
Terminate (automatically) a user session after a defined condition.
- [XLS]
MITRE ATT&CK®
Gather Victim Host Information. Gather Victim Identity Information. Gather Victim Network Information. Gather Victim Org Information. Phishing for Information. Search Closed Sources. …
- [XLS]
HHS 405(d)
A type of malware (malicious software) distinct from other malware; its defining characteristic is that it attempts to deny access to a user’s data, usually by encrypting the data with a key …
- [XLS]
OWASP
Verify that files obtained from untrusted sources are validated to be of expected type and scanned by antivirus scanners to prevent upload of known malicious content.
It is a relatively trivial effort for a malicious individual to reconstruct original PAN data if they have access to both the truncated and hashed version of a PAN.
R1: Test Procedures R2: Ports and Services R3: Security Patch Management R4: Malicious Software Prevention R5: Account Management R6: Security Status Monitoring R7: Disposal or …
- [XLS]
Michigan Courts
b. Provide the following investigative scanning capabilities: - RegEx, File, Hash, and value search across all endpoints. - Malicious activity review and validation including analysis, tagging, …
SI-3 Malicious Code Protection SI-3 (1) Malicious Code Protection | Central Management SI-3 (2) Malicious Code Protection | Automatic Updates SI-3 (10)
- [XLS]
doit.maryland.gov
Policies, procedures, standards, or other documentation showing how the environment is protected against malicious code on mobile devices. Screenshots of platforms are acceptable.
- [XLS]
www.ati.org
Check media containing diagnostic and test programs for malicious code before the media are used in the system. Protect (i.e., physically control and securely store) system media …