SCP Technique . | Clause Type . | ISO/IEC Control . |
---|---|---|
#06 Extend Guardianships | People | 6.08 Information security event reporting |
#07 Assist natural surveillance | Organizational | 5.22 Monitoring, review, and change management of supplier services |
#08 Reduce Anonymity | Organizational | 5.06 Contact with special interest groups |
#08 Reduce Anonymity | People | 6.01 Screening |
#08 Reduce Anonymity | Technological | 8.05 Secure authentication |
#08 Reduce Anonymity | Organizational | 5.16 Identity management |
#08 Reduce Anonymity | Organizational | 5.17 Authentication information |
#09 Utilise Place Managers | Organizational | 5.02 Information security roles and responsibilities |
#10 Strengthen Formal Surveillance | Organizational | 5.03 Segregation of duties |
#10 Strengthen Formal Surveillance | Organizational | 5.07 Threat intelligence |
#10 Strengthen Formal Surveillance | Organizational | 5.24 Information security incident management planning and preparation |
#10 Strengthen Formal Surveillance | Organizational | 5.25 Assessment and decision on information security events |
#10 Strengthen Formal Surveillance | Organizational | 5.28 Collection of evidence |
#10 Strengthen Formal Surveillance | Physical | 7.04 Physical security monitoring |
#10 Strengthen Formal Surveillance | Technological | 8.15 Logging |
#10 Strengthen Formal Surveillance | Technological | 8.16 Monitoring activities |
#10 Strengthen Formal Surveillance | Technological | 8.17 Clock synchronisation |
SCP Technique . | Clause Type . | ISO/IEC Control . |
---|---|---|
#06 Extend Guardianships | People | 6.08 Information security event reporting |
#07 Assist natural surveillance | Organizational | 5.22 Monitoring, review, and change management of supplier services |
#08 Reduce Anonymity | Organizational | 5.06 Contact with special interest groups |
#08 Reduce Anonymity | People | 6.01 Screening |
#08 Reduce Anonymity | Technological | 8.05 Secure authentication |
#08 Reduce Anonymity | Organizational | 5.16 Identity management |
#08 Reduce Anonymity | Organizational | 5.17 Authentication information |
#09 Utilise Place Managers | Organizational | 5.02 Information security roles and responsibilities |
#10 Strengthen Formal Surveillance | Organizational | 5.03 Segregation of duties |
#10 Strengthen Formal Surveillance | Organizational | 5.07 Threat intelligence |
#10 Strengthen Formal Surveillance | Organizational | 5.24 Information security incident management planning and preparation |
#10 Strengthen Formal Surveillance | Organizational | 5.25 Assessment and decision on information security events |
#10 Strengthen Formal Surveillance | Organizational | 5.28 Collection of evidence |
#10 Strengthen Formal Surveillance | Physical | 7.04 Physical security monitoring |
#10 Strengthen Formal Surveillance | Technological | 8.15 Logging |
#10 Strengthen Formal Surveillance | Technological | 8.16 Monitoring activities |
#10 Strengthen Formal Surveillance | Technological | 8.17 Clock synchronisation |
SCP Technique . | Clause Type . | ISO/IEC Control . |
---|---|---|
#06 Extend Guardianships | People | 6.08 Information security event reporting |
#07 Assist natural surveillance | Organizational | 5.22 Monitoring, review, and change management of supplier services |
#08 Reduce Anonymity | Organizational | 5.06 Contact with special interest groups |
#08 Reduce Anonymity | People | 6.01 Screening |
#08 Reduce Anonymity | Technological | 8.05 Secure authentication |
#08 Reduce Anonymity | Organizational | 5.16 Identity management |
#08 Reduce Anonymity | Organizational | 5.17 Authentication information |
#09 Utilise Place Managers | Organizational | 5.02 Information security roles and responsibilities |
#10 Strengthen Formal Surveillance | Organizational | 5.03 Segregation of duties |
#10 Strengthen Formal Surveillance | Organizational | 5.07 Threat intelligence |
#10 Strengthen Formal Surveillance | Organizational | 5.24 Information security incident management planning and preparation |
#10 Strengthen Formal Surveillance | Organizational | 5.25 Assessment and decision on information security events |
#10 Strengthen Formal Surveillance | Organizational | 5.28 Collection of evidence |
#10 Strengthen Formal Surveillance | Physical | 7.04 Physical security monitoring |
#10 Strengthen Formal Surveillance | Technological | 8.15 Logging |
#10 Strengthen Formal Surveillance | Technological | 8.16 Monitoring activities |
#10 Strengthen Formal Surveillance | Technological | 8.17 Clock synchronisation |
SCP Technique . | Clause Type . | ISO/IEC Control . |
---|---|---|
#06 Extend Guardianships | People | 6.08 Information security event reporting |
#07 Assist natural surveillance | Organizational | 5.22 Monitoring, review, and change management of supplier services |
#08 Reduce Anonymity | Organizational | 5.06 Contact with special interest groups |
#08 Reduce Anonymity | People | 6.01 Screening |
#08 Reduce Anonymity | Technological | 8.05 Secure authentication |
#08 Reduce Anonymity | Organizational | 5.16 Identity management |
#08 Reduce Anonymity | Organizational | 5.17 Authentication information |
#09 Utilise Place Managers | Organizational | 5.02 Information security roles and responsibilities |
#10 Strengthen Formal Surveillance | Organizational | 5.03 Segregation of duties |
#10 Strengthen Formal Surveillance | Organizational | 5.07 Threat intelligence |
#10 Strengthen Formal Surveillance | Organizational | 5.24 Information security incident management planning and preparation |
#10 Strengthen Formal Surveillance | Organizational | 5.25 Assessment and decision on information security events |
#10 Strengthen Formal Surveillance | Organizational | 5.28 Collection of evidence |
#10 Strengthen Formal Surveillance | Physical | 7.04 Physical security monitoring |
#10 Strengthen Formal Surveillance | Technological | 8.15 Logging |
#10 Strengthen Formal Surveillance | Technological | 8.16 Monitoring activities |
#10 Strengthen Formal Surveillance | Technological | 8.17 Clock synchronisation |
This PDF is available to Subscribers Only
View Article Abstract & Purchase OptionsFor full access to this pdf, sign in to an existing account, or purchase an annual subscription.