Pretexting
- M3.4.1 - P2 - AWARENESS CAMPAIGN
- T4.1.1 - P3 - COMMMUNICATIONS POLICY
- M4.3.1 - P2 - MANAGEMENT RESPONSIBILITIES
- T4.3.2 - P3 - ON-LINE TRANSACTIONS
- T5.1.1 - P2 - ACCESS CONTROL POLICY
- T5.6.1 - P1 - INFORMATION ACCESS RESTRICTION
- T4.3.2 - P3 - ON-LINE TRANSACTIONS
Intentional Leaks/Sharing of Data by Staff
- M3.4.1 - P2 - AWARENESS CAMPAIGN
- M4.1.1 - P2 - HUMAN RESOURCES SECURITY POLICY
- M4.2.1 - P2 - SCREENING
- M4.3.2 - P2 - DISCIPLINARY PROCESS
- M5.2.3 - P2 - PROTECTION OF ORGANIZATIONAL RECORDS
- M5.2.4 - P3 -DATA PROTECTION AND PRIVACY OF PERSONAL INFORMATION
- T3.6.3 - P1 - MONITORING SYSTEM USE
- T5.5.1 - P1 - SECURE LOG-ON PROCEDURES
- T5.2.2 - P1 - PRIVILEGE MANAGEMENT
- T5.2.4 - P1- REVIEW OF USER ACCESS RIGHTS
- T5.4.2 - P1 -USER AUTHENTICATION FOR EXTERNAL CONNECTIONS
- T5.5.2 - P1 - USER IDENTIFICATION AND AUTHENTICATION
- T5.6.1 - P1 - INFORMATION ACCESS RESTRICTION
- T7.6.4 - P2 - INFORMATION LEAKAGE
Phishing
- M3.3.3 - P2 - TRAINING EXECUTION
- M3.4.1 - P2 - AWARENESS CAMPAIGN
- M4.1.1 - P2 - HUMAN RESOURCES SECURITY POLICY
- T3.4.1 - P1 - CONTROLS AGAINST MALWARE
- T3.4.2
- T4.1.1 - P3 - COMMMUNICATIONS POLICY
- T4.2.1 - P2 - INFORMATION TRANSFER PROCEDURES
- T5.1.1 - P2 - ACCESS CONTROL POLICY
- T5.5.1 - P1 - SECURE LOG-ON PROCEDURES
- T5.5.2 - P1 - USER IDENTIFICATION AND AUTHENTICATION
- T5.5.3 - P1 - USER CREDENTIALS MANAGEMENT SYSTEM
Accidental Leaks/ Sharing of Data by Staff
- M3.3.3 - P2 - TRAINING EXECUTION
- M3.4.1 - P2 - AWARENESS CAMPAIGN
- M5.2.3 - P2 - PROTECTION OF ORGANIZATIONAL RECORDS
- T3.6.3 - P1 - MONITORING SYSTEM USE
- T5.1.1 - P2 - ACCESS CONTROL POLICY
- T5.2.2 - P1 - PRIVILEGE MANAGEMENT
- T5.4.2 - P1 -USER AUTHENTICATION FOR EXTERNAL CONNECTIONS
- T5.5.2 - P1 - USER IDENTIFICATION AND AUTHENTICATION
- T5.6.1 - P1 - INFORMATION ACCESS RESTRICTION
- T5.6.3 - P3 - PUBLICY ACCESSIBLE CONTENT
- T7.6.4 - P2 - INFORMATION LEAKAGE
Illegal Processing of Data
- M3.3.3 - P2 - TRAINING EXECUTION
- M3.4.2
- M4.2.1 - P2 - SCREENING
- M4.3.2 - P2 - DISCIPLINARY PROCESS
- M4.4.3 - P1 - REMOVAL OF ACCES RIGHTS
- M5.2.2 - P4 - INTELLECTUAL PROPERTY RIGHTS (IPR)
- M5.2.3 - P2 - PROTECTION OF ORGANIZATIONAL RECORDS
- M5.2.2 - P4 - INTELLECTUAL PROPERTY RIGHTS (IPR)
- M1.3.1 - P2 - AUTHORIZATION PROCESS FOR INFORMATION SYSTEMS
- M1.3.2 - P2 - CONFIDENTIALITY AGREEMENTS
- T3.2.4 - P2 - SEGREGATION OF DUTIES
- T3.5.1 - P1 - INFORMATION BACKUP
- T3.6.3 - P1 - MONITORING SYSTEM USE
- T4.2.1 - P2 - INFORMATION TRANSFER PROCEDURES
- T3.2.4 - P2 - SEGREGATION OF DUTIES
- T5.2.2 - P1 - PRIVILEGE MANAGEMENT
- T5.2.3 - P1 - USER SECURITY CREDENTIALS MANAGEMENT
- T5.2.4 - P1- REVIEW OF USER ACCESS RIGHTS
- T5.3.1 - P1 - USE OF SECURITY CREDENTIALS
- T5.4.2 - P1 -USER AUTHENTICATION FOR EXTERNAL CONNECTIONS
- T5.4.3 - P1 - EQUIPMENT INDENTIFICATION NETWORKS
- T5.5.2 - P1 - USER IDENTIFICATION AND AUTHENTICATION
- T5.5.3 - P1 - USER CREDENTIALS MANAGEMENT SYSTEM
- T5.6.1 - P1 - INFORMATION ACCESS RESTRICTION
- T5.6.2 - P2 - SENSITIVE SYSTEM ISOLATION