Protocols
42,Wireless Network Segmentation
43,Wireless Properties and Addresses
44,Remote Access Applications
45,Remote Access Connections
46,Remote Access Termination
47,Devices and Media
48,Malware Protection
49,Patch Management
50,Device Hardening
51,Dedicated Portable Media
52,Malware Free
53,Malware Protection Software Validation and Installation
54,Security Patch Authenticity Integrity
55,Security Patch Validation and Installation
56,Security Patch Status
57,Security Patching Retention of Security
58,Security Patch Mitigation
59,Protection of Data
60,Data Classification
61,Data Protection
62,Safety System Configuration Mode
63,Failure-State
64,Data Retention
65,Data Purging
66,Cryptographic Mechanisms
67,Key Management
68,Public Key Infrastructure (PKI)
69,Identification and authentication1
70,Identification and authentication2
71,Authorization and access control
72,User identity assignment
73,User identity removal
74,User identity persistence
75,Access rights assignment
76,Least privilege
77,Software service authentication
78,Software services interactive login rights
79,User authentication
80,Multifactor authentication
81,Mutual authentication
82,Password protection
83,Shared and disclosed/compromised passwords
84,User login display information
85,User login failure displays
86,Consecutive login failures
87,Session integrity
88,Concurrent sessions
89,Screen lock
90,Authorization
91,Administrative rights authorization
92,Multiple approvals
93,Manual elevation of privileges
94,Event and incident management
95,Event detection
96,Event reporting
97,Event reporting interfaces
98,Logging
99,Log entries
100,Log access
101,Event analysis
102,Incident handling and response
103,Vulnerability handling
104,System availability and intended functionality
105,Backup/restore/archive
106,Continuity management
107,Resource management
108,DoS attacks
109,Backup
110,Backup non-interference
111,Backup verification
112,Backup media
113,Backup restoration
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment