Information Protection Program
18 controlsProgram governance, risk management, and information protection policies.
Not startedA certifiable framework that provides a comprehensive, prescriptive, and scalable security and privacy controls framework. Commonly adopted in healthcare and increasingly in other regulated industries.
Program governance, risk management, and information protection policies.
Not startedMalware protection, mobile device security, and removable media controls.
Not startedEncryption, tracking, and disposal of portable storage and devices.
Not startedUser registration, privilege management, password policies, and session controls.
Not startedEvent logging, monitoring, clock synchronization, and log protection.
Not startedNetwork segmentation, firewall management, and intrusion detection.
Not startedEncryption of data in transit, secure messaging, and remote access.
Not startedVulnerability scanning, patch management, and penetration testing.
Not startedBaseline configurations, change control, and system hardening.
Not startedBCP/DR planning, backup and recovery, and crisis communication.
Not startedNotice, consent, data minimization, retention, and individual rights.
Not startedVendor risk assessment, contracts, and ongoing monitoring.
Not started