[Forgot Password]
Login  Register Subscribe

24003

 
 

131517

 
 

106904

 
 

909

 
 

84902

 
 

134

 
 
Paid content will be excluded from the download.

Filter
Matches : 134 Download | Alert*

This guide presents a catalog of security-relevant configuration settings for Ubuntu 14.10 formatted in the eXtensible Configuration Checklist Description Format (XCCDF). <br xmlns="http://www.w3.org/1999/xhtml" /> <br xmlns="http://www.w3.org/1999/xhtml" /> Providing system administrators with such guidance informs them how to securely configure systems under their control in a variety of n ...

The Payment Card Industry (PCI) Data Security Standard (DSS) was developed to encourage and enhance cardholder data security and facilitate the broad adoption of consistent data security measures globally. PCI DSS provides a baseline of technical and operational requirements designed to protect cardholder data. PCI DSS applies to all entities involved in payment card processing - including merchan ...

The purpose of this publication is to provide guidelines for selecting and specifying security controls for information systems supporting the executive agencies of the federal government to meet the requirements of FIPS 200, Minimum Security Requirements for Federal Information and Information Systems. The guidelines apply to all components11 of an information system that process, store, or trans ...

The security series of papers will provide guidance from the Centers for Medicare and Medicaid Services (CMS) on the rule titled "Security Standards for the Protection of Electronic Protected Health Information," found at 45 CFR Part 160 and Part 164, Subparts A and C, commonly known as the Security Rule. The Security Rule was adopted to implement provisions of the Health Insurance Portability and ...

The North American Electric Reliability Corporation (NERC) maintains comprehensive reliability standards that define requirements for planning and operating the bulk electric system. Among these are eight Critical Infrastructure Protection (CIP) Cyber Security Standards, which specify a minimum set of controls and processes for power generation and transmission companies to follow to ensure the se ...

This guide has been created to assist IT professionals in effectively securing systems running Red Hat Enterprise Linux 5 desktops.

SecPod Saner 2.0 Generic Compliance Standards

SecPod Saner Generic Compliance Standards for Process Control

SecPod Saner Generic Compliance Standards for Port Control

SecPod Saner Generic Compliance Standards Device Control


Pages:      Start    2    3    4    5    6    7    8    9    10    11    12    13    ..   13

© 2013 SecPod Technologies