Sandbox

From SecWiki
Jump to navigation Jump to search

This is test page to be deleted.

NameControl family
Access Control DecisionsAc
Access Control for Mobile DevicesAc
Access EnforcementAc
Account ManagementAc
Automated MarkingAc
Concurrent Session ControlAc
Data Mining ProtectionAc
Device LockAc
Information Flow EnforcementAc
Information SharingAc
Least PrivilegeAc
Permitted Actions Without Identification or AuthenticationAc
Policy and ProceduresAc
Previous Logon NotificationAc
Publicly Accessible ContentAc
Reference MonitorAc
Remote AccessAc
Security and Privacy AttributesAc
Separation of DutiesAc
Session TerminationAc
Supervision and Review — Access ControlAc
System Use NotificationAc
Unsuccessful Logon AttemptsAc
Use of External SystemsAc
Wireless AccessAc
AuthorizationCa
Continuous MonitoringCa
Control AssessmentsCa
Information ExchangeCa
Internal System ConnectionsCa
Penetration TestingCa
Plan of Action and MilestonesCa
Policy and ProceduresCa
Security CertificationCa
Alternate Audit Logging CapabilityAu
Audit Log Storage CapacityAu
Audit Record GenerationAu
Audit Record Reduction and Report GenerationAu
Audit Record RetentionAu
Audit Record Review, Analysis, and ReportingAu
Content of Audit RecordsAu
Cross-organizational Audit LoggingAu
Event LoggingAu
Monitoring for Information DisclosureAu
Non-repudiationAu
Policy and ProceduresAu
Protection of Audit InformationAu
Response to Audit Logging Process FailuresAu
Session AuditAu
Time StampsAu
Contacts with Security Groups and AssociationsAt
Literacy Training and AwarenessAt
Policy and ProceduresAt
Role-based TrainingAt
Training FeedbackAt
Training RecordsAt
Access Restrictions for ChangeCm
Baseline ConfigurationCm
Configuration Change ControlCm
Configuration Management PlanCm
Configuration SettingsCm
Data Action MappingCm
Impact AnalysesCm
Information LocationCm
Least FunctionalityCm
Policy and ProceduresCm
Signed ComponentsCm
Software Usage RestrictionsCm
System Component InventoryCm
User-installed SoftwareCm
Alternate Communications ProtocolsCp
Alternate Processing SiteCp
Alternate Storage SiteCp
Alternative Security MechanismsCp
Contingency PlanCp
Contingency Plan TestingCp
Contingency Plan UpdateCp
Contingency TrainingCp
Policy and ProceduresCp
Safe ModeCp
System BackupCp
System Recovery and ReconstitutionCp
Telecommunications ServicesCp
Adaptive AuthenticationIa
Authentication FeedbackIa
Authenticator ManagementIa
Cryptographic Module AuthenticationIa
Device Identification and AuthenticationIa
Identification and Authentication (non-organizational Users)Ia
Identification and Authentication (organizational Users)Ia
Identifier ManagementIa
Identity ProofingIa
Policy and ProceduresIa
Re-authenticationIa
Service Identification and AuthenticationIa
Incident HandlingIr
Incident MonitoringIr
Incident ReportingIr
Incident Response AssistanceIr
Incident Response PlanIr
Incident Response TestingIr
Incident Response TrainingIr
Information Spillage ResponseIr
Integrated Information Security Analysis TeamIr
Policy and ProceduresIr
Controlled MaintenanceMa
Field MaintenanceMa
Maintenance PersonnelMa
Maintenance ToolsMa
Nonlocal MaintenanceMa
Policy and ProceduresMa
Timely MaintenanceMa
Media AccessMp
Media DowngradingMp
Media MarkingMp
Media SanitizationMp
Media StorageMp
Media TransportMp
Media UseMp
Policy and ProceduresMp
Authority to Process Personally Identifiable InformationPt
Computer Matching RequirementsPt
ConsentPt
Personally Identifiable Information Processing PurposesPt
Policy and ProceduresPt
Privacy NoticePt
Specific Categories of Personally Identifiable InformationPt
System of Records NoticePt
Access AgreementsPs
External Personnel SecurityPs
Personnel SanctionsPs
Personnel ScreeningPs
Personnel TerminationPs
Personnel TransferPs
Policy and ProceduresPs
Position DescriptionsPs
Position Risk DesignationPs
Access Control for Output DevicesPe
Access Control for TransmissionPe
Alternate Work SitePe
Asset Monitoring and TrackingPe
Component MarkingPe
Delivery and RemovalPe
Electromagnetic Pulse ProtectionPe
Emergency LightingPe
Emergency PowerPe
Emergency ShutoffPe
Environmental ControlsPe
Facility LocationPe
Fire ProtectionPe
Information LeakagePe
Location of System ComponentsPe
Monitoring Physical AccessPe
Physical Access AuthorizationsPe
Physical Access ControlPe
Policy and ProceduresPe
Power Equipment and CablingPe
Visitor Access RecordsPe
Visitor ControlPe
Water Damage ProtectionPe
Baseline SelectionPl
Baseline TailoringPl
Central ManagementPl
Concept of OperationsPl
Policy and ProceduresPl
Privacy Impact AssessmentPl
Rules of BehaviorPl
Security and Privacy ArchitecturesPl
Security-related Activity PlanningPl
System Security Plan UpdatePl
System Security and Privacy PlansPl
Accounting of DisclosuresPm
Authorization ProcessPm
Complaint ManagementPm
Continuous Monitoring StrategyPm
Critical Infrastructure PlanPm
Data Governance BodyPm
Data Integrity BoardPm
Dissemination of Privacy Program InformationPm
Enterprise ArchitecturePm
Information Security Program Leadership RolePm
Information Security Program PlanPm
Information Security and Privacy ResourcesPm
Insider Threat ProgramPm
Measures of PerformancePm
Minimization of Personally Identifiable Information Used in Testing, Training, and ResearchPm
Mission and Business Process DefinitionPm
Personally Identifiable Information Quality ManagementPm
Plan of Action and Milestones ProcessPm
Privacy Program Leadership RolePm
Privacy Program PlanPm
Privacy ReportingPm
Protecting Controlled Unclassified Information on External SystemsPm
PurposingPm
Risk FramingPm
Risk Management Program Leadership RolesPm
Risk Management StrategyPm
Security and Privacy Groups and AssociationsPm
Security and Privacy WorkforcePm
Supply Chain Risk Management StrategyPm
System InventoryPm
Testing, Training, and MonitoringPm
Threat Awareness ProgramPm
Criticality AnalysisRa
Policy and ProceduresRa
Privacy Impact AssessmentsRa
Risk AssessmentRa
Risk Assessment UpdateRa
Risk ResponseRa
Security CategorizationRa
Technical Surveillance Countermeasures SurveyRa
Threat HuntingRa
Vulnerability Monitoring and ScanningRa
Acquisition Strategies, Tools, and MethodsSr
Component AuthenticitySr
Component DisposalSr
Inspection of Systems or ComponentsSr
Notification AgreementsSr
Policy and ProceduresSr
ProvenanceSr
Supplier Assessments and ReviewsSr
Supply Chain Controls and ProcessesSr
Supply Chain Operations SecuritySr
Supply Chain Risk Management PlanSr
Tamper Resistance and DetectionSr
Alternate Communications PathsSc
Architecture and Provisioning for Name/address Resolution ServiceSc
Boundary ProtectionSc
Collaborative Computing Devices and ApplicationsSc
Concealment and MisdirectionSc
Covert Channel AnalysisSc
Cross Domain Policy EnforcementSc
Cryptographic Key Establishment and ManagementSc
Cryptographic ProtectionSc
DecoysSc
Denial-of-service ProtectionSc
Detonation ChambersSc
Distributed Processing and StorageSc
External Malicious Code IdentificationSc
Fail in Known StateSc
Hardware-based ProtectionSc
Hardware-enforced Separation and Policy EnforcementSc
HeterogeneitySc
Information in Shared System ResourcesSc
Mobile CodeSc
Network DisconnectSc
Non-modifiable Executable ProgramsSc
Operations SecuritySc
Out-of-band ChannelsSc
Platform-independent ApplicationsSc
Policy and ProceduresSc
Port and I/O Device AccessSc
Process IsolationSc
Protection of Information at RestSc
Public Access ProtectionsSc
Public Key Infrastructure CertificatesSc
Resource AvailabilitySc
Secure Name/address Resolution Service (authoritative Source)Sc
Secure Name/address Resolution Service (recursive or Caching Resolver)Sc
Security Function IsolationSc
Sensor Capability and DataSc
Sensor RelocationSc
Separation of System and User FunctionalitySc
Session AuthenticitySc
Software-enforced Separation and Policy EnforcementSc
System PartitioningSc
System Time SynchronizationSc
Thin NodesSc
Transmission ConfidentialitySc
Transmission Confidentiality and IntegritySc
Transmission Preparation IntegritySc
Transmission of Security and Privacy AttributesSc
Trusted PathSc
Usage RestrictionsSc
Voice Over Internet ProtocolSc
Wireless Link ProtectionSc
De-identificationSi
Error HandlingSi
Fail-safe ProceduresSi
Flaw RemediationSi
Information DiversitySi
Information FragmentationSi
Information Input RestrictionsSi
Information Input ValidationSi
Information Management and RetentionSi
Information Output FilteringSi
Information RefreshSi
Malicious Code ProtectionSi
Memory ProtectionSi
Non-persistenceSi
Personally Identifiable Information Quality OperationsSi
Policy and ProceduresSi
Predictable Failure PreventionSi
Security Alerts, Advisories, and DirectivesSi
Security and Privacy Function VerificationSi
Software, Firmware, and Information IntegritySi
Spam ProtectionSi
System MonitoringSi
TaintingSi
Acquisition ProcessSa
Allocation of ResourcesSa
Component AuthenticitySa
Criticality AnalysisSa
Customized Development of Critical ComponentsSa
Developer Configuration ManagementSa
Developer ScreeningSa
Developer Security and Privacy Architecture and DesignSa
Developer Testing and EvaluationSa
Developer-provided TrainingSa
Development Process, Standards, and ToolsSa
External System ServicesSa
Policy and ProceduresSa
Security and Privacy Engineering PrinciplesSa
Software Usage RestrictionsSa
SpecializationSa
Supply Chain ProtectionSa
System Development Life CycleSa
System DocumentationSa
Tamper Resistance and DetectionSa
TrustworthinessSa
Unsupported System ComponentsSa
User-installed SoftwareSa