Item Search

NameAudit NamePluginCategory
Design Your ISMS to Protect Your Assets on AWSTenable AWS Best Practice Auditamazon_aws

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, MEDIA PROTECTION, PHYSICAL AND ENVIRONMENTAL PROTECTION, PROGRAM MANAGEMENT, RISK ASSESSMENT, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

FireEye - YARA policy applies both customer and FireEye rulesTNS FireEyeFireEye

SECURITY ASSESSMENT AND AUTHORIZATION

FireEye - YARA rules are enabledTNS FireEyeFireEye

SECURITY ASSESSMENT AND AUTHORIZATION

Mitigating and Protecting Against DoS & DDoS AttacksTenable AWS Best Practice Auditamazon_aws

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PROGRAM MANAGEMENT, RISK ASSESSMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

Mitigating Compromise and AbuseTenable AWS Best Practice Auditamazon_aws

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT, RISK ASSESSMENT

Using the AWS Trusted Advisor ToolTenable AWS Best Practice Auditamazon_aws

SECURITY ASSESSMENT AND AUTHORIZATION