Maintenance (MA)

Remote maintenance of organizational assets is approved, logged, and performed in a manner that prevents unauthorized access


Login

Protective Technology (PT)

Audit/log records are determined, documented, implemented, and reviewed in accordance with policy


Login

Protective Technology (PT)

Removable media is protected and its use restricted according to policy


Login

Protective Technology (PT)

The principle of least functionality is incorporated by configuring systems to provide only essential capabilities


Login

Protective Technology (PT)

Communications and control networks are protected


Login

Protective Technology (PT)

Mechanisms (e.g., failsafe, load balancing, hot swap) are implemented to achieve resilience requirements in normal and adverse situations


Login

Communications (CO)

Public relations are managed


Login

Communications (CO)

Reputation is repaired after an incident


Login

Communications (CO)

Recovery activities are communicated to internal and external stakeholders as well as executive and management teams


Login

Improvements (IM)

Recovery plans incorporate lessons learned


Login