SCP Technique . | Clause Type . | ISO/IEC Control . |
---|---|---|
#11 Conceal Targets | Organizational | 5.12 Classification of information |
#11 Conceal Targets | Physical | 7.07 Clear desk and clear screen |
#11 Conceal Targets | Technological | 8.03 Information access restriction |
#11 Conceal Targets | Technological | 8.04 Access to source code |
#11 Conceal Targets | Technological | 8.11 Data masking |
#11 Conceal Targets | Technological | 8.24 Use of cryptography |
#12 Remove Targets | Physical | 7.14 Secure disposal or re-use of equipment |
#12 Remove Targets | Technological | 8.10 Information deletion |
#13 Identify Property | Organizational | 5.09 Inventory of information and other associated assets |
#13 Identify Property | Organizational | 5.13 Labelling of information |
#14 Disrupt Markets | Organizational | 5.05 Contact with authorities |
#14 Disrupt Markets | Organizational | 5.14 Information transfer |
#14 Disrupt Markets | Organizational | 5.26 Response to information security incidents |
#15 Deny Benefits | Organizational | 5.30 ICT readiness for business continuity |
#15 Deny Benefits | Technological | 8.06 Capacity management |
#15 Deny Benefits | Technological | 8.13 Information backup |
#15 Deny Benefits | Technological | 8.14 Redundancy of information processing facilities |
SCP Technique . | Clause Type . | ISO/IEC Control . |
---|---|---|
#11 Conceal Targets | Organizational | 5.12 Classification of information |
#11 Conceal Targets | Physical | 7.07 Clear desk and clear screen |
#11 Conceal Targets | Technological | 8.03 Information access restriction |
#11 Conceal Targets | Technological | 8.04 Access to source code |
#11 Conceal Targets | Technological | 8.11 Data masking |
#11 Conceal Targets | Technological | 8.24 Use of cryptography |
#12 Remove Targets | Physical | 7.14 Secure disposal or re-use of equipment |
#12 Remove Targets | Technological | 8.10 Information deletion |
#13 Identify Property | Organizational | 5.09 Inventory of information and other associated assets |
#13 Identify Property | Organizational | 5.13 Labelling of information |
#14 Disrupt Markets | Organizational | 5.05 Contact with authorities |
#14 Disrupt Markets | Organizational | 5.14 Information transfer |
#14 Disrupt Markets | Organizational | 5.26 Response to information security incidents |
#15 Deny Benefits | Organizational | 5.30 ICT readiness for business continuity |
#15 Deny Benefits | Technological | 8.06 Capacity management |
#15 Deny Benefits | Technological | 8.13 Information backup |
#15 Deny Benefits | Technological | 8.14 Redundancy of information processing facilities |
SCP Technique . | Clause Type . | ISO/IEC Control . |
---|---|---|
#11 Conceal Targets | Organizational | 5.12 Classification of information |
#11 Conceal Targets | Physical | 7.07 Clear desk and clear screen |
#11 Conceal Targets | Technological | 8.03 Information access restriction |
#11 Conceal Targets | Technological | 8.04 Access to source code |
#11 Conceal Targets | Technological | 8.11 Data masking |
#11 Conceal Targets | Technological | 8.24 Use of cryptography |
#12 Remove Targets | Physical | 7.14 Secure disposal or re-use of equipment |
#12 Remove Targets | Technological | 8.10 Information deletion |
#13 Identify Property | Organizational | 5.09 Inventory of information and other associated assets |
#13 Identify Property | Organizational | 5.13 Labelling of information |
#14 Disrupt Markets | Organizational | 5.05 Contact with authorities |
#14 Disrupt Markets | Organizational | 5.14 Information transfer |
#14 Disrupt Markets | Organizational | 5.26 Response to information security incidents |
#15 Deny Benefits | Organizational | 5.30 ICT readiness for business continuity |
#15 Deny Benefits | Technological | 8.06 Capacity management |
#15 Deny Benefits | Technological | 8.13 Information backup |
#15 Deny Benefits | Technological | 8.14 Redundancy of information processing facilities |
SCP Technique . | Clause Type . | ISO/IEC Control . |
---|---|---|
#11 Conceal Targets | Organizational | 5.12 Classification of information |
#11 Conceal Targets | Physical | 7.07 Clear desk and clear screen |
#11 Conceal Targets | Technological | 8.03 Information access restriction |
#11 Conceal Targets | Technological | 8.04 Access to source code |
#11 Conceal Targets | Technological | 8.11 Data masking |
#11 Conceal Targets | Technological | 8.24 Use of cryptography |
#12 Remove Targets | Physical | 7.14 Secure disposal or re-use of equipment |
#12 Remove Targets | Technological | 8.10 Information deletion |
#13 Identify Property | Organizational | 5.09 Inventory of information and other associated assets |
#13 Identify Property | Organizational | 5.13 Labelling of information |
#14 Disrupt Markets | Organizational | 5.05 Contact with authorities |
#14 Disrupt Markets | Organizational | 5.14 Information transfer |
#14 Disrupt Markets | Organizational | 5.26 Response to information security incidents |
#15 Deny Benefits | Organizational | 5.30 ICT readiness for business continuity |
#15 Deny Benefits | Technological | 8.06 Capacity management |
#15 Deny Benefits | Technological | 8.13 Information backup |
#15 Deny Benefits | Technological | 8.14 Redundancy of information processing facilities |
This PDF is available to Subscribers Only
View Article Abstract & Purchase OptionsFor full access to this pdf, sign in to an existing account, or purchase an annual subscription.