content stringlengths 26 2.54k | metadata dict |
|---|---|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
173 Document Classification: Public TLP: White
• Evidence of continuous monitoring of event logs ( e.g., the team that is
approved and dedicated to monitoring and controlling these logs).
5-1-3-4 Isolation of Safety Instrumental Systems (SIS).... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 172,
"page_label": "173",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
174 Document Classification: Public TLP: White
o Configure central service system (e.g., Active Directory) to prevent the
use of external storage media automatically; or
o Configure devices registry to prevent the use of external storage media
auto... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 173,
"page_label": "174",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
175 Document Classification: Public TLP: White
• Develop and approve procedures to use mobile devices, (including, but not
limited to, requesting ap provals via e -mail, paper, or through an internal
system). Such procedures include:
o Reason ... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 174,
"page_label": "175",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
176 Document Classification: Public TLP: White
Expected deliverables:
• Cybersecurity policy that covers the requirements of the protection of ICS/OT
(e.g., electronic copy or official hard copy).
• Reports on the review of Secure Configuration and... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 175,
"page_label": "176",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
177 Document Classification: Public TLP: White
• Ensure that the approved documented policy includes requirements for
ICS/OT Patch Management.
• Identify the organization's ICS/OT and determine their criticality, in
accordance with the relevan... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 176,
"page_label": "177",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
178 Document Classification: Public TLP: White
• Review the tools for industrial systems protection against viruses and
suspicious malware and malicious malware periodically to ensure the
comprehensiveness of the protection tools.
• Develop procedu... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 177,
"page_label": "178",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
179 Document Classification: Public TLP: White | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 178,
"page_label": "179",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
180 Document Classification: Public TLP: White | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 179,
"page_label": "180",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.