Tampering
- M3.2.1 - P2 - AWARENESS AND TRAINING PROGRAM
- M3.3.1 - P1 - TRAINING NEEDS
- T3.4.1 - P1 - CONTROLS AGAINST MALWARE
- M5.4.1 - P2 - TECHNICAL COMPLIANCE CHECKING
- T2.2.3 - P2 - SECURING OFFICES, ROOMS AND FACILITIES
- T2.3.1 - P2 - EQUIPMENT SITING AND PROTECTION
- T2.3.4 - P3 - EQUIPMENT MAINTENANCE
- T2.3.5 - P3 - SECURITY OF EQUIPMENT OFF-PREMISES
- T2.3.8 - P2 - UNATTENDED USER EQUIPMENT
- T3.4.1 - P1 - CONTROLS AGAINST MALWARE
- T3.4.2
- T3.5.1 - P1 - INFORMATION BACKUP
- T3.6.3 - P1 - MONITORING SYSTEM USE
- T3.6.5 - P2 - ADMINISTRATOR AND OPERATOR LOGS
- T5.2.3 - P1 - USER SECURITY CREDENTIALS MANAGEMENT
- T5.4.2 - P1 -USER AUTHENTICATION FOR EXTERNAL CONNECTIONS
- T5.4.4 - P4 - REMOTE DIAGNOSTIC AND CONFIGURATION PROTECTION
- T5.5.2 - P1 - USER IDENTIFICATION AND AUTHENTICATION
- T7.5.3 - P3 - ACCESS CONTROL TO PROGRAM SOURCE CODE
- T7.6.2 - P3 - TECHNICAL REVIEW OF APPLICATIONS AFTER OPERATING SYSTEM CHANGES
- T7.6.3 - P2 - RESTRICTIONS ON CHANGES TO SOFTWARE PACKAGES
- T7.7.1 - P1 - CONTROL OF TECHNICAL VULNERABILITIES
Major Accident
- T2.1.1 - P4 - PHYSICAL AND ENVIRONMENTAL SECURITY POLICY
- T2.2.3 - P2 - SECURING OFFICES, ROOMS AND FACILITIES
- T2.2.4 - P4 - PROCTECTING AGAINST EXTERNAL AND ENVIRONMENTAL THREATS
- T2.3.1 - P2 - EQUIPMENT SITING AND PROTECTION
- T3.5.1 - P1 - INFORMATION BACKUP
- T3.6.2 - P2 - AUDIT LOGGING
- T8.3.2 - P4 - REPORTING INFORMATION SECURITY EVENTS
- T8.2.1 - P2 - INCIDENT RESPONSE PLAN
- T8.2.2 - P2 - COMPUTER SECURITY INCIDENT RESPONSE TEAM
- T8.3.1 - P4 - SITUATIONAL AWARENESS
- T8.2.3 - P4 - INCIDENT CLASSIFICATION
- T8.2.4 - P4 - INCIDENT RESPONSE TRAINING
- T8.2.5 - P4 - INCIDENT RESPONSE TESTING
- T2.8.7 - P4 - INFORMATION SECURITY INCIDENT DOCUMENTATION
- T9.9.1 - P4 - INFORMATION SYSTEMS CONTINUITY PLANNING POLICY
- T9.2.1 - P3 - DEVELOPING INFORMATION SYSTEMS CONTINUITY PLANS
- T9.2.2 - P3 - IMPLEMENTATION INFORMATION SYSTEMS CONTINUITY PLANS
- T9.3.1 - P3 - TESTING, MAINTAINING AND RE-ASSESSING INFORMATION SYSTEMS CONTINUITY PLANS SYSTEMS CONTINUITY PLANS
Destruction of Equipment or Media
- T1.1.1 - P2 - ASSET MANAGEMENT POLICY
- T1.2.2 - P2- OWNERSHIP OF ASSETS
- T1.2.3 - P2 - ACCEPTABLE USE OF ASSETS
- T1.4.1 - P1 - MANAGEMENT OF REMOVABLE MEDIA
- T2.1.1 - P4 - PHYSICAL AND ENVIRONMENTAL SECURITY POLICY
- T2.2.1 - P2 - PHYSICAL SECURITY PERIMETER
- T2.2.2 - P2 - PHYSICAL ENTRY CONTROLS
- T2.2.3 - P2 - SECURING OFFICES, ROOMS AND FACILITIES
- T2.3.1 - P2 - EQUIPMENT SITING AND PROTECTION
- T2.3.5 - P3 - SECURITY OF EQUIPMENT OFF-PREMISES
- T2.3.8 - P2 - UNATTENDED USER EQUIPMENT
- T3.2.4 - P2 - SEGREGATION OF DUTIES
- T3.5.1 - P1 - INFORMATION BACKUP
- T9.9.1 - P4 - INFORMATION SYSTEMS CONTINUITY PLANNING POLICY
- T9.2.1 - P3 - DEVELOPING INFORMATION SYSTEMS CONTINUITY PLANS
- T9.2.2 - P3 - IMPLEMENTATION INFORMATION SYSTEMS CONTINUITY PLANS
- T9.3.1 - P3 - TESTING, MAINTAINING AND RE-ASSESSING INFORMATION SYSTEMS CONTINUITY PLANS SYSTEMS CONTINUITY PLANS
Physical Theft of Asset - Including Document, Media and Equipment
- M3.3.3 - P2 - TRAINING EXECUTION
- M3.4.1 - P2 - AWARENESS CAMPAIGN
- M4.3.2 - P2 - DISCIPLINARY PROCESS
- M4.4.2 - P1- RETURN OF ASSETS
- T1.1.1 - P2 - ASSET MANAGEMENT POLICY
- T1.2.1 - P2 - INVENTORY OF ASSETS
- T1.2.2 - P2- OWNERSHIP OF ASSETS
- T1.4.1 - P1 - MANAGEMENT OF REMOVABLE MEDIA
- T1.4.2 - P2 - DISPOSAL OF MEDIA
- T2.2.1 - P2 - PHYSICAL SECURITY PERIMETER
- T2.2.2 - P2 - PHYSICAL ENTRY CONTROLS
- T2.2.3 - P2 - SECURING OFFICES, ROOMS AND FACILITIES
- T2.3.1 - P2 - EQUIPMENT SITING AND PROTECTION
- T2.3.7 - P3 - REMOVAL OF PROPERTY
- T2.3.8 - P2 - UNATTENDED USER EQUIPMENT
- T2.3.9 - P3 - CLEAR DESK AND CLEAR SCREEN POLICY
- T3.5.1 - P1 - INFORMATION BACKUP
- T5.6.2 - P2 - SENSITIVE SYSTEM ISOLATION
- T7.4.1 - P2 - POLICY ON THE USE OF CRYPTOGRAPHIC CONTROLS
- T7.4.2 - P2 - KEY MANAGEMENT
Unauthorized Use of Equipment
- M1.3.1 - P2 - AUTHORIZATION PROCESS FOR INFORMATION SYSTEMS
- M4.4.1 - P1- TERMINATION RESPONSIBILITIES
- M5.2.5 - P3 - PREVENTIONS OF MISUSE OF INFORMATION SYSTEM
- T1.2.1 - P2 - INVENTORY OF ASSETS
- T2.3.1 - P2 - EQUIPMENT SITING AND PROTECTION
- T2.3.5 - P3 - SECURITY OF EQUIPMENT OFF-PREMISES
- T3.2.4 - P2 - SEGREGATION OF DUTIES
- T3.6.3 - P1 - MONITORING SYSTEM USE
- T5.2.3 - P1 - USER SECURITY CREDENTIALS MANAGEMENT
- T5.3.1 - P1 - USE OF SECURITY CREDENTIALS
- T5.5.2 - P1 - USER IDENTIFICATION AND AUTHENTICATION